Pricing Login Free trial Support
All an engineer has to do is click a link, and they have everything they need in one place. That level of integration and simplicity helps us respond faster and more effectively.
Sajeeb Lohani
Global Technical Information Security Officer (TISO), Bugcrowd
Read case study

Glossary

VPC flow logging


A


B


C


D


E


F


G


H


I


J


K


L


M


N


O


P


Q


R


S


T


U


V


W


X


Y


Z

Table of contents

    What is VPC flow logging?

    VPC Flow logging lets you capture and log data about network traffic in your VPC. VPC Flow logging records information about the IP data going to and from designated network interfaces, storing this raw data in Amazon CloudWatch, where it can be retrieved and viewed.

    VPC flow logs dashboard sumo

    A VPC flow logging dashboard from Sumo Logic


    Click here to learn more about AWS Traffic Mirroring.

    Virtual private cloud

    Monitor all the activity within your cloud environment for a bird’s eye view of your operations but note the pricing above. Analysis of VPC logging should reveal popular or vulnerable resources to watch closely moving forward.

    Subnet

    VPCs are often divided into subnets spanning multiple availability zones in the region. Subnets can be private or public subnet. Private subnets isolate internal resources from public-facing traffic, among other uses. Public subnets require an elastic IP to communicate to the Internet. Create a flow log for a specific subnet where you may want to monitor all activity. In this example, you want to monitor flow logs to ensure no internet traffic goes to the private subnet.

    Network Interface

    One can monitor specific interfaces on AWS EC2 instances and capture flow logs from an interface. Capture full flow logs from critical connection points in your network to stay ahead of issues like latency and malicious intrusions.

    After choosing what resources you will log, define the logging parameters. These include:

    • Traffic type: You can filter by all, accepted, or rejected traffic.
    • Log name and destination: Specify a functional name for the log and where to store it in CloudWatch.
    • Necessary permissions: Ensure the log owner has identity access management (IAM) privileges to publish and work with the flow log.

    After setting up a flow log for a given resource, scaling is simple. The rules you outline will automatically replicate to additional instances, saving you time and trouble duplicating flow logs.

    • DNS traffic
    • DHCP

    Similarly, dynamic host configuration protocol (DHCP) traffic is not recorded. Depending on the size of your VPC, this can represent a notable amount of traffic.

    • Multiple IP Addresses

    Sometimes a virtual NIC will pool IP addresses for better performance. Flow logs only display traffic on the primary address.

    • Legacy limitations

    AWS instances before December 2013 running in the EC2 Classic format are incompatible with VPC Flow logging. Consider migrating to the current AWS format.

    With VPC Flow logging, Amazon adds a powerful deep analysis tool for your AWS cloud, including in a DevOps environment. Knowing how to turn it on, what critical data to collect, and what you can’t find in your VPC logs is a step in the right direction toward mastering VPC logging.

    Integrating directly with Google Stackdriver, Sumo Logic provides real-time observability for your GCP-generated log data. With the Sumo Logic app for Google Cloud VPC, gain real-time insights and analytics into network activity through interactive, customizable dashboards. You can look for unusual traffic patterns and suspicious activity with outlier detection.

    FAQs

    1. Utilize security groups: Define security group rules to control inbound and outbound traffic to your EC2 instances based on protocols, ports, and IP addresses. Restrict access to only necessary resources to reduce the attack surface.

    2. Implement network ACLs: Set up Network Access Control Lists (ACLs) at the subnet level to filter traffic and provide additional security for your VPC.

    3. Follow the least privilege principle: By configuring security group rules, grant only the minimum required permissions to each EC2 instance and avoid unnecessarily opening ports or protocols.

    4. Regularly review and update rules: Periodically review and update security group rules and network ACLs to ensure they align with your current security requirements and best practices.

    5. Use Bastion hosts: Employ Bastion hosts to securely administer your EC2 instances in private subnets by controlling SSH or RDP access through the Bastion host.

    6. Monitor and log activities: Enable VPC Flow logs to capture information about the IP traffic going to and from network interfaces in your VPC for security analysis and troubleshooting.

    Yes, Sumo Logic provides log management, infrastructure monitoring, APM and more as part of our full-stack observability solution. Any new telemetry collected from across your tech stack (physical or virtual machines, clouds, microservices, etc.) provides additional context and insights that help you gain visibility into your overall environment.

    There are many discussions in the DevOps world about the difference between monitoring and observability. Monitoring, by definition, is the process of collecting, analyzing and using data to track various systems. Meanwhile, observability leverages all the data from logs, metrics and traces to help development teams detect and resolve any issues. Observability focuses on understanding the context of all of the metrics and the internal state of your infrastructure.

    In simple terms, monitoring captures and displays data, and observability is understanding system health through inputs and outputs.