Analytics Release Notes

Last updated: Feb 19, 2026

  • Feb 17, 2026
    • Date parsed from source:
      Feb 17, 2026
    • First seen by Releasebot:
      Feb 19, 2026

    Analytics by Cloudflare

    Cloudflare One Product Name Updates

    Cloudflare refreshes Networking branding to clearly map products to Zero Trust and SASE. Old names are retired in favor of descriptive labels while all functionality and billing remain unchanged.

    We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.
    We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.

    What’s changing

    • Magic WAN -> Cloudflare WAN
    • Magic WAN IPsec -> Cloudflare IPsec
    • Magic WAN GRE -> Cloudflare GRE
    • Magic WAN Connector -> Cloudflare One Appliance
    • Magic Firewall -> Cloudflare Network Firewall
    • Magic Network Monitoring -> Network Flow
    • Magic Cloud Networking -> Cloudflare One Multi-cloud Networking

    No action is required by you; all functionality, existing configurations, and billing will remain exactly the same.

    For more information, visit the
    Cloudflare One documentation.

    Original source Report a problem
  • Feb 12, 2026
    • Date parsed from source:
      Feb 12, 2026
    • First seen by Releasebot:
      Feb 12, 2026

    Analytics by Cloudflare

    Content Type Dimension for AI Bots in Cloudflare Radar

    Radar now shows content type insights for AI bot and crawler traffic, introducing a content_type dimension and filters. Access distributions by MIME category via new API endpoints and bot pages for AI crawlers.

    Radar now includes content type insights

    Radar now includes content type insights for AI bot and crawler traffic. The new content_type dimension and filter shows the distribution of content types returned to AI crawlers, grouped by MIME type category.

    The content type dimension and filter are available via the following API endpoints

    • /ai/bots/summary/content_type
    • /ai/bots/timeseries_groups/content_type

    Content type categories

    • HTML - Web pages (text/html)
    • Images - All image formats (image/*)
    • JSON - JSON data and API responses (application/json, *+json)
    • JavaScript - Scripts (application/javascript, text/javascript)
    • CSS - Stylesheets (text/css)
    • Plain Text - Unformatted text (text/plain)
    • Fonts - Web fonts (font/, application/font-)
    • XML - XML documents and feeds (text/xml, application/xml, application/rss+xml, application/atom+xml)
    • YAML - Configuration files (text/yaml, application/yaml)
    • Video - Video content and streaming (video/*, application/ogg, *mpegurl)
    • Audio - Audio content (audio/*)
    • Markdown - Markdown documents (text/markdown)
    • Documents - PDFs, Office documents, ePub, CSV (application/pdf, application/msword, text/csv)
    • Binary - Executables, archives, WebAssembly (application/octet-stream, application/zip, application/wasm)
    • Serialization - Binary API formats (application/protobuf, application/grpc, application/msgpack)
    • Other - All other content types

    Additionally, individual bot information pages ↗ now display content type distribution for AI crawlers that exist in both the Verified Bots and AI Bots datasets.

    Check out the AI Insights page ↗ to explore the data.

    Original source Report a problem
  • All of your release notes in one feed

    Join Releasebot and get updates from Cloudflare and hundreds of other software products.

  • February 2026
    • No date parsed from source.
    • First seen by Releasebot:
      Feb 11, 2026

    Analytics by Cloudflare

    Enhanced Logo Matching for Brand Protection

    Brand Protection unveils a major Logo Matching upgrade with a redesigned model and UI. New configurable thresholds from 75%, visible visual match scores, and direct logo previews in the Cloudflare dashboard speed triage and catch subtle impersonations.

    What’s new

    • Configurable match thresholds: Users can set a minimum match score (starting at 75%) when creating a logo query to capture subtle variations or high-quality impersonations.
    • Visual match scores: Allow users to see the exact percentage of the match directly in the results table, highlighted with color-coded lozenges to indicate severity.
    • Direct logo previews: Available in the Cloudflare dashboard — similar to string matches — to verify infringements at a glance.

    Key benefits

    • Expose sophisticated impersonators who use slightly altered logos to bypass basic detection filters.
    • Faster triage of the most relevant threats immediately using visual indicators, reducing the time spent manually reviewing matches.

    Ready to protect your visual identity? Learn more in our Brand Protection documentation.

    Original source Report a problem
  • Feb 3, 2026
    • Date parsed from source:
      Feb 3, 2026
    • First seen by Releasebot:
      Feb 5, 2026

    Analytics by Cloudflare

    Threat actor identification with "also known as" aliases

    Cloudflare Threat Events add an Also known as alias field in both dashboard and API, aligning attacker names with industry standards. Easily map to other vendors and quickly see matches with monitored groups. Check Threat Events API docs for access details.

    Identifying threat actors can be challenging, because naming conventions often vary across the security industry. To simplify your research, Cloudflare Threat Events now include an Also known as field, providing a list of common aliases and industry-standard names for the groups we track.

    This new field is available in both the Cloudflare dashboard and via the API. In the dashboard, you can view these aliases by expanding the event details side panel (under the Attacker field) or by adding it as a column in your configurable table view.

    Key benefits

    • Easily map Cloudflare-tracked actors to the naming conventions used by other vendors without manual cross-referencing.
    • Quickly identify if a detected threat actor matches a group your team is already monitoring via other intelligence feeds.

    For more information on how to access this data, refer to the Threat Events API documentation 1.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 15, 2026
    • Modified by Releasebot:
      Jan 28, 2026

    Analytics by Cloudflare

    Network Services navigation update

    Cloudflare overhaul of the Network Services dashboard aligns navigation with solutions like Magic Transit, Magic WAN, and Magic Firewall. A new Overview page, renamed policies, and reorganized Routes, Connectors, and Insights streamline setup while preserving existing configurations.

    Network Services dashboard update

    The Network Services menu structure in Cloudflare's dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.

    Your existing configurations will remain the same, and you will have access to all of the same features and functionality.

    The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to Magic Transit, Magic WAN, and Magic Firewall.

    Summary of changes

    • A new Overview page provides access to the most common tasks across Magic Transit and Magic WAN.
    • Product names have been removed from top-level navigation.
    • Magic Transit and Magic WAN configuration is now organized under Routes and Connectors. For example, you will find IP Prefixes under Routes, and your GRE/IPsec Tunnels under Connectors.
    • Magic Firewall policies are now called Firewall Policies.
    • Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as Appliances and Appliance profiles. They can be found under Connectors > Appliances.
    • Network analytics, network health, and real-time analytics are now available under Insights.
    • Packet Captures are found under Insights > Diagnostics.
    • You can manage your Sites from Insights > Network health.
    • You can find Magic Network Monitoring under Insights > Network flow.

    If you would like to provide feedback, complete this form. You can also find these details in the January 7, 2026 email titled [FYI] Upcoming Network Services Dashboard Navigation Update.

    Original source Report a problem
  • Jan 14, 2026
    • Date parsed from source:
      Jan 14, 2026
    • First seen by Releasebot:
      Jan 14, 2026

    Analytics by Cloudflare

    URL Scanner now supports PDF report downloads

    Cloudflare URL Scanner now supports exporting a PDF report from the dashboard, letting teams save and share consolidated scan results in a single file. It bundles screenshots, signatures and metadata for easy sharing with non technical stakeholders.

    We have expanded the reporting capabilities of the Cloudflare URL Scanner. In addition to existing JSON and HAR exports, users can now generate and download a PDF report directly from the Cloudflare dashboard. This update streamlines how security analysts can share findings with stakeholders who may not have access to the Cloudflare dashboard or specialized tools to parse JSON and HAR files.

    Key Benefits

    • Consolidate scan results, including screenshots, security signatures, and metadata, into a single, portable document
    • Easily share professional-grade summaries with non-technical stakeholders or legal teams for faster incident response

    What’s new

    • PDF Export Button: A new download option is available in the URL Scanner results page within the Cloudflare dashboard
    • Unified Documentation: Access all scan details—from high-level summaries to specific security flags—in one offline-friendly file

    To get started with the URL Scanner and explore our reporting capabilities, visit the URL Scanner API documentation ↗.

    Original source Report a problem
  • Jan 12, 2026
    • Date parsed from source:
      Jan 12, 2026
    • First seen by Releasebot:
      Jan 12, 2026

    Analytics by Cloudflare

    Cloudflare Threat Events now support STIX2 format

    Cloudflare Threat Events now supports STIX2, making integration with TIPs, SIEMs and SOAR tools seamless. The standard format clarifies relationships between indicators and actors for faster threat analysis. See Threat Events API docs for querying details.

    We are excited to announce that Cloudflare Threat Events now supports the STIX2 (Structured Threat Information Expression) format. This was a highly requested feature designed to streamline how security teams consume and act upon our threat intelligence.

    By adopting this industry-standard format, you can now integrate Cloudflare's threat events data more effectively into your existing security ecosystem.

    Key benefits

    • Eliminate the need for custom parsers, as STIX2 allows for "out of the box" ingestion into major Threat Intel Platforms (TIPs), SIEMs, and SOAR tools.
    • STIX2 provides a standardized way to represent relationships between indicators, sightings, and threat actors, giving your analysts a clearer picture of the threat landscape.

    For technical details on how to query events using this format, please refer to our Threat Events API Documentation ↗.

    Original source Report a problem
  • Jan 7, 2026
    • Date parsed from source:
      Jan 7, 2026
    • First seen by Releasebot:
      Jan 7, 2026

    Analytics by Cloudflare

    Workers Analytics Engine SQL now supports filtering using HAVING and LIKE

    Workers Analytics Engine now supports HAVING for post‑aggregation filtering and LIKE/ILIKE pattern matching with wildcards. This enables filtering groups by aggregates and flexible text searches in SQL queries. Learn more in the SQL reference.

    You can now use the HAVING clause and LIKE pattern matching operators in Workers Analytics Engine

    Workers Analytics Engine allows you to ingest and store high-cardinality data at scale and query your data through a simple SQL API.

    Filtering using HAVING

    The HAVING clause complements the WHERE clause by enabling you to filter groups based on aggregate values. While WHERE filters rows before aggregation, HAVING filters groups after aggregation is complete.

    You can use HAVING to filter groups where the average exceeds a threshold:

    SELECT
      blob1 AS probe_name,
      avg(double1) AS average_temp
    FROM temperature_readings
    GROUP BY probe_name
    HAVING average_temp > 10
    

    You can also filter groups based on aggregates such as the number of items in the group:

    SELECT
      blob1 AS probe_name,
      count() AS num_readings
    FROM temperature_readings
    GROUP BY probe_name
    HAVING num_readings > 100
    

    Pattern matching using LIKE

    The new pattern matching operators enable you to search for strings that match specific patterns using wildcard characters:

    • LIKE - case-sensitive pattern matching
    • NOT LIKE - case-sensitive pattern exclusion
    • ILIKE - case-insensitive pattern matching
    • NOT ILIKE - case-insensitive pattern exclusion

    Pattern matching supports two wildcard characters: % (matches zero or more characters) and _ (matches exactly one character).

    You can match strings starting with a prefix:

    SELECT
      *
    FROM logs
    WHERE blob1 LIKE 'error%'
    

    You can also match file extensions (case-insensitive):

    SELECT
      *
    FROM requests
    WHERE blob2 ILIKE '%.jpg'
    

    Another example is excluding strings containing specific text:

    SELECT
      *
    FROM events
    WHERE blob3 NOT ILIKE '%debug%'
    

    Ready to get started?

    Learn more about the HAVING clause or pattern matching operators in the Workers Analytics Engine SQL reference documentation.

    Original source Report a problem
  • Dec 11, 2025
    • Date parsed from source:
      Dec 11, 2025
    • First seen by Releasebot:
      Dec 16, 2025

    Analytics by Cloudflare

    SentinelOne as Logpush destination

    Cloudflare Logpush now supports SentinelOne as a native destination.

    Logs from Cloudflare can be sent to SentinelOne AI SIEM via Logpush. The destination can be configured through the Logpush UI in the Cloudflare dashboard or by using the Logpush API.

    Destination Configuration

    For more information, refer to the Destination Configuration documentation.

    Original source Report a problem
  • Nov 24, 2025
    • Date parsed from source:
      Nov 24, 2025
    • First seen by Releasebot:
      Nov 25, 2025
    • Modified by Releasebot:
      Jan 12, 2026

    Analytics by Cloudflare

    Cloud Services Observability in Cloudflare Radar

    Radar adds HTTP Origins insights for visibility into traffic between Cloudflare and origin infrastructure. The new Origins API exposes endpoints to list origins, fetch time series, and summarize requests, with extended anomaly and outage detection.

    Radar introduces HTTP Origins insights

    providing visibility into the status of traffic between Cloudflare's global network and cloud-based origin infrastructure.

    The new Origins API provides provides the following endpoints:

    • /origins - Lists all origins (cloud providers and associated regions).
    • /origins/{origin} - Retrieves information about a specific origin (cloud provider).
    • /origins/timeseries - Retrieves normalized time series data for a specific origin, including the following metrics:
      • REQUESTS: Number of requests
      • CONNECTION_FAILURES: Number of connection failures
      • RESPONSE_HEADER_RECEIVE_DURATION: Duration of the response header receive
      • TCP_HANDSHAKE_DURATION: Duration of the TCP handshake
      • TCP_RTT: TCP round trip time
      • TLS_HANDSHAKE_DURATION: Duration of the TLS handshake
    • /origins/summary - Retrieves HTTP requests to origins summarized by a dimension.
    • /origins/timeseries_groups - Retrieves timeseries data for HTTP requests to origins grouped by a dimension.

    The following dimensions are available for the summary and timeseries_groups endpoints:

    • region: Origin region
    • success_rate: Success rate of requests (2XX versus 5XX response codes)
    • percentile: Percentiles of metrics listed above

    Additionally, the Annotations and Traffic Anomalies APIs have been extended to support origin outages and anomalies, enabling automated detection and alerting for origin infrastructure issues.

    Check out the new Radar page ↗.

    Original source Report a problem

Related products