DEV Community

How CloudWatch Network Monitor Performs Connectivity Test to EC2 Instances

Introduction:

Amazon Web Services recently released a feature in CloudWatch "Network Monitor" which is responsible to perform connectivity tests between source and destination. This feature doesn't require any manual user intervention, it's a manage service by AWS which works smoothly without any agents installation i.e. no requirement of agents as well. This feature not only works within AWS environment, but also works between AWS and On-Premises environment to ensure no connectivity losses.

Ref Link: https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-cloudwatch-network-monitor-generally-available/

Pattern:

Image description

Image description

Solution Overview:

Below steps to be followed to implement -

  • Open CloudWatch console and click on "Network Monitor" option.
  • Click on "Create Monitor" and provide the basic required details as below.

Image description

  • Provide subnet name as "Source" and give "Destination IP" or IP ranges.

Image description

  • Review the provided details and submit.

Image description

  • Once submitted, the monitoring resource would be created along with provided probe information. Generally it takes time around 3-4 minutes to set up completely and come in "Active" state. After taking time to get metrics, it will display like below.

Image description

  • Please make sure this resource status is "Healthy" which confirms successful connectivity test.

As we have provided aggregated time as 30s, so the servers will be pinged in each 30 seconds time interval and provide the status of healthiness since it creation.

Packet Loss:

If this connectivity test gets failed or interrupted due to some network glitches or failure, packet loss section would provide the value "100%" with graphical representation.

Image description

Round Trip Time(RTT):

That defines the travel duration of traffics from source to destination.

Image description

Communication Protocols:

TCP and ICMP these two protocols are supported by this feature for now. ICMP probes carry echo request from mentioned source address to mentioned destination address and if destination resources replies back with echo request, then it gets considered as successful connectivity test. RTT and packet loss both are calculated on metric information from source to destination and vice versa.

RTT = (time taken from source-to-destination) + (time taken from destination-to-source)
Packet Loss = (% loss from source-to-destination) + (% loss from destination-to-source)

Note: The port number for corresponding protocol must be opened at security group level of that instance. For ICMP, it takes "All" in port section so no action required apart from adding ICMP rule, but in TCP, port needs to be taken care.

In case of TCP, probe carries TCP SYN packets from mentioned source details to destination and expects TCP SYN+ACK reply from destination.

Supported Region:

Asia Pacific (Hong Kong) ap-east-1
Asia Pacific (Mumbai) ap-south-1
Asia Pacific (Seoul) ap-northeast-2
Asia Pacific (Singapore) ap-southeast-1
Asia Pacific (Sydney) ap-southeast-2
Asia Pacific (Tokyo) ap-northeast-1
Canada West (Calgary) ca-west-1
Europe (Frankfurt) eu-central-1
Europe (Ireland) eu-west-1
Europe (London) eu-west-2
Europe (Paris) eu-west-3
Europe (Stockholm) eu-north-1
Middle East (Bahrain) me-south-1
South America (Sรฃo Paulo) sa-east-1
US East (N. Virginia) us-east-1
US East (Ohio) us-east-2
US West (N. California) us-west-1
US West (Oregon) us-west-2

Create an Alarm:

  • Open CloudWatch metrics and choose "AWS/NetworkMonitor" default namespace.
  • Search with correct probe ID.
  • Select the metrics and click on "bell" icon to configure alarms.

Image description

  • Keep the details as it is and set condition that Packet Loss should not be greater than "0" as below -

Image description

  • As a trigger, we have created EventBridge rule with lambda function, so that once packet loss alarm gets triggered, then it sends an email with sufficient information using SNS topic API.

EventBridge Rule Configuration:

Category: CloudWatch Alarm State Change

  • Below is the schema of event pattern.
{
  "source": ["aws.cloudwatch"],
  "detail-type": ["CloudWatch Alarm State Change"],
  "resources": ["arn:aws:cloudwatch:us-east-1:<account-id>:alarm:cw-network-packetloss-alarm-ec2"],
  "detail": {
    "state": {
      "value": ["ALARM"]
    }
  }
}
Enter fullscreen mode Exit fullscreen mode
  • Integrate EventBridge rule with Lambda function.

Image description

Lambda Function Code:

import json
import boto3
import os

def lambda_handler(event, context):
    id = event['id']
    account = event['account']
    timestamps = event['time']
    region = event['region']
    alarmarn = event['resources'][0]
    alarmname = event['detail']['alarmName']
    alarmreason = event['detail']['state']['reason']
    previousState = event['detail']['previousState']['value']
    currentstate = event['detail']['state']['value']
    Monitorname = event['detail']['configuration']['metrics'][0]['metricStat']['metric']['dimensions']['Monitor']    
    msg = f'Hi Team,\n\nPlease be informed that alarm \'{alarmname}\' in accountId {account} is in {currentstate} state. Please find below set of details to get more insights.\n\nAlarm Details:\n ID = {id},\nAccount = {account},\nTimestamp = {timestamps},\nRegion = {region},\nPreviousState = {previousState},\nCurrentState = {currentstate},\nAlarmARN = {alarmarn},\nAlarm_Reason = {alarmreason}\n\nThanks & Regards,\nAmazon Cloud Services'
    sns_client = boto3.client('sns')
    res = sns_client.publish(
        TopicArn = os.environ['snsarn'],
        Subject = f'Alarm: High Packet Loss Trigger Alert',
        Message = str(msg)
        )
Enter fullscreen mode Exit fullscreen mode

Testing:

For simplicity, we have executed below command which changes the alarm status from OK to ALARM forcefully for short period of time.
As a result, alarm status of probe has been changed as below snap.

Command: aws cloudwatch set-alarm-state --alarm-name "cw-network-packetloss-alarm-ec2" --state-value ALARM --state-reason "testing purposes"

Image description

Once lambda function is triggered successfully, it interacts with SNS topic to send email messages to subscribed email address.

Image description

Pricing:

Please check below link to get pricing estimation on CloudWatch NetworkMonitor.

Link: https://aws.amazon.com/cloudwatch/pricing/

Conclusion:

In this article we have seen how we can configure agentless network monitoring system within AWS network or hybrid network to ensure proper monitoring of packet loss and other metrices.
Hope this blog will help you to configure the things properly. Please let me know for more information or suggestion and follow me to get more on AWS.

Cheers!!

Top comments (1)

Collapse
 
robinamirbahar profile image
Robina

Amazing