{"componentChunkName":"component---src-templates-blog-js","path":"/ctf/aws-formation/tp10-monitoring-reporting","result":{"data":{"markdownRemark":{"html":"<h1>TP10 - Monitoring &#x26; Reporting</h1>\n<h2>1. Cloudwatch Introduction</h2>\n<h3>definition</h3>\n<p><strong>CW is a monitoring service to monitor your AWS resources, as well as the applications that you run on AWS</strong></p>\n<h3>what can we monitor with CW</h3>\n<ul>\n<li>\n<p>Compute</p>\n<ul>\n<li>autoscaling group</li>\n<li>elastics load balancers</li>\n<li>route53 Heatlth checks</li>\n</ul>\n</li>\n<li>\n<p>Storage &#x26; Content delivery</p>\n<ul>\n<li>EBS VOlumes</li>\n<li>Storage Gateays</li>\n<li>CloudFront</li>\n</ul>\n</li>\n<li>\n<p>Database &#x26; Analytics</p>\n<ul>\n<li>DynamoDB</li>\n<li>ELasticache Nodes</li>\n<li>RDS Instances</li>\n<li>Elastics MapReduce Job Flows</li>\n<li>Redshift</li>\n</ul>\n</li>\n<li>\n<p>Other</p>\n<ul>\n<li>SNS Topics </li>\n<li>SQS queuss</li>\n<li>pswork</li>\n<li>CloudWatch Logs</li>\n<li>Estimate Charge on your AWS Build</li>\n</ul>\n</li>\n</ul>\n<h3>CloudWatch and EC2</h3>\n<p>When CW comes on EC2, it monirtores <strong>by default</strong> :</p>\n<ul>\n<li>\n<p><strong>Host Level Metrics</strong> consist of : </p>\n<ul>\n<li>CPU</li>\n<li>Network</li>\n<li>Disk</li>\n<li>Status Check</li>\n</ul>\n</li>\n<li><strong>custom metrics</strong> :\nby default EC2 monitoring is** 5 minutes interfvales<strong>, unless you enable detailed monitoring hich will then make it a **1 minute intervals</strong> (1 minutes is the minimum)</li>\n</ul>\n<h3>How long are CW metrics Stored</h3>\n<ul>\n<li>\n<p>you can <strong>retrieve this data</strong> </p>\n<ul>\n<li>with <em>GetMetricStatistics API</em> or by using thirds party tools offereds by AWS parteners</li>\n<li><strong>from any terminated EC2 or ELB instane</strong> after its termination</li>\n</ul>\n</li>\n<li><strong>CW Logs will store your log data indefinitely</strong>, but you can change retention time for each LOg Group at any time</li>\n</ul>\n<h3>CloudWatch Alarms</h3>\n<p>You can create an alarm to monitor any Amazon CloudWatch metric in your account, with appropriate thresholds and with defined actiosn triggered.</p>\n<p>It includes :</p>\n<ul>\n<li>EC2 CPU Utilization</li>\n<li>ELB Latency</li>\n<li>charges on your AWS bill</li>\n</ul>\n<h2>2. Monitoring EC2 With Custom Metrics</h2>\n<h3>edit the crontab</h3>\n<p>lowest granularity is 1 minutes</p>\n<h2>3. Monitoring EBS</h2>\n<p>EBS = virutal disk in the cloud</p>\n<h3>4 different volume types</h3>\n<ul>\n<li>SSD : Solid State Drives</li>\n<li>HDD : hard Disk Drives</li>\n<li>general purpose (SSD) : grp2</li>\n<li>provisioned IOPS (SSD) : io1 </li>\n<li>Throughtput Optimized (HDD) : st1</li>\n<li>Cold (HDD) : sc1</li>\n</ul>\n<h3>Uses cases</h3>\n<p><img src=\"/assets/TP10%20-%20Monitoring&#x26;Reporting%20-%20Compare%20Volume%20Types.png\" alt=\"image-20200729222515366\"></p>\n<h3>IOPS &#x26; Volumes Examples</h3>\n<ul>\n<li>Volume Read Ops/ VOlume Write OPS = total number of IO Ops in a specific period of time. So say 1 000 in 1 minute ) 100/60 = IOPS</li>\n<li>Volume Queue Length = Number of read operations and write operation request waiting to be completed in a specific period of time</li>\n</ul>\n<h4>IOPS</h4>\n<p>IOPS are a unit of measure representing input/output operations per second. The operations are measured in KiB, and the underlying drive technology determines the maximum amount of data that a volume type counts as a single I/O. I/O size is capped at 256 KiB for SSD volumes and 1,024 KiB for HDD volumes because SSD volumes handle small or random I/O much more efficiently than HDD volumes. </p>\n<h4>IOPS per GiB of volume size</h4>\n<p><strong>Genral Purpose SSD volumes</strong> have a base of <strong>3 IOPS per GiB</strong> of volume size.</p>\n<ul>\n<li>Mximum Volume SIze of 16_284 GiB</li>\n<li>Maximum IOPS SIze of 10 000 IOPS Total</li>\n</ul>\n<p>So the bigger is the volume, the more performance you get, untill 10 000 IOPS (from 3 000).</p>\n<p>Thus, if we burst our 100 GiB (-> 3IOPS * 100 = 300 IOPS) volume to 3000 IOPS, the burst will be 2700 (3000 - 300 )</p>\n<p><img src=\"/assets/TP10%20-%20Monitoring&#x26;Reporting%20-%20IOPS.png\" alt=\"image-20200729224635676\"></p>\n<p>Above 10 000 IOPS (Y axis), : </p>\n<ul>\n<li>you will not use general SSD purpose anymore, but a bigger volumes</li>\n<li>you will provisional IOPS</li>\n</ul>\n<h4>I/O Credits</h4>\n<ul>\n<li>Each volume receives an initial I/O credits balance of 5 400 000 I/O credits</li>\n<li>This is enough to sustain the maximum burst performance of 3 000 IPOS for 30 minutes</li>\n<li><strong>When you are going over your provisioned IO Level (ie bursting) you will be earning credits.</strong></li>\n</ul>\n<h3><a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/ebs-initialize.html\">Pre Warming EBS Volumes</a></h3>\n<p>Les volumes EBS <strong>vides</strong> reçoivent leurs performances maximum au moment où ils sont créés et <strong>ne nécessitent pas d'initialisation</strong> (anciennement préchauffage).</p>\n<p>Concernant les volumes ayant été créés à partir d'<strong>instantanés</strong>, les blocs de stockage doivent être extraits d'Amazon S3 et écrits sur le volume pour que vous puissiez y accéder. Cette action préalable prend du temps et peut causer <strong>une hausse significative de la latence des opérations d'E/S lors du premier accès à chaque bloc</strong>.\nLes performances du volume sont obtenues une fois que tous les blocs ont été téléchargés et écrits sur le volume. </p>\n<p><strong>Pour éviter cette baisse de performances initiale</strong> dans un environnement de production, vous pouvez utiliser l'une des solutions suivantes :</p>\n<ul>\n<li><strong>Forcez l'initialisation immédiate de la totalité du volume</strong>. Pour plus d'informations, consultez <a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/ebs-initialize.html#ebs-initialize-linux\">Initialisation des volumes Amazon EBS sur Linux</a>.</li>\n<li><strong>Activez la restauration  d’instantané rapide sur un instantané</strong> pour vous assurer que les volumes EBS créés à  partir de l’instantané sont entièrement initialisés à la création et fournissent  instantanément la totalité des performances allouées. Pour plus  d'informations, consultez <a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/ebs-fast-snapshot-restore.html\">Restauration d'instantané rapide Amazon EBS</a>.</li>\n</ul>\n<h3>EBS cloudwatch metrics</h3>\n<p><a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/using_cloudwatch_ebs.html#ebs-volume-metrics\">https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/using_cloudwatch_ebs.html#ebs-volume-metrics</a></p>\n<p>L'espace de noms <code>AWS/EBS</code> inclut les métriques suivantes pour les volumes EBS. Pour obtenir des informations sur l'espace disque disponible à partir du système d'exploitation sur une instance, veuillez consulter <a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/ebs-describing-volumes.html#ebs-view-free-disk-space\">Affichage de l'espace disque disponible</a>.</p>\n<h3>Volume Status Checks</h3>\n<p><a href=\"https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/monitoring-volume-status.html#monitoring-volume-checks\">https://docs.aws.amazon.com/fr_fr/AWSEC2/latest/UserGuide/monitoring-volume-status.html#monitoring-volume-checks</a></p>\n<p>Amazon Web Services (AWS) fournit automatiquement les données que vous pouvez utiliser pour surveiller vos volumes Amazon Elastic Block Store (Amazon EBS). </p>\n<p>Le tableau suivant répertorie les statuts des volumes Amazon EBS.</p>\n<table>\n<thead>\n<tr>\n<th>Statut du volume</th>\n<th>Statut d'activation des E/S</th>\n<th>Statut des performances d'E/S (uniquement disponible pour les volumes IOPS provisionnés)</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td><code>ok</code></td>\n<td>Activé (E/S activées ou E/S activées automatiquement)</td>\n<td>Normal (performances du volume telles qu'attendues)</td>\n</tr>\n<tr>\n<td><code>warning</code></td>\n<td>Activé (E/S activées ou E/S activées automatiquement)</td>\n<td>Dégradé (performances du volume inférieures aux attentes)                                                                                                Profondément dégradé (performances du volume bien inférieures aux attentes)</td>\n</tr>\n<tr>\n<td><code>impaired</code></td>\n<td>Activé (E/S activées ou E/S activées automatiquement)                                                                                                Désactivé (volume hors connexion et récupération en attente, ou en attente d'activation par l'utilisateur des E/S)</td>\n<td>Interrompu (performances du volume profondément impactées)                                                                                                Non disponible (impossible de déterminer les performances d'E/S parce que les E/S                                                   sont désactivées)</td>\n</tr>\n<tr>\n<td><code>insufficient-data</code></td>\n<td>Activé (E/S activées ou E/S activées automatiquement)                                                                                                Données insuffisantes</td>\n<td>Données insuffisantes</td>\n</tr>\n</tbody>\n</table>\n<ul>\n<li>Warning = Degraded or Severely Degraded</li>\n<li>Impaired = Stalled or Not Available</li>\n</ul>\n<h3>Modifying EBS volumes</h3>\n<p>If you Amazon EBS Volume is <strong>attached</strong> to a current generation EC2 instance type, you can, whitout detaching it. : </p>\n<ul>\n<li>increase its size, </li>\n<li>change its volume type, </li>\n<li>or (for an io1 volume) adjust its IOPS performance</li>\n</ul>\n<p>If they are <strong>detached</strong>, you can as well : </p>\n<ul>\n<li>issue the modification command (console or command line)</li>\n<li>monitor the progress of the modification</li>\n<li>if the size of the volume was modified extend the volume's file system to take advatage of the increased storage capacity.</li>\n</ul>\n<h2>4. Monitoring ELB</h2>\n<p>Elastoc Load Balancer</p>\n<h3>3 Types of ELB</h3>\n<p>3 Differet Types of Elastic Load Balancers : </p>\n<ol>\n<li>Application Load Balancer</li>\n<li>Network Load Balancer</li>\n<li>Classic Load Balancer</li>\n</ol>\n<h3>4 Different ways to monitor your Load Balancer</h3>\n<ol>\n<li>CloudWatch metrics</li>\n<li>Access logs</li>\n<li>Request tracing</li>\n<li>CloudTrail logs</li>\n</ol>\n<h3>CloudWatch vs CloudTrail</h3>\n<ul>\n<li>CloudWatch -> performance</li>\n<li>CloudTrail -> API calls in the AWS plateform</li>\n</ul>\n<h3>CloudWatch Metrics</h3>\n<p>ELB publishes to Amazon CloudWatch, for your load balancers and your targets : </p>\n<ul>\n<li>metrics = variable monitor</li>\n<li>and datapoints = values of that variable over time</li>\n</ul>\n<h3>Access Logs</h3>\n<p>Access logs = information about request :</p>\n<ul>\n<li>the time </li>\n<li>the client IP adress</li>\n<li>the latencies</li>\n<li>request paths</li>\n<li>server responses</li>\n</ul>\n<p><strong>Access logging</strong> = optional feature of ELB disabled by default. It enables the store of access  logs in a S3 bucket in compressed files.</p>\n<p>It is still possible to trace these errors using Access Logs which would be stored on S3.</p>\n<p>Access Logs can store data where the EC2 instance has been deleted.</p>\n<h3>Request Tracing</h3>\n<p><strong>Available for Application Load Balancers only</strong></p>\n<p>You can use request tracing to track HTTP request from clients to targets or other services -> adding W-AWS-Trace-Id header before sending request to the target.</p>\n<h3>CloudTrail</h3>\n<p>To capture  calls made to the ELB API and store them as log files in Amazon S3.</p>\n<p>Used to determine the following details : </p>\n<ul>\n<li>calls,</li>\n<li>source IP address where the call came from,</li>\n<li>who made the call</li>\n<li>when the call was made</li>\n</ul>\n<h2>5. Monitoring Elasticache</h2>\n<p>Elasticach = 2 engines :</p>\n<ol>\n<li>Memcached</li>\n<li>Redis</li>\n</ol>\n<p>4 important things to look at :</p>\n<ol>\n<li>CPU Utilization</li>\n<li>Swap Usage</li>\n<li>Evictions</li>\n<li>Concurrent Connections</li>\n</ol>\n<h3>Comparison</h3>\n<table>\n<thead>\n<tr>\n<th></th>\n<th>Memcached</th>\n<th>Redis</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>CPU Utilization</td>\n<td>Multi-threaded<br />Loads up to 90% ; if exceeds -> add more nodes to the cluster</td>\n<td>Mono-threaded<br />Threshold = 90 / number of cores</td>\n</tr>\n<tr>\n<td>Swap Usage</td>\n<td>Should be around 0 most of the time, should not exceed 50Mb.<br />If it is the case -> increase the <em>memcached connections overhead</em> parametes</td>\n<td>No SwapUsage metric<br />Use reserved-memory</td>\n</tr>\n<tr>\n<td>Evictions</td>\n<td>No recommended settings<br />Scale OUT (add more nodes)<br />Scale UP (increasing the memory of existing nodes)</td>\n<td>No recommended settings<br />Scale OUT (add replicas) only</td>\n</tr>\n<tr>\n<td>Concurrent Connections</td>\n<td>No recommended settings</td>\n<td>No recommended settings</td>\n</tr>\n</tbody>\n</table>\n<h3>Swap Usage</h3>\n<ul>\n<li>Swap Usage = Amoun of the Swap file that is used</li>\n<li>Sap Fionlyonlyle (or Paging File) = Amount of disk storage space reservec on disk if your computer runs out of RAM</li>\n</ul>\n<h3>Evictions</h3>\n<p>An Evictions occurs when a new item is added and an old item must be removed due to lake of free space in the system.</p>\n<h3>Concurent connections</h3>\n<p>If there is a large spike in the number of concurrent connections this can either mean : </p>\n<ul>\n<li>a large traffic spike</li>\n<li>or your application is not releasing connections as it should be</li>\n</ul>\n<p>Remember to set an alarm on number of concurrent connections for Elasticache.</p>\n<h2>6. Metrics From Multiple Regions &#x26; Custom Dashboards</h2>\n<p>CloudWatch - Dashboards are multi-region and can display any widget to any region.</p>\n<p>To ad the widget, change to the region that you need and then add the widget to the dashboard.</p>\n<h2>7. Create A Billing Alarm</h2>\n<p><img src=\"/assets/TP10%20-%20Monitoring&#x26;Reporting%20-%20BIlling%20Alarms.png\" alt=\"image-20200731012254243\"></p>\n<h2>8. AWS Organisations Lab</h2>\n<h3>Definition</h3>\n<p>AWS Organisations = allows you to manage multiple AWS accounts at once.\nYou can create groups of accounts and then apply policies to those groups</p>\n<ul>\n<li>Centrally manage policies across multiple AWS Accounts</li>\n<li>Control Access To AWS Services</li>\n<li>Automate AWS Account Creation And Management</li>\n<li>Consolidate Billing Across Multiple AWS accounts</li>\n</ul>\n<h4>Central Management</h4>\n<p>Centralization of policies management across multiple accounts</p>\n<h4>Control Access</h4>\n<p>Allow or Deny individuals AWS Services using Service Control Policies (SCPs).</p>\n<p>Even if IAM in an accounts allows a resource not allowed by SCP, this last will override it.</p>\n<h4>Automate AWS Account Creation</h4>\n<p>Automate the creation and management of new AWS Accounts</p>\n<h4>Consolidated Billing</h4>\n<p>Set up a single payment method for all the AWS accounts in your organization through consolidated billing.</p>\n<h2>9. AWS Resource Groups &#x26; Tagging</h2>\n<h3>Tags definition</h3>\n<ul>\n<li>Key Value Pairs attached to AWS resource</li>\n<li>Metadata</li>\n<li>can be inherited</li>\n</ul>\n<h3>Resource Groups</h3>\n<p>It is a way of grouping tags</p>\n<p>Group your resource using the tafs that are assigned to them.</p>\n<p>Resource groups can contain foloowing tags : </p>\n<ul>\n<li>region</li>\n<li>Name</li>\n<li>Health Check</li>\n</ul>\n<p>You can use resource groups with AWS Systems manager to automate task</p>\n<h2>10. Cost Explorer and Cost Allocation Tags</h2>\n<p><strong>AWS Cost Explorer</strong> has an easy-to-use interface that lets you visualize, understand, and manage your AWS costs and usage over time. You can view data up to last 13months and get recommandation. </p>\n<ul>\n<li>Use tags to tag your resources</li>\n<li>Configure tags for cost centres (such as department, employee id etc.)</li>\n<li>Activate cost allocation tags to track you costs by tags</li>\n</ul>\n<h2>11. EC2 Pricing Models</h2>\n<p>EC2 options : </p>\n<ul>\n<li><strong>On Demand</strong> : allow you to pay a fixed rate by the hour (or second) with no commitment</li>\n<li><strong>Reserved</strong> : provide you with a capacity reservation, and offer a significant discount on the hourly carge for an instance</li>\n<li><strong>Spot</strong> : enable you to bid whatever price you wnat for instance capacity, providing savings if your app have flexible start and end times</li>\n<li><strong>Dedicated Hosts</strong> : Physical EC2 server dedicated for your use. DH can reduce costs by allowing you to use your existing server-bound software licenses.</li>\n</ul>\n<h2>12. AWS Config 101</h2>\n<p>With AWS Config, you are able to continuously monitor and record configuration changes of your AWS resources. Config also enables you to inventory your AWS resources, the configurations of your AWS resources, as well as software configurations within EC2 instances at any point in time. Once change from a previous state is detected, an Amazon Simple Notification Service (SNS) notification can be delivered for you to review and take action.</p>\n<ul>\n<li>\n<p>Enables :</p>\n<ul>\n<li>compliance auditing</li>\n<li>security analysis</li>\n<li>resource tracking</li>\n</ul>\n</li>\n<li>\n<p>Provides :</p>\n<ul>\n<li>Configurations snapshot and logs config changes of AWS resources</li>\n<li>Automated compliance checking\t</li>\n</ul>\n</li>\n<li>\n<p>Key components</p>\n<ul>\n<li>Config Dashboard</li>\n<li>\n<p>Config Rules</p>\n<ul>\n<li>Managed</li>\n<li>Custom</li>\n</ul>\n</li>\n<li>Resources</li>\n<li>Settings</li>\n</ul>\n</li>\n</ul>\n<p><img src=\"/assets/TP10%20-%20Monitoring&#x26;Reporting%20-%20AWS%20Config.png\" alt=\"image-20200731015230281\"></p>\n<h2>13. AWS Config Lab</h2>\n<p>Compliance checks</p>\n<ul>\n<li>\n<p>Trigger</p>\n<ul>\n<li>Periodic </li>\n<li>Configuration changes</li>\n</ul>\n</li>\n<li>\n<p>Managed rules</p>\n<ul>\n<li>About 40</li>\n<li>Basic, fundamental</li>\n</ul>\n</li>\n</ul>\n<p>Permission needed for config</p>\n<ul>\n<li>\n<p>AWS Config requires an IAM Role with : </p>\n<ul>\n<li>Read only permissions to the recorded resources.</li>\n<li>Write access to S3 logging bucket</li>\n<li>Publish access to SNS</li>\n</ul>\n</li>\n</ul>\n<p>Restrict Access : </p>\n<ul>\n<li>Users need to be authentificated with AWS and have the appropriate permissions set via IAM policies to gain access</li>\n<li>Only Admins needing to set up and manage Config require full access</li>\n<li>provide read only permissions or Config day to day use.</li>\n</ul>\n<p>Monitoring Config :</p>\n<ul>\n<li>Use CloudTrail with COnfig to provide deeper insight into resources</li>\n<li>Use CloudTrail to monitor access to config such as someone stopping the Config Recorder</li>\n</ul>\n<h2>14. AWS Config Vs AWS CloudTrail Vs CloudWatch</h2>\n<p>All of these monitors somethings :</p>\n<table>\n<thead>\n<tr>\n<th>Config</th>\n<th>CloudTrail</th>\n<th>CloudWatch</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>performance</td>\n<td>API calls in the AWS platform</td>\n<td>state of your AWS environment</td>\n</tr>\n</tbody>\n</table>\n<p>CloudWatch can notify you of changes.</p>\n<h2>15. Health Dashboards</h2>\n<p>2 types of Dashboards :</p>\n<ol>\n<li>Health :\nshows the health of each AWS Service as a whole per region</li>\n<li>Personal :\nprovides alert and remediation guidance when AWS is experiencing events that may impact you</li>\n</ol>\n<p>Service Health Dashboard </p>\n<p><img src=\"TP10%20-%20Monitoring&#x26;Reporting%20-%20Health%20Dashboard.png\" alt=\"Service Health Dashboard \"></p>","frontmatter":{"date":"July 31, 2020","path":"ctf/aws-formation/tp10-monitoring-reporting","title":"TP10 - Monitoring & Reporting","tags":["cloud","ec2","aws"],"categorie":"ctf","thumbnail":"/assets/alex-machado-80sv993luki-unsplash.jpg"},"fields":{"readingTime":{"text":"13 min read"}}},"file":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.4970059880239521,"src":"/static/11cdcb302d032fa2db3a46428a8f74c9/a7715/alex-machado-80sv993luki-unsplash.jpg","srcSet":"/static/11cdcb302d032fa2db3a46428a8f74c9/8f7df/alex-machado-80sv993luki-unsplash.jpg 250w,\n/static/11cdcb302d032fa2db3a46428a8f74c9/0f3a1/alex-machado-80sv993luki-unsplash.jpg 500w,\n/static/11cdcb302d032fa2db3a46428a8f74c9/a7715/alex-machado-80sv993luki-unsplash.jpg 1000w,\n/static/11cdcb302d032fa2db3a46428a8f74c9/37d86/alex-machado-80sv993luki-unsplash.jpg 1500w,\n/static/11cdcb302d032fa2db3a46428a8f74c9/a41d1/alex-machado-80sv993luki-unsplash.jpg 2000w,\n/static/11cdcb302d032fa2db3a46428a8f74c9/6a059/alex-machado-80sv993luki-unsplash.jpg 6000w","sizes":"(max-width: 1000px) 100vw, 1000px"}}}},"pageContext":{"slug":"ctf/aws-formation/tp10-monitoring-reporting","featuredImage":"alex-machado-80sv993luki-unsplash.jpg"}}}