Common errors
This section covers the most common errors you might encounter when connecting resources with Cloudflare Tunnel. If you do not see your issue listed below, refer to the troubleshooting FAQ, view your Tunnel logs, or contact Cloudflare Support.
You can check your tunnel’s connection status either from the Zero Trust dashboard (by going to Networks > Tunnels) or by running the cloudflared tunnel list
command. Each tunnel displays a status that reflects its current connection state:
Status | Meaning | Recommended Action |
---|---|---|
Healthy | The tunnel is active and serving traffic through four connections to the Cloudflare global network. | No action is required. Your tunnel is running correctly. |
Inactive | The tunnel has been created (via the API or dashboard) but the cloudflared connector has never been run to establish a connection. | Run the tunnel as a service (recommended) or use the cloudflared tunnel run command on your origin server to connect the tunnel to Cloudflare. Refer to substep 6 of step 1 in the Create a Tunnel dashboard guide or step 4 in the Create a Tunnel API guide. |
Down | The tunnel was previously connected but is currently disconnected because the cloudflared process has stopped. | 1. Ensure the cloudflared service or process is actively running on your server. 2. Check for server-side issues, such as the machine being powered off, an application crash, or recent network changes. |
Degraded | The cloudflared connector is running and the tunnel is serving traffic, but at least one individual connection has failed. Further degradation in tunnel availability could risk the tunnel going down and failing to serve traffic. | 1. Review your cloudflared logs for connection failures or error messages. 2. Investigate local network and firewall rules to ensure they are not blocking connections to the Cloudflare Tunnel IPs and ports. |
If you see this error when installing a remotely-managed tunnel, ensure that no other cloudflared
instances are running as a service on this machine. Only a single instance of cloudflared
may run as a service on any given machine. Instead, we recommend adding additional routes to your existing tunnel. Alternatively, you can run sudo cloudflared service uninstall
to uninstall cloudflared
.
If you are unable to save your tunnel's public hostname, choose a different hostname or delete the existing DNS record. Check the DNS records for your domain from the Cloudflare dashboard ↗.
If you encounter the following error when running a tunnel, double check your config.yml
file and ensure that the credentials-file
points to the correct location. You may need to change /root/
to your home directory.
cloudflared tunnel run
2021-06-04T06:21:16Z INF Starting tunnel tunnelID=928655cc-7f95-43f2-8539-2aba6cf3592dTunnel credentials file '/root/.cloudflared/928655cc-7f95-43f2-8539-2aba6cf3592d.json' doesn't exist or is not a file
To start using Cloudflare Tunnel, a super administrator in the Cloudflare account must first log in through cloudflared login
. The client will launch a browser window and prompt the user to select a hostname in their Cloudflare account. Once selected, Cloudflare generates a certificate that consists of three components:
- The public key of the origin certificate for that hostname
- The private key of the origin certificate for that domain
- A token that is unique to Cloudflare Tunnel
Those three components are bundled into a single PEM file that is downloaded one time during that login flow. The host certificate is valid for the root domain and any subdomain one-level deep. Cloudflare uses that certificate file to authenticate cloudflared
to create DNS records for your domain in Cloudflare.
The third component, the token, consists of the zone ID (for the selected domain) and an API token scoped to the user who first authenticated with the login command. When user permissions change (if that user is removed from the account or becomes an admin of another account, for example), Cloudflare rolls the user's API key. However, the certificate file downloaded through cloudflared
retains the older API key and can cause authentication failures. The user will need to login once more through cloudflared
to regenerate the certificate. Alternatively, the administrator can create a dedicated service user to authenticate.
This means the origin is using a certificate that cloudflared
does not trust. For example, you may get this error if you are using SSL/TLS inspection in a proxy between your server and Cloudflare. To solve this:
- Add the certificate to the system certificate pool.
- Use the
--origin-ca-pool
flag and specify the path to the certificate. - Use the
--no-tls-verify
flag to stopcloudflared
checking the certificate for a trust chain.
A 1033
error indicates your tunnel is not connected to Cloudflare's network because Cloudflare's network cannot find a healthy cloudflared
instance to receive the traffic.
First, review whether your tunnel is listed as Active
on the Zero Trust ↗ dashboard by going to Networks > Tunnels or run cloudflared tunnel list
. If the tunnel is not Active
, review the following and take the action necessary for your tunnel status:
Status | Meaning | Recommended Action |
---|---|---|
Healthy | The tunnel is active and serving traffic through four connections to the Cloudflare global network. | No action is required. Your tunnel is running correctly. |
Inactive | The tunnel has been created (via the API or dashboard) but the cloudflared connector has never been run to establish a connection. | Run the tunnel as a service (recommended) or use the cloudflared tunnel run command on your origin server to connect the tunnel to Cloudflare. Refer to substep 6 of step 1 in the Create a Tunnel dashboard guide or step 4 in the Create a Tunnel API guide. |
Down | The tunnel was previously connected but is currently disconnected because the cloudflared process has stopped. | 1. Ensure the cloudflared service or process is actively running on your server. 2. Check for server-side issues, such as the machine being powered off, an application crash, or recent network changes. |
Degraded | The cloudflared connector is running and the tunnel is serving traffic, but at least one individual connection has failed. Further degradation in tunnel availability could risk the tunnel going down and failing to serve traffic. | 1. Review your cloudflared logs for connection failures or error messages. 2. Investigate local network and firewall rules to ensure they are not blocking connections to the Cloudflare Tunnel IPs and ports. |
For more information, refer to the comprehensive list of Cloudflare 1xxx errors.
This error occurs when cloudflared
does not recognize the SSL/TLS certificate presented by your origin. To resolve the issue, set the origin server name parameter to the hostname on your origin certificate. Here is an example of a locally-managed tunnel configuration:
ingress: - hostname: test.example.com service: https://localhost:443 originRequest: originServerName: test.example.com
This means that your cloudflared access
client is unable to reach your cloudflared tunnel
origin.
To diagnose this, you should look at the cloudflared tunnel
logs. A very often root cause is that the cloudflared tunnel
is unable to proxy to your origin (e.g. because the ingress is mis-configured, or the origin is down, or because the origin HTTPS certificate cannot be validated by cloudflared tunnel
).
If cloudflared tunnel
has no logs, it means Cloudflare Edge is not even able to route the websocket traffic to it.
There are a few different possible root causes behind the websocket: bad handshake
error:
-
Your
cloudflared tunnel
is either not running or not connected to Cloudflare Edge. -
WebSockets are not enabled.
-
Your Cloudflare account has Universal SSL enabled but your SSL/TLS encryption mode is set to Off (not secure). To resolve:
- On the Cloudflare dashboard for your zone, go to SSL/TLS > Overview.
- Ensure that your SSL/TLS encryption mode is set to either Flexible, Full or Full (strict).
-
Your requests are blocked by Super Bot Fight Mode. To resolve, make sure you set Definitely automated to Allow in the bot fight mode settings.
-
Your SSH or RDP Access application has the Binding Cookie enabled. To disable the cookie, go to Access > Applications and edit the application settings.
-
One or more Workers routes are overlapping with the tunnel hostname, and the Workers do not properly handle the traffic. To resolve, you could either exclude your tunnel from the Worker route by not defining a route that includes the tunnel's hostname or update your Worker to only handle specific paths and forward all other requests to the origin, for example, by using
return fetch(req)
.
Long-lived connections initiated through the Cloudflare Zero Trust platform, such as SSH sessions, can last up to eight hours. However, disruptions along the service path may result in more frequent disconnects. Often, these disconnects are caused by regularly scheduled maintenance events such as data center, server, or service updates and restarts. If you believe these events are not the cause of disconnects in your environment, collect the relevant WARP logs and Tunnel logs and contact Support.
If cloudflared
returns error error="remote error: tls: handshake failure"
, check to make sure the hostname in question is covered by a SSL certificate. If using a multi-level subdomain, an advanced certificate may be required as the Universal SSL will not cover more than one level of subdomain. This may surface in the browser as ERR_SSL_VERSION_OR_CIPHER_MISMATCH
.
If your Cloudflare Tunnel logs returns a socket: too many open files
error, it means that cloudflared
has exhausted the open files limit on your machine. The maximum number of open files, or file descriptors, is an operating system setting that determines how many files a process is allowed to open. To increase the open file limit, you will need to configure ulimit settings on the machine running cloudflared
.
This buffer size increase is reported by the quic-go library ↗ leveraged by cloudflared ↗. You can learn more about the log message in the quic-go repository ↗. This log message is generally not impactful and can be safely ignored when troubleshooting. However, if you have deployed cloudflared
within a unique, high-bandwidth environment then buffer size can be manually overridden for testing purposes.
To set the maximum receive buffer size on Linux:
- Create a new file under
/etc/sysctl.d/
:
sudo vi 98-core-rmem-max.conf
- In the file, define the desired buffer size:
net.core.rmem_max=2500000
-
Reboot the host machine running
cloudflared
. -
To validate that these changes have taken effect, use the
grep
command:
sudo sysctl -a | grep net.core.rmem_max
net.core.rmem_max = 2500000
To ping an IP address behind Cloudflare Tunnel, your system must allow ICMP traffic through cloudflared
. For configuration instructions, refer to the ICMP proxy documentation.
Proxied traffic through Cloudflare Tunnel is buffered by default unless the origin server includes the response header Content-Type: text/event-stream
. The Content-Type: text/event-stream
response header tells cloudflared
to stream data as it arrives instead of buffering the entire response.
This error occurs when you try to add a CIDR route that falls within Cloudflare WARP's CGNAT IP range. The 100.96.0.0/12
range, which covers addresses from 100.96.0.1
to 100.111.255.254
, is reserved for internal WARP routing and cannot be added as a Cloudflare Tunnel route. To connect your private network, you will need to change its IP/CIDR so that it does not overlap with 100.96.0.0/12
.
Troubleshooting - Browse other Cloudflare One-related troubleshooting errors and solutions.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Directory
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- © 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark
-