Before you go ahead and think about creating flow logs across your infrastructure, do be aware that there are a number of limitations to using them. Some of the key points to be aware of are available at https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html#flow-logs-limitations.
That concludes this section covering VPC flow logs and how they can be used at the network level to capture network data that's crucial in helping you to identify potential security attacks and threats. Attacks come from different layers, and having the ability to create logs at each of these layers puts you in a good position to identify a threat quickly and eliminate it.
In the next section, I want to look at another network layer logging capability, but one that offers very different data to that of VPC Flow Logs.