AvantGuard - DNSFilter icon

AvantGuard - DNSFilter

AvantGuard - DNSFilter

Actions277

Overview

This node integrates with the AvantGuard DNSFilter API to retrieve traffic reports specifically focusing on "Traffic Reports Qps Active Agents." It allows users to query detailed traffic data related to active agents, including filtering by various parameters such as agent IDs, application IDs, network IDs, and time ranges. This node is beneficial for network administrators or security analysts who want to monitor real-time or historical traffic activity, analyze agent behavior, or generate threat reports.

Practical examples include:

  • Fetching active agent traffic reports filtered by specific user agents or applications.
  • Generating security threat reports within a defined time window.
  • Monitoring allowed versus blocked traffic types from different sources like agents or proxies.

Properties

Name Meaning
Additional Query Parameters Optional filters to refine the traffic report query. Includes:
- Agent Ids: Comma separated list of user agent UUIDs (defaults to all).
- Agent Types: Comma separated list of user agent types.
- Application Ids: Comma separated list of application IDs.
- Collection Ids: Comma separated list of collection IDs.
- From: UTC lower limit datetime for the report (format YYYY-MM-DDThh:mm:ss or with Z). Defaults to current UTC minus 1 day.
- Mac Addresses: Comma separated MAC addresses without colons.
- Nat Ips: Comma separated NAT IPs (valid integers 101 to 106).
- Network Ids: Comma separated network IDs.
- Organization Ids: Comma separated organization IDs (defaults to user's org ID).
- Private Ip: Specific private LAN IP.
- Private Ip From/To: Range for private LAN IP.
- Security Report: Boolean to filter threats only (true), non-threats only (false), or both if empty.
- Source: Traffic source filter; options are All, Agents, Proxies (default All).
- To: UTC upper limit datetime for the report (same format as From). Defaults to current UTC.
- Type: Type of report; options are All, Allowed, Blocked (default All).
- User Ids: Comma separated local user IDs.

Output

The node outputs JSON data representing the traffic report results based on the applied filters. The structure typically includes details about active agents, their traffic statistics, timestamps, and possibly threat indicators depending on the security_report parameter.

If binary data output is supported, it would represent raw report files or logs, but this node primarily returns structured JSON data.

Dependencies

  • Requires an API key credential for authenticating with the AvantGuard DNSFilter service.
  • The node uses the base URL https://api.dnsfilter.com for API requests.
  • No additional external dependencies beyond the provided API client library bundled in the node.

Troubleshooting

  • Invalid Date Format: If the from or to date parameters are not in the correct ISO 8601 format (YYYY-MM-DDThh:mm:ss or with trailing Z), the API may default to preset values or return errors. Ensure proper formatting.
  • Empty or Incorrect Filters: Providing invalid IDs or malformed comma-separated lists can result in no data returned or API errors. Validate input formats carefully.
  • Authentication Errors: Missing or incorrect API credentials will cause authentication failures. Verify that the API key credential is correctly configured in n8n.
  • API Rate Limits: Excessive querying might hit rate limits imposed by the DNSFilter API. Implement retry logic or reduce query frequency if needed.

Links and References

Discussion