Analyzing Network Traffic

Twingate allows customers to view and export network activity on their remote networks. This can be useful for troubleshooting or investigatory purposes. Note that the only network activity that will be exported is traffic that flows through Connectors you have deployed. As Twingate is not a traditional VPN, it does not see other user traffic, which flows directly to the Internet.

Twingate provides two ways to view and export network traffic that flows through Connectors that you have deployed on your network:

  • Manually exporting network traffic via the Admin console
  • Real-time connection logging, output directly by the Connector process

-> Real-time connection logging configuration and output is described in Real-time Connection Logs

Viewing Network Traffic in the Admin Console

Network traffic can be viewed on either an individual User or Resource page.

This view will show recent network traffic associated with this User or Resource. When clicking into a specific event, customers can see more details about the event. These additional details include the Resource IP address, protocol, connection type, and duration.

Exporting Network Traffic

To create an export:

1. Navigate to the Analytics page under Settings

2. Click New Report to generate a new report

3. Select the time range and the Remote Network that you want to export

The time range will use your local timezone, even though the export itself will have timestamps in UTC. The time used is the end time of the connection, regardless of when the connection began. Remote Networks will default to all.

4. The export will complete in the background and email you when it’s ready.

Most exports will only take a few minutes, though very large ones could take a few hours.

5. Go back to the Analytics page to download completed reports.

-> View details about the schema we use to export events


Where is the IP of the client? This is currently not shown and will be added in a future update.

Why don’t I see access denied events? Due to the zero trust method Twingate uses, there is no way to distinguish between being denied access to a Resource and said Resource not existing at all, because the client only knows about Resources it has permissions to access. We are looking into how to address this in the future.

How long are events retained for? Twingate retains analytics data for the life of the account.

Last updated 2 months ago