You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-schema-update.md
+25-18Lines changed: 25 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Azure traffic analytics schema update - March 2020 | Microsoft Docs
2
+
title: Azure Traffic Analytics schema update - March 2020 | Microsoft Docs
3
3
description: Sample queries with new fields in the Traffic Analytics schema.
4
4
services: network-watcher
5
5
documentationcenter: na
6
6
author: vinigam
7
7
manager: agummadi
8
-
editor:
8
+
editor:
9
9
10
10
ms.service: network-watcher
11
11
ms.devlang: na
@@ -18,14 +18,15 @@ ms.author: vinigam
18
18
---
19
19
# Sample queries with new fields in Traffic Analytics schema (August 2019 schema update)
20
20
21
-
The [Traffic Analytics Log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) has been updated to include the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
22
-
The new fields provide information about source and destination IPs and simplify queries.
21
+
The [Traffic Analytics log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) includes the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. The new fields provide information about source and destination IPs, and also simplify queries.
23
22
24
-
Below are three examples showing how to replace the old fields with new ones.
23
+
In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
Review examples of how to replace the old fields with the new ones.
27
26
28
-
We don’t have to infer Source and destination cases for Azure and External public flows from FlowDirection_s field for AzurePublic and ExternalPublic flows specifically. In case of an NVA (Network Virtual Appliance), the FlowDirection_s field can be inappropriate to be used as well.
27
+
## Replacing the VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, and PublicIPs_s fields
28
+
29
+
We don't have to infer source and destination cases from the **FlowDirection_s** field for AzurePublic and ExternalPublic flows. It can also be inappropriate to use the **FlowDirection_s** field for a Network Virtual Appliance.
Earlier field was of format: <Index value 0)>|<NSG_RULENAME>|<FlowDirection>|<FlowStatus>|<FlowCountProcessedByRule>
75
+
<Index value 0)>|<NSG_ RuleName>|<FlowDirection>|<FlowStatus>|<FlowCountProcessedByRule>
74
76
75
-
Earlier we used to aggregate data across NSG and NSGRules. Now we do not aggregate. So NSGList_s contains only one NSG and NSGRules_s also used to contain only one rule. So we have removed the complicated formatting here and the same can be found in other fields as mentioned below:
77
+
We no longer aggregate data across a network security group (NSG). In the updated schema **NSGList_s** contains only one NSG. Also, **NSGRules**used to contain only one rule. We removed the complicated formatting here and in other fields as shown:
Since we do not club data across NSG, the FlowCount_d is simply AllowedInFlows_d + DeniedInFlows_d + AllowedOutFlows_d + DeniedOutFlows_d.
103
-
Only 1 of the above 4 will be non-zero and rest three will be 0. And it would indicate the status and count in the NIC where the flow was captured.
108
+
Only one of the four fields will be non-zero. The other three fields will be zero. This indicates the status and count in the NIC where the flow was captured.
104
109
105
-
If the flow was allowed, one of the fields prefixed with “Allowed” will be populated. Else one fields prefixed with “Denied” will be populated.
106
-
If the flow was inbound, one of the fields suffixed with "\_d" like “InFlows_d” suffixed field will be populated. Else “OutFlows_d” will be populated.
110
+
- If the flow was allowed, one of the "Allowed" fields will be populated.
111
+
- If the flow was denied, one of the "Denied" fields will be populated.
112
+
- If the flow was inbound, one of the "InFlows_d" fields will be populated.
113
+
- If the flow was outbound, one of the "OutFlows_d" fields will be populated.
107
114
108
-
Depending on above 2 conditions, we know which one out of the 4 will be populated.
115
+
Depending on the above conditions, we know which one of the four fields will be populated.
109
116
110
117
111
118
## Next Steps
112
-
To get answers to frequently asked questions, see [Traffic analytics FAQ](traffic-analytics-faq.md)
113
-
To see details about functionality, see [Traffic analytics documentation](traffic-analytics.md)
119
+
To get answers to frequently asked questions, see [Traffic Analytics FAQ](traffic-analytics-faq.md)
120
+
To see details about functionality, see [Traffic Analytics documentation](traffic-analytics.md)
0 commit comments