Overview

Benefits

Zero Performance Loss
Non-intrusive data collection fundamentally avoids the high bandwidth and CPU resource consumption on CVMs associated with traditional methods, helping you build an efficient and stable cloud-based network monitoring system.

Security

Full-time and Full-flow Service

Real-time Data Collection

Easy Management
Features
Flow Log Collection
Flow logs can be generated for Virtual Private Clouds (VPCs), subnets, and Elastic Network Interfaces (ENIs). When created for VPCs or subnets, the flow logs for every individual ENI within those VPCs or subnets are collected. Each flow log record includes the following fields: source IP, destination IP, protocol, packet size, traffic volume, collection time window, and security group or Access Control List (ACL) permissions.
Flow Log Query
Flow Log Delivery
Scenarios
Network Failure Troubleshooting
Network Architecture Optimization
Network Threat Alarms

Network quality is fundamental to business stability. FL enhances this by enabling snapshotting of failure sites, allowing for quick identification of issues, network rewinding for tracking, and reduced downtime. FL can specifically be used to swiftly determine:
1. The CVMs responsible for issues like broadcast storms or excessive bandwidth usage.
2. Whether CVM inaccessibility is caused by improper security group or ACL settings.

FL gathers comprehensive ENI traffic data across the entire network, around the clock. By leveraging big data analytics and visualization, it enhances your data-driven network operations capabilities and optimizes your network architecture to:
1. Analyze historical network data to establish business network benchmarks.
2. Quickly identify performance bottlenecks to adjust scaling effectively.
3. Assess end users’ access regions to expand business coverage appropriately.
4. Examine network traffic to refine network security policies.

Implementing additional traditional traffic checkpoints can negatively impact the performance of CVMs. Conversely, FL’s continuous, comprehensive, and non-intrusive collection method enables the timely identification of the following network threats, enhancing system security without compromising CVM performance:
1. Attempts to connect to numerous IP addresses.
2. Communications with known malicious IPs.
3. Use of uncommon protocols.