User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Flow Collection Type
135 of 218
Flow Collection Type
Select from NetFlow, Application Telemetry or Both from the drop-down list to
choose the flow data you are using. Selecting SFlow changes the Flow Sources
table to an Application Telemetry Sources table. These tables allow you to select
the devices that collect application telemetry data flow by entering the name, IP
and device family for that device.
NOTE: Changing an ExtremeAnalytics engine to Application Telemetry or Both does not
update the configuration on the engine. Run the dnetconfig process on the
engine to change the configuration.
Collection Privacy Levels
Collection privacy level settings restrict the amount of identifying information
collected by the ExtremeAnalytics engine and displayed in the Application
Information column of the Application Flows report. (Access this report from the
Analytics tab. In the Application Flows report, hover over the Application
Information column to view the collected information.) This information is also
displayed in the Flow Summary window.
Increasing the privacy level protects the end user's identifying information from
being viewed by IT staff with access to the Application Flows report. The default
privacy level allows maximum access to the information. Increasing the privacy
level allows you to restrict the information that is collected and displayed.
There are three privacy levels. For all three levels, passwords are not collected or
displayed.
l Maximum Access — The ExtremeAnalytics engine collects both identifying
information and sensitive information. The information displays in the Application
Information column.
l Medium Privacy — The ExtremeAnalytics engine collects identifying information, but
not sensitive information. Identifying information displays in the Application
Information column.
l Maximum Privacy — The ExtremeAnalytics engine does not collect identifying
information or sensitive information. Information does not display in the Application
Information column.