Here is a mildly sanitized line of logs to highlight my question. If you look, we see client inbound and outbound packets; but not bytes, like we do with server:
CEF:0|Check Point|VPN-1 & FireWall-1|Check Point|Accept|https|Unknown|act=Accept cn1Label=Elapsed Time in Seconds cn1=0 destinationTranslatedAddress=0.0.0.0 destinationTranslatedPort=0 deviceDirection=0 deviceInboundInterface=eth1 in=3029 out=7390 rt=1764799479000 shost=subnet-0c0070b6a4749279c (db-sn);vpc-06ee7f5be1032b3c6 (vpc-uat);us-east-2a;i-0565d0361f70ed21b (sqlvm-... sourceTranslatedAddress=x.x.x.x sourceTranslatedPort=20368 spt=51306 dpt=443 start=1764799479000 cs2Label=Rule Name cs2=Allow App and DB Server Access layer_name=Network layer_uuid=8a994dd3-993e-4c0c-92a1-a8630b153f4c match_id=186 parent_rule=0 rule_action=Accept rule_uid=c3e9fd76-4744-428a-a5b4-cfaf55c2c4d6 conn_direction=Outgoing contextnum=1 ifname=eth0 logid=6 loguid={0x57cdc63c,0x8df614e5,0x17c5189,0x183aa14c} origin=z.z.z.z originsicname=CN\=fwname.mydomain.com,O\=fwname..zk7npk sequencenum=16 version=5 __nsons=0 __p_dport=0 __pos=7 bytes=10419 client_inbound_packets=14 client_outbound_packets=30 context_num=1 dst=y.y.y.y dst_uo_icon=@app/cp_azure_azure dst_uo_name=Azure Public Services lastupdatetime=1764799487 nat_addtnl_rulenum=0 nat_rulenum=0 packets=44 product=VPN-1 & FireWall-1 proto=6 segment_time=1764799479 server_inbound_bytes=7390 server_inbound_packets=15 server_outbound_bytes=3029 server_outbound_interface=eth0 server_outbound_packets=2
client_inbound_packets=14
client_outbound_packets=30
server_inbound_bytes=7390
server_inbound_packets=15
server_outbound_bytes=3029
server_outbound_packets=2
I do see this before the client packet count: "bytes=10419" - perhaps I need to match one of these entries up with the GUI-corresponding log and perform some kind of transform; but IMO it should come out a little cleaner.