You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/logs/gateway-logs/index.mdx
+9-72Lines changed: 9 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,13 @@ pcx_content_type: reference
3
3
title: Gateway activity logs
4
4
sidebar:
5
5
order: 3
6
-
7
6
---
8
7
9
-
import { Render } from"~/components"
10
-
11
-
:::note
8
+
import { Render } from"~/components";
12
9
10
+
:::note[Private source IP substitution]
13
11
14
-
Gateway logs will only show the public Source IP address. Private IP addresses are NAT-ed behind a public IP address.
15
-
12
+
Gateway logs will only show the public IP address for the **Source IP** field. Private IP addresses are substituted by a public IP address via network address translation (NAT).
16
13
17
14
:::
18
15
@@ -34,8 +31,6 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
@@ -44,37 +39,25 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
44
39
|**Time**| Date and time of the DNS query. |
45
40
|**Resolver Decision**| The reason why Gateway applied a particular **Action** to the request. Refer to the [list of resolver decisions](#resolver-decisions). |
|**Email**| Email address of the user who registered the WARP client where traffic originated from. |
@@ -83,12 +66,8 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
83
66
|**Device ID**| UUID of the device connected with the WARP client. Each unique device in your organization will have a UUID associated with it each time the device is registered for a particular email. The same physical device may have multiple UUIDs associated with it. |
84
67
|**Last authenticated**| Date and time the user last authenticated their Zero Trust session. |
|**Query Type**| Type of [DNS query](https://en.wikipedia.org/wiki/List_of_DNS_record_types). |
@@ -106,12 +85,8 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
106
85
|**DNS Location**|[User-configured location](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) from where the DNS query was made. |
107
86
|**Location ID**| ID of the DNS location where the query originated. |
|`blockedByCategory`|`3`| Domain or hostname matched a category in a Block policy. |
@@ -123,51 +98,37 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
123
98
|`blockedRule`|`9`| IP address in the response matched a Block policy. |
124
99
|`allowedRule`|`10`| IP address in the response matched an Allow policy. |
125
100
126
-
127
-
128
101
## Network logs
129
102
130
103
:::caution[Failed connection logs]
131
104
132
-
133
105
Gateway will only log failed connections in [network session logs](/logs/reference/log-fields/account/zero_trust_network_sessions/). These logs are available for Enterprise users via [Logpush](/cloudflare-one/insights/logs/logpush/) or [GraphQL](/cloudflare-one/insights/analytics/gateway/#graphql-queries).
|**Source IP**| IP address of the user sending the packet. |
147
116
|**Source Internal IP**| Private IP address assigned by the user's local network. |
148
-
|**Destination IP**| IP address of the packet’s target. |
117
+
|**Destination IP**| IP address of the packet's target. |
149
118
|**Action**| The Gateway [Action](/cloudflare-one/policies/gateway/dns-policies/#actions) taken based on the first rule that matched (such as Allow or Block). |
|**Source IP**| IP address of the user sending the packet. |
188
145
|**Source Port**| Source port number for the packet. |
189
146
|**Source Country**| Country code for the packet source. |
190
-
|**Destination IP**| IP address of the packet’s target. |
147
+
|**Destination IP**| IP address of the packet's target. |
191
148
|**Destination Port**| Destination port number for the packet. |
192
149
|**Destination Country**| Destination port number for the packet. |
193
150
|**Protocol**| Protocol over which the packet was sent. |
@@ -197,24 +154,18 @@ Gateway will only log failed connections in [network session logs](/logs/referen
197
154
|**Category details**| Category or categories associated with the packet. |
198
155
|**Proxy PAC Endpoint**|[PAC file proxy endpoint](/cloudflare-one/connections/connect-devices/agentless/pac-files/) Gateway forwarded traffic to, if applicable. |
199
156
200
-
201
-
202
157
## HTTP logs
203
158
204
159
:::note
205
160
206
-
207
161
When an HTTP request results in an error, Gateway logs the first 512 bytes of the request for 30 days for internal troubleshooting. Otherwise, Gateway does not log HTTP bodies.
@@ -293,8 +228,6 @@ When an HTTP request results in an error, Gateway logs the first 512 bytes of th
293
228
|**Direction**| Upload or download direction of the detected file. |
294
229
|**Action**| The Action Gateway applied to the request. |
295
230
296
-
297
-
298
231
### Enhanced file detection
299
232
300
233
Enhanced file detection is an optional feature to extract more file information from HTTP traffic. When turned on, Gateway will read file information from the HTTP body rather than the HTTP headers to provide greater accuracy and reliability. This feature may have a minor impact on performance for file-heavy organizations.
@@ -308,3 +241,7 @@ To turn on enhanced file detection:
308
241
### Isolate requests
309
242
310
243
When a user creates an [isolation policy](/cloudflare-one/policies/browser-isolation/isolation-policies/), Gateway logs the initial request that triggers isolation as an Isolate action. Because this request is not isolated yet, the `is_isolated` field will return `false`. Zero Trust then securely returns the result to the user in an isolated browser. Gateway will log all subsequent requests in the isolated browser with the action (such as Allow or Block), and the `is_isolated` field will return `true`.
244
+
245
+
## Limitations
246
+
247
+
Gateway activity logs are not available in the dashboard if you turn on the [Customer Metadata Boundary](/data-localization/metadata-boundary/) within Cloudflare Data Localization Suite (DLS). Enterprise users using CMB can still export logs via [Logpush](/cloudflare-one/insights/logs/logpush/). For more information, refer to [DLS product compatibility](/data-localization/compatibility/#zero-trust).
0 commit comments