Skip to content

Commit 9c40f2f

Browse files
authored
[Logs] Update Logpush dataset fields (#29927)
1 parent e24bcef commit 9c40f2f

7 files changed

Lines changed: 107 additions & 1 deletion

File tree

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
title: New TenantID and Firewall for AI fields in Logpush datasets
3+
description: Logpush datasets now include TenantID and Firewall for AI fields for enhanced logging and security insights.
4+
date: 2026-04-15
5+
---
6+
7+
Cloudflare has added new fields to multiple [Logpush datasets](/logs/logpush/logpush-job/datasets/):
8+
9+
### TenantID field
10+
11+
The following Gateway and Zero Trust datasets now include a `TenantID` field:
12+
13+
- **[Gateway DNS](/logs/logpush/logpush-job/datasets/account/gateway_dns/#tenantid)**: Identifies the tenant ID of the DNS request, if it exists.
14+
- **[Gateway HTTP](/logs/logpush/logpush-job/datasets/account/gateway_http/#tenantid)**: Identifies the tenant ID of the HTTP request, if it exists.
15+
- **[Gateway Network](/logs/logpush/logpush-job/datasets/account/gateway_network/#tenantid)**: Identifies the tenant ID of the network session, if it exists.
16+
- **[Zero Trust Network Sessions](/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions/#tenantid)**: Identifies the tenant ID of the network session, if it exists.
17+
18+
### Firewall for AI fields
19+
20+
The following datasets now include [Firewall for AI](/api-shield/security/volumetric-abuse-detection/#firewall-for-ai) fields:
21+
22+
- **[Firewall Events](/logs/logpush/logpush-job/datasets/zone/firewall_events/)**:
23+
- `FirewallForAIInjectionScore`: The score indicating the likelihood of a prompt injection attack in the request.
24+
- `FirewallForAIPIICategories`: List of PII categories detected in the request.
25+
- `FirewallForAITokenCount`: The number of tokens in the request.
26+
- `FirewallForAIUnsafeTopicCategories`: List of unsafe topic categories detected in the request.
27+
28+
- **[HTTP Requests](/logs/logpush/logpush-job/datasets/zone/http_requests/)**:
29+
- `FirewallForAIInjectionScore`: The score indicating the likelihood of a prompt injection attack in the request.
30+
- `FirewallForAIPIICategories`: List of PII categories detected in the request.
31+
- `FirewallForAITokenCount`: The number of tokens in the request.
32+
- `FirewallForAIUnsafeTopicCategories`: List of unsafe topic categories detected in the request.
33+
34+
For the complete field definitions for each dataset, refer to [Logpush datasets](/logs/logpush/logpush-job/datasets/).

src/content/docs/logs/logpush/logpush-job/datasets/account/gateway_dns.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -465,6 +465,12 @@ Type: `int`
465465

466466
The port used by the client when they sent the DNS request (for example, 0).
467467

468+
## TenantID
469+
470+
Type: `string`
471+
472+
The tenant ID of the DNS request, if exists.
473+
468474
## TimeZone
469475

470476
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/account/gateway_http.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -285,6 +285,12 @@ Type: `int`
285285

286286
Source port of the request.
287287

288+
## TenantID
289+
290+
Type: `string`
291+
292+
The tenant ID of the request, if exists.
293+
288294
## URL
289295

290296
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/account/gateway_network.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,12 @@ Type: `int`
177177

178178
Source port of the network session.
179179

180+
## TenantID
181+
182+
Type: `string`
183+
184+
The tenant ID of the network session, if exists.
185+
180186
## Transport (deprecated)
181187

182188
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,12 @@ Type: `int`
249249

250250
Source port of the network session.
251251

252+
## TenantID
253+
254+
Type: `string`
255+
256+
The tenant ID of the network session, if exists.
257+
252258
## UserID
253259

254260
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/zone/firewall_events.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,30 @@ Type: `int`
153153

154154
HTTP response status code returned to browser.
155155

156+
## FirewallForAIInjectionScore
157+
158+
Type: `int`
159+
160+
The score indicating the likelihood of a prompt injection attack in the request, as determined by Firewall for AI.
161+
162+
## FirewallForAIPIICategories
163+
164+
Type: `array[string]`
165+
166+
List of PII categories detected in the request by Firewall for AI.
167+
168+
## FirewallForAITokenCount
169+
170+
Type: `int`
171+
172+
The number of tokens in the request, as counted by Firewall for AI.
173+
174+
## FirewallForAIUnsafeTopicCategories
175+
176+
Type: `array[string]`
177+
178+
List of unsafe topic categories detected in the request by Firewall for AI.
179+
156180
## FraudUserID
157181

158182
Type: `string`

src/content/docs/logs/logpush/logpush-job/datasets/zone/http_requests.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,30 @@ Type: `int`
345345

346346
Total view of Time To First Byte as measured at Cloudflare's edge. Starts after a TCP connection is established and ends when Cloudflare begins returning the first byte of a response to eyeballs. Includes TLS handshake time (for new connections) and origin response time.
347347

348+
## FirewallForAIInjectionScore
349+
350+
Type: `int`
351+
352+
The score indicating the likelihood of a prompt injection attack in the request, as determined by Firewall for AI.
353+
354+
## FirewallForAIPIICategories
355+
356+
Type: `array[string]`
357+
358+
List of PII categories detected in the request by Firewall for AI.
359+
360+
## FirewallForAITokenCount
361+
362+
Type: `int`
363+
364+
The number of tokens in the request, as counted by Firewall for AI.
365+
366+
## FirewallForAIUnsafeTopicCategories
367+
368+
Type: `array[string]`
369+
370+
List of unsafe topic categories detected in the request by Firewall for AI.
371+
348372
## FraudAttack
349373

350374
Type: `string`
@@ -433,7 +457,7 @@ Number of bytes returned by the origin server.
433457

434458
Type: `int`
435459

436-
Upstream time to first byte, measured from the first datacenter that receives a request. Includes time taken by Argo Smart Routing and Tiered Cache, plus time to connect and receive the first byte of response from origin servers. This field replaces OriginResponseTime.
460+
Upstream response time, measured from the first datacenter that receives a request. Includes time taken by Argo Smart Routing and Tiered Cache, plus time to connect and receive a response from origin servers. This field replaces OriginResponseTime.
437461

438462
## OriginResponseHTTPExpires
439463

0 commit comments

Comments
 (0)