So if you configured flows or firewall as a tag in the syslog server configuration on Network wide -> general then you can indeed tick boxes on your L3/4 rules and when they get hit they will log to the syslog in 3 lines.
A flow start log will be made which shows the normal and translated IP addresses (can't be filtered)
A flow or firewall log that actually shows a logic match at the end so you'll have to think what ports and protocols you are matching in that rule to recognize the matched rule.
examples:
protocol=tcp sport=43958 dport=443 pattern: allow all
protocol=udp sport=54366 dport=53 pattern: Group Policy Allow
I don't have access to our logging server to show better examples right now.
A flow end log after the connection is terminated with also the NAT information like the flow start.
We log several firewalls like this and haven't had any issues with that.