You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Customers using Magic Network Monitoring can export virtual private cloud (VPC) flow logs from their cloud environment to Cloudflare's network. Cloudflare will then process these VPC flow logs and display analytics on your cloud traffic in the dashboard. Customers can also ingest data on their cloud traffic via our public GraphQL API which powers the cloud traffic analytics in the dashboard.
12
+
13
+
Currently, Magic Network Monitoring only supports AWS VPC flow logs via AWS Firehose. AWS VPC flow logs can only be configured via Cloudflare's API for Magic Network Monitoring.
14
+
15
+
To learn how to set up this feature, refer to [VPC flow log guide (beta)](/magic-network-monitoring/get-started/#vpc-flow-log-guide).
To begin using Magic Network Monitoring, complete the list of tasks below.
10
+
To begin using Magic Network Monitoring for network and/or cloud traffic visibility, complete the list of tasks below.
11
+
12
+
-[NetFlow and sFlow guide](#netflow-and-sflow-guide)
13
+
-[VPC flow log guide (beta)](#vpc-flow-log-guide)
11
14
12
15
If you are an Enterprise customer, Cloudflare can significantly accelerate the onboarding timeline during active-attack scenarios. Enterprise customers that would like to use Magic Network Monitoring and Magic Transit On Demand together can begin by [configuring Magic Transit](/magic-transit/get-started/).
13
16
14
-
## 1. Verify NetFlow or sFlow capabilities
17
+
## NetFlow and sFlow guide
18
+
19
+
### 1. Verify NetFlow or sFlow capabilities
15
20
16
21
Verify your routers are capable of exporting <GlossaryTooltipterm="NetFlow">NetFlow</GlossaryTooltip> or <GlossaryTooltipterm="sFlow">sFlow</GlossaryTooltip> to an IP address on Cloudflare's network. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
17
22
18
23
Refer to [Supported routers](/magic-network-monitoring/routers/supported-routers) to view a list of supported routers. The list is not exhaustive.
19
24
20
-
## 2. Register your router with Cloudflare
25
+
###2. Register your router with Cloudflare
21
26
22
27
When you register your router with Cloudflare, your router links your NetFlow or sFlow data to your Cloudflare account.
23
28
@@ -29,7 +34,7 @@ When you register your router with Cloudflare, your router links your NetFlow or
29
34
6. Under **Default router sampling rate**, enter a value for the <GlossaryTooltipterm="sampling">sampling</GlossaryTooltip> rate. The value should match the sampling rate of your NetFlow or sFlow configuration.
30
35
7. Select **Next**.
31
36
32
-
## 3. Configure your router
37
+
###3. Configure your router
33
38
34
39
Next, configure your router to send NetFlow/SFlow data to Cloudflare. For this step, you will also need to have your router's configuration menu open to input the values shown in the Cloudflare dashboard.
35
40
@@ -40,7 +45,7 @@ Refer to the [NetFlow/IPFIX configuration](/magic-network-monitoring/routers/net
40
45
3. Enter the values shown in your router's configuration.
41
46
4. Select **Next**.
42
47
43
-
## 4. Check your router configuration
48
+
###4. Check your router configuration
44
49
45
50
After setting up your router, confirm the configuration was successfully set up.
46
51
@@ -54,6 +59,40 @@ When you are done with router configuration, select **Finish onboarding**.
54
59
This will only be visible during the onboarding process. When you are finished onboarding, this page will no longer be visible.
55
60
:::
56
61
57
-
## 5. Create rules
62
+
###5. Create rules
58
63
59
64
Create rules to analyze data for a specific set of destinations or to implement thresholds. Refer to [Rules](/magic-network-monitoring/rules/) for more information.
Verify that your AWS account is capable of exporting AWS VPC flow logs via AWS Firehose. Currently, Magic Network Monitoring only supports VPC flow log ingestion for AWS.
71
+
72
+
### 2. Set up AWS Firehose to export VPC flow logs to Cloudflare
73
+
74
+
:::note
75
+
AWS VPC flow logs can only be configured via the Cloudflare API for Magic Network Monitoring. There are no inputs in the dashboard for configuring AWS VPC flow logs.
76
+
:::
77
+
78
+
1. Create an authorization token via [Cloudflare's API for Magic Network Monitoring](/api/resources/magic_network_monitoring/subresources/vpc_flows/subresources/tokens/methods/create/). This authorization token allows Cloudflare to identify and verify the account sending VPC flow logs to our endpoint.
79
+
80
+
<APIRequest
81
+
path="/accounts/{account_id}/mnm/vpc-flows/token"
82
+
method="POST"
83
+
/>
84
+
85
+
2. Set the `HTTP Headers - X-Amz-Firehose-Access-Key` in the stream configuration for the authorization token generated in the previous step.
86
+
87
+
3. Send your AWS Firehose VPC flow log stream towards `https://aws-flow-logs.cloudflare.com/`.
88
+
89
+
4. Select all of the AWS VPC flow log data fields that you want to send to Cloudflare. You should select the highest number AWS VPC flow log version that supports all the fields you want to export to Cloudflare (refer to [AWS flow log documentation](https://docs.aws.amazon.com/vpc/latest/userguide/flow-log-records.html) for more information). For example, if you need a version 8 field like `reject-reason`, you must export all fields from versions 1 through 8. Cloudflare supports all seven templates for AWS VPC Flow logs.
90
+
91
+
### 3. Verify your cloud traffic via analytics
92
+
93
+
After setting up AWS Firehose to send VPC flow logs to Magic Network Monitoring, you can confirm that Cloudflare is receiving the logs as expected by searching for your cloud traffic data in the analytics page of the Magic Network Monitoring dashboard.
94
+
95
+
1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
96
+
2. Go to **Analytics & Logs** > **Magic Monitoring**.
97
+
98
+
The default view will be the analytics dashboard for Magic Network Monitoring.
Copy file name to clipboardExpand all lines: src/content/docs/magic-network-monitoring/index.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,13 +20,13 @@ import {
20
20
21
21
<Description>
22
22
23
-
Improve your network visibility and detect DDoS attacks based on traffic flows.
23
+
Improve your network and cloud traffic visibility. Customers with public IPs can also detect DDoS attacks based on their traffic flows.
24
24
25
25
</Description>
26
26
27
27
<Plantype="all" />
28
28
29
-
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltipterm="flow data">flow data</GlossaryTooltip> sent from a customer's routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
29
+
Magic Network Monitoring provides visibility into your network traffic and cloud traffic by analyzing network <GlossaryTooltipterm="flow data">flow data</GlossaryTooltip> sent from a customer's routers or cloud environment. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow. In cloud environments, Magic Network Monitoring supports AWS VPC flow logs via AWS Firehose.
30
30
31
31
Magic Network Monitoring is generally available to everyone with a Cloudflare account by default. You can log in to your Cloudflare dashboard, select your account, then go to **Analytics & Logs** > **Magic Monitoring** to get started.
0 commit comments