Skip to content

Commit 6304bec

Browse files
committed
edit pass: traffic-analytics-schema-update
1 parent e443b78 commit 6304bec

File tree

1 file changed

+20
-18
lines changed

1 file changed

+20
-18
lines changed

articles/network-watcher/traffic-analytics-schema-update.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,17 @@ ms.date: 03/06/2020
1616
ms.author: vinigam
1717

1818
---
19-
# Sample queries with new fields in Traffic Analytics schema (August 2019 schema update)
19+
# Sample queries with new fields in the Traffic Analytics schema (August 2019 schema update)
2020

21-
The [Traffic Analytics log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) includes the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. The new fields provide information about source and destination IPs, and also simplify queries.
21+
The [Traffic Analytics log schema](https://docs.microsoft.com/azure/network-watcher/traffic-analytics-schema) includes the following new fields: **SrcPublicIPs_s** , **DestPublicIPs_s**, **NSGRule_s**. The new fields provide information about source and destination IPs, and they simplify queries.
2222

2323
In the next few months, the following older fields will be deprecated: **VMIP_s**, **Subscription_g**, **Region_s**, **NSGRules_s**, **Subnet_s**, **VM_s**, **NIC_s**, **PublicIPs_s**, **FlowCount_d**.
2424

25-
Review examples of how to replace the old fields with the new ones.
25+
The following three examples show how to replace the old fields with the new ones.
2626

27-
## Replacing the VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, and PublicIPs_s fields
27+
## Example 1: VMIP_s, Subscription_g, Region_s, Subnet_s, VM_s, NIC_s, and PublicIPs_s fields
2828

29-
We don't have to infer source and destination cases from the **FlowDirection_s** field for AzurePublic and ExternalPublic flows. It can also be inappropriate to use the **FlowDirection_s** field for a Network Virtual Appliance.
29+
We don't have to infer source and destination cases from the **FlowDirection_s** field for AzurePublic and ExternalPublic flows. It can also be inappropriate to use the **FlowDirection_s** field for a network virtual appliance.
3030

3131
```Old Kusto query
3232
AzureNetworkAnalytics_CL
@@ -68,13 +68,13 @@ SourcePublicIPsAggregated = iif(isnotempty(SrcPublicIPs_s), SrcPublicIPs_s, "N/A
6868
DestPublicIPsAggregated = iif(isnotempty(DestPublicIPs_s), DestPublicIPs_s, "N/A")
6969
```
7070

71-
## Replacing the NSGRules_s field
71+
## Example 2: NSGRules_s field
7272

7373
The old field used the format:
7474

7575
<Index value 0)>|<NSG_ RuleName>|<Flow Direction>|<Flow Status>|<FlowCount ProcessedByRule>
7676

77-
We no longer aggregate data across a network security group (NSG). In the updated schema **NSGList_s** contains only one NSG. Also, **NSGRules** used to contain only one rule. We removed the complicated formatting here and in other fields as shown:
77+
We no longer aggregate data across a network security group (NSG). In the updated schema, **NSGList_s** contains only one NSG. Also **NSGRules** contains only one rule. We removed the complicated formatting here and in other fields as shown in the example.
7878

7979
```Old Kusto query
8080
AzureNetworkAnalytics_CL
@@ -99,22 +99,24 @@ FlowStatus = FlowStatus_s,
9999
FlowCountProcessedByRule = AllowedInFlows_d + DeniedInFlows_d + AllowedOutFlows_d + DeniedOutFlows_d
100100
```
101101

102-
## Replacing the FlowCount_d field
102+
## Example 3: FlowCount_d field
103103

104-
Since we do not club data across the NSG, the **FlowCount_d** is simply:
104+
Because we do not club data across the NSG, the **FlowCount_d** is simply:
105105

106106
**AllowedInFlows_d** + **DeniedInFlows_d** + **AllowedOutFlows_d** + **DeniedOutFlows_d**
107107

108-
Only one of the four fields will be non-zero. The other three fields will be zero. This indicates the status and count in the NIC where the flow was captured.
108+
Only one of the four fields will be nonzero. The other three fields will be zero. The fields populate to indicate the status and count in the NIC where the flow was captured.
109109

110-
- If the flow was allowed, one of the "Allowed" fields will be populated.
111-
- If the flow was denied, one of the "Denied" fields will be populated.
112-
- If the flow was inbound, one of the "InFlows_d" fields will be populated.
113-
- If the flow was outbound, one of the "OutFlows_d" fields will be populated.
110+
To illustrate these conditions:
114111

115-
Depending on the above conditions, we know which one of the four fields will be populated.
112+
- If the flow was allowed, one of the "Allowed" prefixed fields will be populated.
113+
- If the flow was denied, one of the "Denied" prefixed fields will be populated.
114+
- If the flow was inbound, one of the "InFlows_d" suffixed fields will be populated.
115+
- If the flow was outbound, one of the "OutFlows_d" suffixed fields will be populated.
116116

117+
Depending on the conditions, we know which one of the four fields will be populated.
117118

118-
## Next Steps
119-
To get answers to frequently asked questions, see [Traffic Analytics FAQ](traffic-analytics-faq.md)
120-
To see details about functionality, see [Traffic Analytics documentation](traffic-analytics.md)
119+
## Next steps
120+
121+
- To get answers to frequently asked questions, see [Traffic Analytics FAQ](traffic-analytics-faq.md).
122+
- To see details about functionality, see [Traffic Analytics documentation](traffic-analytics.md).

0 commit comments

Comments
 (0)