Skip to content

Commit 1e6aac3

Browse files
authored
Merge pull request #109184 from v-dihans/traffic-analytics-schema-update
edit pass: traffic-analytics-schema-update
2 parents 4fa934f + 8575e3d commit 1e6aac3

File tree

1 file changed

+29
-20
lines changed

1 file changed

+29
-20
lines changed

articles/network-watcher/traffic-analytics-schema-update.md

Lines changed: 29 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Azure traffic analytics schema update - March 2020 | Microsoft Docs
2+
title: Azure Traffic Analytics schema update - March 2020 | Microsoft Docs
33
description: Sample queries with new fields in the Traffic Analytics schema.
44
services: network-watcher
55
documentationcenter: na
66
author: vinigam
77
manager: agummadi
8-
editor:
8+
editor:
99

1010
ms.service: network-watcher
1111
ms.devlang: na
@@ -16,16 +16,17 @@ ms.date: 03/06/2020
1616
ms.author: vinigam
1717

1818
---
19-
# Sample queries with new fields in Traffic Analytics schema (August 2019 schema update)
19+
# Sample queries with new fields in the Traffic Analytics schema (August 2019 schema update)
2020

21-
The [Traffic Analytics Log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) has been updated to include the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
22-
The new fields provide information about source and destination IPs and simplify queries.
21+
The [Traffic Analytics log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) includes the following new fields: **SrcPublicIPs_s**, **DestPublicIPs_s**, **NSGRule_s**. The new fields provide information about source and destination IPs, and they simplify queries.
2322

24-
Below are three examples showing how to replace the old fields with new ones.
23+
In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
2524

26-
## Example 1 - VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, PublicIPs_s
25+
The following three examples show how to replace the old fields with the new ones.
2726

28-
We don’t have to infer Source and destination cases for Azure and External public flows from FlowDirection_s field for AzurePublic and ExternalPublic flows specifically. In case of an NVA (Network Virtual Appliance), the FlowDirection_s field can be inappropriate to be used as well.
27+
## Example 1: VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, and PublicIPs_s fields
28+
29+
We don't have to infer source and destination cases from the **FlowDirection_s** field for AzurePublic and ExternalPublic flows. It can also be inappropriate to use the **FlowDirection_s** field for a network virtual appliance.
2930

3031
```Old Kusto query
3132
AzureNetworkAnalytics_CL
@@ -67,12 +68,13 @@ SourcePublicIPsAggregated = iif(isnotempty(SrcPublicIPs_s), SrcPublicIPs_s, "N/A
6768
DestPublicIPsAggregated = iif(isnotempty(DestPublicIPs_s), DestPublicIPs_s, "N/A")
6869
```
6970

71+
## Example 2: NSGRules_s field
7072

71-
## Example 2 - NSGRules_s
73+
The old field used the format:
7274

73-
Earlier field was of format: <Index value 0)>|<NSG_RULENAME>|<Flow Direction>|<Flow Status>|<FlowCount ProcessedByRule>
75+
<Index value 0)>|<NSG_ RuleName>|<Flow Direction>|<Flow Status>|<FlowCount ProcessedByRule>
7476

75-
Earlier we used to aggregate data across NSG and NSGRules. Now we do not aggregate. So NSGList_s contains only one NSG and NSGRules_s also used to contain only one rule. So we have removed the complicated formatting here and the same can be found in other fields as mentioned below:
77+
We no longer aggregate data across a network security group (NSG). In the updated schema, **NSGList_s** contains only one NSG. Also **NSGRules** contains only one rule. We removed the complicated formatting here and in other fields as shown in the example.
7678

7779
```Old Kusto query
7880
AzureNetworkAnalytics_CL
@@ -97,17 +99,24 @@ FlowStatus = FlowStatus_s,
9799
FlowCountProcessedByRule = AllowedInFlows_d + DeniedInFlows_d + AllowedOutFlows_d + DeniedOutFlows_d
98100
```
99101

100-
## Example 3 - FlowCount_d
102+
## Example 3: FlowCount_d field
103+
104+
Because we do not club data across the NSG, the **FlowCount_d** is simply:
105+
106+
**AllowedInFlows_d** + **DeniedInFlows_d** + **AllowedOutFlows_d** + **DeniedOutFlows_d**
107+
108+
Only one of the four fields will be nonzero. The other three fields will be zero. The fields populate to indicate the status and count in the NIC where the flow was captured.
101109

102-
Since we do not club data across NSG, the FlowCount_d is simply AllowedInFlows_d + DeniedInFlows_d + AllowedOutFlows_d + DeniedOutFlows_d.
103-
Only 1 of the above 4 will be non-zero and rest three will be 0. And it would indicate the status and count in the NIC where the flow was captured.
110+
To illustrate these conditions:
104111

105-
If the flow was allowed, one of the fields prefixed with “Allowed” will be populated. Else one fields prefixed with “Denied” will be populated.
106-
If the flow was inbound, one of the fields suffixed with "\_d" like “InFlows_d” suffixed field will be populated. Else “OutFlows_d” will be populated.
112+
- If the flow was allowed, one of the "Allowed" prefixed fields will be populated.
113+
- If the flow was denied, one of the "Denied" prefixed fields will be populated.
114+
- If the flow was inbound, one of the "InFlows_d" suffixed fields will be populated.
115+
- If the flow was outbound, one of the "OutFlows_d" suffixed fields will be populated.
107116

108-
Depending on above 2 conditions, we know which one out of the 4 will be populated.
117+
Depending on the conditions, we know which one of the four fields will be populated.
109118

119+
## Next steps
110120

111-
## Next Steps
112-
To get answers to frequently asked questions, see [Traffic analytics FAQ](traffic-analytics-faq.md)
113-
To see details about functionality, see [Traffic analytics documentation](traffic-analytics.md)
121+
- To get answers to frequently asked questions, see [Traffic Analytics FAQ](traffic-analytics-faq.md).
122+
- To see details about functionality, see [Traffic Analytics documentation](traffic-analytics.md).

0 commit comments

Comments
 (0)