AvantGuard - DNSFilter icon

AvantGuard - DNSFilter

AvantGuard - DNSFilter

Actions277

Overview

This node operation, Traffic Reports Total Domains Collections, retrieves aggregated traffic report data focused on domain collections. It is designed to query and summarize network traffic information by various filters such as user agents, applications, categories, collections, domains, and time ranges. This node is useful for network administrators or security analysts who want to analyze traffic patterns, identify threats, or monitor allowed/blocked domains over specific periods.

Practical examples include:

  • Generating a report of all blocked domains accessed within the last week.
  • Filtering traffic reports by specific user agents or application IDs.
  • Grouping traffic data by collection IDs to understand domain usage per collection.
  • Creating threat reports by enabling the security report option.

Properties

Name Meaning
Additional Query Parameters Optional parameters to refine the traffic report query. Includes:
- Agent Ids: Comma separated list of user agent UUIDs (default all)
- Agent Types: Comma separated list of user agent types (default all)
- Application Ids: Comma separated list of application IDs (default all)
- Bucket Size: Desired bucket size for aggregation (auto, 15min, 1day), default auto
- Category Ids: Comma separated list of category IDs (default all)
- Collection Ids: Comma separated list of collection IDs (default all)
- Domain: Filter domains starting with this value
- From: Report UTC lower limit datetime (format YYYY-MM-DDThh:mm:ss or with Z)
- Mac Addresses: Comma separated list of MAC addresses without colons (default all)
- Network Ids: Comma separated list of network IDs (default all)
- Organization Ids: Comma separated list of organization IDs (default user org ID)
- Private Ip: Private LAN IP filter
- Private Ip From: Lower limit of private LAN IP range
- Private Ip To: Upper limit of private LAN IP range
- Security Report: Boolean to include only threats (true), non-threats (false), or both if empty (default true)
- Show Individual Collections: Boolean to group results by collection ID (default true)
- Source: Traffic source filter (all, networks, agents, proxies), default all
- To: Report UTC upper limit datetime
- Type: Type of report (all, allowed, blocked), default all
- User Ids: Comma separated list of user IDs (default all)

Output

The node outputs JSON data containing the aggregated traffic report results based on the specified filters. The structure typically includes total counts or metrics grouped by domain collections, optionally broken down by individual collections if enabled.

  • The json output field contains the report data with domain statistics, timestamps, and grouping information.
  • No binary data output is indicated for this operation.

Dependencies

  • Requires an API key credential for authentication to the AvantGuard DNSFilter service.
  • The node sends HTTP requests to the DNSFilter API endpoint at https://api.dnsfilter.com.
  • Proper configuration of the API key credential in n8n is necessary for successful execution.

Troubleshooting

  • Common issues:

    • Invalid date/time format in from or to properties may cause the API to reject the request or return unexpected results. Use ISO 8601 format (YYYY-MM-DDThh:mm:ss or with Z).
    • Providing invalid or malformed comma-separated lists in filter fields (e.g., agent_ids, user_ids) can lead to empty or error responses.
    • Missing or incorrect API key credential will result in authentication errors.
    • Setting incompatible combinations of filters might yield no data.
  • Error messages:

    • Authentication failures: Check that the API key credential is correctly configured and valid.
    • Validation errors from the API: Verify that all query parameters conform to expected formats and values.
    • Network errors: Ensure connectivity to the DNSFilter API endpoint.

Links and References

Discussion