You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-schema-update.md
+29-20Lines changed: 29 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Azure traffic analytics schema update - March 2020 | Microsoft Docs
2
+
title: Azure Traffic Analytics schema update - March 2020 | Microsoft Docs
3
3
description: Sample queries with new fields in the Traffic Analytics schema.
4
4
services: network-watcher
5
5
documentationcenter: na
6
6
author: vinigam
7
7
manager: agummadi
8
-
editor:
8
+
editor:
9
9
10
10
ms.service: network-watcher
11
11
ms.devlang: na
@@ -16,16 +16,17 @@ ms.date: 03/06/2020
16
16
ms.author: vinigam
17
17
18
18
---
19
-
# Sample queries with new fields in Traffic Analytics schema (August 2019 schema update)
19
+
# Sample queries with new fields in the Traffic Analytics schema (August 2019 schema update)
20
20
21
-
The [Traffic Analytics Log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) has been updated to include the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
22
-
The new fields provide information about source and destination IPs and simplify queries.
21
+
The [Traffic Analytics log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) includes the following new fields: **SrcPublicIPs_s**, **DestPublicIPs_s**, **NSGRule_s**. The new fields provide information about source and destination IPs, and they simplify queries.
23
22
24
-
Below are three examples showing how to replace the old fields with new ones.
23
+
In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
The following three examples show how to replace the old fields with the new ones.
27
26
28
-
We don’t have to infer Source and destination cases for Azure and External public flows from FlowDirection_s field for AzurePublic and ExternalPublic flows specifically. In case of an NVA (Network Virtual Appliance), the FlowDirection_s field can be inappropriate to be used as well.
27
+
## Example 1: VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, and PublicIPs_s fields
28
+
29
+
We don't have to infer source and destination cases from the **FlowDirection_s** field for AzurePublic and ExternalPublic flows. It can also be inappropriate to use the **FlowDirection_s** field for a network virtual appliance.
Earlier field was of format: <Index value 0)>|<NSG_RULENAME>|<FlowDirection>|<FlowStatus>|<FlowCountProcessedByRule>
75
+
<Index value 0)>|<NSG_ RuleName>|<FlowDirection>|<FlowStatus>|<FlowCountProcessedByRule>
74
76
75
-
Earlier we used to aggregate data across NSG and NSGRules. Now we do not aggregate. So NSGList_s contains only one NSG and NSGRules_s also used to contain only one rule. So we have removed the complicated formatting here and the same can be found in other fields as mentioned below:
77
+
We no longer aggregate data across a network security group (NSG). In the updated schema, **NSGList_s** contains only one NSG. Also **NSGRules** contains only one rule. We removed the complicated formatting here and in other fields as shown in the example.
Only one of the four fields will be nonzero. The other three fields will be zero. The fields populate to indicate the status and count in the NIC where the flow was captured.
101
109
102
-
Since we do not club data across NSG, the FlowCount_d is simply AllowedInFlows_d + DeniedInFlows_d + AllowedOutFlows_d + DeniedOutFlows_d.
103
-
Only 1 of the above 4 will be non-zero and rest three will be 0. And it would indicate the status and count in the NIC where the flow was captured.
110
+
To illustrate these conditions:
104
111
105
-
If the flow was allowed, one of the fields prefixed with “Allowed” will be populated. Else one fields prefixed with “Denied” will be populated.
106
-
If the flow was inbound, one of the fields suffixed with "\_d" like “InFlows_d” suffixed field will be populated. Else “OutFlows_d” will be populated.
112
+
- If the flow was allowed, one of the "Allowed" prefixed fields will be populated.
113
+
- If the flow was denied, one of the "Denied" prefixed fields will be populated.
114
+
- If the flow was inbound, one of the "InFlows_d" suffixed fields will be populated.
115
+
- If the flow was outbound, one of the "OutFlows_d" suffixed fields will be populated.
107
116
108
-
Depending on above 2 conditions, we know which one out of the 4 will be populated.
117
+
Depending on the conditions, we know which one of the four fields will be populated.
109
118
119
+
## Next steps
110
120
111
-
## Next Steps
112
-
To get answers to frequently asked questions, see [Traffic analytics FAQ](traffic-analytics-faq.md)
113
-
To see details about functionality, see [Traffic analytics documentation](traffic-analytics.md)
121
+
- To get answers to frequently asked questions, see [Traffic Analytics FAQ](traffic-analytics-faq.md).
122
+
- To see details about functionality, see [Traffic Analytics documentation](traffic-analytics.md).
0 commit comments