Skip to content

Commit 3269372

Browse files
authored
[Logs] Update Log fields (#28296)
This updates Log fields. They are synced from internal `entities` repo's fields templates. Changelog file is added manually.
1 parent 66ee2dc commit 3269372

14 files changed

+271
-12
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: New MCP Portal Logs dataset and new fields across multiple Logpush datasets in Cloudflare Logs
3+
description: New MCP Portal Logs dataset is now available, along with new fields for multiple Logpush datasets in Cloudflare Logs.
4+
date: 2026-03-09
5+
---
6+
7+
Cloudflare has added new fields across multiple [Logpush datasets](/logs/logpush/logpush-job/datasets/):
8+
9+
### New dataset
10+
11+
- **MCP Portal Logs**: A new dataset with fields including `ClientCountry`, `ClientIP`, `ColoCode`, `Datetime`, `Error`, `Method`, `PortalAUD`, `PortalID`, `PromptGetName`, `ResourceReadURI`, `ServerAUD`, `ServerID`, `ServerResponseDurationMs`, `ServerURL`, `SessionID`, `Success`, `ToolCallName`, `UserEmail`, and `UserID`.
12+
13+
### New fields in existing datasets
14+
15+
- **DEX Application Tests**: `HTTPRedirectEndMs`, `HTTPRedirectStartMs`, `HTTPResponseBody`, and `HTTPResponseHeaders`.
16+
- **DEX Device State Events**: `ExperimentalExtra`.
17+
- **Firewall Events**: `FraudUserID`.
18+
- **Gateway HTTP**: `AppControlInfo` and `ApplicationStatuses`.
19+
- **Gateway DNS**: `InternalDNSDurationMs`.
20+
- **HTTP Requests**: `FraudEmailRisk`, `FraudUserID`, and `PayPerCrawlStatus`.
21+
- **Network Analytics Logs**: `DNSQueryName`, `DNSQueryType`, and `PFPCustomTag`.
22+
- **WARP Toggle Changes**: `UserEmail`.
23+
- **WARP Config Changes**: `UserEmail`.
24+
- **Zero Trust Network Session Logs**: `SNI`.
25+
26+
For the complete field definitions for each dataset, refer to [Logpush datasets](/logs/logpush/logpush-job/datasets/).
27+

src/content/docs/logs/logpush/logpush-job/datasets/account/dex_application_tests.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,12 +141,30 @@ Type: `string`
141141

142142
HTTP test method. HTTP tests only.
143143

144+
## HTTPRedirectEndMs
145+
146+
Type: `int`
147+
148+
HTTP test redirect end timestamp, in milliseconds elapsed since test start. HTTP tests only. Refer to [Resource timing](https://developer.mozilla.org/en-US/docs/Web/API/Resource_Timing_API/Using_the_Resource_Timing_API) for more details.
149+
150+
## HTTPRedirectStartMs
151+
152+
Type: `int`
153+
154+
HTTP test redirect start timestamp, in milliseconds elapsed since test start. HTTP tests only. Refer to [Resource timing](https://developer.mozilla.org/en-US/docs/Web/API/Resource_Timing_API/Using_the_Resource_Timing_API) for more details.
155+
144156
## HTTPRequestStartMs
145157

146158
Type: `int`
147159

148160
HTTP test result request start, in milliseconds since test start. HTTP tests only. Refer to [Resource timing](https://developer.mozilla.org/en-US/docs/Web/API/Resource_Timing_API/Using_the_Resource_Timing_API) for more details.
149161

162+
## HTTPResponseBody
163+
164+
Type: `string`
165+
166+
HTTP response body. HTTP tests only.
167+
150168
## HTTPResponseBodyBytes
151169

152170
Type: `int`
@@ -165,6 +183,12 @@ Type: `int`
165183

166184
HTTP test result header bytes. HTTP tests only.
167185

186+
## HTTPResponseHeaders
187+
188+
Type: `array[object]`
189+
190+
HTTP response headers, for example `[{"name": "Content-Type", "value": "text/html"}]`. HTTP tests only.
191+
168192
## HTTPResponseStartMs
169193

170194
Type: `int`

src/content/docs/logs/logpush/logpush-job/datasets/account/dex_device_state_events.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,12 @@ Type: `string`
135135

136136
The WARP client's DoH subdomain.
137137

138+
## ExperimentalExtra
139+
140+
Type: `object`
141+
142+
Additional unstructured data sent by the WARP client. This field may change at any time.
143+
138144
## FirewallEnabled
139145

140146
Type: `bool`
@@ -271,7 +277,7 @@ The public IPv6 postal code of the device assigned by the ISP, for example `9000
271277

272278
Type: `string`
273279

274-
The WARP client connection mode, e.g. `warp+doh`, `proxy`.
280+
The WARP client connection mode, for example, `warp+doh`, `proxy`.
275281

276282
## NetworkReceivedBPS
277283

@@ -313,7 +319,7 @@ The top applications by percentage of RAM used, for example `[{"name": "app0", "
313319

314320
Type: `string`
315321

316-
The WARP client connection status, e.g. `connected`, `paused`.
322+
The WARP client connection status, for example, `connected`, `paused`.
317323

318324
## SwitchLocked
319325

@@ -349,7 +355,7 @@ The tunnel type the device uses to establish a connection to the edge, if any. C
349355

350356
Type: `string`
351357

352-
The colo code where the client is connected to our API. e.g. `DFW` or `none`.
358+
The colo code where the client is connected to our API, for example, `DFW` or `none`.
353359

354360
## WiFiStrengthDBM
355361

src/content/docs/logs/logpush/logpush-job/datasets/account/dlp_forensic_copies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Captured request/response data, base64-encoded.
4949

5050
Type: `string`
5151

52-
Phase of the HTTP request this forensic copy was captured from (i.e. "request" or "response").
52+
Phase of the HTTP request this forensic copy was captured from (that is, "request" or "response").
5353

5454
## TriggeredRuleID
5555

src/content/docs/logs/logpush/logpush-job/datasets/account/email_security_alerts.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
# Code generator. DO NOT EDIT.
33

4-
title: Email security Alerts
4+
title: Email Security Alerts
55
pcx_content_type: configuration
66
sidebar:
77
order: 21
@@ -13,7 +13,7 @@ The descriptions below detail the fields available for `email_security_alerts`.
1313

1414
Type: `string`
1515

16-
The canonical ID for an Email security Alert (for example, '4WtWkr6nlBz9sNH-2024-08-28T15:32:35').
16+
The canonical ID for an Email Security Alert (for example, '4WtWkr6nlBz9sNH-2024-08-28T15:32:35').
1717

1818
## AlertReasons
1919

@@ -25,7 +25,7 @@ Human-readable list of findings which contributed to this message's final dispos
2525

2626
Type: `array[object]`
2727

28-
List of objects containing metadata of attachments contained in this message (for example, [{"Md5": "91f073bd208689ddbd248e8989ecae90", "Sha1": "62b77e14e2c43049c45b5725018e78d0f9986930", "Sha256": "3b57505305e7162141fd898ed87d08f92fc42579b5047495859e56b3275a6c06", "Ssdeep": "McAQ8tPlH25e85Q2OiYpD08NvHmjJ97UfPMO47sekO:uN9M553OiiN/OJ9MM+e3", "Name": "attachment.gif", "ContentTypeProvided": "image/gif", "ContentTypeComputed": "application/x-msi", "Encrypted": true, "Decrypted": true]}, ...]).
28+
List of objects containing metadata of attachments contained in this message (for example, [{"Md5": "91f073bd208689ddbd248e8989ecae90", "Sha1": "62b77e14e2c43049c45b5725018e78d0f9986930", "Sha256": "3b57505305e7162141fd898ed87d08f92fc42579b5047495859e56b3275a6c06", "Ssdeep": "McAQ8tPlH25e85Q2OiYpD08NvHmjJ97UfPMO47sekO:uN9M553OiiN/OJ9MM+e3", "Name": "attachment.gif", "ContentTypeProvided": "image/gif", "ContentTypeComputed": "application/x-msi", "Encrypted": true, "Decrypted": true}, ...]).
2929

3030
## CC
3131

@@ -67,7 +67,7 @@ List of links detected in this message, benign or otherwise; limited to 100 in t
6767

6868
Type: `string`
6969

70-
The message's mode of transport to Email security. <br />Possible values are <em>unset</em> \| <em>api</em> \| <em>direct</em> \| <em>bcc</em> \| <em>journal</em> \| <em>retroScan</em>.
70+
The message's mode of transport to Email Security. <br />Possible values are <em>unset</em> \| <em>api</em> \| <em>direct</em> \| <em>bcc</em> \| <em>journal</em> \| <em>retroScan</em>.
7171

7272
## MessageID
7373

@@ -85,7 +85,7 @@ The origin of the message. <br />Possible values are <em>unset</em> \| <em>inter
8585

8686
Type: `string`
8787

88-
The original sender address as determined by Email security mail processing (for example, 'firstlast@cloudflare.com').
88+
The original sender address as determined by Email Security mail processing (for example, 'firstlast@cloudflare.com').
8989

9090
## ReplyTo
9191

@@ -151,7 +151,7 @@ Value of the Subject header provided by the sender.
151151

152152
Type: `array[string]`
153153

154-
Threat categories attributed by Email security processing (for example, 'CredentialHarvester', 'Dropper').
154+
Threat categories attributed by Email Security processing (for example, 'CredentialHarvester', 'Dropper').
155155

156156
## Timestamp
157157

src/content/docs/logs/logpush/logpush-job/datasets/account/gateway_dns.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,12 @@ Type: `array[string]`
171171

172172
The IPs used to correlate existing FQDN matching policy between Gateway DNS and Gateway proxy.
173173

174+
## InternalDNSDurationMs
175+
176+
Type: `int`
177+
178+
The time it took for the internal DNS to respond.
179+
174180
## InternalDNSFallbackStrategy
175181

176182
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/account/gateway_http.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,12 @@ Type: `string`
2121

2222
Action performed by gateway on the HTTP request.
2323

24+
## AppControlInfo
25+
26+
Type: `object`
27+
28+
Information about application control operations, APIs, and groups that matched the HTTP request.
29+
2430
## ApplicationIDs
2531

2632
Type: `array[int]`
@@ -33,6 +39,12 @@ Type: `array[string]`
3339

3440
Names of the applications that matched the HTTP request parameters.
3541

42+
## ApplicationStatuses
43+
44+
Type: `array[string]`
45+
46+
Statuses of the applications that matched the HTTP request parameters.
47+
3648
## BlockedFileHash
3749

3850
Type: `string`
@@ -203,9 +215,9 @@ The private app AUD, if any.
203215

204216
## ProxyEndpoint
205217

206-
Type: ``
207-
218+
Type: `string`
208219

220+
The proxy endpoint used on the HTTP request, if any.
209221

210222
## Quarantined
211223

Lines changed: 124 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,124 @@
1+
---
2+
# Code generator. DO NOT EDIT.
3+
4+
title: MCP Portal Logs
5+
pcx_content_type: configuration
6+
sidebar:
7+
order: 21
8+
---
9+
10+
The descriptions below detail the fields available for `mcp_portal_logs`.
11+
12+
## ClientCountry
13+
14+
Type: `string`
15+
16+
Country code of the client IP address.
17+
18+
## ClientIP
19+
20+
Type: `string`
21+
22+
IP address of the client that initiated the request.
23+
24+
## ColoCode
25+
26+
Type: `string`
27+
28+
Colo code of the data center that processed the request (for example, 'DFW').
29+
30+
## Datetime
31+
32+
Type: `int or string`
33+
34+
The date and time the request was made.
35+
36+
## Error
37+
38+
Type: `string`
39+
40+
The error message if the request failed and there is additional information.
41+
42+
## Method
43+
44+
Type: `string`
45+
46+
The JSON-RPC method of the request (for example, 'tools/call', 'prompts/get', 'resources/read').
47+
48+
## PortalAUD
49+
50+
Type: `string`
51+
52+
Audience tag of the MCP Portal.
53+
54+
## PortalID
55+
56+
Type: `string`
57+
58+
Unique identifier of the MCP Portal.
59+
60+
## PromptGetName
61+
62+
Type: `string`
63+
64+
For prompts/get requests, the name of the prompt being fetched.
65+
66+
## ResourceReadURI
67+
68+
Type: `string`
69+
70+
For resources/read requests, the URI of the resource being fetched.
71+
72+
## ServerAUD
73+
74+
Type: `string`
75+
76+
Audience tag of the upstream MCP Server.
77+
78+
## ServerID
79+
80+
Type: `string`
81+
82+
Unique identifier of the upstream MCP Server.
83+
84+
## ServerResponseDurationMs
85+
86+
Type: `int`
87+
88+
The time in milliseconds it took for the upstream MCP server to respond.
89+
90+
## ServerURL
91+
92+
Type: `string`
93+
94+
URL of the upstream MCP Server.
95+
96+
## SessionID
97+
98+
Type: `string`
99+
100+
Unique identifier of the stateful MCP session associated with the request.
101+
102+
## Success
103+
104+
Type: `bool`
105+
106+
If the request succeeded.
107+
108+
## ToolCallName
109+
110+
Type: `string`
111+
112+
For tools/call requests, the name of the tool being called.
113+
114+
## UserEmail
115+
116+
Type: `string`
117+
118+
Email address of the authenticated user who performed the request.
119+
120+
## UserID
121+
122+
Type: `string`
123+
124+
Unique identifier of the authenticated user who performed the request.

src/content/docs/logs/logpush/logpush-job/datasets/account/network_analytics_logs.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,18 @@ Type: `string`
5757

5858
The unique site identifier of the Cloudflare data center that received the packet (for example, 'ams01', 'sjc01', 'lhr01').
5959

60+
## DNSQueryName
61+
62+
Type: `string`
63+
64+
The DNS query name (domain) that was queried, if the packet is a DNS query.
65+
66+
## DNSQueryType
67+
68+
Type: `string`
69+
70+
The DNS query type (for example, A, AAAA, MX, TXT), if the packet is a DNS query.
71+
6072
## Datetime
6173

6274
Type: `int or string`
@@ -321,6 +333,12 @@ Type: `string`
321333

322334
The action that Cloudflare systems took on the packet. <br />Possible values are <em>pass</em> \| <em>drop</em>.
323335

336+
## PFPCustomTag
337+
338+
Type: `int`
339+
340+
The custom network analytics tag set by Programmable Flow Protection program, if any.
341+
324342
## ProtocolState
325343

326344
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/account/warp_config_changes.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,3 +74,9 @@ The device serial number.
7474
Type: `int or string`
7575

7676
Time the event was ingested.
77+
78+
## UserEmail
79+
80+
Type: `string`
81+
82+
The Access user email.

0 commit comments

Comments
 (0)