From 63758f40edd9eb964d8b10d4f77b8569adacc91a Mon Sep 17 00:00:00 2001 From: Pedro Sousa <680496+pedrosousa@users.noreply.github.com> Date: Thu, 16 Jan 2025 19:48:24 +0000 Subject: [PATCH] [Logs] Update log fields Updates log fields based on the latest changes in the `entities` internal repo. --- .../reference/log-fields/account/gateway_http.md | 6 +++--- .../reference/log-fields/zone/firewall_events.md | 2 +- .../reference/log-fields/zone/http_requests.md | 2 +- .../log-fields/zone/page_shield_events.md | 14 +++++++++++++- 4 files changed, 18 insertions(+), 6 deletions(-) diff --git a/src/content/docs/logs/reference/log-fields/account/gateway_http.md b/src/content/docs/logs/reference/log-fields/account/gateway_http.md index 54d6b4b6d2d746..150bbed2e5bd1f 100644 --- a/src/content/docs/logs/reference/log-fields/account/gateway_http.md +++ b/src/content/docs/logs/reference/log-fields/account/gateway_http.md @@ -53,7 +53,7 @@ Reason file was blocked in the response, if any. ## BlockedFileSize -Type: `string` +Type: `int` File size(bytes) blocked in the response, if any. @@ -101,7 +101,7 @@ Country code of the destination IP of the HTTP request (for example, 'US'). ## DestinationPort -Type: `string` +Type: `int` Destination port of the request. @@ -257,7 +257,7 @@ Local LAN IP of the device. Only available when connected via a GRE/IPsec tunnel ## SourcePort -Type: `string` +Type: `int` Source port of the request. diff --git a/src/content/docs/logs/reference/log-fields/zone/firewall_events.md b/src/content/docs/logs/reference/log-fields/zone/firewall_events.md index db0ed8f23a3ce8..e8b369840b48ea 100644 --- a/src/content/docs/logs/reference/log-fields/zone/firewall_events.md +++ b/src/content/docs/logs/reference/log-fields/zone/firewall_events.md @@ -163,7 +163,7 @@ The kind of event, currently only possible values are: firewall. Type: `string` -Result of the check for leaked credentials. +Result of the check for [leaked credentials](/waf/detections/leaked-credentials/).
Possible results are: password_leaked \| username_and_password_leaked \| username_password_similar \| username_leaked \| clean. ## MatchIndex diff --git a/src/content/docs/logs/reference/log-fields/zone/http_requests.md b/src/content/docs/logs/reference/log-fields/zone/http_requests.md index 98da6b035c70a7..c147957bbb8321 100644 --- a/src/content/docs/logs/reference/log-fields/zone/http_requests.md +++ b/src/content/docs/logs/reference/log-fields/zone/http_requests.md @@ -367,7 +367,7 @@ Inter-request statistics computed for this JA4 fingerprint. JA4Signals field is Type: `string` -Result of the check for leaked credentials. +Result of the check for [leaked credentials](/waf/detections/leaked-credentials/).
Possible results are: password_leaked \| username_and_password_leaked \| username_password_similar \| username_leaked \| clean. ## OriginDNSResponseTimeMs diff --git a/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md b/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md index 126d776efcac47..79a70e52895d9c 100644 --- a/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md +++ b/src/content/docs/logs/reference/log-fields/zone/page_shield_events.md @@ -15,6 +15,12 @@ Type: `string` The action which was taken against the violation.
Possible values are log \| allow. +## CSPDirective + +Type: `string` + +The violated directive in the report. + ## Host Type: `string` @@ -33,6 +39,12 @@ Type: `string` The ID of the policy which was violated. +## ResourceType + +Type: `string` + +The resource type of the violated directive. Possible values are 'script', 'connection' or 'other' for unmonitored resource types + ## Timestamp Type: `int or string` @@ -45,7 +57,7 @@ Type: `string` The resource URL. -## URLContainsCDNCGIPath +## URLContainsCDNCGIPath (deprecated) Type: `bool`