Monitoring is an important part of maintaining the availability and performance of Global Accelerator and your AWS solutions. You should collect monitoring data from all of the parts of your AWS solution so that you can more easily debug a multi-point failure if one occurs. AWS provides several tools for monitoring your Global Accelerator resources and activity, and responding to potential incidents.
AWS Global Accelerator publishes data points to Amazon CloudWatch for your accelerators. CloudWatch enables you to retrieve statistics about those data points as an ordered set of time-series data, known as metrics.
AWS Global Accelerator currently publishes three metrics (AWS/GlobalAccelerator namespace) to Amazon CloudWatch:
Flow logs enable you to capture information about the IP address traffic going to and from network interfaces in your accelerator in AWS Global Accelerator. Flow log data is published to Amazon S3, where you can retrieve and view your data after you’ve created a flow log. Currently you can not enable flow logs using the web console, you must AWS Global Accelerator UpdateAcceleratorAttributes API, for more information and steps to enable flow logs, see flow logs in AWS Global Accelerator.
Sample log file:
version aws_account_id accelerator_id client_ip client_port gip gip_port endpoint_ip endpoint_port protocol ip_address_type packets bytes start_time end_time action log_status globalaccelerator_source_ip globalaccelerator_source_port endpoint_region globalaccelerator_region direction vpc_id 2.0 071855492661 ad530208-6600-4e87-9706-1f89a7e36abc 126.96.36.199 37760 188.8.131.52 80 172.31.21.192 80 TCP IPV4 0 0 1580605194 1580605204 ACCEPT OK - 0 ap-northeast-1 NRT57-2 INGRESS vpc-0f24e33eec64ec958
AWS Solutions Architecture team has published a blog post that uses Amazon Athena (an interactive query tool for S3-based data) and Amazon QuickSight (a cloud-based business intelligence service) to analyze and visualize the flow log data and develop actionable business value. This will help to easily troubleshoot reachability issues for your application, identify security vulnerabilities, or get an overview of how end-users access your application.
For more information and implementation details read the blog post here.
Congratulations! You just completed the workshop, do not forget to delete the resources.