Skip to content

Commit 70cf0c6

Browse files
authored
Update Logs docs Logs fields page (#202)
This updates Logs docs Logs fields page. Co-authored-by: Sohei Okamoto <[email protected]>
1 parent 05c0379 commit 70cf0c6

File tree

1 file changed

+8
-8
lines changed
  • products/logs/src/content/log-fields

1 file changed

+8
-8
lines changed

products/logs/src/content/log-fields/index.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ The tables below describe the fields available by log category. The list of fiel
1313
<TableWrap>
1414

1515
| Field | Value | Type |
16-
|---|---|---|
16+
| -- | -- | -- |
1717
| BotScore | Cloudflare Bot Score (available for Bot Management customers; please contact your account team to enable) | int |
1818
| BotScoreSrc | Underlying detection engine or <em>source</em> on where a Bot Score is calculated.<br /> Possible values are <em>Not Computed</em> \| <em>Heuristics</em> \| <em>Machine Learning</em> \| <em>Behavioral Analysis</em> \| <em>Verified Bot</em> | string |
1919
| CacheCacheStatus | <em>unknown</em> \| <em>miss</em> \| <em>expired</em> \| <em>updating</em> \| <em>stale</em> \| <em>hit</em> \| <em>ignored</em> \| <em>bypass</em> \| <em>revalidated</em> | string |
@@ -52,9 +52,9 @@ The tables below describe the fields available by log category. The list of fiel
5252
| EdgeResponseStatus | HTTP status code returned by Cloudflare to the client | int |
5353
| EdgeServerIP | IP of the edge server making a request to the origin | string |
5454
| EdgeStartTimestamp | Timestamp at which the edge received request from the client | int or string |
55-
| FirewallMatchesActions | Array of actions the Cloudflare firewall products performed on this request. The individual firewall products associated with this action be found in FirewallMatchesSources and their respective RuleIds can be found in FirewallMatchesRuleIDs. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesSources.<br /> Possible actions are <em>allow</em> \| <em>log</em> \| <em>simulate</em> \| <em>drop</em> \| <em>challenge</em> \| <em>jschallenge</em> \| <em>connectionClose</em> \| <em>bypass</em> | array of actions (strings) |
56-
| FirewallMatchesRuleIDs | Array of RuleIDs of the firewall product that has matched the request. The firewall product associated with the RuleID can be found in FirewallMatchesSources. The length of the array is the same as FirewallMatchesActions and FirewallMatchesSources. | array of RuleIDs (strings) |
57-
| FirewallMatchesSources | The firewall products that matched the request. The same product can appear multiple times, which indicates different rules or actions that were activated. The RuleIDs can be found in FirewallMatchesRuleIDs, the actions can be found in FirewallMatchesActions. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesActions.<br /> Possible sources are <em>asn</em> \| <em>country</em> \| <em>ip</em> \| <em>ipRange</em> \| <em>securityLevel</em> \| <em>zoneLockdown</em> \| <em>waf</em> \| <em>firewallRules</em> \| <em>uaBlock</em> \| <em>rateLimit</em> \| <em>bic</em> \| <em>hot</em> \| <em>l7ddos</em> \| <em>sanitycheck</em> \| <em>protect</em> | array of product names (strings) |
55+
| FirewallMatchesActions | Array of actions the Cloudflare firewall products performed on this request. The individual firewall products associated with this action be found in FirewallMatchesSources and their respective RuleIds can be found in FirewallMatchesRuleIDs. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesSources.<br /> Possible actions are <em>allow</em> \| <em>log</em> \| <em>simulate</em> \| <em>drop</em> \| <em>challenge</em> \| <em>jschallenge</em> \| <em>connectionClose</em> \| <em>bypass</em> | array[string] |
56+
| FirewallMatchesRuleIDs | Array of RuleIDs of the firewall product that has matched the request. The firewall product associated with the RuleID can be found in FirewallMatchesSources. The length of the array is the same as FirewallMatchesActions and FirewallMatchesSources. | array[string] |
57+
| FirewallMatchesSources | The firewall products that matched the request. The same product can appear multiple times, which indicates different rules or actions that were activated. The RuleIDs can be found in FirewallMatchesRuleIDs, the actions can be found in FirewallMatchesActions. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesActions.<br /> Possible sources are <em>asn</em> \| <em>country</em> \| <em>ip</em> \| <em>ipRange</em> \| <em>securityLevel</em> \| <em>zoneLockdown</em> \| <em>waf</em> \| <em>firewallRules</em> \| <em>uaBlock</em> \| <em>rateLimit</em> \| <em>bic</em> \| <em>hot</em> \| <em>l7ddos</em> \| <em>sanitycheck</em> \| <em>protect</em> | array[string] |
5858
| OriginIP | IP of the origin server | string |
5959
| OriginResponseBytes (deprecated) | Number of bytes returned by the origin server | int |
6060
| OriginResponseHTTPExpires | Value of the origin 'expires' header in RFC1123 format | string |
@@ -64,7 +64,7 @@ The tables below describe the fields available by log category. The list of fiel
6464
| OriginSSLProtocol | SSL (TLS) protocol used to connect to the origin | string |
6565
| ParentRayID | Ray ID of the parent request if this request was made using a Worker script | string |
6666
| RayID | ID of the request | string |
67-
| SecurityLevel | The security level configured at the time of this request. This is used to determine the sensitivity of the IP Reputation system | string |
67+
| SecurityLevel | The security level configured at the time of this request. This is used to determine the sensitivity of the IP Reputation system. | string |
6868
| WAFAction | Action taken by the WAF, if triggered | string |
6969
| WAFFlags | Additional configuration flags: <em>simulate (0x1)</em> \| <em>null</em> | string |
7070
| WAFMatchedVar | The full name of the most-recently matched variable | string |
@@ -85,7 +85,7 @@ The tables below describe the fields available by log category. The list of fiel
8585
<TableWrap>
8686

8787
| Field | Value | Type |
88-
|---|---|---|
88+
| -- | -- | -- |
8989
| Application | The unique public ID of the application on which the event occurred | string |
9090
| ClientAsn | Client AS number | int |
9191
| ClientBytes | The number of bytes read from the client by the Spectrum service | int |
@@ -116,7 +116,7 @@ The tables below describe the fields available by log category. The list of fiel
116116
| OriginTlsStatus | The state of the TLS session from Spectrum to the origin; <em>UNKNOWN</em> \| <em>OK</em> \| <em>INTERNAL_ERROR</em> \| <em>INVALID_CONFIG</em> \| <em>INVALID_SNI</em> \| <em>HANDSHAKE_FAILED</em> \| <em>KEYLESS_RPC</em> | string |
117117
| ProxyProtocol | Which form of proxy protocol is applied to the given connection; <em>off</em> \| <em>v1</em> \| <em>v2</em> \| <em>simple</em> | string |
118118
| Status | A code indicating reason for connection closure | int |
119-
| Timestamp | Timestamp at which the event took place | string |
119+
| Timestamp | Timestamp at which the event took place | int or string |
120120

121121
</TableWrap>
122122

@@ -126,7 +126,7 @@ The tables below describe the fields available by log category. The list of fiel
126126
<TableWrap>
127127

128128
| Field | Value | Type |
129-
|---|---|---|
129+
| -- | -- | -- |
130130
| Action | The code of the first-class action the Cloudflare Firewall took on this request | string |
131131
| ClientASN | The ASN number of the visitor | int |
132132
| ClientASNDescription | The ASN of the visitor as string | string |

0 commit comments

Comments
 (0)