Flow logs feature captures IPv4 and IPv6 network traffic flows and helps debug connectivity issues and monitor network performance. Flow logs are stored in an IONOS Object Storage bucket and can be accessed for analysis and visualization. Traffic flow details include source/destination IP addresses, ports, protocol, packet count, bytes, and capture times. Logs are stored in intervals, prefixed with a timestamp, and can be retained or deleted manually or through automatic configuration. Configurations, once set, cannot be altered, and there is a limit of one flow log per network interface, Managed NAT Gateway, and Managed Network Load Balancer.
Overview
Learn about Flow Logs, configure and manage network traffic flows.
How-Tos
Learn how to configure and delete the Flow Logs.
Flow Log Record
Learn how to use the Flow Log record.
Cloud API
Access the REST API documentation for Flow Logs.
SDKs
Interact with Flow Logs using SDKs.
Config Management Tools
Explore configuration management tools compatible with Flow Logs.
Use the Flow logs feature to capture data that is related to IPv4 and IPv6 network traffic flows. Flow logs can be enabled for each network interface of a Virtual Machine (VM) instance, as well as the public interfaces of the Managed Network Load Balancer (NLB) and Managed Network Address Translation (NAT) Gateway.
Flow logs can help you with several tasks such as:
Debugging connectivity and security issues
Monitoring network throughput and performance
Logging data to ensure that firewall rules are working as expected
Flow logs are stored in a customer IONOS Object Storage bucket, which you configure when you create a flow log collector.
A network traffic flow is a sequence of packets sent from a specific source to a specific unicast, anycast, or multicast destination. A flow could be made up of all packets in a specific transport connection or a media stream. However, a flow is not always mapped to a transport connection one-to-one.
A flow consists of the following network information:
Source IP address
Destination IP address
Source port
Destination port
Internet protocol
Number of packets
Bytes
Capture start time
Capture end time
Flow log data for a monitored network interface is stored as flow log records, which are log events containing fields that describe the traffic flow. For more information, see Flow Log Record.
Flow log records are written to flow logs, which are then stored in a user-defined IONOS Object Storage bucket from where they can be accessed.
Traffic flows in your network are captured based on the defined rules.
Flow logs are collected at a 10-minute rotation interval and have no impact on customer resources or network performance. Statistics about a traffic flow are collected and aggregated during this time period to create a flow log record.
Flow logs can capture network traffic flow data for IPv4 and IPv6 addresses in user-owned buckets.
The flow log file's name is prefixed with an optional object prefix, followed by a Unix timestamp and the file extension .log.gz. Example: flowlogs/webserver01-1629810635.log.gz.
Flow logs are retained in the IONOS Object Storage bucket until they are manually deleted. Alternatively, you can configure objects to be deleted automatically after a predefined time period using a Lifecycle Policy for an object in the IONOS Object Storage. For more information, see Delete objects.
The IONOS Object Storage owner of the object is an IONOS internal technical user named [email protected] with Canonical ID 31721881|65b95d54-8b1b-459c-9d46-364296d9beaf.
Warning: It is advisable to never delete the IONOS Cloud internal technical user from your bucket as this disables the flow log service. The bucket owner also receives full permissions to the flow log objects per default.
This section lists the limitations of Flow logs:
You cannot change the configuration of a flow log or the flow log record format after it has been created. In the flow log record, you cannot add or remove fields. Instead, delete the flow log and create a new one with the necessary settings.
Flow logs do not operate on contract-owned buckets. However, flow logs can capture network traffic flow data for IPv4 and IPv6 addresses in user-owned buckets.
There is a limit of one flow log created per NIC, Managed NAT Gateway, and Managed Network Load Balancer.
A flow log record is a record of a network flow in your VDC. By default, each record captures a network Internet Protocol (IP) Address traffic flow, groups it, and is enhanced with the following information:
Account ID of the resource
Unique identifier of the network interface
The flow status, indicating whether it was accepted or rejected by the Software Defined Network (SDN) layer
The flow log record is in the following format:
<version> <account-id> <interface-id> <srcaddr> <dstaddr> <srcport> <dstport> <protocol> <packets> <bytes> <start> <end> <action> <log-status>The following table describes all of the available fields for a flow log record.
Field
Type
Description
Example Value
version
string
The flow log version. Version 2 is the default.
2
account-id
string
The IONOS Cloud account ID of the owner of the resource containing the interface for which flow logs are collected.
12345678
interface_id
string
The interface unique identifier (UUID) for which flow logs are collected.
7ffd6527-ce80-4e57-a949-f9a45824ebe2
srcaddr
string
The source address for incoming traffic, or the IPv4 address of the network interface for outgoing traffic.
172.17.1.100
dstaddr
string
The destination address for outgoing traffic, or the IPv4 address of the network interface for incoming traffic.
172.17.1.101
srcport
uint16
The source port from which the network flow originated.
59113
dstport
uint16
The destination port for the network flow.
20756
protocol
uin8
The Internet Assigned Numbers Authority (IANA) protocol number of the traffic. For more information, see .
6
packets
uint64
The number of packets transferred during the network flow capture window.
17
bytes
uint64
The number of bytes transferred during the network flow capture window.
1325
start
string
The timestamp, in UNIX EPOCH format, of when the first packet of the flow was received within the grouping interval.
1587983051
end
string
The timestamp, in UNIX EPOCH format, of when the last packet of the flow was received within the grouping interval.
1587983052
action
string
The action associated with the traffic:
ACCEPT: traffic accepted by the firewall
REJECT: traffic rejected by the firewall
ACCEPT
log-status
string
The flow log logging status:
OK: normal flow logging
SKIPDATA: Some flow log records were skipped during the grouping interval
OK
The following are the examples of flow log records that capture specific traffic flows. For information on how to create flow logs, see Configure Flow Logs.
In this example, traffic to the network interface 7ffd6527-ce80-4e57-a949-f9a45824ebe2 for the account 12345678 is accepted.
2 12345678 7ffd6527-ce80-4e57-a949-f9a45824ebe2 172.17.1.100 172.17.1.101 59113 20756 6 17 1325 1587983051 1587983052 ACCEPT OKIn this example, traffic to the network interface 7ffd6527-ce80-4e57-a949-f9a45824ebe2 for the account 12345678 is rejected.
2 12345678 7ffd6527-ce80-4e57-a949-f9a45824ebe2 172.17.1.100 172.17.1.101 59113 20756 6 17 1325 1587983051 1587983052 REJECT OKYou can create flow logs using the DCD for your network interfaces as well as the public interfaces of the Managed Network Load Balancer (NLB) and Managed NAT Gateway. Flow logs can publish data to your buckets in the IONOS Object Storage.
After you have created and configured your bucket in the IONOS Object Storage, you can create flow logs for your network interfaces.
2. Open the required data center.
3. Go to the Server or Cubes element and select the Network tab. Open the properties of the Network Interface Controller (NIC).
4. Open the Flow Log drop-down list and fill in the fields. Provide an appropriate name for the flow log rule in the Name field. The name will also be the first part of the object name prefix.
5. To create flow logs for all traffic, choose a Direction from the drop-down list. Choose either of the following to capture the traffic: * Ingress: To capture flow logs for incoming traffic. * Egress: To capture flow logs for outgoing traffic. * Bidirectional: To capture flow logs in both directions, inbound and outbound. 6. Select an Action that will be taken on a network packet or flow as observed by the flow logging system from the drop-down list. Choose either of the following actions: * Rejected: To capture only traffic blocked by the firewall. * Accepted: To capture only traffic allowed by the firewall. * Any: To capture all of the traffic. 7. Enter a valid existing IONOS Object Storage bucket name in the Target Object Storage bucket field. This is an optional object name prefix where flow log records should be written.
8. Select Add flow log to complete the configuration of the flow log. Once you provision your changes, it will be available .
Result: You can view the activated flow log rule indicated by a green light on the NIC properties. The green light indicates that the configuration has been validated and is valid for provisioning.
Select the Flow Log drop-down list and choose the name of the flow log rule for which you want to view the summary.
(Optional) At this point, you may make further changes to your data center.
Once ready, select Provision changes. After provisioning is complete, the network interface's flow logs are activated.
2. Open the required data center.
3. Go to the Managed NAT Gateway or Managed Network Load Balancer element and select the Settings tab.
4. Provide an appropriate name for the flow log rule in the Name field. The name will also be the first part of the objects’ name prefix.
5. To create flow logs for all traffic, choose a Direction from the drop-down list. Choose either of the following to capture the traffic: * Ingress: To capture flow logs for incoming traffic. * Egress: To capture flow logs for outgoing traffic. * Bidirectional: To capture flow logs in both directions, inbound and outbound. 6. Select an Action to be performed on a network packet or flow as observed by the flow logging system from the drop-down list. Choose either of the following actions: * Rejected: To capture only traffic blocked by the firewall. * Accepted: To capture only traffic allowed by the firewall. * Any: To capture all of the traffic. 7. Enter a valid existing IONOS Object Storage bucket name in the Target Object Storage bucket field. This is an optional object name prefix where flow log records should be written.
8. Select Add flow log to complete the configuration of the flow log. Once you provision your changes, it will be available.
Result: You can view the activated flow log rule indicated by a green light on the NIC properties. The green light indicates that the configuration has been validated and is valid for provisioning.






To delete a flow log, follow these steps:
2. Open the required data center.
3. Select the relevant VM for which you want to delete the flow logs. Open the properties of the Network Interface Controller (NIC) and select the Network tab.
4. Select the Flow Log drop-down list.
5. Select the to delete the flow log. Confirm your selection by selecting OK.
6. Select Provision changes. After provisioning, the network interface's flow logs are deleted successfully and no longer captured.
Result: The flow log is deleted successfully.

1. In the DCD, go to Menu > Virtual Data Centers.
1. In the DCD, go to Menu > Virtual Data Centers.
1. In the DCD, go to Menu > Virtual Data Centers.