You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: products/logs/src/content/log-fields/index.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ The tables below describe the fields available by log category. The list of fiel
13
13
<TableWrap>
14
14
15
15
| Field | Value | Type |
16
-
|---|---|---|
16
+
| -- | -- | -- |
17
17
| BotScore | Cloudflare Bot Score (available for Bot Management customers; please contact your account team to enable) | int |
18
18
| BotScoreSrc | Underlying detection engine or <em>source</em> on where a Bot Score is calculated.<br /> Possible values are <em>Not Computed</em> \| <em>Heuristics</em> \| <em>Machine Learning</em> \| <em>Behavioral Analysis</em> \| <em>Verified Bot</em> | string |
@@ -52,9 +52,9 @@ The tables below describe the fields available by log category. The list of fiel
52
52
| EdgeResponseStatus | HTTP status code returned by Cloudflare to the client | int |
53
53
| EdgeServerIP | IP of the edge server making a request to the origin | string |
54
54
| EdgeStartTimestamp | Timestamp at which the edge received request from the client | int or string |
55
-
| FirewallMatchesActions | Array of actions the Cloudflare firewall products performed on this request. The individual firewall products associated with this action be found in FirewallMatchesSources and their respective RuleIds can be found in FirewallMatchesRuleIDs. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesSources.<br /> Possible actions are <em>allow</em> \| <em>log</em> \| <em>simulate</em> \| <em>drop</em> \| <em>challenge</em> \| <em>jschallenge</em> \| <em>connectionClose</em> \| <em>bypass</em> | array of actions (strings)|
56
-
| FirewallMatchesRuleIDs | Array of RuleIDs of the firewall product that has matched the request. The firewall product associated with the RuleID can be found in FirewallMatchesSources. The length of the array is the same as FirewallMatchesActions and FirewallMatchesSources. | array of RuleIDs (strings)|
57
-
| FirewallMatchesSources | The firewall products that matched the request. The same product can appear multiple times, which indicates different rules or actions that were activated. The RuleIDs can be found in FirewallMatchesRuleIDs, the actions can be found in FirewallMatchesActions. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesActions.<br /> Possible sources are <em>asn</em> \| <em>country</em> \| <em>ip</em> \| <em>ipRange</em> \| <em>securityLevel</em> \| <em>zoneLockdown</em> \| <em>waf</em> \| <em>firewallRules</em> \| <em>uaBlock</em> \| <em>rateLimit</em> \| <em>bic</em> \| <em>hot</em> \| <em>l7ddos</em> \| <em>sanitycheck</em> \| <em>protect</em> | array of product names (strings)|
55
+
| FirewallMatchesActions | Array of actions the Cloudflare firewall products performed on this request. The individual firewall products associated with this action be found in FirewallMatchesSources and their respective RuleIds can be found in FirewallMatchesRuleIDs. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesSources.<br /> Possible actions are <em>allow</em> \| <em>log</em> \| <em>simulate</em> \| <em>drop</em> \| <em>challenge</em> \| <em>jschallenge</em> \| <em>connectionClose</em> \| <em>bypass</em> | array[string]|
56
+
| FirewallMatchesRuleIDs | Array of RuleIDs of the firewall product that has matched the request. The firewall product associated with the RuleID can be found in FirewallMatchesSources. The length of the array is the same as FirewallMatchesActions and FirewallMatchesSources. | array[string]|
57
+
| FirewallMatchesSources | The firewall products that matched the request. The same product can appear multiple times, which indicates different rules or actions that were activated. The RuleIDs can be found in FirewallMatchesRuleIDs, the actions can be found in FirewallMatchesActions. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesActions.<br /> Possible sources are <em>asn</em> \| <em>country</em> \| <em>ip</em> \| <em>ipRange</em> \| <em>securityLevel</em> \| <em>zoneLockdown</em> \| <em>waf</em> \| <em>firewallRules</em> \| <em>uaBlock</em> \| <em>rateLimit</em> \| <em>bic</em> \| <em>hot</em> \| <em>l7ddos</em> \| <em>sanitycheck</em> \| <em>protect</em> | array[string]|
58
58
| OriginIP | IP of the origin server | string |
59
59
| OriginResponseBytes (deprecated) | Number of bytes returned by the origin server | int |
60
60
| OriginResponseHTTPExpires | Value of the origin 'expires' header in RFC1123 format | string |
@@ -64,7 +64,7 @@ The tables below describe the fields available by log category. The list of fiel
64
64
| OriginSSLProtocol | SSL (TLS) protocol used to connect to the origin | string |
65
65
| ParentRayID | Ray ID of the parent request if this request was made using a Worker script | string |
66
66
| RayID | ID of the request | string |
67
-
| SecurityLevel | The security level configured at the time of this request. This is used to determine the sensitivity of the IP Reputation system | string |
67
+
| SecurityLevel | The security level configured at the time of this request. This is used to determine the sensitivity of the IP Reputation system.| string |
68
68
| WAFAction | Action taken by the WAF, if triggered | string |
| WAFMatchedVar | The full name of the most-recently matched variable | string |
@@ -85,7 +85,7 @@ The tables below describe the fields available by log category. The list of fiel
85
85
<TableWrap>
86
86
87
87
| Field | Value | Type |
88
-
|---|---|---|
88
+
| -- | -- | -- |
89
89
| Application | The unique public ID of the application on which the event occurred | string |
90
90
| ClientAsn | Client AS number | int |
91
91
| ClientBytes | The number of bytes read from the client by the Spectrum service | int |
@@ -116,7 +116,7 @@ The tables below describe the fields available by log category. The list of fiel
116
116
| OriginTlsStatus | The state of the TLS session from Spectrum to the origin; <em>UNKNOWN</em> \| <em>OK</em> \| <em>INTERNAL_ERROR</em> \| <em>INVALID_CONFIG</em> \| <em>INVALID_SNI</em> \| <em>HANDSHAKE_FAILED</em> \| <em>KEYLESS_RPC</em> | string |
117
117
| ProxyProtocol | Which form of proxy protocol is applied to the given connection; <em>off</em> \| <em>v1</em> \| <em>v2</em> \| <em>simple</em> | string |
118
118
| Status | A code indicating reason for connection closure | int |
119
-
| Timestamp | Timestamp at which the event took place | string |
119
+
| Timestamp | Timestamp at which the event took place |int or string |
120
120
121
121
</TableWrap>
122
122
@@ -126,7 +126,7 @@ The tables below describe the fields available by log category. The list of fiel
126
126
<TableWrap>
127
127
128
128
| Field | Value | Type |
129
-
|---|---|---|
129
+
| -- | -- | -- |
130
130
| Action | The code of the first-class action the Cloudflare Firewall took on this request | string |
131
131
| ClientASN | The ASN number of the visitor | int |
132
132
| ClientASNDescription | The ASN of the visitor as string | string |
0 commit comments