Amazon Virtual Private Cloud (VPC) lets you create a secure, isolated network within AWS. For detailed information refer to the AWS VPC’s official documentation.
Integration Method: S3
Tables: Network Activity (4001)
This integration supports the following events.
Event | Description |
|---|---|
Network Events | Get the list of AWS Network Events |
Note:
AWS VPC doesn’t follow a traditional versioning system. Instead, it is a continuously updated cloud service.
Prerequisites
The user should have access to the AWS portal.
The user should have access to the VPC dashboard and access to create an S3 bucket.
The user should have access to the DataBee console.
Configuration overview
Create S3 Bucket for AWS VPC flow logs.
Add the AWS VPC data feed in the DataBee console with the below parameters.
DataBee Parameter
AWS VPC Parameter
S3 Bucket Name
AWS Region
Bucket Region
Apply the generated Bucket policy from DataBee to S3 Bucket policy.
Create an event notification for bucket with the AWS SQS ARN from DataBee.
AWS VPC Configuration
Create S3 Bucket
Sign in to the AWS Management Console and open the Amazon S3 console.
In the navigation bar on the top of the page, choose the name of the currently displayed AWS Region. Next, choose the Region in which you want to create a bucket.

Create Bucket
In the left navigation pane, choose General purpose buckets.
Choose Create bucket. The “Create bucket” page opens.

For Bucket name, enter a name for your bucket. The bucket name must:
Be unique within a partition. A partition is a grouping of regions. AWS currently has three partitions: aws (commercial Regions), aws-cn (China Regions), and aws-us-gov (AWS GovCloud (US) Regions).
It is between 3 and 63 characters long.
Consist only of lowercase letters, numbers, periods (.), and hyphens (-). For best compatibility, we recommend that you avoid using periods (.) in bucket names, except for buckets that are used only for static website hosting.
Begin and end with a letter or number.
For a complete list of bucket-naming rules, see General purpose bucket naming rules.

Configure the Object Ownership, Block Public Access settings, Bucket Versioning, and Tags according to your preferences.
Select the encryption type for Default encryption of object. If you want to encrypt the data with AWS KMS key, then follow Create a KMS key.

Click Create bucket.
Navigate to Properties of the bucket. Copy the ARN value of bucket for future use.

Navigate to Permissions > Bucket policy of the bucket. Click on the Edit button.

Add policy for the VPC Flow logs
Navigate to bucket permissions for VPC flow logs. Copy the permissions and paste in the Bucket policy.
Here replace the following values.
my-s3-arn – replace with the bucket arn value.
account_id – replace with the account_id. Click on the top-right profile menu to get the account id.

arn:aws:logs:region:account_id – replace with the aws region and account_id.
bucket_name – replace with the bucket name.

Click on Save changes.
Create VPC Flow Logs
Sign in to the AWS Management Console and open the Amazon VPC console.
Navigate to the Your VPCs tab.

Select the existing VPC or create VPC.
Create VPC flow logs.
Navigate to the Flow logs tab.
Click on Create flow log.

Enter the flow log settings details
Enter the Name.
Select All for Filter.
Select Maximum aggregation interval as per your preference.

Select the Destination as S3 bucket to publish the flow log data.
Paste the bucket ARN value.

Select the log record format
Select the Custom format.
Click on the Select All button.

Select Log file format and partition logs by time
Select Text (default) as Log file format.
Select Partition logs by time as per your preference.

Click Create flow log button.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.

Search for AWS VPC and click on it as shown below.

Click on the AWS S3 collection method.

In configuration, enter feed contact information, confirm the following and click Next.
S3 Bucket Name: Paste the bucket name
AWS Region: Select the AWS Region in which bucket is created
Compression: Select gzip
Content Type: Select SSV
KMS Encryption Key (optional): Paste the KMS Key if setup the KMS key for bucket
SNS Topic ARN (optional): Enter the SNS Topic ARN

Copy the IAM policy and KMS policy to apply to your AWS S3 bucket.
Copy the policy statement to clipboard.

Go to the Permissions tab in the bucket. Navigate to Bucket policy and click the Edit button.

Add the bucket policy statement copied from DataBee.

Save the bucket policy.
Click Next.
Setup AWS S3 bucket notification.
Copy the SQS ARN to clipboard.

Go to the Properties tab of the bucket.

Navigate to Event notifications and click Create event notification.

Enter the General configuration details.

Select the Event types for Object creation.

Set the Destination
Select SQS queue as Destination.
Select option to Enter SQS queue ARN.
Paste the SQS queue ARN.
Click Save Changes.

Click on Test Connection button to check the connection between AWS VPC and DataBee.

Click Submit.
Troubleshooting Tips
If you are facing an error while testing the connection, then make sure the bucket policy is applied properly and check the SQS event notification configuration as described in the steps.