From 63758f40edd9eb964d8b10d4f77b8569adacc91a Mon Sep 17 00:00:00 2001
From: Pedro Sousa <680496+pedrosousa@users.noreply.github.com>
Date: Thu, 16 Jan 2025 19:48:24 +0000
Subject: [PATCH] [Logs] Update log fields
Updates log fields based on the latest changes in the `entities` internal repo.
---
.../reference/log-fields/account/gateway_http.md | 6 +++---
.../reference/log-fields/zone/firewall_events.md | 2 +-
.../reference/log-fields/zone/http_requests.md | 2 +-
.../log-fields/zone/page_shield_events.md | 14 +++++++++++++-
4 files changed, 18 insertions(+), 6 deletions(-)
diff --git a/src/content/docs/logs/reference/log-fields/account/gateway_http.md b/src/content/docs/logs/reference/log-fields/account/gateway_http.md
index 54d6b4b6d2d746..150bbed2e5bd1f 100644
--- a/src/content/docs/logs/reference/log-fields/account/gateway_http.md
+++ b/src/content/docs/logs/reference/log-fields/account/gateway_http.md
@@ -53,7 +53,7 @@ Reason file was blocked in the response, if any.
## BlockedFileSize
-Type: `string`
+Type: `int`
File size(bytes) blocked in the response, if any.
@@ -101,7 +101,7 @@ Country code of the destination IP of the HTTP request (for example, 'US').
## DestinationPort
-Type: `string`
+Type: `int`
Destination port of the request.
@@ -257,7 +257,7 @@ Local LAN IP of the device. Only available when connected via a GRE/IPsec tunnel
## SourcePort
-Type: `string`
+Type: `int`
Source port of the request.
diff --git a/src/content/docs/logs/reference/log-fields/zone/firewall_events.md b/src/content/docs/logs/reference/log-fields/zone/firewall_events.md
index db0ed8f23a3ce8..e8b369840b48ea 100644
--- a/src/content/docs/logs/reference/log-fields/zone/firewall_events.md
+++ b/src/content/docs/logs/reference/log-fields/zone/firewall_events.md
@@ -163,7 +163,7 @@ The kind of event, currently only possible values are: firewall.
Type: `string`
-Result of the check for leaked credentials.
+Result of the check for [leaked credentials](/waf/detections/leaked-credentials/).
Possible results are: password_leaked \| username_and_password_leaked \| username_password_similar \| username_leaked \| clean.
## MatchIndex
diff --git a/src/content/docs/logs/reference/log-fields/zone/http_requests.md b/src/content/docs/logs/reference/log-fields/zone/http_requests.md
index 98da6b035c70a7..c147957bbb8321 100644
--- a/src/content/docs/logs/reference/log-fields/zone/http_requests.md
+++ b/src/content/docs/logs/reference/log-fields/zone/http_requests.md
@@ -367,7 +367,7 @@ Inter-request statistics computed for this JA4 fingerprint. JA4Signals field is
Type: `string`
-Result of the check for leaked credentials.
+Result of the check for [leaked credentials](/waf/detections/leaked-credentials/).
Possible results are: password_leaked \| username_and_password_leaked \| username_password_similar \| username_leaked \| clean.
## OriginDNSResponseTimeMs
diff --git a/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md b/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md
index 126d776efcac47..79a70e52895d9c 100644
--- a/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md
+++ b/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md
@@ -15,6 +15,12 @@ Type: `string`
The action which was taken against the violation.
Possible values are log \| allow.
+## CSPDirective
+
+Type: `string`
+
+The violated directive in the report.
+
## Host
Type: `string`
@@ -33,6 +39,12 @@ Type: `string`
The ID of the policy which was violated.
+## ResourceType
+
+Type: `string`
+
+The resource type of the violated directive. Possible values are 'script', 'connection' or 'other' for unmonitored resource types
+
## Timestamp
Type: `int or string`
@@ -45,7 +57,7 @@ Type: `string`
The resource URL.
-## URLContainsCDNCGIPath
+## URLContainsCDNCGIPath (deprecated)
Type: `bool`