Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Logs] Update log fields #19255

Merged
merged 1 commit into from
Jan 17, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Reason file was blocked in the response, if any.

## BlockedFileSize

Type: `string`
Type: `int`

File size(bytes) blocked in the response, if any.

Expand Down Expand Up @@ -101,7 +101,7 @@ Country code of the destination IP of the HTTP request (for example, 'US').

## DestinationPort

Type: `string`
Type: `int`

Destination port of the request.

Expand Down Expand Up @@ -257,7 +257,7 @@ Local LAN IP of the device. Only available when connected via a GRE/IPsec tunnel

## SourcePort

Type: `string`
Type: `int`

Source port of the request.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ The kind of event, currently only possible values are: <em>firewall</em>.

Type: `string`

Result of the check for leaked credentials.
Result of the check for [leaked credentials](/waf/detections/leaked-credentials/). <br />Possible results are: <em>password_leaked</em> \| <em>username_and_password_leaked</em> \| <em>username_password_similar</em> \| <em>username_leaked</em> \| <em>clean</em>.

## MatchIndex

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -367,7 +367,7 @@ Inter-request statistics computed for this JA4 fingerprint. JA4Signals field is

Type: `string`

Result of the check for leaked credentials.
Result of the check for [leaked credentials](/waf/detections/leaked-credentials/). <br />Possible results are: <em>password_leaked</em> \| <em>username_and_password_leaked</em> \| <em>username_password_similar</em> \| <em>username_leaked</em> \| <em>clean</em>.

## OriginDNSResponseTimeMs

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,12 @@ Type: `string`

The action which was taken against the violation. <br />Possible values are <em>log</em> \| <em>allow</em>.

## CSPDirective

Type: `string`

The violated directive in the report.

## Host

Type: `string`
Expand All @@ -33,6 +39,12 @@ Type: `string`

The ID of the policy which was violated.

## ResourceType

Type: `string`

The resource type of the violated directive. Possible values are 'script', 'connection' or 'other' for unmonitored resource types

## Timestamp

Type: `int or string`
Expand All @@ -45,7 +57,7 @@ Type: `string`

The resource URL.

## URLContainsCDNCGIPath
## URLContainsCDNCGIPath (deprecated)

Type: `bool`

Expand Down
Loading