- Elastic integrations
- Integrations quick reference
- 1Password
- Abnormal Security
- ActiveMQ
- Active Directory Entity Analytics
- Admin By Request EPM integration
- Airflow
- Akamai
- Apache
- API (custom)
- Arbor Peakflow SP Logs
- Arista NG Firewall
- Atlassian
- Auditd
- Auth0
- authentik
- AWS
- Amazon CloudFront
- Amazon DynamoDB
- Amazon EBS
- Amazon EC2
- Amazon ECS
- Amazon EMR
- AWS API Gateway
- Amazon GuardDuty
- AWS Health
- Amazon Kinesis Data Firehose
- Amazon Kinesis Data Stream
- Amazon MQ
- Amazon Managed Streaming for Apache Kafka (MSK)
- Amazon NAT Gateway
- Amazon RDS
- Amazon Redshift
- Amazon S3
- Amazon S3 Storage Lens
- Amazon Security Lake
- Amazon SNS
- Amazon SQS
- Amazon VPC
- Amazon VPN
- AWS Bedrock
- AWS Billing
- AWS CloudTrail
- AWS CloudWatch
- AWS ELB
- AWS Fargate
- AWS Inspector
- AWS Lambda
- AWS Logs (custom)
- AWS Network Firewall
- AWS Route 53
- AWS Security Hub
- AWS Transit Gateway
- AWS Usage
- AWS WAF
- Azure
- Activity logs
- App Service
- Application Gateway
- Application Insights metrics
- Application Insights metrics overview
- Application State Insights metrics
- Azure logs (v2 preview)
- Azure OpenAI
- Billing metrics
- Container instance metrics
- Container registry metrics
- Container service metrics
- Custom Azure Logs
- Custom Blob Storage Input
- Database Account metrics
- Event Hub input
- Firewall logs
- Frontdoor
- Functions
- Microsoft Entra ID
- Monitor metrics
- Network Watcher VNet
- Network Watcher NSG
- Platform logs
- Resource metrics
- Spring Cloud logs
- Storage Account metrics
- Virtual machines metrics
- Virtual machines scaleset metrics
- Barracuda
- BeyondInsight and Password Safe Integration
- BitDefender
- Bitwarden
- blacklens.io
- Blue Coat Director Logs
- BBOT (Bighuge BLS OSINT Tool)
- Box Events
- Bravura Monitor
- Broadcom ProxySG
- Canva
- Cassandra
- CEL Custom API
- Ceph
- Check Point
- Cilium Tetragon
- CISA Known Exploited Vulnerabilities
- Cisco
- Cisco Meraki Metrics
- Citrix
- Claroty CTD
- Cloudflare
- Cloud Asset Inventory
- CockroachDB Metrics
- Common Event Format (CEF)
- Containerd
- CoreDNS
- Corelight
- Couchbase
- CouchDB
- Cribl
- CrowdStrike
- Cyberark
- Cybereason
- CylanceProtect Logs
- Custom Websocket logs
- Darktrace
- Data Exfiltration Detection
- DGA
- Digital Guardian
- Docker
- DomainTools Real Time Unified Feeds
- Elastic APM
- Elastic Fleet Server
- Elastic Security
- Elastic Stack monitoring
- Elasticsearch Service Billing
- Envoy Proxy
- ESET PROTECT
- ESET Threat Intelligence
- etcd
- Falco
- F5
- File Integrity Monitoring
- FireEye Network Security
- First EPSS
- Forcepoint Web Security
- ForgeRock
- Fortinet
- Gigamon
- GitHub
- GitLab
- Golang
- Google Cloud
- Custom GCS Input
- GCP
- GCP Audit logs
- GCP Billing metrics
- GCP Cloud Run metrics
- GCP CloudSQL metrics
- GCP Compute metrics
- GCP Dataproc metrics
- GCP DNS logs
- GCP Firestore metrics
- GCP Firewall logs
- GCP GKE metrics
- GCP Load Balancing metrics
- GCP Metrics Input
- GCP PubSub logs (custom)
- GCP PubSub metrics
- GCP Redis metrics
- GCP Security Command Center
- GCP Storage metrics
- GCP VPC Flow logs
- GCP Vertex AI
- GoFlow2 logs
- Hadoop
- HAProxy
- Hashicorp Vault
- HTTP Endpoint logs (custom)
- IBM MQ
- IIS
- Imperva
- InfluxDb
- Infoblox
- Iptables
- Istio
- Jamf Compliance Reporter
- Jamf Pro
- Jamf Protect
- Jolokia Input
- Journald logs (custom)
- JumpCloud
- Kafka
- Keycloak
- Kubernetes
- LastPass
- Lateral Movement Detection
- Linux Metrics
- Living off the Land Attack Detection
- Logs (custom)
- Lumos
- Lyve Cloud
- Mattermost
- Memcached
- Menlo Security
- Microsoft
- Microsoft 365
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft DHCP
- Microsoft DNS Server
- Microsoft Entra ID Entity Analytics
- Microsoft Exchange Online Message Trace
- Microsoft Exchange Server
- Microsoft Graph Activity Logs
- Microsoft M365 Defender
- Microsoft Office 365 Metrics Integration
- Microsoft Sentinel
- Microsoft SQL Server
- Mimecast
- ModSecurity Audit
- MongoDB
- MongoDB Atlas
- MySQL
- Nagios XI
- NATS
- NetFlow Records
- Netskope
- Network Beaconing Identification
- Network Packet Capture
- Nginx
- Okta
- Oracle
- OpenAI
- OpenCanary
- Osquery
- Palo Alto
- pfSense
- PHP-FPM
- PingOne
- PingFederate
- Pleasant Password Server
- PostgreSQL
- Prometheus
- Proofpoint TAP
- Proofpoint On Demand
- Pulse Connect Secure
- Qualys VMDR
- QNAP NAS
- RabbitMQ Logs
- Radware DefensePro Logs
- Rapid7
- Redis
- Rubrik RSC Metrics Integration
- Sailpoint Identity Security Cloud
- Salesforce
- SentinelOne
- ServiceNow
- Slack Logs
- Snort
- Snyk
- SonicWall Firewall
- Sophos
- Spring Boot
- SpyCloud Enterprise Protection
- SQL Input
- Squid Logs
- SRX
- STAN
- Statsd Input
- Sublime Security
- Suricata
- StormShield SNS
- Symantec
- Symantec Endpoint Security
- Sysmon for Linux
- Sysdig
- Syslog Router Integration
- System
- System Audit
- Tanium
- TCP Logs (custom)
- Teleport
- Tenable
- Threat intelligence
- ThreatConnect
- Threat Map
- Thycotic Secret Server
- Tines
- Traefik
- Trellix
- Trend Micro
- TYCHON Agentless
- UDP Logs (custom)
- Universal Profiling
- Vectra Detect
- VMware
- WatchGuard Firebox
- WebSphere Application Server
- Windows
- Wiz
- Zeek
- ZeroFox
- Zero Networks
- ZooKeeper Metrics
- Zoom
- Zscaler
Cloudflare Integration
editCloudflare Integration
editVersion |
2.30.0 (View all) |
Compatible Kibana version(s) |
8.13.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Community |
Cloudflare integration uses Cloudflare’s API to retrieve audit logs and traffic logs from Cloudflare, for a particular zone, and ingest them into Elasticsearch. This allows you to search, observe and visualize the Cloudflare log events through Elasticsearch.
Users of Cloudflare use Cloudflare services to increase the security and performance of their web sites and services.
Configuration
editEnabling the integration in Elastic
edit- In Kibana go to Management > Integrations
- In the "Search for integrations" search bar type Cloudflare.
- Click on "Cloudflare" integration from the search results.
- Click on Add Cloudflare button to add Cloudflare integration.
Configure Cloudflare audit logs data stream
editEnter values "Auth Email", "Auth Key" and "Account ID".
See for X-AUTH-EMAIL
and X-AUTH-KEY
here for more information on Auth Email and Auth Key.
Configure Cloudflare logs
editThese logs contain data related to the connecting client, the request path through the Cloudflare network, and the response from the origin web server. For more information see here.
The integration can retrieve Cloudflare logs using -
- Auth Email and Auth Key
- API Token
More information is available here
Configure using Auth Email and Auth Key
editEnter values "Auth Email", "Auth Key" and "Zone ID".
See for X-AUTH-EMAIL
and X-AUTH-KEY
here for more information on Auth Email and Auth Key.
Configure using API Token
editEnter values "API Token" and "Zone ID".
For the Cloudflare integration to be able to successfully get logs the following permissions must be granted to the API token -
-
Account.Access: Audit Logs: Read
- API Tokens allow for more granular permission settings.
- Zone ID can be found here.
Logs
editAudit
editAudit logs summarize the history of changes made within your Cloudflare account. Audit logs include account-level actions like login and logout, as well as setting changes to DNS, Crypto, Firewall, Speed, Caching, Page Rules, Network, and Traffic features, etc.
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
cloudflare.audit.actor.type |
The type of actor, whether a User, Cloudflare Admin, or an Automated System. Valid values: user, admin, Cloudflare. |
keyword |
cloudflare.audit.metadata |
An object which can lend more context to the action being logged. This is a flexible value and varies between different actions. |
flattened |
cloudflare.audit.new_value |
The new value of the resource that was modified |
flattened |
cloudflare.audit.old_value |
The value of the resource before it was modified |
flattened |
cloudflare.audit.owner.id |
User identifier tag |
keyword |
cloudflare.audit.resource.id |
An identifier for the resource that was affected by the action |
keyword |
cloudflare.audit.resource.type |
A short string that describes the resource that was affected by the action |
keyword |
data_stream.dataset |
Data stream dataset name. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Type of Filebeat input. |
keyword |
log.flags |
Flags for the log file. |
keyword |
log.offset |
Offset of the entry in the log file. |
long |
Example
An example event for audit
looks as following:
{ "@timestamp": "2021-11-30T13:42:04.000Z", "agent": { "ephemeral_id": "c1f5062e-f467-4812-af6a-7d4b4e7c942d", "id": "4b6522ee-8519-493a-b53a-a85672045358", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.10.1" }, "cloud": { "account": { "id": "aaabbbccc" }, "provider": "cloudflare" }, "cloudflare": { "audit": { "actor": { "type": "user" }, "owner": { "id": "enl3j9du8rnx2swwd9l32qots7l54t9s" }, "resource": { "id": "enl3j9du8rnx2swwd9l32qots7l54t9s", "type": "account" } } }, "data_stream": { "dataset": "cloudflare.audit", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "4b6522ee-8519-493a-b53a-a85672045358", "snapshot": false, "version": "8.10.1" }, "event": { "action": "rotate_api_key", "agent_id_status": "verified", "category": [ "iam" ], "created": "2023-10-10T14:41:04.679Z", "dataset": "cloudflare.audit", "id": "8d3396e8-c903-5a66-9421-00fc34570550", "ingested": "2023-10-10T14:41:05Z", "kind": "event", "original": "{\"action\":{\"info\":\"key digest: c6b5d100d7ce492d24c5b13160fce1cc0092ce7e8d8430e9f5cf5468868be6f6\",\"result\":true,\"type\":\"rotate_API_key\"},\"actor\":{\"email\":\"user@example.com\",\"id\":\"enl3j9du8rnx2swwd9l32qots7l54t9s\",\"ip\":\"52.91.36.10\",\"type\":\"user\"},\"id\":\"8d3396e8-c903-5a66-9421-00fc34570550\",\"interface\":\"\",\"metadata\":{},\"newValue\":\"\",\"oldValue\":\"\",\"owner\":{\"id\":\"enl3j9du8rnx2swwd9l32qots7l54t9s\"},\"resource\":{\"id\":\"enl3j9du8rnx2swwd9l32qots7l54t9s\",\"type\":\"account\"},\"when\":\"2021-11-30T13:42:04Z\"}", "outcome": "success", "type": [ "change" ] }, "input": { "type": "httpjson" }, "related": { "ip": [ "52.91.36.10" ], "user": [ "enl3j9du8rnx2swwd9l32qots7l54t9s" ] }, "source": { "address": "52.91.36.10", "ip": "52.91.36.10" }, "tags": [ "forwarded", "cloudflare-audit", "preserve_original_event" ], "user": { "email": "user@example.com", "id": "enl3j9du8rnx2swwd9l32qots7l54t9s" } }
Logpull
editThese logs contain data related to the connecting client, the request path through the Cloudflare network, and the response from the origin web server. For more information see here.
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloudflare.bot.score.src |
Detection engine responsible for generating the Bot Score. Possible values are Not Computed, Heuristics, Machine Learning, Behavioral Analysis, Verified Bot, JS Fingerprinting, Cloudflare Service. |
text |
cloudflare.bot.score.value |
Cloudflare Bot Score. Scores below 30 are commonly associated with automated traffic. |
long |
cloudflare.cache.bytes |
Number of bytes returned by the cache |
long |
cloudflare.cache.status |
Status of cache |
keyword |
cloudflare.cache.status_code |
HTTP status code returned by the cache to the edge. All requests (including non-cacheable ones) go through the cache. |
long |
cloudflare.cache.tiered_fill |
Tiered Cache was used to serve this request |
boolean |
cloudflare.client.ip_class |
Class of client, ex. badHost |
searchEngine |
allowlist |
greylist…. |
keyword |
cloudflare.client.ssl.protocol |
Client SSL (TLS) protocol |
keyword |
cloudflare.device_type |
Client device type |
keyword |
cloudflare.edge.colo.code |
IATA airport code of data center that received the request |
keyword |
cloudflare.edge.colo.id |
Cloudflare edge colo id |
long |
cloudflare.edge.pathing.op |
Indicates what type of response was issued for this request (unknown = no specific action) |
keyword |
cloudflare.edge.pathing.src |
Details how the request was classified based on security checks (unknown = no specific classification) |
keyword |
cloudflare.edge.pathing.status |
Indicates what data was used to determine the handling of this request (unknown = no data) |
keyword |
cloudflare.edge.rate_limit.action |
The action taken by the blocking rule; empty if no action taken |
keyword |
cloudflare.edge.rate_limit.id |
The internal rule ID of the rate-limiting rule that triggered a block (ban) or log action. 0 if no action taken. |
long |
cloudflare.edge.request.host |
Host header on the request from the edge to the origin |
keyword |
cloudflare.edge.response.bytes |
Number of bytes returned by the edge to the client |
long |
cloudflare.edge.response.compression_ratio |
Edge response compression ratio |
long |
cloudflare.edge.response.content_type |
Edge response Content-Type header value |
keyword |
cloudflare.edge.response.status_code |
HTTP status code returned by Cloudflare to the client |
long |
cloudflare.firewall.actions |
Array of actions the Cloudflare firewall products performed on this request. The individual firewall products associated with this action be found in FirewallMatchesSources and their respective RuleIds can be found in FirewallMatchesRuleIDs. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesSources. |
keyword |
cloudflare.firewall.rule_ids |
Array of RuleIDs of the firewall product that has matched the request. The firewall product associated with the RuleID can be found in FirewallMatchesSources. The length of the array is the same as FirewallMatchesActions and FirewallMatchesSources. |
keyword |
cloudflare.firewall.sources |
The firewall products that matched the request. The same product can appear multiple times, which indicates different rules or actions that were activated. The RuleIDs can be found in FirewallMatchesRuleIDs, the actions can be found in FirewallMatchesActions. The length of the array is the same as FirewallMatchesRuleIDs and FirewallMatchesActions. |
keyword |
cloudflare.origin.response.bytes |
Number of bytes returned by the origin server |
long |
cloudflare.origin.response.expires |
Value of the origin expires header |
date |
cloudflare.origin.response.last_modified |
Value of the origin last-modified header |
date |
cloudflare.origin.response.status_code |
Status returned by the origin server |
long |
cloudflare.origin.response.time |
Number of nanoseconds it took the origin to return the response to edge |
long |
cloudflare.origin.ssl.protocol |
SSL (TLS) protocol used to connect to the origin |
keyword |
cloudflare.parent.ray_id |
Ray ID of the parent request if this request was made using a Worker script |
keyword |
cloudflare.ray_id |
Ray ID of the parent request if this request was made using a Worker script |
keyword |
cloudflare.security_level |
The security level configured at the time of this request. This is used to determine the sensitivity of the IP Reputation system. |
keyword |
cloudflare.waf.action |
Action taken by the WAF, if triggered |
keyword |
cloudflare.waf.flags |
Additional configuration flags: simulate (0x1) |
null |
keyword |
cloudflare.waf.matched_var |
The full name of the most-recently matched variable |
keyword |
cloudflare.waf.profile |
low |
med |
high |
keyword |
cloudflare.waf.rule.id |
ID of the applied WAF rule |
keyword |
cloudflare.waf.rule.message |
Rule message associated with the triggered rule |
keyword |
cloudflare.worker.cpu_time |
Amount of time in microseconds spent executing a worker, if any |
long |
cloudflare.worker.status |
Status returned from worker daemon |
keyword |
cloudflare.worker.subrequest |
Whether or not this request was a worker subrequest |
boolean |
cloudflare.worker.subrequest_count |
Number of subrequests issued by a worker when handling this request |
long |
cloudflare.zone.id |
Internal zone ID |
long |
cloudflare.zone.name |
The human-readable name of the zone (e.g. cloudflare.com). |
keyword |
data_stream.dataset |
Data stream dataset name. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Type of Filebeat input. |
keyword |
log.flags |
Flags for the log file. |
keyword |
log.offset |
Offset of the entry in the log file. |
long |
Example
An example event for logpull
looks as following:
{ "@timestamp": "2019-08-02T15:29:08.000Z", "agent": { "ephemeral_id": "a27dd9de-634b-47ac-a284-09aaea297972", "id": "4b6522ee-8519-493a-b53a-a85672045358", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.10.1" }, "client": { "address": "35.232.161.245", "as": { "number": 15169 }, "bytes": 2577, "geo": { "country_iso_code": "us" }, "ip": "35.232.161.245", "port": 55028 }, "cloudflare": { "cache": { "status": "unknown", "tiered_fill": false }, "client": { "ip_class": "noRecord", "ssl": { "protocol": "TLSv1.2" } }, "device_type": "desktop", "edge": { "colo": { "id": 14 }, "pathing": { "op": "wl", "src": "filter_based_firewall", "status": "captchaNew" }, "rate_limit": { "id": 0 }, "response": { "bytes": 2848, "compression_ratio": 2.64, "content_type": "text/html", "status_code": 403 } }, "firewall": { "actions": [ "simulate", "challenge" ], "rule_ids": [ "094b71fea25d4860a61fa0c6fbbd8d8b", "e454fd4a0ce546b3a9a462536613692c" ], "sources": [ "firewallRules", "firewallRules" ] }, "origin": { "response": { "bytes": 0, "status_code": 0, "time": 0 }, "ssl": { "protocol": "unknown" } }, "parent": { "ray_id": "00" }, "ray_id": "500115ec386354d8", "security_level": "med", "waf": { "action": "unknown", "flags": "0", "profile": "unknown" }, "worker": { "cpu_time": 0, "status": "unknown", "subrequest": false, "subrequest_count": 0 }, "zone": { "id": 155978002 } }, "data_stream": { "dataset": "cloudflare.logpull", "namespace": "ep", "type": "logs" }, "destination": { "bytes": 2848 }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "4b6522ee-8519-493a-b53a-a85672045358", "snapshot": false, "version": "8.10.1" }, "event": { "action": [ "simulate", "challenge" ], "agent_id_status": "verified", "category": [ "network" ], "created": "2023-10-10T14:42:46.310Z", "dataset": "cloudflare.logpull", "duration": 0, "end": "2019-08-02T15:29:08.000Z", "ingested": "2023-10-10T14:42:49Z", "kind": "event", "original": "{\"CacheCacheStatus\":\"unknown\",\"CacheResponseBytes\":0,\"CacheResponseStatus\":0,\"CacheTieredFill\":false,\"ClientASN\":15169,\"ClientCountry\":\"us\",\"ClientDeviceType\":\"desktop\",\"ClientIP\":\"35.232.161.245\",\"ClientIPClass\":\"noRecord\",\"ClientRequestBytes\":2577,\"ClientRequestHost\":\"cf-analytics.com\",\"ClientRequestMethod\":\"POST\",\"ClientRequestPath\":\"/wp-cron.php\",\"ClientRequestProtocol\":\"HTTP/1.1\",\"ClientRequestReferer\":\"https://cf-analytics.com/wp-cron.php?doing_wp_cron=1564759748.3962020874023437500000\",\"ClientRequestURI\":\"/wp-cron.php?doing_wp_cron=1564759748.3962020874023437500000\",\"ClientRequestUserAgent\":\"WordPress/5.2.2;https://cf-analytics.com\",\"ClientSSLCipher\":\"ECDHE-ECDSA-AES128-GCM-SHA256\",\"ClientSSLProtocol\":\"TLSv1.2\",\"ClientSrcPort\":55028,\"EdgeColoID\":14,\"EdgeEndTimestamp\":\"2019-08-02T15:29:08Z\",\"EdgePathingOp\":\"wl\",\"EdgePathingSrc\":\"filter_based_firewall\",\"EdgePathingStatus\":\"captchaNew\",\"EdgeRateLimitAction\":\"\",\"EdgeRateLimitID\":0,\"EdgeRequestHost\":\"\",\"EdgeResponseBytes\":2848,\"EdgeResponseCompressionRatio\":2.64,\"EdgeResponseContentType\":\"text/html\",\"EdgeResponseStatus\":403,\"EdgeServerIP\":\"\",\"EdgeStartTimestamp\":\"2019-08-02T15:29:08Z\",\"FirewallMatchesActions\":[\"simulate\",\"challenge\"],\"FirewallMatchesRuleIDs\":[\"094b71fea25d4860a61fa0c6fbbd8d8b\",\"e454fd4a0ce546b3a9a462536613692c\"],\"FirewallMatchesSources\":[\"firewallRules\",\"firewallRules\"],\"OriginIP\":\"\",\"OriginResponseBytes\":0,\"OriginResponseHTTPExpires\":\"\",\"OriginResponseHTTPLastModified\":\"\",\"OriginResponseStatus\":0,\"OriginResponseTime\":0,\"OriginSSLProtocol\":\"unknown\",\"ParentRayID\":\"00\",\"RayID\":\"500115ec386354d8\",\"SecurityLevel\":\"med\",\"WAFAction\":\"unknown\",\"WAFFlags\":\"0\",\"WAFMatchedVar\":\"\",\"WAFProfile\":\"unknown\",\"WAFRuleID\":\"\",\"WAFRuleMessage\":\"\",\"WorkerCPUTime\":0,\"WorkerStatus\":\"unknown\",\"WorkerSubrequest\":false,\"WorkerSubrequestCount\":0,\"ZoneID\":155978002}", "start": "2019-08-02T15:29:08.000Z" }, "http": { "request": { "bytes": 2577, "method": "POST", "referrer": "https://cf-analytics.com/wp-cron.php?doing_wp_cron=1564759748.3962020874023437500000" }, "response": { "bytes": 2848, "status_code": 403 }, "version": "1.1" }, "input": { "type": "httpjson" }, "network": { "bytes": 5425, "protocol": "http", "transport": "tcp" }, "observer": { "type": "proxy", "vendor": "cloudflare" }, "server": { "bytes": 2848 }, "source": { "address": "35.232.161.245", "as": { "number": 15169 }, "bytes": 2577, "geo": { "country_iso_code": "us" }, "ip": "35.232.161.245", "port": 55028 }, "tags": [ "forwarded", "cloudflare-logpull", "preserve_original_event" ], "tls": { "cipher": "ECDHE-ECDSA-AES128-GCM-SHA256", "version": "1.2", "version_protocol": "tls" }, "url": { "domain": "cf-analytics.com", "extension": "php", "full": "https://cf-analytics.com/wp-cron.php?doing_wp_cron=1564759748.3962020874023437500000", "original": "/wp-cron.php?doing_wp_cron=1564759748.3962020874023437500000", "path": "/wp-cron.php", "query": "doing_wp_cron=1564759748.3962020874023437500000", "scheme": "https" }, "user_agent": { "device": { "name": "Spider" }, "name": "WordPress", "original": "WordPress/5.2.2;https://cf-analytics.com", "version": "5.2.2" } }
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
2.30.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.29.1 |
Bug fix (View pull request) |
8.13.0 or higher |
2.29.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.28.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.27.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.26.0 |
Enhancement (View pull request) |
8.12.0 or higher |
2.25.0 |
Enhancement (View pull request) |
8.12.0 or higher |
2.24.0 |
Enhancement (View pull request) |
8.12.0 or higher |
2.23.1 |
Enhancement (View pull request) |
8.10.1 or higher |
2.23.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.22.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.21.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.20.0 |
Bug fix (View pull request) |
8.10.1 or higher |
2.19.1 |
Bug fix (View pull request) |
8.7.1 or higher |
2.19.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.18.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.17.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.16.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.15.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.14.1 |
Bug fix (View pull request) |
8.7.1 or higher |
2.14.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.13.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.12.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.11.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.10.0 |
Enhancement (View pull request) |
— |
2.9.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.8.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.7.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.6.0 |
Enhancement (View pull request) |
8.7.1 or higher |
2.5.1 |
Bug fix (View pull request) |
8.4.0 or higher |
2.5.0 |
Enhancement (View pull request) |
8.0.0 or higher |
2.4.2 |
Enhancement (View pull request) |
8.0.0 or higher |
2.4.1 |
Bug fix (View pull request) |
8.0.0 or higher |
2.4.0 |
Enhancement (View pull request) |
8.0.0 or higher |
2.3.1 |
Enhancement (View pull request) |
8.0.0 or higher |
2.3.0 |
Enhancement (View pull request) |
8.0.0 or higher |
2.2.4 |
Bug fix (View pull request) |
8.0.0 or higher |
2.2.3 |
Enhancement (View pull request) |
8.0.0 or higher |
2.2.2 |
Bug fix (View pull request) |
8.0.0 or higher |
2.2.1 |
Enhancement (View pull request) |
8.0.0 or higher |
2.2.0 |
Enhancement (View pull request) |
8.0.0 or higher |
2.1.3 |
Bug fix (View pull request) |
8.0.0 or higher |
2.1.2 |
Enhancement (View pull request) |
8.0.0 or higher |
2.1.1 |
Bug fix (View pull request) |
8.0.0 or higher |
2.1.0 |
Enhancement (View pull request) |
8.0.0 or higher |
2.0.1 |
Enhancement (View pull request) |
8.0.0 or higher |
2.0.0 |
Enhancement (View pull request) |
8.0.0 or higher |
1.4.2 |
Enhancement (View pull request) |
7.16.0 or higher |
1.4.1 |
Enhancement (View pull request) |
— |
1.4.0 |
Enhancement (View pull request) |
— |
1.3.2 |
Enhancement (View pull request) |
7.16.0 or higher |
1.3.1 |
Bug fix (View pull request) |
7.16.0 or higher |
1.3.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.2.1 |
Bug fix (View pull request) |
7.16.0 or higher |
1.2.0 |
Enhancement (View pull request) |
— |
1.1.1 |
Bug fix (View pull request) |
— |
1.1.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.0.3 |
Enhancement (View pull request) |
7.16.0 or higher |
1.0.2 |
Enhancement (View pull request) |
7.16.0 or higher |
1.0.1 |
Bug fix (View pull request) |
— |
1.0.0 |
Enhancement (View pull request) |
— |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.1 |
Enhancement (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |
On this page