AvantGuard - DNSFilter icon

AvantGuard - DNSFilter

AvantGuard - DNSFilter

Actions277

Overview

This node operation, Traffic Reports Total Requests Collections, retrieves aggregated traffic report data grouped by collections. It is designed to query detailed network traffic statistics such as total requests filtered by various criteria including user agents, applications, networks, and time ranges. This node is useful for network administrators or security analysts who want to monitor traffic patterns, detect anomalies, or generate reports on allowed or blocked traffic within their infrastructure.

Practical examples include:

  • Generating daily summaries of network traffic per collection.
  • Filtering traffic reports by specific user agents or MAC addresses.
  • Analyzing threat-related traffic by enabling the security report option.
  • Grouping results by collection IDs to understand traffic distribution across different segments.

Properties

Name Meaning
Additional Query Parameters Optional filters and parameters to customize the traffic report query. Includes:
- Agent Ids: Comma separated list of user agent UUIDs (default all)
- Agent Types: Comma separated list of user agent types (default all)
- Application Ids: Comma separated list of application IDs (default all)
- Bucket Size: Desired bucket size for aggregation (auto, 15min, 1day), default auto
- Collection Ids: Comma separated list of collection IDs (default all)
- From: UTC lower limit datetime for report (format YYYY-MM-DDThh:mm:ss or with Z)
- Mac Addresses: Comma separated list of MAC addresses without colons (default all)
- Nat Ips: Comma separated list of NAT IPs (valid integers 101-106)
- Network Ids: Comma separated list of network IDs (default all)
- Organization Ids: Comma separated list of organization IDs (default user's org ID)
- Private Ip: Specific private LAN IP
- Private Ip From/To: Range for private LAN IPs
- Security Report: Boolean to filter threats only (true), non-threats only (false), or both if empty (default true)
- Show Individual Collections: Boolean to group results by collection ID (default true)
- Source: Traffic source filter (all, networks, agents, proxies), default all
- To: UTC upper limit datetime for report
- Type: Type of report (all, allowed, blocked), default all
- User Ids: Comma separated list of local user IDs (default all)

Output

The node outputs JSON data representing the aggregated traffic report grouped by collections according to the specified filters. The structure typically includes:

  • Collection identifiers.
  • Aggregated counts of total requests.
  • Breakdown by allowed or blocked traffic if requested.
  • Time-bucketed data based on the selected bucket size.
  • Optionally, threat-related information if the security report flag is enabled.

No binary data output is indicated for this operation.

Dependencies

  • Requires an API key credential for authenticating with the AvantGuard DNSFilter service.
  • The node communicates with the DNSFilter API endpoint at https://api.dnsfilter.com.
  • Proper configuration of the API authentication token in n8n credentials is necessary.

Troubleshooting

  • Invalid Date Format: If the from or to date parameters are not in the correct ISO format (YYYY-MM-DDThh:mm:ss or with trailing Z), the API may return errors or default to fallback dates. Ensure correct formatting.
  • Empty or Incorrect Filters: Providing invalid IDs or malformed comma-separated lists can result in no data returned or API errors. Validate input values carefully.
  • Authentication Errors: Missing or incorrect API credentials will cause authorization failures. Verify that the API key credential is correctly set up.
  • Large Data Sets: Requesting very large date ranges or many filters simultaneously might lead to timeouts or performance issues. Use appropriate bucket sizes and filter scopes.
  • Boolean Parameter Handling: The security_report and show_individual_collections flags must be boolean; passing other types may cause unexpected behavior.

Links and References

Discussion