Skip to content

Commit 3091acc

Browse files
marciocloudflarepedrosousa
authored andcommitted
[MNM] VPC flow logs (#21548)
* added flow logs page * changed page weight * added content * added netflow section * added flow log * added link * corrected headers * refined text * added beta badge * refined text * added apirequest * refined steps * Apply suggestions from code review Co-authored-by: Pedro Sousa <[email protected]> * added suggestion --------- Co-authored-by: Pedro Sousa <[email protected]>
1 parent 9ff7294 commit 3091acc

File tree

4 files changed

+64
-10
lines changed

4 files changed

+64
-10
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Cloud flow logs (beta)
3+
pcx_content_type: reference
4+
sidebar:
5+
order: 5
6+
label: Cloud flow logs
7+
badge:
8+
text: Beta
9+
---
10+
11+
Customers using Magic Network Monitoring can export virtual private cloud (VPC) flow logs from their cloud environment to Cloudflare's network. Cloudflare will then process these VPC flow logs and display analytics on your cloud traffic in the dashboard. Customers can also ingest data on their cloud traffic via our public GraphQL API which powers the cloud traffic analytics in the dashboard.
12+
13+
Currently, Magic Network Monitoring only supports AWS VPC flow logs via AWS Firehose. AWS VPC flow logs can only be configured via Cloudflare's API for Magic Network Monitoring.
14+
15+
To learn how to set up this feature, refer to [VPC flow log guide (beta)](/magic-network-monitoring/get-started/#vpc-flow-log-guide).

src/content/docs/magic-network-monitoring/get-started.mdx

Lines changed: 46 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,19 +5,24 @@ sidebar:
55
order: 2
66
---
77

8-
import { GlossaryTooltip } from "~/components";
8+
import { APIRequest, Badge, GlossaryTooltip } from "~/components";
99

10-
To begin using Magic Network Monitoring, complete the list of tasks below.
10+
To begin using Magic Network Monitoring for network and/or cloud traffic visibility, complete the list of tasks below.
11+
12+
- [NetFlow and sFlow guide](#netflow-and-sflow-guide)
13+
- [VPC flow log guide (beta)](#vpc-flow-log-guide)
1114

1215
If you are an Enterprise customer, Cloudflare can significantly accelerate the onboarding timeline during active-attack scenarios. Enterprise customers that would like to use Magic Network Monitoring and Magic Transit On Demand together can begin by [configuring Magic Transit](/magic-transit/get-started/).
1316

14-
## 1. Verify NetFlow or sFlow capabilities
17+
## NetFlow and sFlow guide
18+
19+
### 1. Verify NetFlow or sFlow capabilities
1520

1621
Verify your routers are capable of exporting <GlossaryTooltip term="NetFlow">NetFlow</GlossaryTooltip> or <GlossaryTooltip term="sFlow">sFlow</GlossaryTooltip> to an IP address on Cloudflare's network. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
1722

1823
Refer to [Supported routers](/magic-network-monitoring/routers/supported-routers) to view a list of supported routers. The list is not exhaustive.
1924

20-
## 2. Register your router with Cloudflare
25+
### 2. Register your router with Cloudflare
2126

2227
When you register your router with Cloudflare, your router links your NetFlow or sFlow data to your Cloudflare account.
2328

@@ -29,7 +34,7 @@ When you register your router with Cloudflare, your router links your NetFlow or
2934
6. Under **Default router sampling rate**, enter a value for the <GlossaryTooltip term="sampling">sampling</GlossaryTooltip> rate. The value should match the sampling rate of your NetFlow or sFlow configuration.
3035
7. Select **Next**.
3136

32-
## 3. Configure your router
37+
### 3. Configure your router
3338

3439
Next, configure your router to send NetFlow/SFlow data to Cloudflare. For this step, you will also need to have your router's configuration menu open to input the values shown in the Cloudflare dashboard.
3540

@@ -40,7 +45,7 @@ Refer to the [NetFlow/IPFIX configuration](/magic-network-monitoring/routers/net
4045
3. Enter the values shown in your router's configuration.
4146
4. Select **Next**.
4247

43-
## 4. Check your router configuration
48+
### 4. Check your router configuration
4449

4550
After setting up your router, confirm the configuration was successfully set up.
4651

@@ -54,6 +59,40 @@ When you are done with router configuration, select **Finish onboarding**.
5459
This will only be visible during the onboarding process. When you are finished onboarding, this page will no longer be visible.
5560
:::
5661

57-
## 5. Create rules
62+
### 5. Create rules
5863

5964
Create rules to analyze data for a specific set of destinations or to implement thresholds. Refer to [Rules](/magic-network-monitoring/rules/) for more information.
65+
66+
## VPC flow log guide <Badge text="Beta" variant="caution" />
67+
68+
### 1. Verify cloud flow log capabilities
69+
70+
Verify that your AWS account is capable of exporting AWS VPC flow logs via AWS Firehose. Currently, Magic Network Monitoring only supports VPC flow log ingestion for AWS.
71+
72+
### 2. Set up AWS Firehose to export VPC flow logs to Cloudflare
73+
74+
:::note
75+
AWS VPC flow logs can only be configured via the Cloudflare API for Magic Network Monitoring. There are no inputs in the dashboard for configuring AWS VPC flow logs.
76+
:::
77+
78+
1. Create an authorization token via [Cloudflare's API for Magic Network Monitoring](/api/resources/magic_network_monitoring/subresources/vpc_flows/subresources/tokens/methods/create/). This authorization token allows Cloudflare to identify and verify the account sending VPC flow logs to our endpoint.
79+
80+
<APIRequest
81+
path="/accounts/{account_id}/mnm/vpc-flows/token"
82+
method="POST"
83+
/>
84+
85+
2. Set the `HTTP Headers - X-Amz-Firehose-Access-Key` in the stream configuration for the authorization token generated in the previous step.
86+
87+
3. Send your AWS Firehose VPC flow log stream towards `https://aws-flow-logs.cloudflare.com/`.
88+
89+
4. Select all of the AWS VPC flow log data fields that you want to send to Cloudflare. You should select the highest number AWS VPC flow log version that supports all the fields you want to export to Cloudflare (refer to [AWS flow log documentation](https://docs.aws.amazon.com/vpc/latest/userguide/flow-log-records.html) for more information). For example, if you need a version 8 field like `reject-reason`, you must export all fields from versions 1 through 8. Cloudflare supports all seven templates for AWS VPC Flow logs.
90+
91+
### 3. Verify your cloud traffic via analytics
92+
93+
After setting up AWS Firehose to send VPC flow logs to Magic Network Monitoring, you can confirm that Cloudflare is receiving the logs as expected by searching for your cloud traffic data in the analytics page of the Magic Network Monitoring dashboard.
94+
95+
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
96+
2. Go to **Analytics & Logs** > **Magic Monitoring**.
97+
98+
The default view will be the analytics dashboard for Magic Network Monitoring.

src/content/docs/magic-network-monitoring/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ import {
2020

2121
<Description>
2222

23-
Improve your network visibility and detect DDoS attacks based on traffic flows.
23+
Improve your network and cloud traffic visibility. Customers with public IPs can also detect DDoS attacks based on their traffic flows.
2424

2525
</Description>
2626

2727
<Plan type="all" />
2828

29-
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltip term="flow data">flow data</GlossaryTooltip> sent from a customer's routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
29+
Magic Network Monitoring provides visibility into your network traffic and cloud traffic by analyzing network <GlossaryTooltip term="flow data">flow data</GlossaryTooltip> sent from a customer's routers or cloud environment. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow. In cloud environments, Magic Network Monitoring supports AWS VPC flow logs via AWS Firehose.
3030

3131
Magic Network Monitoring is generally available to everyone with a Cloudflare account by default. You can log in to your Cloudflare dashboard, select your account, then go to **Analytics & Logs** > **Magic Monitoring** to get started.
3232

src/content/docs/magic-network-monitoring/tutorials/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tutorials
33
pcx_content_type: navigation
44
sidebar:
5-
order: 5
5+
order: 6
66
group:
77
hideIndex: true
88

0 commit comments

Comments
 (0)