User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Options
84 of 218
NOTE: Information held in the ExtremeAnalytics engine's cache is not saved. Restarting the
ExtremeAnalytics engine before the data in the memory cache is sent to Extreme Management
Center results in the loss of that information.
Options
Following are definitions of the different options available when creating your
custom query.
Data Table
Select which type of network activity data to query. The correct data table to
use depends on the nature of the report.
l End-System Details - Hourly — End-system data collected every hour. Used when
data for a specific client or server is needed, or when the information requested is
highly specific, for example top applications used by Android devices in the London
site.
l Application Data - Hourly — Application data collected every hour. Used for higher
level information, such as top applications during an hour.
l Application Data - High-Rate — Application data collected at a higher rate (every
five minutes). Used for a more detailed picture of how traffic changes over time.
l Application Telemetry - Hourly — Application Telemetry flow data collected every
hour.
Display Format
Select the display format for the report: Grid, Chart Over Time, Word Cloud,
Tree Map, or Bubble Map.
Target
Network traffic information is collected on objects in your network called
targets. Some targets are physical, such as clients and servers, and some are
logical, such as applications. Select the type of target that you want
information about. Available targets vary depending on the selected data
table. If you want information on a specific target, specify that target in the
Search Criteria options.
l Applications — An application in ExtremeAnalytics is identified through layer 7
analysis of network traffic. For example, an application can be identified as
Facebook.