You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-schema.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: network-watcher
8
8
ms.topic: concept-article
9
-
ms.date: 12/05/2023
9
+
ms.date: 04/24/2024
10
10
11
11
#CustomerIntent: As a administrator, I want learn about traffic analytics schema so I can easily use the queries and understand their output.
12
12
---
13
13
14
-
# Schema and data aggregation in Azure Network Watcher traffic analytics
14
+
# Traffic analytics schema and data aggregation
15
15
16
16
Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Traffic analytics analyzes Azure Network Watcher flow logs to provide insights into traffic flow in your Azure cloud. With traffic analytics, you can:
17
17
@@ -268,8 +268,10 @@ The following table details public IP schema:
268
268
|**Location**| Location of the IP | - For Azure Public IP: Azure region of virtual network/network interface/virtual machine to which the IP belongs OR Global for IP [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). <br> - For External Public IP and Malicious IP: 2-letter country code where IP is located (ISO 3166-1 alpha-2). |
269
269
|**PublicIPDetails**| Information about IP | - For AzurePublic IP: Azure Service owning the IP or Microsoft virtual public IP for [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). <br> - ExternalPublic/Malicious IP: WhoIS information of the IP. |
270
270
|**ThreatType**| Threat posed by malicious IP |**For Malicious IPs only**: One of the threats from the list of currently allowed values (described in the next table). |
271
-
|**ThreatDescription**| Description of the threat |**For Malicious IPs only**: Description of the threat posed by the malicious IP. |
272
-
|**DNSDomain**| DNS domain |**For Malicious IPs only**: Domain name associated with this IP. |
271
+
|**ThreatDescription**| Description of the threat |*For Malicious IPs only*. Description of the threat posed by the malicious IP. |
272
+
|**DNSDomain**| DNS domain |*For Malicious IPs only*. Domain name associated with the malicious IP. |
273
+
|**Url**| URL corresponding to the malicious IP |*For Malicious IPs only*|
274
+
|**Port**| Port corresponding to the malicious IP |*For Malicious IPs only*|
273
275
274
276
# [**VNet flow logs (preview)**](#tab/vnet)
275
277
@@ -285,8 +287,10 @@ The following table details public IP schema:
285
287
|**PublicIPDetails**| Information about IP |**For AzurePublic IP**: Azure Service owning the IP or **Microsoft Virtual Public IP** for the IP 168.63.129.16. <br> **ExternalPublic/Malicious IP**: WhoIS information of the IP. |
286
288
|**ThreatType**| Threat posed by malicious IP |*For Malicious IPs only*. One of the threats from the list of currently allowed values. For more information, see [Notes](#notes). |
287
289
|**DNSDomain**| DNS domain |*For Malicious IPs only*. Domain name associated with this IP. |
288
-
|**ThreatDescription**|Description of the threat |*For Malicious IPs only*. Description of the threat posed by the malicious IP. |
290
+
|**ThreatDescription**|Description of the threat |*For Malicious IPs only*. Description of the threat posed by the malicious IP. |
289
291
|**Location**| Location of the IP |**For Azure Public IP**: Azure region of virtual network / network interface / virtual machine to which the IP belongs or Global for IP 168.63.129.16. <br> **For External Public IP and Malicious IP**: two-letter country code (ISO 3166-1 alpha-2) where IP is located. |
292
+
|**Url**| URL corresponding to the malicious IP |*For Malicious IPs only*|
293
+
|**Port**| Port corresponding to the malicious IP |*For Malicious IPs only*|
290
294
291
295
> [!NOTE]
292
296
> *NTAIPDetails* in VNet flow logs replaces *AzureNetworkAnalyticsIPDetails_CL* used in NSG flow logs.
0 commit comments