Configuring network monitoring and logging for AWS services

Task Statement 2.1: Implement routing and connectivity between on-premises networks and the AWS Cloud.

📘AWS Certified Advanced Networking – Specialty


1. Why Network Monitoring and Logging Matter

In AWS, monitoring and logging help you:

  1. Track Network Health – See if your network connections (VPCs, Direct Connect, VPNs) are working correctly.
  2. Troubleshoot Issues – Identify why a service or connection is slow or failing.
  3. Security and Compliance – Detect unauthorized access, data leaks, or policy violations.
  4. Optimize Performance – Find bottlenecks and improve efficiency.

For the exam, you need to know which AWS services provide monitoring/logging, how they work, and when to use them.


2. AWS Tools for Network Monitoring

AWS has several key services for network monitoring:

a) Amazon CloudWatch

  • Purpose: Monitors AWS resources and applications in real-time.
  • What you can monitor:
    • VPCs, subnets, EC2 network traffic
    • VPN connection status
    • Transit Gateway metrics
  • Example metrics:
    • NetworkPacketsIn / Out – Number of packets in/out of an EC2 instance
    • TunnelState – VPN connection up or down
  • Exam Tip: Know how CloudWatch alarms can trigger notifications when a network metric crosses a threshold.

b) AWS CloudTrail

  • Purpose: Logs API calls and changes in your AWS environment.
  • Use for networking:
    • Track who created, deleted, or modified VPCs, Security Groups, NACLs, or Route Tables
  • Exam Tip: CloudTrail logs are essential for audit and compliance. Know that it records events, not metrics.

c) VPC Flow Logs

  • Purpose: Captures network traffic metadata for a VPC, subnet, or ENI.
  • What it logs:
    • Source/destination IP
    • Protocol (TCP/UDP)
    • Packet/byte counts
    • Accept/reject traffic status (allow/deny by security group/NACL)
  • Where logs go: CloudWatch Logs or S3
  • Example: You notice traffic from a suspicious IP being blocked by your NACL. Flow Logs show it.
  • Exam Tip: Understand the difference between accepted vs rejected traffic logs, and how it helps troubleshoot connectivity issues.

d) AWS Transit Gateway Network Manager

  • Purpose: Visualizes and monitors global network connectivity across multiple VPCs and on-premises sites.
  • Features:
    • View connections between multiple AWS Regions and on-premises networks
    • Detect network health issues
  • Exam Tip: Know that it integrates with CloudWatch for alerts.

e) AWS Route Analyzer / Reachability Analyzer

  • Purpose: Tests network paths and routing between two endpoints.
  • Use case:
    • Verify if an EC2 instance in one VPC can reach another instance via VPN or Transit Gateway
  • Exam Tip: These are diagnostic tools, not continuous monitoring tools. Know their difference from VPC Flow Logs.

3. Logging Best Practices for Networking

  1. Enable VPC Flow Logs for all critical subnets – Helps troubleshoot connectivity and security issues.
  2. Send logs to S3 for long-term storage – Retain for audits or compliance.
  3. Use CloudWatch for real-time alerts – Immediate notification of failures or anomalies.
  4. Enable CloudTrail globally – Track all API changes across accounts.
  5. Tag resources properly – Makes filtering and monitoring logs easier.

4. Monitoring On-Premises Connectivity

When connecting AWS to on-premises networks via Direct Connect or VPN, monitor:

  • Direct Connect: Use CloudWatch metrics like ConnectionState, BytesIn/Out, and BGP status.
  • VPN Connections: Monitor TunnelState metrics. Set alarms for tunnel down events.
  • Hybrid Networks: Transit Gateway + Network Manager to visualize multi-site connectivity.

Exam Tip: Know how to combine CloudWatch alarms + Flow Logs to detect and troubleshoot hybrid network issues.


5. Example Study Points for Exam

TopicKey Points
CloudWatchMetrics, alarms, network packets, VPN tunnel state
CloudTrailAPI logging, VPC modifications, audit trail
VPC Flow LogsTraffic metadata, accept/reject logs, troubleshooting
Transit Gateway Network ManagerMulti-VPC/multi-region monitoring, health visualization
Reachability AnalyzerTest network paths, connectivity verification
Best PracticesEnable logging, use CloudWatch alarms, store logs for audits

6. Exam Tip Summary

  1. VPC Flow Logs → traffic-level logging
  2. CloudTrail → API-level logging
  3. CloudWatch → metrics + alarms
  4. Transit Gateway + Network Manager → global hybrid monitoring
  5. Reachability Analyzer → network path testing

Think of it like layers: Flow Logs → CloudWatch → Network Manager → Alerts. Each layer gives you more visibility into your network.

Buy Me a Coffee