Changelog
You can now manage Snippets using Terraform. For more information, refer to Configure Snippets using Terraform.
You can now connect to R2 buckets in Cloud Connector.
The new simplified user interface for URL Rewrites is now live, making it easier for users to configure URL rewrites with wildcard support. This update streamlines the process by eliminating the need for complex functions in rule creation. The updated user interface is available at Rules > Transform Rules > Rewrite URL. For more information, refer to the wildcard support documentation.
The Cloudflare dashboard now automatically validates DNS records and Cloudflare for SaaS custom hostnames for rules targeting specific hostnames or URLs. To prevent misconfigured rules and ensure smoother deployments, you will get proactive warnings for missing or misconfigured DNS records and custom hostnames.
Compression Rules now support Zstandard compression and are available in all Cloudflare plans. Users in the Free plan will gradually get access throughout 2024.
Cloudflare Snippets have transitioned from alpha to beta.
You can now use the wildcard_replace()
function in rewrite expressions of URL rewrites.
The new Rules > Templates page in the Cloudflare dashboard allows you to create common rules with a single click, featuring dozens of pre-built templates. You can also access these templates directly from each product's rule builder. Also, explore the Examples gallery in the developer docs for real-world use cases and inspiration.
The simplified UI for Single Redirects is now available to all users, making URL redirects easier and more intuitive. This update builds on the recent wildcard support in Ruleset Engine products. Access the new UI under Rules > Redirect Rules. Learn more about wildcard support and our open-source Rust crate in the blog post.
Cloud Connector (beta) is now available to all customers. For setup details, refer to the documentation, explore examples, and check out the blog post.
Cloud Connector (beta) is now available to all free and a subset of paid customers. This rollout will be gradually extended to all Cloudflare users, simplifying multi-cloud management and enhancing integration with Cloudflare's Connectivity Cloud. For more information, refer to the blog post.
Cloudflare Snippets (alpha) now allow multiple subrequests depending on your plan. For more information, refer to the Availability.
Wildcards are now supported across our Ruleset Engine-based products, including Single Redirects, Cache Rules, Transform Rules, WAF, Waiting Room, and more:
- You can now use the
wildcard
andstrict wildcard
operators with any string field in the Ruleset Engine, such as full URI, host, headers, cookies, user-agent, and country. For more details, refer to Operators and Wildcard matching. - In Single Redirects, the
wildcard_replace()
function allows you to use segments matched by thewildcard
andstrict wildcard
operators in redirect URL targets. For more information, refer to Functions.
Cloudflare Snippets (alpha) are now available to all paid customers.
Cloudflare Snippets (alpha) are now available to all Enterprise customers. Customers in other paid plans will gradually get access throughout 2024.
The Page Rules migration guide is now available for users interested in transitioning to modern Rules features instead of Page Rules. Explore the guide for detailed instructions on migrating your configurations.
You can now turn off Cloudflare Web Analytics, also known as Real User Monitoring (RUM), for specific requests using a configuration rule.
You can now turn on or off Cloudflare Fonts for specific requests using a configuration rule.
Customers can now use new fields cf.tls_client_hello_length
(the length of the client hello message sent in a TLS handshake), cf.tls_client_random
(the value of the 32-byte random value provided by the client in a TLS handshake), and cf.tls_client_extensions_sha1
(the SHA-1 fingerprint of TLS client extensions) in various products built on Ruleset Engine.
Customers can now use arbitrary port numbers in Host Header Override in Origin Rules. Previously, only hostname was allowed as a value (for example, example.com
). Now, you can set the value to hostname:port
(for example, example.com:1234
) as well.