This feature is in BETA status. Please contact your account manager to preview this feature on your account.
Use Edge Insights to gain historical and near real-time insights into threat profiles, performance, and CDN usage. It allows you to:
The primary function of these reports is to identify threat profiles, assess performance, and gather data on CDN usage. This data should not be used for billing purposes.
Please contact your CDN account manager to activate Edge Insights.
Generating a report consists of performing the following steps:
Select one of the following data sources:
Select the time period for which data will be returned.
Define a time period that does not exceed the retention period defined for the selected data source.
Edge Control Only
Define the configurations that will be compared and the type of data that will be analyzed.
Select the data that will be compared from the HTTP Status Code and Cache Status sections.
For example, you may select TCP_MISS from the Cache Status section to compare whether cache misses increased as a result of your latest configuration update.
Common Use Cases:
From the Time Period option, define the desired time period.
For example, if the software update was made available on a Monday at 3 p.m., then you would set the starting point to that date and time. By default, the ending point is automatically set to a recent timestamp and therefore allows you to view all available data from the starting point to the present.
Create a filter for the software update's URL.
Select URL.
Set it to the URL for the desired software update package.
Specific URL Example:
The following value filters for a specific URL:
Recursive Example:
The following value filters for all requests with the same base URL:
From Top Results section, select the HTTP Status Code field.
From the pie chart, click on 404.
Optional. If you cannot detect a clear pattern, try narrowing the report's time period.
For example, if the spike occurred on a Monday at 3 p.m., then you should generate a report for Monday from 2 p.m. to 4 p.m.
View detailed information for a request that results in a 404 Not found response by clicking on an entry in the Logs section.
From the Time Period option, define a time period that covers that traffic spike.
For example, if the traffic spike occurred on a Monday at 3 p.m., then you should generate a report for Monday from 2 p.m. to 4 p.m.
From the Time Period option, define a time period that covers that spike.
For example, if the spike occurred on a Monday at 3 p.m., then you should generate a report for Monday from 2 p.m. to 4 p.m.
From Top Results section, select a field related to the selected rule message. Click on the largest segment in the pie chart.
For example, if you filtered by the Method is not allowed by policy rule message, then you should select the Request Method field.
From the Time Period option, define a time period that covers that spike.
For example, if the spike occurred on a Monday at 3 p.m., then you should generate a report for Monday from 2 p.m. to 4 p.m.
You may share an entire report or specific data with other users.
Entire Report: Share an Edge Insights report with another MCC user by providing the report's URL.
Example:
Specific Data: Click on the next to the data that you would like to share. The MCC will load the corresponding JSON data in a new window or tab. You should then either:
Share the data's URL with another MCC user.
Example:
You must establish a MCC session before attempting to load a MCC URL that points to a specific report or data. Attempting to load this type of URL without an active MCC session may load the MCC's home page instead.
Our policy on downsampling data and the amount of time that we store it varies according to data source.
Data Source |
Downsampling |
Retention Schedule |
---|---|---|
WAF Alerts |
30 days |
|
Rate Limiting Alerts |
10% |
30 days |
Sampled Access Logs |
0.1% |
7 days |
Analytics |
0.1% |
7 days |
Edge Control |
Not ApplicableYour configuration changes are not downsampled. |
7 days |
The time chart (aka line graph) graphs the current report's data over time.
Key information:
By default, a single line plots all requests over time. Graph the top results for a specific field by clicking on the button that corresponds to that field. If the desired field is not listed, select it from within the Top Results section.
By default, a line graph may include up to the 10 most popular entries. Customize this limit through the Limit Results to Top option from the left-hand pane. This option also affects the maximum number of unique entries that may be listed within a top result chart.
By default, Edge Insights plots data using an optimal time interval for the report's time range. You may override this by switching the resolution from Auto to the desired time interval.
The report's time range determines the set of available resolutions.
The top results charts displays the top results for 2 key fields.
Key information:
By default, each chart may include up to the 10 most popular entries. Customize this limit through the Limit Results to Top option from the left-hand pane. This option also affects the maximum number of unique entries that may be graphed within the time chart.
The Top Results charts only include statistically significant entries. A gray slice called Rest... represents all remaining traffic.
Certain fields may generate a pie chart that solely consists of a Rest... slice. This behavior typically indicates either that there are many unique entries or that this field is not applicable to the majority of requests.
Example:
In the following illustration, the Geographical Postal Code pie chart returns a single slice called Rest.... The traffic represented by this pie chart is distributed throughout the world and therefore no single postal code was responsible for a statistically significant traffic segment. The POP pie chart, on the other hand, displays the top 10 POPs. Those POPs were responsible for serving the majority of traffic included in this report.
Increasing the Limit Results to Top option to 30 provides visibility into additional POPs that were responsible for serving the majority of your traffic. Notice in the following illustration that the Rest... slice is now smaller since the pie chart now reports data for POPs that were previously included by that slice.
Filtering is critical for gaining deeper insights into your data. Perform the following steps to quickly filter your report:
From Top Results section, select the field that contains the data that you would like to filter.
From the pie chart, click on the value by which you would like to filter.
The Filters section in the left-hand pane is immediately updated to display your filter query.
Example:
From the Top Results section, select the HTTP Status Code field and then click on 404 to create the following filter:
Perform the following common tasks from within the Filters section in the left-hand pane:
Manually add a filter by performing the following steps:
Select the desired field.
The set of available fields varies by data source. View field definitions for:
WAF Alerts, Rate Limiting Alerts, Sampled Access Logs, and Analytics
Optional. Click on = to toggle between filtering for requests that:
Although you may not change this setting once a filter has been set, you may always delete a filter and then create a new one.
Example:
Filter for requests that do not originate from a specific country by selecting the Country Name field, toggling this symbol to ≠, and then defining the name of the desired country.
Set the value through which the report will be filtered.
Advanced (Regular Expressions)
If you are filtering by a field that reports a string value, then you may define a regular expression through the following syntax:
Example:
Use this regular expression on the Country Name field to filter for requests that originated in United States, Canada, or Mexico:
Log data provides contextual information about a request that allows you to gain deeper behavioral insight into threat detection and CDN usage. View the log data associated with the current report from within the Logs section.
Key information:
Edge Insights restricts log retrieval to 10,000 log entries. If the current report consists of more log entries, then you may only retrieve log data for 10,000 of the most recent requests. This limit solely applies to log retrieval. Your report's time chart and top results charts display all available data without regard to this limit.
Edge Insights is not meant to be used as a log retrieval or log archival tool. Use Real-Time Log Delivery to automatically archive log data to one or more destinations.
Use the WAF Alerts data source for historical and near real-time analysis of recent threats to site traffic. For example, use this data to:
Edge Insights retains WAF data for 30 days.
Each WAF field is defined below.
Field | Description |
---|---|
Account Type |
Reserved for future use. |
Acl ID |
Indicates the system-defined ID of the access rule that the request violated. |
Acl Name |
Indicates the name of the access rule that the request violated. |
Action Type |
Indicates the type of action that was taken in response to the rule violation. Valid values are:
|
ASN |
Indicates the autonomous system number (ASN) for the autonomous system (AS) from which the request originated. |
Bytes In |
Indicates the sum of the number of bytes read from both of the following sources:
Returns 0 for blocked requests. |
Bytes Out |
Indicates the number of bytes in the response sent from the edge server to the client. Returns 0 for blocked requests. |
Cache Status |
Indicates the cache status code that was generated by the request. This code indicates how the request was handled by the CDN with regards to caching. |
City Name |
Indicates the city from which the request originated. |
Client Content Type |
This field has been deprecated. Use the Content Type field instead. |
Client IP |
Identifies the IP address of the client from which the request originated. |
Content Type |
Indicates the media typeIdentifies/classifies the data contained in a file. (aka content type) for the requested content. Example: application/javascript
|
Country Code |
Identifies the country from which the request originated by its country code. |
Country Name |
Identifies the country from which the request originated by its name. |
Epoch Time |
Indicates the timestamp, in Unix time (seconds), at which our CDN received the request. |
Event ID |
Indicates the unique ID assigned to the event. Pass this ID to the Get Event Log Entry endpoint to retrieve this event log entry. |
File size |
Indicates the size, in bytes, of the requested asset (i.e., response body). |
Host |
Indicates the Host header value sent in the client's request to the CDN. |
id |
Reserved for future use. |
Instance ID |
Reserved for future use. |
Instance Name |
Reserved for future use. |
IP Version |
Reserved for future use. |
LC |
Reserved for future use. |
Matched On |
Indicates a variable that identifies where the violation was found. |
Matched Value |
Indicates the value of the variable defined by the Matched On field. Standard security practices dictate that measures should be taken to prevent sensitive data (e.g., credit card information or passwords) from being passed as clear text from the client to your origin server. Another incentive for encrypting sensitive data is that it will be logged by our system when an alert is triggered as a result of this data. If sensitive data cannot be encrypted or obfuscated, then it is strongly recommended to contact our technical customer support to disable logging for the Matched Value field. |
Operator Name |
Indicates how the system interpreted the comparison between the Operator Parameter and the Matched Value fields. Common operators are:
|
Operator Parameter |
Indicates the source or the value that was compared against the Matched Value field. |
Pipeline Time |
Indicates the number of seconds between when the request was received by our network and ingestion. |
Platform |
Indicates the delivery platform that served the request. Valid values are:
|
POP |
Identifies the POP that handled the client's request by its three-letter abbreviation. |
Profile ID |
Indicates the system-defined ID of the managed rule that the request violated. |
Profile Name |
Indicates the name of the managed rule that the request violated. |
Profile Type |
Indicates whether the request was screened as a result of a production or audit rule. |
Receiving Host |
Indicates the name of the server that inspected the request. |
Referer |
Indicates the request’s referrer as defined by the Referer request header. |
Request Method |
Indicates the request's HTTP method. Example: HTTP_METHOD_GET
|
Rule ID |
Indicates the ID for the rule that the request violated. This field indicates that the rule met or exceeded the maximum anomaly score. Please refer to the Sub Event(s) section, which contains a sub event for each rule violated by a request, to find out why the request was flagged or blocked. Each sub event indicates the rule that was violated and the data used to identify the violation. |
Rule Message |
Provides a description of the rule that the request violated. Syntax: Inbound Anomaly Score Exceeded (Total Score: 3, SQLi=0, XSS=0): Last Matched Message: Rule MessageThis term represents the message for the last rule that the request violated.
This field indicates the request's anomaly score and the last rule that it violated. Please refer to the Sub Event(s) section, which contains a sub event for each rule violated by a request, to find out why the request was flagged or blocked. Each sub event indicates the rule that was violated and the data used to identify the violation. |
Rule Tags |
Indicates the tags associated with the rule that the request violated. These tags may be used to determine whether a rule, access control, or global setting was violated. Naming convention: Rule Set/CategoryIdentifies whether the request violated a rule, an access control, or the delivery profile./Subcategory
View sample values that identify a policy.
OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ OWASP_CRS/WEB_ATTACK/SQL_INJECTION View sample values that identify a blacklist criterion.
BLACKLIST/IP BLACKLIST/COUNTRY BLACKLIST/REFERRER BLACKLIST/URL View a sample value that identifies a setting.
OWASP_CRS/POLICY/SIZE_LIMIT |
Rules Config ID |
Indicates the ID of the custom rule that the request violated. |
Rules Config Name |
Indicates the name of the custom rule that the request violated. |
Scope ID |
Indicates the system-defined ID of the Security Application Manager configuration that the request violated. |
Scope Name |
Indicates the name of the Security Application Manager configuration that the request violated. |
Server Address |
Indicates the IP address for the edge server that processed the request. |
Server Name |
Indicates the name of the edge server that processed the request. |
Server Port |
Indicates the port number on an edge server to which the client directed a request. Valid values are:
|
Sub Event Count |
Indicates the number of rules that the request violated. |
Sub Events |
Reserved for future use. |
Total Anomaly Score |
Indicates the anomaly score assigned to the request. This score is determined by the number of rules that were violated and their severity. |
URL |
Indicates the URL of the request that triggered the rule violation. |
User Agent |
Indicates the user agent that submitted the request that triggered the rule violation. This information is derived from the User-Agent request header. |
Use the Rate Limiting Alerts data source for historical and near real-time analysis of recently rate limited requests. For example, use this data to:
Logging for rate limited requests is downsampled to 10% due to the volume of requests that may occur during a single incident (e.g., volumetric Distributed Denial-of-Service attack).
Calculate an approximation of your actual total events by multiplying your total events by 10.
For example, if your total events reports 325K, then the approximate number of requests for that time period is 3,250,000.
Edge Insights retains WAF data, including rate limited requests, for 30 days.
Each Rate Limiting field is defined below.
Fields | Description |
---|---|
Account Type |
Reserved for future use. |
Bytes In |
Indicates the sum of the number of bytes read from both of the following sources:
Returns 0 for blocked requests. |
Bytes Out |
Indicates the number of bytes in the response sent from the edge server to the client. Returns 0 for blocked requests. |
Cache Status |
Indicates the cache status code that was generated by the request. This code indicates how the request was handled by the CDN with regards to caching. |
City Name |
Indicates the city from which the request originated. |
Client IP |
Identifies the IP address of the client from which the request originated. |
Common Header |
Reserved for future use. |
Content Type |
Reserved for future use. |
Country Code |
Identifies the country from which the request originated by its country code. |
Country Name |
Identifies the country from which the request originated by its name. |
Epoch Time |
Indicates the timestamp, in Unix time (seconds), at which our CDN received the request. |
File extension |
Indicates the request's file extension. |
Host |
Indicates the Host header value sent in the client's request to the CDN. |
id |
Reserved for future use. |
LC |
Reserved for future use. |
POP |
Identifies the POP that handled the client's request by its three-letter abbreviation. |
Rate Limiting Action Duration |
Indicates the number of seconds for which the rate limit that this request violated was enforced. |
Rate Limiting Action Limit ID |
Indicates the ID of the rate rule that the request violated. |
Rate Limiting Action Limit Name |
Indicates the name of the rate rule that the request violated. |
Rate Limiting Action Percentage |
Reserved for future use. |
Rate Limiting Action Start Epoch msec |
Indicates when the rate limiting action was applied to the request. The date and time is reported in Unix time (a.k.a. POSIX time or Unix epoch). Time is reported in milliseconds instead of seconds. Please convert this value from milliseconds to seconds prior to leveraging it with Unix time functions. |
Rate Limiting Action Type |
Indicates the type of action that was applied to the request. Valid values are:
|
Rate Limiting Action URL |
Indicates the URL to which the request was redirected. |
Rate Limiting Enforcement Duration |
Indicates the minimum length of time, in seconds, that eligible requests were rate limited when the event took place. View a sample scenario.
This example assumes that a duration of 280 seconds was reported for an event. This means that the rule's rate limiting policy was enforced for a minimum of 4 minutes and 40 seconds. The actual duration of the enforcement period was determined by the length of time that requests exceeded the rule's threshold. |
Rate Limiting Enforcement Percentage |
Indicates the percentage of eligible requests that were rate limited when the event took place. View a sample scenario.
A percentage of 20% indicates that 20% of eligible requests were rate limited when the event took place. In other words, if there are 1000 eligible requests per minute, then a predefined action (e.g., URL redirection) was applied to 200 requests. |
Rate Limiting Enforcement Rule ID |
Indicates the action that was applied to the rate limited request by its system-defined ID. |
Rate Limiting Enforcement Start Epoch msec |
Indicates when the rate limiting action was applied to the request. The date and time is reported in Unix time (a.k.a. POSIX time or Unix epoch). Time is reported in milliseconds instead of seconds. Please convert this value from milliseconds to seconds prior to leveraging it with Unix time functions. |
Rate Limiting Enforcement Tuple ID |
Indicates the ID of the rate rule that the request violated. |
Rate Limiting Enforcement Tuple Name |
Indicates the name of the rate rule that the request violated. |
Rate Limiting Enforcement Type |
Indicates the type of action that was applied to the rate limited request. |
Rate Limiting Enforcement URL |
Indicates the URL to which the request was redirected. |
Referer |
Indicates the request’s referrer as defined by the Referer request header. |
Request Method |
Indicates the request's HTTP method. Example: HTTP_METHOD_GET
|
Scope ID |
Identifies the system-defined ID of the Security Application Manager configuration that the request violated. |
Scope Name |
Identifies the name of the Security Application Manager configuration that the request violated. |
Server Address |
Indicates the IP address for the edge server that processed the request. |
Server Name |
Indicates the name of the edge server that processed the request. |
Server Port |
Indicates the port number on an edge server to which the client directed a request. Valid values are:
|
Server Type |
Indicates the type of server that handled the request. |
URI |
Indicates the request's URL path and query string. This URL path starts directly after the hostname and it excludes the protocol and hostname. |
URL |
Indicates the URL of the request that triggered the rule violation. |
User Agent |
Indicates the user agent that submitted the request. This value is derived from the request's User-Agent header. |
Use this data source to analyze CDN traffic that has been downsampled to 0.1%. This data provides historical and near real-time visibility into your CDN traffic at a high-level.
Calculate an approximation of your actual total events by multiplying your total events by 1,000.
For example, if your total events reports 235K, then the approximate number of requests for that time period is 235,000,000.
Each Sampled Access Log field is defined below.
Field | Description |
---|---|
ASN |
Indicates the autonomous system number (ASN) for the autonomous system (AS) from which the request originated. |
Bytes In |
Indicates the sum of the number of bytes read from both of the following sources:
Returns 0 for blocked requests. |
Bytes Out |
Indicates the number of bytes in the response sent from the edge server to the client. Returns 0 for blocked requests. |
Bytes Out without Header |
Indicates the number of bytes in the payload sent from the edge server to the client. Returns 0 for blocked requests. |
Cache Status |
Indicates the cache status code that was generated by the request. This code indicates how the request was handled by the CDN with regards to caching. |
Chosen SSL Signature Algorithm |
Indicates the algorithms used to generate and encrypt a hash for this TLS request. Example: RSA-SHA256
|
City Name |
Indicates the city from which the request originated. |
Client Content Type |
Indicates the media typeIdentifies/classifies the data contained in a file. (aka content type) for the requested content. Example: application/javascript
|
Client IP |
Identifies the IP address of the client from which the request originated. |
Client SSL Ciphers |
Indicates the set of cipher suites supported by the client that submitted the request. |
Client VIP |
Reserved for future use. |
Common Header |
Reserved for future use. |
Connection ID |
Reserved for future use. |
Content Range |
Indicates the location of a ranged request's payload within the full message. This information is defined within the Content-Range header. Example: bytes 0-4095/8388608
|
Content Type |
Indicates the media typeIdentifies/classifies the data contained in a file. (aka content type) for the requested content. Example: application/javascript
|
Continent Code |
Indicates the continent from which the request originated using one of the following codes:
|
Country Code |
Identifies the country from which the request originated by its country code. |
Country Name |
Identifies the country from which the request originated by its name. |
Customer config version |
Identifies the version of the CDN configuration that was in effect when this request was processed. Updating your CDN configuration increments your CDN configuration version. |
Direct Response |
Reserved for future use. |
EC Tag |
Reserved for future use. |
Epoch Time |
Indicates the timestamp, in Unix time (seconds), at which our CDN received the request. |
Event ID |
Indicates the unique ID assigned to this request. |
File extension |
Indicates the request's file extension. Example: .js
|
File size |
Indicates the size, in bytes, of the requested asset (i.e., response body). |
Forwarded for IP |
Indicates the requester's IP address. |
Geographical Latitude |
Indicates the approximate latitude of the postal code, city, subdivision, or country associated with the client's IP address. A null value is reported when the client's latitude cannot be determined. |
Geographical Longitude |
Indicates the approximate longitude of the postal code, city, subdivision, or country associated with the client's IP address. A null value is reported when the client's longitude cannot be determined. |
Geographical Postal Code |
Reserved for future use. |
Geographical Real Region Name |
Reserved for future use. |
Geographical Region Name |
Indicates the name of the region from which the request originated. Example: Sao Paulo
|
Geographical Time Zone |
Indicates the name of the time zone that corresponds to the region from which the request originated. Example: America/Sao_Paulo
|
File size |
Indicates the size, in bytes, of the requested asset (i.e., response body). |
HTTP Status |
Indicates the HTTP status message for the response generated by an origin server, Example: HTTP_STATUS_OK
|
HTTP Status Code |
Indicates the HTTP status code for the response generated by an origin server, Example: 200
|
IP Version |
Indicates the client's IP version number. Valid values are: 4 | 6
|
LC |
Reserved for future use. |
Origin URL |
Indicates the request's URL path and query string. This URL path starts directly after the content access pointThis URL segment of a CDN URL identifies where the request should be directed. This relative path starts directly after the CDN hostname. The proper syntax for a content access point is "/yyAN," where "yy" stands for the origin identifier and "AN" stands for a customer account number. A content access point for a customer origin also includes a directory that identifies it.. It excludes the protocol, hostname, and content access point. Example: /resources/script.js
|
Pipeline Time |
Indicates the number of seconds between when the request was received by our network and ingestion. |
Platform |
Indicates the delivery platform that served the request. Valid values are:
|
POP |
Identifies the POP that handled the client's request by its three-letter abbreviation. |
Proxy Address |
Indicates the IP address to which the request was proxied. |
Proxy ASN |
Indicates the ASN through which the request was proxied. |
Proxy hard error |
Indicates the error message that occurred when proxying the request. Example: The following sample value indicates that an error did not occur when proxying the request: HARD_ERR_NONE
|
Proxy Port |
Indicates the port to which the request was proxied. |
Proxy Version |
Reserved for future use. |
Query String |
Indicates the request's query string. |
QUIC version |
Indicates the request's QUIC version. |
Range |
Indicates the requested range of bytes as defined by the Range request header. Example: bytes=0-12022
|
Receiving Host |
Identifies the host that received the request. |
Referer |
Indicates the request’s referrer as defined by the Referer request header. |
Request Count |
Reserved for future use. |
Request ID |
Indicates the unique ID assigned to this request. |
Request Method |
Indicates the request's HTTP method. Example: HTTP_METHOD_GET
|
Request Protocol |
Indicates the request's HTTP version. Example: HTTP_2_0
|
Server Address |
Indicates the IP address for the edge server that processed the request. |
Server Name |
Indicates the name of the edge server that processed the request. |
Server Port |
Indicates the port number on an edge server to which the client directed a request. Valid values are:
|
SSL Cipher Name |
Indicates the cipher suite used in the handshake between the client that submitted the request and one of our servers. Example: TLS_AES_256_GCM_SHA384
|
SSL Client Cipher Name |
Reserved for future use. |
SSL Client Signature Algorithms |
Indicates the set of TLS signature algorithms supported by the client that submitted the request. |
SSL Protocol |
Indicates the TLS protocol version used for the communication between the client and our network. Example:
TLSv1.3
|
TCP Congestion Algorithm |
Indicates the network congestion avoidance algorithm for TCP used to process the request. Example: cubic
|
Throughput |
Reserved for future use. |
Timestamp |
Indicates the timestamp at which our CDN received the request. Syntax: YYYY-MM-DDThh:mm:ss:ffZ
Example: 2021-11-14T18:36:11Z
|
Total Connection Time |
Indicates the length of time, in seconds, that it took to send a response to the client. This metric measures the duration between when an edge server receives a request and when it finishes sending the response to the client. This field does not take into account network time. Example: 0.000582
|
URI |
Indicates the request's URL path and query string. This URL path starts directly after the hostname and it excludes the protocol and hostname. Our service transforms edge CNAME URLs into a CDN URL before logging this data. Example: This example assumes that the client submitted the following request: https://cdn.example.com/script.js
Our service transforms the above edge CNAME URL to the following CDN URL: https://wpc.0001.edgecastcdn.net/800001/myorigin/script.js
It then logs the following value for this field: /800001/myorigin/resources/script.js
|
URL |
Indicates the request's URL. Example: https://cdn.example.com/resources/script.js
|
User Agent |
Indicates the user agent that submitted the request. This information is derived from the User-Agent request header. |
Write Time Used |
Indicates the length of time, in seconds, that it took an edge server to write the response. This metric measures the duration between when an edge server starts writing the response and when it finishes sending the response to the client. Our servers forward data as it is read. This means that the read_time and write_time reported for an asset spans over an overlapping time period. This field does not take into account network time. Example: 2.9999e-05
|
X Midgress |
Indicates whether the request was proxied through an additional CDN server (e.g., This field reports __na__ for requests that did not have midgress traffic. |
Use this data source to analyze CDN traffic that has been downsampled to 0.1%. This data provides historical and near real-time visibility into your CDN traffic at a high-level.
Calculate an approximation of your actual total events by multiplying your total events by 1,000.
For example, if your total events reports 100K, then the approximate number of requests for that time period is 100,000,000.
Each Analytics field is defined below.
Field | Description |
---|---|
ASN |
Indicates the autonomous system number (ASN) for the autonomous system (AS) from which the request originated. |
Bytes In |
Indicates the sum of the number of bytes read from both of the following sources:
Returns 0 for blocked requests. |
Bytes Out |
Indicates the number of bytes in the response sent from the edge server to the client. Returns 0 for blocked requests. |
Bytes Out without Header |
Indicates the number of bytes in the payload sent from the edge server to the client. Returns 0 for blocked requests. |
Cache Status |
Indicates the cache status code that was generated by the request. This code indicates how the request was handled by the CDN with regards to caching. |
Chosen SSL Signature Algorithm |
Indicates the algorithms used to generate and encrypt a hash for this TLS request. Example: RSA-SHA256
|
City Name |
Indicates the city from which the request originated. |
Client Content Type |
Indicates the media typeIdentifies/classifies the data contained in a file. (aka content type) for the requested content. Example: application/javascript
|
Client IP |
Identifies the IP address of the client from which the request originated. |
Client SSL Ciphers |
Indicates the set of cipher suites supported by the client that submitted the request. |
Client VIP |
Reserved for future use. |
Common Header |
Reserved for future use. |
Connection ID |
Reserved for future use. |
Content Range |
Indicates the location of a ranged request's payload within the full message. This information is defined within the Content-Range header. Example: bytes 0-4095/8388608
|
Content Type |
Indicates the media typeIdentifies/classifies the data contained in a file. (aka content type) for the requested content. Example: application/javascript
|
Continent Code |
Indicates the continent from which the request originated using one of the following codes:
|
Country Code |
Identifies the country from which the request originated by its country code. |
Country Name |
Identifies the country from which the request originated by its name. |
Customer config version |
Identifies the version of the CDN configuration that was in effect when this request was processed. Updating your CDN configuration increments your CDN configuration version. |
Direct Response |
Reserved for future use. |
EC Tag |
Reserved for future use. |
Epoch Time |
Indicates the timestamp, in Unix time (seconds), at which our CDN received the request. |
Event ID |
Indicates the unique ID assigned to this request. |
File extension |
Indicates the request's file extension. Example: .js
|
File size |
Indicates the size, in bytes, of the requested asset (i.e., response body). |
Forwarded for IP |
Indicates the requester's IP address. |
Geographical Latitude |
Indicates the approximate latitude of the postal code, city, subdivision, or country associated with the client's IP address. A null value is reported when the client's latitude cannot be determined. |
Geographical Longitude |
Indicates the approximate longitude of the postal code, city, subdivision, or country associated with the client's IP address. A null value is reported when the client's longitude cannot be determined. |
Geographical Postal Code |
Reserved for future use. |
Geographical Real Region Name |
Reserved for future use. |
Geographical Region Name |
Indicates the name of the region from which the request originated. Example: Sao Paulo
|
Geographical Time Zone |
Indicates the name of the time zone that corresponds to the region from which the request originated. Example: America/Sao_Paulo
|
File size |
Indicates the size, in bytes, of the requested asset (i.e., response body). |
HTTP Status |
Indicates the HTTP status message for the response generated by an origin server, Example: HTTP_STATUS_OK
|
HTTP Status Code |
Indicates the HTTP status code for the response generated by an origin server, Example: 200
|
IP Version |
Indicates the client's IP version number. Valid values are: 4 | 6
|
LC |
Reserved for future use. |
Origin URL |
Indicates the request's URL path and query string. This URL path starts directly after the content access pointThis URL segment of a CDN URL identifies where the request should be directed. This relative path starts directly after the CDN hostname. The proper syntax for a content access point is "/yyAN," where "yy" stands for the origin identifier and "AN" stands for a customer account number. A content access point for a customer origin also includes a directory that identifies it.. It excludes the protocol, hostname, and content access point. Example: /resources/script.js
|
Pipeline Time |
Indicates the number of seconds between when the request was received by our network and ingestion. |
Platform |
Indicates the delivery platform that served the request. Valid values are:
|
POP |
Identifies the POP that handled the client's request by its three-letter abbreviation. |
Proxy Address |
Indicates the IP address to which the request was proxied. |
Proxy ASN |
Indicates the ASN through which the request was proxied. |
Proxy hard error |
Indicates the error message that occurred when proxying the request. Example: The following sample value indicates that an error did not occur when proxying the request: HARD_ERR_NONE
|
Proxy Port |
Indicates the port to which the request was proxied. |
Proxy Version |
Reserved for future use. |
Query String |
Indicates the request's query string. |
QUIC version |
Indicates the request's QUIC version. |
Range |
Indicates the requested range of bytes as defined by the Range request header. Example: bytes=0-12022
|
Receiving Host |
Identifies the host that received the request. |
Referer |
Indicates the request’s referrer as defined by the Referer request header. |
Request Count |
Reserved for future use. |
Request ID |
Indicates the unique ID assigned to this request. |
Request Method |
Indicates the request's HTTP method. Example: HTTP_METHOD_GET
|
Request Protocol |
Indicates the request's HTTP version. Example: HTTP_2_0
|
Server Address |
Indicates the IP address for the edge server that processed the request. |
Server Name |
Indicates the name of the edge server that processed the request. |
Server Port |
Indicates the port number on an edge server to which the client directed a request. Valid values are:
|
SSL Cipher Name |
Indicates the cipher suite used in the handshake between the client that submitted the request and one of our servers. Example: TLS_AES_256_GCM_SHA384
|
SSL Client Cipher Name |
Reserved for future use. |
SSL Client Signature Algorithms |
Indicates the set of TLS signature algorithms supported by the client that submitted the request. |
SSL Protocol |
Indicates the TLS protocol version used for the communication between the client and our network. Example:
TLSv1.3
|
TCP Congestion Algorithm |
Indicates the network congestion avoidance algorithm for TCP used to process the request. Example: cubic
|
Throughput |
Reserved for future use. |
Timestamp |
Indicates the timestamp at which our CDN received the request. Syntax: YYYY-MM-DDThh:mm:ss:ffZ
Example: 2021-11-14T18:36:11Z
|
Total Connection Time |
Indicates the length of time, in seconds, that it took to send a response to the client. This metric measures the duration between when an edge server receives a request and when it finishes sending the response to the client. This field does not take into account network time. Example: 0.000582
|
URI |
Indicates the request's URL path and query string. This URL path starts directly after the hostname and it excludes the protocol and hostname. Our service transforms edge CNAME URLs into a CDN URL before logging this data. Example: This example assumes that the client submitted the following request: https://cdn.example.com/script.js
Our service transforms the above edge CNAME URL to the following CDN URL: https://wpc.0001.edgecastcdn.net/800001/myorigin/script.js
It then logs the following value for this field: /800001/myorigin/resources/script.js
|
URL |
Indicates the request's URL. Example: https://cdn.example.com/resources/script.js
|
User Agent |
Indicates the user agent that submitted the request. This information is derived from the User-Agent request header. |
Write Time Used |
Indicates the length of time, in seconds, that it took an edge server to write the response. This metric measures the duration between when an edge server starts writing the response and when it finishes sending the response to the client. Our servers forward data as it is read. This means that the read_time and write_time reported for an asset spans over an overlapping time period. This field does not take into account network time. Example: 2.9999e-05
|
X Midgress |
Indicates whether the request was proxied through an additional CDN server (e.g., This field reports __na__ for requests that did not have midgress traffic. |
Use this data source to analyze how a new CDN configuration affects content delivery and performance.
Edgecast CDN