diff --git a/src/content/changelog/logs/2026-05-19-log-fields-updated.mdx b/src/content/changelog/logs/2026-05-19-log-fields-updated.mdx
new file mode 100644
index 000000000000000..02931d89704e7df
--- /dev/null
+++ b/src/content/changelog/logs/2026-05-19-log-fields-updated.mdx
@@ -0,0 +1,14 @@
+---
+title: Updated fields across multiple Logpush datasets in Cloudflare Logs
+description: Fields have been updated across multiple Logpush datasets in Cloudflare Logs.
+date: 2026-05-19
+---
+
+Cloudflare has updated [Logpush datasets](/logs/logpush/logpush-job/datasets/):
+
+### Updated fields in existing datasets
+
+- **DEX Device State Events** (added): `DeviceRegistrationProfileID`.
+- **HTTP requests** (added): `MatchedRules`.
+
+For the complete field definitions for each dataset, refer to [Logpush datasets](/logs/logpush/logpush-job/datasets/).
diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/account/dex_device_state_events.md b/src/content/docs/logs/logpush/logpush-job/datasets/account/dex_device_state_events.md
index 8229d1ef49c0c38..f05355e75891640 100644
--- a/src/content/docs/logs/logpush/logpush-job/datasets/account/dex_device_state_events.md
+++ b/src/content/docs/logs/logpush/logpush-job/datasets/account/dex_device_state_events.md
@@ -111,6 +111,12 @@ Type: `string`
The unique ID for the device registration.
+## DeviceRegistrationProfileID
+
+Type: `string`
+
+The ID for the Device Profile used for the device registration.
+
## DiskReadBPS
Type: `int`
diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/account/mnm_flow_logs.md b/src/content/docs/logs/logpush/logpush-job/datasets/account/mnm_flow_logs.md
index 722649c975c80c7..d6caf204ae75aeb 100644
--- a/src/content/docs/logs/logpush/logpush-job/datasets/account/mnm_flow_logs.md
+++ b/src/content/docs/logs/logpush/logpush-job/datasets/account/mnm_flow_logs.md
@@ -43,7 +43,7 @@ The destination port number.
Type: `string`
-If the flow is routed through a WARP device, the device ID.
+The ID of the network device (such as a router or switch) that originated the flow.
## EgressBits
@@ -73,7 +73,7 @@ The flow protocol (e.g., 'AWS_VPC', 'IPFIX', 'SFLOW_5', 'NETFLOW_V9', etc.).
Type: `int or string`
-The timestamp of the flow.
+The timestamp of the flow. To specify the timestamp format, refer to [Output types](/logs/logpush/logpush-job/log-output-options/#output-types).
## NumFlows
@@ -103,7 +103,7 @@ The protocol number (e.g., 6 for TCP, 17 for UDP).
Type: `string`
-Comma-separated list of rule IDs associated with the flow if any.
+Comma-separated list of Magic Network Monitoring rule IDs associated with the flow, if any.
## SampleRate
@@ -151,4 +151,4 @@ The TCP flags.
Type: `int or string`
-The date and time of the event.
+The date and time of the event. To specify the timestamp format, refer to [Output types](/logs/logpush/logpush-job/log-output-options/#output-types).
diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions.md b/src/content/docs/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions.md
index 5b16faae6db2eac..6a5f1a6ca1c6985 100644
--- a/src/content/docs/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions.md
+++ b/src/content/docs/logs/logpush/logpush-job/datasets/account/zero_trust_network_sessions.md
@@ -7,6 +7,8 @@ sidebar:
order: 21
---
+Network session logs are generated for all traffic proxied through Cloudflare Gateway across all supported [on-ramps](/cloudflare-one/networks/connectivity-options/), such as the Cloudflare One Client (WARP), proxy endpoints (PAC files), Browser Isolation, and Cloudflare Tunnel.
+
The descriptions below detail the fields available for `zero_trust_network_sessions`.
## AccountID
diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/zone/firewall_events.md b/src/content/docs/logs/logpush/logpush-job/datasets/zone/firewall_events.md
index 1917fb15d8b686a..3bae6bc4940be7f 100644
--- a/src/content/docs/logs/logpush/logpush-job/datasets/zone/firewall_events.md
+++ b/src/content/docs/logs/logpush/logpush-job/datasets/zone/firewall_events.md
@@ -177,25 +177,25 @@ Type: `int`
HTTP response status code returned to browser.
-## FirewallForAIInjectionScore
+## FirewallForAIInjectionScore (deprecated)
Type: `int`
The score indicating the likelihood of a prompt injection attack in the request, as determined by Firewall for AI. Deprecated: Use AISecurityInjectionScore instead.
-## FirewallForAIPIICategories
+## FirewallForAIPIICategories (deprecated)
Type: `array[string]`
List of PII categories detected in the request by Firewall for AI. Deprecated: Use AISecurityPIICategories instead.
-## FirewallForAITokenCount
+## FirewallForAITokenCount (deprecated)
Type: `int`
The number of tokens in the request, as counted by Firewall for AI. Deprecated: Use AISecurityTokenCount instead.
-## FirewallForAIUnsafeTopicCategories
+## FirewallForAIUnsafeTopicCategories (deprecated)
Type: `array[string]`
diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/zone/http_requests.md b/src/content/docs/logs/logpush/logpush-job/datasets/zone/http_requests.md
index 25d821652612b76..f35875359ac8f30 100644
--- a/src/content/docs/logs/logpush/logpush-job/datasets/zone/http_requests.md
+++ b/src/content/docs/logs/logpush/logpush-job/datasets/zone/http_requests.md
@@ -453,6 +453,12 @@ Type: `string`
Result of the check for [leaked credentials](/waf/detections/leaked-credentials/).
Possible results are: password_leaked \| username_and_password_leaked \| username_password_similar \| username_leaked \| clean.
+## MatchedRules
+
+Type: `array[object]`
+
+Array of matched FL product rules grouped by product. Each object contains: product (string, e.g. snippets, transform, redirects), rulesetId (string), rulesetVersion (int), and rules (array of objects, each with id (string) and optional metadata (object with string key-value pairs)).
+
## OriginDNSResponseTimeMs
Type: `int`
@@ -475,7 +481,7 @@ Time taken to send request headers to origin after establishing a connection. No
Type: `int`
-Number of bytes returned by the origin server.
+Number of bytes returned by the origin server. Consider using CacheResponseBytes and filtering out OriginResponseStatus with values 0 and 304, which indicate a revalidated response. Read more [here](/logs/faq/common-calculations/#how-can-i-calculate-bytes-served-by-the-origin-from-cloudflare-logs).
## OriginResponseDurationMs