AWS re:Postを使用することにより、以下に同意したことになります AWS re:Post 利用規約

How we can apply Alerting on AWS Networking resources

0

Dear Team,

I am planning to apply the HEALTH CHECK Alert on following recourses of AWS.

  1. Virtual Private Cloud a. Public Subnet b. Private Subnet

  2. Internet Gateway

  3. NAT Gateway

  4. Security Groups

I have search and did not found any useful help. Appreciated your kind support.

Thanks Malik Adeel Imtiaz

質問済み 2年前2308ビュー
3回答
1

Many of the resources you've mentioned are virtual and not built using a single "thing" which makes performing health checks difficult. I will attempt to answer the question though.

  1. If you can connect from an instance in that VPC to another instance in the VPC then the VPC is working. This is true for both private and public subnets. I would suggest setting up some sort of network probe (Lambda would be ideal for this) that emits a metric to your monitoring tool (CloudWatch Metrics would suit here).
  2. Similarly, if you can connect to an external (public) IP address from within your VPC or you can connect to an Elastic (or Public) IP connected to your VPC from an external source then the Internet Gateway is working.
  3. Same as (1) and (2) - except this time ensure that the network probe is on a private subnet and it is probing an external resource that must be reached via the NAT Gateway.
  4. Security groups aren't a physical firewall; they are (more or less) a property of the instance. You can check to see if the security group is operating correctly by probing ports that should be open (to confirm that they are open); and probing ports that should be closed (to confirm that they are closed). You might also use VPC Reachability Analyzer for this although it doesn't send probes - instead it uses automated reasoning to determine if your security groups are configured correctly.

With all of that said: In my opinion performing these health checks are not a good way to spend your time (or money). Instead, I would be building monitoring that is looking at the health and response times of the applications that are hosted in the VPC. This has the side effect of ensuring that all the other components are working correctly but also gives you greater visibility into what your end-users are experiencing. You might also consider CloudWatch Real-User Monitoring for this task.

profile pictureAWS
エキスパート
回答済み 2年前
profile pictureAWS
エキスパート
レビュー済み 1年前
0

Thank you so much Gurus, for your reply.

Please see that if any outage occur in any AWS Services in any Region we will not receive any email for that. Until Client or / End User complaint us that there app is not working (irrespective of what services they are using). We need to check the application first. Then open this link -->> https://status.aws.amazon.com/govcloud And need to check the service manually that it is working fine in the region from where client has logged a complaint.

So main focus was to configure the alert on below services.

  1. Virtual Private Cloud a. Public Subnet b. Private Subnet
  2. Internet Gateway
  3. NAT Gateway
  4. Security Groups

So that if these services got some outage we can get the Alert on Email.

回答済み 2年前
  • As per my answer: Some of those things you can't monitor directly. Doing end-to-end monitoring will ensure that your entire service is working as well as (by proxy) ensuring that the services you want to monitor are working correctly. You can't check a VPC or subnet to see if it is working - it isn't a valid question for that type of construct. Even on premises you can't check to see that a subnet is working - you have to check connectivity to something on that subnet. Same applies here - check to see that your application is working correctly and you've proven the other things.

0

Since you didn't mention what metric you would like to cover, I will just provide the documentation and maybe we can help you more once you provide additional info. Do you want only to check that it is available or anything else?

VPC - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-cloudwatch.html

NAT GTW - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway-cloudwatch.html

Security groups - https://aws.amazon.com/premiumsupport/knowledge-center/monitor-security-group-changes-ec2/

What is it you want to monitor with Internet GTW? You can use AWS Config , for example - https://docs.aws.amazon.com/config/latest/developerguide/internet-gateway-authorized-vpc-only.html

Not sure if helpful but this https://wellarchitectedlabs.com/reliability/300_labs/300_health_checks_and_dependencies/ LAB can provide additional insight to you.

Let us know what's your use case so we can a little dive deeper

回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ