Each FAQ below explains:
This error occurs when the AWS credentials configured for the Amazon VPC monitor do not have permission to invoke one or more required AWS APIs.
You may see messages similar to the following:
Data collection has failed. Reason: UnauthorizedOperation – You are not authorized to perform this operation…
User: {username} is not authorized to perform: ec2:DescribeSubnets
This error indicates that AWS could not authenticate the credentials configured for the Amazon VPC monitor. The access key, secret key, or role configuration may be invalid, expired, or incorrectly configured.
You may see messages similar to the following:
Data collection has failed. Reason: AuthFailure – AWS was not able to validate the provided access credentials.
sts get-caller-identity
to validate the credentials before retrying data collection.
This error indicates that Applications Manager did not receive a response from AWS within the expected time window. The delay can occur due to network conditions, proxy behavior, AWS API latency, or large environments that take longer to process.
Messages similar to the following:
Data collection has failed. Reason: The server did not respond to the request for more than 2 minutes.
This error occurs when the Amazon S3 bucket configured for VPC Flow Logs cannot be found or accessed by the configured monitoring setup. Without a valid bucket, Flow Logs cannot be delivered and performance metrics cannot be collected.
Messages similar to the following:
Data collection has failed. Reason: S3 Bucket ({bucket-name}) configured for this VPC doesn't exist.
This error occurs when VPC Flow Logs are enabled for the VPC, but the configured log record format does not match the required schema for parsing network traffic and performance metrics.
Messages similar to the following:
Data collection has failed. Reason: Flow Log is enabled for this VPC {vpc-name}, but the configured flow log format is not in the expected format. Refer to this KB Article to know the expected format.
${version} ${account-id} ${interface-id} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${packets} ${bytes} ${start} ${end} ${action} ${log-status}
When the Flow Log format does not match the expected schema, the monitor
surfaces configuration details directly in the UI to help you troubleshoot
without switching to the AWS Console.
This error occurs when VPC Flow Logs are configured to send data to an unsupported destination type.
Supported monitoring requires Flow Logs to be delivered to an Amazon S3 bucket.
Messages similar to the following:
Data collection has failed. Reason: Flow Logs for VPC {vpc-id} point to an unsupported destination type ({destination-type}). To continue monitoring, reconfigure the Flow Logs to send data to an Amazon S3 bucket.
| Destination Type | Supported |
|---|---|
| Amazon S3 | Yes |
| CloudWatch Logs | No |
| Kinesis Data Firehose | No |
You will see the following message when VPC Flow Logs are not enabled or not enabled at the VPC level:
This indicates that network traffic and performance metrics cannot be collected until VPC Flow Logs are enabled at the VPC level.
${version} ${account-id} ${interface-id} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${packets} ${bytes} ${start} ${end} ${action} ${log-status}
The IAM role is used by the VPC Flow Logs service to write log files into the specified S3 bucket. This role is assumed by the VPC Flow Logs service and does not grant direct access to users.
vpc-flow-logs.amazonaws.com{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:PutObject",
"Resource": "arn:aws:s3:::/AWSLogs//*"
},
{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListBucket"
],
"Resource": "arn:aws:s3:::"
}
]
}
This occurs when VPC Flow Logs are enabled only at the subnet or network interface (ENI) level, but not at the VPC level. The VPC monitor requires a VPC-level Flow Log configuration to collect traffic and performance metrics across the entire VPC.
When a subnet or Elastic Network Interface (ENI) is deleted in AWS, the VPC monitor continues to retain the resource details for a short duration to avoid transient discovery issues and false alerts.
You can control how long deleted subnets or ENIs remain in the monitor before being removed.
Network Address Usage (NAU) metrics published by AWS represent the maximum number of Network Address Usage units that can be consumed within a VPC. These limits protect VPCs from exhausting IP-related resources and are enforced using AWS service quotas.
NAU units are an AWS-internal capacity measure used to track how many IP-address-consuming resources exist within a VPC. Different AWS resources consume different numbers of NAU units.
The exact NAU unit consumption varies by resource type and AWS manages these values internally.
This error appears when an Amazon Athena query — including partition-creation queries — does not complete successfully after the configured retry attempts.
Typical error message:
Athena query {0} did not succeed after maximum retry attempts ({1}).
Reason: {2}
Where:
After submitting a query, the monitor repeatedly polls Athena for its status:
Partition-creation queries (ALTER TABLE ADD PARTITION) are also
validated using this same retry logic.
Yes. The monitor retries Athena query-status checks up to the configured retry limit and waits between attempts before marking the poll as failed.
If the query remains in progress too long or fails, the poll cycle ends and the error is displayed in the monitor.
| Handled by ApplicationsManager | Customer must manage in AWS |
|---|---|
|
|
This error indicates that Athena did not complete a query — including partition creation — within the allowed retry attempts. Customers should inspect the Athena query execution details in AWS and validate IAM permissions, S3 locations, Glue configuration, and Athena quotas.
This error appears when ApplicationsManager attempts to create a daily AWS Glue partition for VPC Flow Logs and the operation does not succeed.
Typical error message:
Partition creation failed for date {0} in table {1} and database {2}.
Where:
2026-01-26)VPC Flow Logs are partitioned by date (YYYY-MM-DD) so that Athena scans only the required data range. This keeps queries fast and reduces AWS cost.
If a partition for the current day does not exist, the monitor attempts to create it automatically before running queries.
s3://<bucket-name>/AWSLogs/<account-id>/vpcflowlogs/<region>/YYYY/MM/DD/
| Handled by ApplicationsManager | Customer must manage in AWS |
|---|---|
|
|
This error means the daily Glue partition for VPC Flow Logs could not be created. Verify IAM permissions, Glue schema, S3 directory structure, and Flow Log delivery to resolve the issue.
Applications Manager does not delete any AWS resources or data generated as part of VPC monitoring. This includes VPC Flow Logs stored in Amazon S3, Athena query results, and AWS Glue metadata.
Customers are responsible for configuring appropriate data retention and cleanup policies on the AWS side to control storage growth and cost.
To control storage usage, configure Amazon S3 Lifecycle policies on:
Recommended actions:
Athena stores query outputs in the configured S3 location. These files can accumulate quickly if not cleaned.
Glue databases, tables, and partitions are metadata objects and do not consume significant storage, but excessive unused partitions can affect query planning and maintenance.
This article explains the AWS-side costs incurred when enabling Amazon VPC monitoring using VPC Flow Logs delivered to Amazon S3 and analyzed using Amazon Athena and AWS Glue.
Costs vary significantly based on the traffic volume, number of ENIs, polling interval, retention period, region, and AWS pricing tiers. All examples below are illustrative and should be validated using the AWS Pricing Calculator and your AWS billing dashboard.
For every poll cycle, the monitor executes the following:
Default performance polling interval: 15 minutes (96 polls per day).
AWS charges for the volume of Flow Logs delivered. The exact pricing varies by region and AWS billing tier.
Main driver: Network traffic inside the VPC.
VPC Flow Logs and Athena query outputs are stored in Amazon S3. Charges depend on:
Customers are strongly advised to configure S3 Lifecycle policies to expire or archive older logs.
Athena pricing is based on data scanned, not query count. Typical pricing is approximately $5/TB scanned (region dependent).
AWS Glue Data Catalog objects usually incur minimal cost. Glue crawlers or ETL jobs, if enabled, incur DPU-hour charges.
Describe APIs and control-plane calls generally have negligible cost.
This applies only when logs or queries cross regions or leave AWS.
| Component | Estimate |
|---|---|
| Athena scans | $10–15 |
| S3 storage | $20–25 |
| Flow Log delivery | Traffic-dependent |
| Glue / APIs | Minimal |
If you continue to experience issues after following the steps in these FAQs, review the detailed error message shown in the monitor and cross-check the corresponding AWS service configuration.
For persistent failures, collect:
Then contact ApplicationsManager support with this information for faster resolution.
Keeping VPC Flow Logs correctly configured, partitions optimized, and retention policies in place will ensure stable monitoring, predictable AWS costs, and accurate visibility into your VPC environment.