Flow Logs (FL) service provides log collection, query, data management and record features, helping you easily perform OPS and quickly troubleshoot issues.
After a flow log is created for an ENI, the log stream of the ENI will be automatically collected and the log data will be synced to CLS. In the CLS topic, each ENI has a unique log stream which contains flow log records.
CLS supports querying hundreds of millions of log data entries. You can search for data with full text or multiple keywords across topics, and the results can be returned within seconds.
FL integrates with CLS to store and manage log data.
A flow log records the network flow that passes through the capture window and matches the 5-tuple rules.
version account-id interface-id srcaddr dstaddr srcport dstport protocol packets bytes start end action log-status
Field | Description |
---|---|
version | FL version. |
account-id | AppID of the FL account. |
interface-id | ENI ID. |
srcaddr | Source IP. |
dstaddr | Destination IP. |
srcport | Source port of the traffic. |
dstport | Destination port of the traffic. |
protocol | IANA protocol number of the traffic. For more information, see the assigned Internet Protocol Numbers. |
packets | Number of packets transferred in the capture window. |
bytes | Number of bytes transferred in the capture window. |
start | Start time of the capture window in Unix seconds. |
end | End time of the capture window in Unix seconds. |
action | Traffic-related action. Valid values: ACCEPT: the traffic allowed by the security group or network ACL. REJECT: the traffic rejected by the security group or network ACL. |
log-status | Logging status of the flow log. OK: Data is logging normally to the specified destination. NODATA: There was no network traffic passing through the ENI in the capture window. SKIPDATA: Some flow log records were skipped in the capture window. This may be caused by an internal capacity constraint or an internal error. |
The flow log recorded when the SSH traffic (destination port: 22; TCP) of the ENI eni-lq6mkcis
under the account 1251762227
was accepted:
2 1251762227 eni-lq6mkcis 172.31.16.139 172.31.16.21 20641 22 6 20 4249 1418530010 1418530070 ACCEPT OK
The flow log recorded when the RDP traffic (destination port: 3389; TCP) of the ENI eni-lq6mkcis
under the account 1251762227
was rejected:
2 1251762227 eni-lq6mkcis 172.31.9.69 172.31.9.12 49761 3389 6 20 4249 1418530010 1418530070 REJECT OK
The flow log recorded when there was no data collected in the capture window:
V1 1251762227 eni-lq6mkcis - - - - - - - 1431280876 1431280934 - NODATA
The flow log recorded when there was data skipped in the capture window:
V1 1251762227 eni-lq6mkcis - - - - - - - 1431280876 1431280934 - SKIPDATA
Flow log record of security group and network ACL rules:
Since security group is stateful, it allows response to the accepted traffic; as network ACL is stateless, therefore, the response to the accepted traffic should follow the network ACL rules.
For example, if you ping your instance (private IP of the network interface: 172.31.16.139) from your home computer (IP: 203.0.113.12), and the security group's inbound rule allows the ICMP traffic while its outbound rule does not, your instance will respond to the ping request as the security group is stateful.
If your network ACL allows the inbound but rejects the outbound ICMP traffic, response to the ping request will be discarded and will not be sent to your home computer as the network ACL is stateless. In this case, the flow log has two records:
V1 1251762227 eni-lq6mkcis 203.0.113.12 172.31.16.139 0 0 1 4 336 1432917027 1432917142 ACCEPT OK
V1 1251762227 eni-lq6mkcis 172.31.16.139 203.0.113.12 0 0 1 4 336 1432917094 1432917142 REJECT OK
If your network ACL allows the outbound ICMP traffic, your flow log will have two ACCEPT records (one for sending the ping request and the other for responding). If your security group rejects the inbound ICMP traffic and the traffic does not reach your instance, the flow log has one REJECT record.
Was this page helpful?