AvantGuard - DNSFilter icon

AvantGuard - DNSFilter

AvantGuard - DNSFilter

Actions277

Overview

This node operation, "Traffic Reports Qps Active Collections," retrieves detailed traffic report data filtered by various criteria such as user agents, applications, collections, networks, and time ranges. It is designed to query active collections of traffic reports with fine-grained filtering options.

Typical use cases include:

  • Monitoring network traffic activity for specific user agents or applications.
  • Generating security threat reports based on traffic data.
  • Filtering traffic data by organizational units or network segments.
  • Analyzing allowed versus blocked traffic within a specified timeframe.

For example, a network administrator could use this node to fetch all blocked traffic reports from certain user agents over the past day to investigate potential security incidents.

Properties

Name Meaning
Additional Query Parameters Optional filters to refine the traffic report query. These include:
- Agent Ids: Comma-separated list of user agent UUIDs (default: all)
- Agent Types: Comma-separated list of user agent types (default: all)
- Application Ids: Comma-separated list of application IDs (default: all)
- Collection Ids: Comma-separated list of collection IDs (default: all)
- From: UTC lower limit datetime for the report in ISO format (default: current UTC minus 1 day)
- Mac Addresses: Comma-separated MAC addresses without colons (default: all)
- Nat Ips: Comma-separated NAT IPs, valid integers 101 to 106 (default: all)
- Network Ids: Comma-separated network IDs (default: all)
- Organization Ids: Comma-separated organization IDs (default: user's org ID)
- Private Ip: Specific private LAN IP
- Private Ip From: Lower bound of private LAN IP range
- Private Ip To: Upper bound of private LAN IP range
- Security Report: Boolean to filter threats report; true for threats only, false for non-threats, empty for both (default: true)
- Source: Traffic source filter with options All, Agents, Proxies (default: All)
- To: UTC upper limit datetime for the report in ISO format (default: current UTC)
- Type: Report type filter with options All, Allowed, Blocked (default: All)
- User Ids: Comma-separated local user IDs (default: all)

Output

The node outputs JSON data representing the traffic reports matching the specified filters. The structure typically includes collections of traffic data points such as timestamps, agent identifiers, application details, network information, and security status (allowed/blocked). This output can be used downstream for further analysis, visualization, or alerting.

If binary data were supported, it would represent raw report files or logs, but this node focuses on structured JSON responses.

Dependencies

  • Requires an API key credential for authenticating requests to the AvantGuard DNSFilter service.
  • The node uses the base URL https://api.dnsfilter.com for its API calls.
  • No additional environment variables are explicitly required beyond the API authentication token.

Troubleshooting

  • Invalid Date Format: If the from or to date parameters are not in the expected ISO format (YYYY-MM-DDThh:mm:ss or with trailing Z), the API may default to fallback dates or return errors. Ensure correct formatting.
  • Empty or Incorrect Filters: Providing invalid IDs or malformed comma-separated lists may result in no data returned or API errors. Validate input values carefully.
  • Authentication Errors: Missing or incorrect API credentials will cause authorization failures. Verify that the API key credential is correctly configured.
  • Network Issues: Connectivity problems to the API endpoint will prevent data retrieval. Check network access and proxy settings if applicable.

Links and References

Discussion