For intelligent monitoring of services running in Amazon cloud, you can integrate Dynatrace with Amazon Web Services (AWS). AWS integration helps you stay on top of the dynamics of your data center in the cloud.
đź”· Review how Dynatrace integrates with AWS CloudWatch
đź”· Review how Metric events for alerts
In addition to monitoring your AWS workloads using OneAgent, Dynatrace provides integration with AWS CloudWatch which adds infrastructure monitoring to gain insight even into serverless application scenarios.
Dynatrace brings value by enriching the data from AWS CloudWatch extending observability into the platform with additional metrics for cloud infrastructure, load balancers, API Management Services, and more.
These metrics are managed by Dynatrace's AI engine automatically and this extended observability improves operations, reduces MTTR and increases innovation.
Here is an example from another environment.

Notice the following details:

Here is an example of a host with no OneAgent.
Notice the following details:

Here is a list of the Lambda functions. Notice tags and time-series data.

As AWS services are enabled, Dynatrace will enable preset dashboards automatically. These can be cloned and customized or hidden as required. Here is one example:

To see more dashboards, navigate to this repository:
There are several ways one can configure the Dynatrace AWS monitor, but for this workshop we will use a quick solution using AWS Key based access following these basic steps:
The AWS monitoring policy defines the minimum scope of permissions you need to give to Dynatrace to monitor the services running in your AWS account. Create it once and use anytime when enabling Dynatrace access to your AWS account.
1 . Go to Identity and Access Management (IAM) in your Amazon Console.
2 . Go to Policies menu option on left
3 . On the Policies page, click the Create policy button.

4 . On the new policy page, select the JSON tab and paste this predefined policy from the box below from the JSON from this Dynatrace page:
When you are done, it should look like this:s

5 . You can skip over the Add tags page
6 . One the Review policy page, use the policy name of dynatrace_monitoring_policy

7 . Click Create policy button.
Dynatrace can use access keys to make secure REST or Query protocol requests to the AWS service API. You'll need to generate an Access key ID and a Secret access key that Dynatrace can use to get metrics from Amazon Web Services.
1 . On the IAM page in the AWS console, pick the Users menu
2 . On the new use page, click Add User.
Dynatrace_monitoring_userNext:Permissions buttonSpecify User Details

3 . On the set permissions page
Attach existing policies directly tabdynatrace_monitoring_policyClick Next: Review button
4 . You can skip over the Add tags page
5 . Review the user details and click Create user.

6 . In order to create an Access key and Secret, we first need to access the newly created user.

7 . Choose the Security Credentials Tab ...

8 . and click on Create access key

9 . In the Access key best practices & alternatives choose the Third-party service tab, check the "I understand ..." box and proceed to Next .

10 . You can skip setting a description tag and directly Create access key.
11 . You can store the Access Key ID name (AKID) and Secret access key values using any of the available methods. Be mindful of the warning up top though: This is the only time that the secret access key can be viewed or downloaded. You cannot recover it later. However, you can create a new access key any time.

Once you've granted AWS access to Dynatrace, it's time to connect Dynatrace to your Amazon AWS account.
1 . In the Dynatrace menu, go to Settings > Cloud and virtualization > AWS
2 . Click Connect new instance button.
3 . Select Key-based authentication method.
dynatrace_workshop)Access key ID field, paste the identifier of the key you created in Amazon for Dynatrace access.Secret access key field, paste the value of the key you created in Amazon for Dynatrace access.Connect to verify and save the connection.
4 . Once the connection is successfully verified and saved, your AWS account will be listed in the Cloud and virtualization settings page. If successful, your should see the configuration now on the AWS connections page:

On the far left Dynatrace menu, navigate to the Infrastructure -> AWS menu.

You may see no data initially as seen here. This is because Dynatrace makes Amazon API requests every 5 minutes, so it might take a few minutes for data to show until we are done with application setup on AWS.

Once data is coming in, the dashboard pages will look similar to what is shown below.


Once data starts to be collected, click in the blue availability zone section located under the grey header labeled EC2 and you should see the list of availability zones below. Click on us-west-2c and the EC2 instances will be listed.

Click on an EC2 instance, and you will see how this host still is represented in the same Host view that we saw earlier with the host running the OneAgent. The basic CPU and memory metrics from CloudWatch are graphed for you. What is GREAT, is that this host is being monitored automatically by the Dynatrace AI engine and can raise a problem when there are anomalies.

The AWS monitor is a central way to get a picture and metrics for the AWS resources running against your accounts as you migrate.
Read more about how to scale your enterprise cloud environment with enhanced AI-powered observability of all AWS services in this Dynatrace blog
See the Dynatrace Docs for more details on the setup options.
Dynatrace Davis automatically analyzes abnormal situations within your IT infrastructure and attempts to identify any relevant impact and root cause. Davis relies on a wide spectrum of information sources, such as a transactional view of your services and applications, as well as all on events raised on individual nodes within your Smartscape topology.
There are two main sources for single events in Dynatrace:
Custom metric events are configured in the global settings of your environment and are visible to all Dynatrace users in your environment.
1 . To add custom alerts, navigate to Settings --> Anomaly Detection --> Custom Events for Alerting menu.
2 . Click the Create custom event for alerting button.

3 . In the Metric dropdown list, type EC2 CPU usage % and pick the Cloud platforms > AWS > EC2 > CPU > usage option and Pick Average

4 . Click Add rule-base button and update as shown below

5 . Choose Static threshold and update as shown below

6 . Add the Event Description to have the title and severity = CUSTOM ALERT as shown below.

Notice the Alert preview chart that helps you in reviewing these settings

7 . Save your changes
8 . Add another rule, with everything the same, except for the Event Description to have the title and severity = RESOURCE as shown below.

9 . Save your changes and the list should look as shown below.

To connect to the host, simply use EC2 Instance Connect. To this, navigate to the EC2 instances page in the AWS console.
From the list, pick the dt-orders-monolith and then the connect button.

Then on the next page, choose the EC2 Instance Connect option and then the connect button.

Once you connected, you will see the terminal prompt like the below.
Welcome to Ubuntu 20.04.2 LTS (GNU/Linux 5.4.0-1045-aws x86_64)
...
...
To run a command as administrator (user "root"), use "sudo <command>".
See "man sudo_root" for details.
ubuntu@ip-10-0-0-118:~$
Using a unix utility yes, we can generate CPU stress just by running the yes command a few times.
In the terminal, copy all these lines and run them:
yes > /dev/null &
yes > /dev/null &
yes > /dev/null &
To verify, run this command:
ps -ef | grep yes
The output should look like this:
ubuntu 5802 5438 99 20:48 pts/0 00:00:05 yes
ubuntu 5805 5438 89 20:48 pts/0 00:00:04 yes
ubuntu 5806 5438 97 20:48 pts/0 00:00:03 yes
ubuntu 5818 5438 0 20:48 pts/0 00:00:00 grep --color=auto yes
3 . Back in Dynatrace within the host view, the CPU should now be high as shown below

4 . It may take a minute or so, but you will get two problem cards as shown below. #1 is the alert from the severity = RESOURCE where Davis was invoked, and #2 is the alert from severity = CUSTOM ALERT.

1 . Navigate to Settings --> Integrations --> Problem Notifications
2 . Read the overview and then click the Add Notification button
3 . Click various Notification types from the drop down to review the configurations inputs.
4 . For the Custom integration type, review the option to customize the payload.
5 . Notice how you can choose the Alert profile, but you only have default
1 . Navigate to Settings --> Alerting --> Alerting profiles
2 . Read the overview and then expand the default rule.
3 . Now add one, by clicking on the Add alerting profile button
4 . Review the options to choose severity rules and filters
To stop the problem, you need to kill the processes. To do this:
1 . Back in the CloudShell, run this command to get the process IDs ps -ef | grep yes
2 . For each process, copy the process ID and run kill
For example:
# If output is this...
ubuntu@ip-10-0-0-118:~$ ps -ef | grep yes
ubuntu 5802 5438 99 20:48 pts/0 00:00:05 yes
ubuntu 5805 5438 89 20:48 pts/0 00:00:04 yes
ubuntu 5806 5438 97 20:48 pts/0 00:00:03 yes
# Then run...
kill 5802
kill 5805
kill 5806
3 . Verify they are gone by running this again ps -ef | grep yes
4 . Verify that CPU in Dynatrace goes to normal and the problems will eventually automatically close
Simply type exit to exit the VM and return the CloudShell.
In this section, you should have completed the following:
âś… Review how Dynatrace integrates with AWS CloudWatch
âś… Review how AWS CloudWatch metrics can be configured as Metric events for alerts
The Dynatrace integrated solution for AWS Control Tower provides a way to establish Dynatrace monitoring for multi-account AWS environments. This solution automates the configuration process when AWS managed accounts are created. By ingesting metrics published to Amazon CloudWatch (Watch) for databases, networks, and compute services, Dynatrace provides a picture of your environment.
You can read more about this on this AWS Marketplace blogs