Oracle Cloud Infrastructure (OCI) provides native tools that give deep visibility into network behavior, traffic flows, routing decisions, and connectivity paths.
This blog focuses on how to monitor, analyze, and troubleshoot OCI networks effectively using Flow Logs, Logging Analytics, Path Analyzer, and operational diagnostic tools.
1. VCN Flow Logs – Foundational Network Visibility
What VCN Flow Logs Are
Why Flow Logs Are Critical
- Did the packet reach the subnet or VNIC?
- Was it allowed or denied?
- Which port or protocol was involved?
- Was the issue security-related or routing-related?
How to Enable VCN Flow Logs
- Navigate to Networking → Virtual Cloud Networks.
- Select the Subnet and select monitoring tab
- Enable Flow Logs.
- Select or create a Log Group.
- Save the configuration.
Common Use Cases
- Troubleshooting “instance not reachable” issues.
- Verifying NSG or Security List behavior.
- Auditing hybrid traffic entering via DRG.
- Identifying suspicious inbound connection attempts.
2. Logging Analytics – Making Sense of Flow Logs at Scale
What Logging Analytics Is
While Flow Logs capture raw data, Logging Analytics turns data into insights.
Why Logging Analytics Matters
In large environments, Flow Logs can generate millions of records. Logging Analytics enables:
-
Pattern detection (normal vs abnormal traffic)
-
Traffic trend analysis over time
-
Rapid filtering of denied or suspicious flows
-
Correlation across network, compute, and application logs
It significantly reduces mean time to resolution (MTTR).
How to Enable Logging Analytics
-
Navigate to Observability & Management → Logging Analytics.
-
Enable the Logging Analytics service for the tenancy.
-
Grant required IAM policies for log ingestion.
-
In OCI Logging, configure Flow Logs to be forwarded to Logging Analytics.
-
Use built-in parsers and dashboards to visualize traffic.
Common Use Cases
Identifying spikes in denied traffic after rule changes.
Monitoring hybrid connectivity stability.
Investigating security incidents using historical logs.
Creating alerts for repeated denied connections.
3. Path Analyzer – Understanding Routing and Security Decisions
What Path Analyzer Does
Why Path Analyzer Is Essential
- Which route table is selected
- Which gateway is used
- Whether security rules allow traffic
- Where traffic would be dropped
How to Use Path Analyzer
- Navigate to Networking → Network Path Analyzer.
- Define the Source (instance, VNIC, or IP).
- Define the Destination (instance, CIDR, on-prem IP).
- Select protocol and port.
- Run the analysis to view the simulated path and results.
you can do bidirectional as well as unidirectional analysis also depending on the issue.
Once you have given all the source, destination, port, protocol and direction details then run the analysis.
Common Use Cases
- Debugging hub-spoke connectivity failures.
- Validating DRG routing logic.
- Troubleshooting asymmetric routing.
- Confirming hybrid traffic paths.
- Diagnosing backend reachability behind load balancers.
4. Common OCI Networking Troubleshooting Scenarios
- Missing or incorrect route table entries.
- NSG or Security List blocking traffic.
- Incorrect gateway (IGW vs NAT).
- OS-level firewall restrictions.
- IPSec tunnel down or BGP not established.
- Overlapping CIDR blocks.
- Incorrect DRG route table association.
- MTU mismatches causing silent packet drops.
- Missing return routes on on-prem routers.
- Overlapping VCN CIDRs.
- Incorrect DRG attachment route priorities.
- Multiple gateways competing for the same prefix.








No comments:
Post a Comment