Traffic-Blocked Log Event JSON Format
This document describes the JSON log event fields of the Log Streaming Traffic Blocked log event and provides an example.
The traffic-blocked log event is generated when Cyber Shield Traffic Filtering blocks a traffic flow.
The log event JSON contains the Header fields and a log JSON object. The fields in the log JSON object for when the eventName in the Header is set to traffic-blocked are described in the table below. For more information on the Header, refer to Log Event Header Fields.
Field Name  | Type  | Description  | 
|---|---|---|
signatureId  | String  | The ID of the traffic signature, which matched the traffic flow to cause it to be blocked.  | 
eventName  | String  | Informative text describing the traffic signature with which the blocked traffic flow was matched.  | 
classification  | String  | Informative text describing the threat classification of the blocked traffic flow.  | 
priority  | Integer  | The Cyber Shield Traffic Filtering priority level. Traffic matching specific patterns of interest are classified into three threat priority levels, where 1 is the highest severity, and 3 is the lowest.  | 
category  | String  | The Cyber Shield traffic filter category of the blocked traffic flow.  | 
protocol  | String  | The protocol of the blocked traffic flow.  | 
sourceIp  | String  | The IP address of the traffic source.  | 
sourcePort  | Integer  | The port number of the traffic source.  | 
destinationIp  | String  | The IP address of the intended traffic destination.  | 
destinationPort  | Integer  | The port number of the intended traffic destination.  | 
{
  "CloudConnexaLogVersion": 1,
  "timestamp": "2023-11-10T15:50:04.000000Z",
  "cloudId": "test",
  "service": "CloudConnexa",
  "traceId": "33249eb9-836e-4f9c-b9da-3688166bfa2b",
  "initiator": "521572bc-fcc2-4c05-a78c-d2a9654cc676",
  "initiatorType": "Device",
  "initiatorName": "My Main Device",
  "parentEntity": "43efdaaa-d8a1-4af1-acc1-d96b77313f42",
  "parentEntityType": "User",
  "parentEntityName": "My User",
  "category": "Security.CyberShieldBlockedTraffic",
  "eventName": "traffic-blocked",
  "log": {
    "signatureId": "1:99999907:1",
    "eventName": "ET WORM OpenVPN generate event for category Malware prio 1",
    "classification": "Attempted Information Leak",
    "priority": 1,
    "category": "Malware and Ransomware",
    "protocol": "TCP",
    "sourceIp": "100.96.1.130",
    "sourcePort": 55544,
    "destinationIp": "104.18.21.80",
    "destinationPort": 80
  }
}