Skip to content

Commit 63758f4

Browse files
committed
[Logs] Update log fields
Updates log fields based on the latest changes in the `entities` internal repo.
1 parent 66d6203 commit 63758f4

File tree

4 files changed

+18
-6
lines changed

4 files changed

+18
-6
lines changed

src/content/docs/logs/reference/log-fields/account/gateway_http.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Reason file was blocked in the response, if any.
5353

5454
## BlockedFileSize
5555

56-
Type: `string`
56+
Type: `int`
5757

5858
File size(bytes) blocked in the response, if any.
5959

@@ -101,7 +101,7 @@ Country code of the destination IP of the HTTP request (for example, 'US').
101101

102102
## DestinationPort
103103

104-
Type: `string`
104+
Type: `int`
105105

106106
Destination port of the request.
107107

@@ -257,7 +257,7 @@ Local LAN IP of the device. Only available when connected via a GRE/IPsec tunnel
257257

258258
## SourcePort
259259

260-
Type: `string`
260+
Type: `int`
261261

262262
Source port of the request.
263263

src/content/docs/logs/reference/log-fields/zone/firewall_events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ The kind of event, currently only possible values are: <em>firewall</em>.
163163

164164
Type: `string`
165165

166-
Result of the check for leaked credentials.
166+
Result of the check for [leaked credentials](/waf/detections/leaked-credentials/). <br />Possible results are: <em>password_leaked</em> \| <em>username_and_password_leaked</em> \| <em>username_password_similar</em> \| <em>username_leaked</em> \| <em>clean</em>.
167167

168168
## MatchIndex
169169

src/content/docs/logs/reference/log-fields/zone/http_requests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,7 @@ Inter-request statistics computed for this JA4 fingerprint. JA4Signals field is
367367

368368
Type: `string`
369369

370-
Result of the check for leaked credentials.
370+
Result of the check for [leaked credentials](/waf/detections/leaked-credentials/). <br />Possible results are: <em>password_leaked</em> \| <em>username_and_password_leaked</em> \| <em>username_password_similar</em> \| <em>username_leaked</em> \| <em>clean</em>.
371371

372372
## OriginDNSResponseTimeMs
373373

src/content/docs/logs/reference/log-fields/zone/page_shield_events.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,12 @@ Type: `string`
1515

1616
The action which was taken against the violation. <br />Possible values are <em>log</em> \| <em>allow</em>.
1717

18+
## CSPDirective
19+
20+
Type: `string`
21+
22+
The violated directive in the report.
23+
1824
## Host
1925

2026
Type: `string`
@@ -33,6 +39,12 @@ Type: `string`
3339

3440
The ID of the policy which was violated.
3541

42+
## ResourceType
43+
44+
Type: `string`
45+
46+
The resource type of the violated directive. Possible values are 'script', 'connection' or 'other' for unmonitored resource types
47+
3648
## Timestamp
3749

3850
Type: `int or string`
@@ -45,7 +57,7 @@ Type: `string`
4557

4658
The resource URL.
4759

48-
## URLContainsCDNCGIPath
60+
## URLContainsCDNCGIPath (deprecated)
4961

5062
Type: `bool`
5163

0 commit comments

Comments
 (0)