Application Performance Release Notes

Last updated: Dec 10, 2025

  • Nov 25, 2025
    • Parsed from source:
      Nov 25, 2025
    • Detected by Releasebot:
      Dec 10, 2025

    Application Performance by Cloudflare

    Audit Logs for Cache Purge Events

    New detailed audit logs for cache purge events let you see who, what, and when for purge requests across all methods, with dashboard and API access.

    Audit logs for purge events

    You can now review detailed audit logs for cache purge events, giving you visibility into what purge requests were sent, what they contained, and by whom. Audit your purge requests via the Dashboard or API for all purge methods:

    • Purge everything
    • List of prefixes
    • List of tags
    • List of hosts
    • List of files

    Example

    The detailed audit payload is visible within the Cloudflare Dashboard (under Manage Account > Audit Logs ) and via the API. Below is an example of the Audit Logs v2 payload structure:

    {
      "action": {
        "result": "success",
        "type": "create"
      },
      "actor": {
        "id": "1234567890abcdef",
        "email": "[email protected]",
        "type": "user"
      },
      "resource": {
        "product": "purge_cache",
        "request": {
          "files": [
            "https://example.com/images/logo.png",
            "https://example.com/css/styles.css"
          ]
        },
      },
      "zone": {
        "id": "023e105f4ecef8ad9ca31a8372d0c353",
        "name": "example.com"
      }
    }
    

    Get started

    To get started, refer to the Audit Logs documentation.

    Original source Report a problem
  • Nov 7, 2025
    • Parsed from source:
      Nov 7, 2025
    • Detected by Releasebot:
      Dec 10, 2025

    Application Performance by Cloudflare

    Inspect Cache Keys with Cloudflare Trace

    Cloudflare Trace now shows the exact cache key for each request, helping you troubleshoot hits and misses and verify custom cache keys from Cache Rules or Page Rules. Access Trace via dashboard or API for ad hoc debugging or automated monitoring.

    Example scenario

    You can now see the exact cache key generated for any request directly in Cloudflare Trace. This visibility helps you troubleshoot cache hits and misses, and verify that your Custom Cache Keys 1 configured via Cache Rules or Page Rules 2 are working as intended.

    Previously, diagnosing caching behavior required inferring the key from configuration settings. Now, you can confirm that your custom logic for headers, query strings, and device types is correctly applied.

    Access Trace via the dashboard or API, either manually for ad-hoc debugging or automated as part of your quality-of-service monitoring.

    If you have a Cache Rule that segments content based on a specific cookie (for example, user_region ), run a Trace with that cookie present to confirm the user_region value appears in the resulting cache key.

    The Trace response includes the cache key in the cache object:

    {
      "step_name": "request",
      "type": "cache",
      "matched": true,
      "public_name": "Cache Parameters",
      "cache": {
        "key": {
          "zone_id": "023e105f4ecef8ad9ca31a8372d0c353",
          "scheme": "https",
          "host": "example.com",
          "uri": "/images/hero.jpg"
        },
        "key_string": "023e105f4ecef8ad9ca31a8372d0c353::::https://example.com/images/hero.jpg:::::"
      }
    }
    

    Get started

    To learn more, refer to the Trace documentation and our guide on Custom Cache Keys.

    Original source Report a problem
  • Oct 30, 2025
    • Parsed from source:
      Oct 30, 2025
    • Detected by Releasebot:
      Nov 1, 2025
    • Modified by Releasebot:
      Dec 10, 2025

    Application Performance by Cloudflare

    New TCP-based fields available in Rulesets

    Cloudflare introduces two new Ruleset fields to tailor policies by transport and performance. Distinguish TCP from QUIC traffic and route high latency requests using cf.edge.client_tcp and cf.timings.client_tcp_rtt_msec.

    Cloudflare now provides two new request fields in the Ruleset engine that let you make decisions based on whether a request used TCP and the measured TCP round-trip time between the client and Cloudflare. These fields help you understand protocol usage across your traffic and build policies that respond to network performance. For example, you can distinguish TCP from QUIC traffic or route high latency requests to alternative origins when needed.

    New fields

    Field Type Description cf.edge.client_tcp Boolean Indicates whether the request used TCP. A value of true means the client connected using TCP instead of QUIC. cf.timings.client_tcp_rtt_msec Number Reports the smoothed TCP round-trip time between the client and Cloudflare in milliseconds. For example, a value of 20 indicates roughly twenty milliseconds of RTT.

    Example filter expression:

    cf.edge.client_tcp && cf.timings.client_tcp_rtt_msec < 100
    

    More information can be found in the Rules language fields reference.

    Original source Report a problem
  • Oct 16, 2025
    • Parsed from source:
      Oct 16, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    Monitor Groups for Advanced Health Checking With Load Balancing

    Cloudflare Load Balancing adds Monitor Groups to unify multiple health checks into a single group for smarter failover. Combine monitors, mark ones as observation only, and get holistic latency-based steering across all active checks. Available via API for Enterprise Load Balancing customers.

    Cloudflare Load Balancing Monitor Groups

    Cloudflare Load Balancing now supports Monitor Groups, a powerful new way to combine multiple health monitors into a single, logical group. This allows you to create sophisticated health checks that more accurately reflect the true availability of your applications by assessing multiple services at once.

    With Monitor Groups, you can ensure that all critical components of an application are healthy before sending traffic to an origin pool, enabling smarter failover decisions and greater resilience. This feature is now available via the API for customers with an Enterprise Load Balancing subscription.

    What you can do

    • Combine Multiple Monitors: Group different health monitors (for example, HTTP, TCP) that check various application components, like a primary API gateway and a specific /login service.
    • Isolate Monitors for Observation: Mark a monitor as "monitoring only" to receive alerts and data without it affecting a pool's health status or traffic steering. This is perfect for testing new checks or observing non-critical dependencies.
    • Improve Steering Intelligence: Latency for Dynamic Steering is automatically averaged across all active monitors in a group, providing a more holistic view of an origin's performance.

    This enhancement is ideal for complex, multi-service applications where the health of one component depends on another. By aggregating health signals, Monitor Groups provide a more accurate and comprehensive assessment of your application's true status.

    For detailed information and API configuration guides, please visit our developer documentation for Monitor Groups.

    Original source Report a problem
  • Sep 16, 2025
    • Parsed from source:
      Sep 16, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    DNS Firewall Analytics — now in the Cloudflare dashboard

    Cloudflare adds GraphQL-powered DNS Firewall analytics in the dashboard with interactive panels for trends, statistics, and data-center views. Filter by dimensions, view up to 62 days of data, and access is available to all DNS Firewall customers. A new analytics feature to inform security and performance decisions.

    Access GraphQL-powered DNS Firewall analytics directly in the Cloudflare dashboard.

    Explore Four Interactive Panels

    • Query summary: Describes trends over time, segmented by dimensions.
    • Query statistics: Describes totals, cached/uncached queries, and processing/response times.
    • DNS queries by data center: Describes global view and the top 10 data centers.
    • Top query statistics: Shows a breakdown by key dimensions, with search and expand options (up to top 100 items).

    Additional features:

    • Apply filters and time ranges once. Changes reflect across all panels.
    • Filter by dimensions like query name, query type, cluster, data center, protocol (UDP/TCP), IP version, response code/reason, and more.
    • Access up to 62 days of historical data with flexible intervals.

    Availability

    Available to all DNS Firewall customers as part of their existing subscription.

    Where to Find It

    • In the Cloudflare dashboard, go to the DNS Firewall page.
    • Go to DNS Firewall
    • Refer to the DNS Firewall Analytics to learn more.
    Original source Report a problem
  • Aug 25, 2025
    • Parsed from source:
      Aug 25, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    Manage and deploy your AI provider keys through Bring Your Own Key (BYOK) with AI Gateway, now powered by Cloudflare Secrets Store

    Cloudflare Secrets Store now integrates with AI Gateway, enabling BYO AI keys managed securely by reference rather than exposed in headers. Create secrets from the gateway, wrangler, dashboard, or API and use the Secrets Store reference in requests with curl or JavaScript examples.

    Cloudflare Secrets Store integration with AI Gateway

    Cloudflare Secrets Store is now integrated with AI Gateway, allowing you to store, manage, and deploy your AI provider keys in a secure and seamless configuration through Bring Your Own Key. Instead of passing your AI provider keys directly in every request header, you can centrally manage each key with Secrets Store and deploy in your gateway configuration using only a reference, rather than passing the value in plain text.

    You can now create a secret directly from your AI Gateway in the dashboard by navigating into your gateway -> Provider Keys -> Add .

    You can also create your secret with the newly available ai_gateway scope via wrangler, the Secrets Store dashboard, or the API .

    Then, pass the key in the request header using its Secrets Store reference:
    curl -X POST https://gateway.ai.cloudflare.com/v1//my-gateway/anthropic/v1/messages
    --header 'cf-aig-authorization: ANTHROPIC_KEY_1
    --header 'anthropic-version: 2023-06-01'
    --header 'Content-Type: application/json'
    --data '{"model": "claude-3-opus-20240229", "messages": [{"role": "user", "content": "What is Cloudflare?"}]}'

    Or, using Javascript:
    import Anthropic from '@anthropic-ai/sdk';

    const anthropic = new Anthropic({
    apiKey: "ANTHROPIC_KEY_1",
    baseURL: "https://gateway.ai.cloudflare.com/v1//my-gateway/anthropic",
    });

    const message = await anthropic.messages.create({
    model: 'claude-3-opus-20240229',
    messages: [{role: "user", content: "What is Cloudflare?"}],
    max_tokens: 1024
    });

    For more information, check out the blog !

    Original source Report a problem
  • Aug 15, 2025
    • Parsed from source:
      Aug 15, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    Steer Traffic by AS Number in Load Balancing Custom Rules

    You can now create more granular, network-aware Custom Rules in Cloudflare Load Balancing using the Autonomous System Number (ASN) of an incoming request.

    This allows you to steer traffic with greater precision based on the network source of a request. For example, you can route traffic from specific Internet Service Providers (ISPs) or enterprise customers to dedicated infrastructure, optimize performance, or enforce compliance by directing certain networks to preferred data centers.

    To get started, create a Custom Rule in your Load Balancer and select AS Num from the Field dropdown.

    Original source Report a problem
  • Aug 6, 2025
    • Parsed from source:
      Aug 6, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    Improvements to Monitoring Using Zone Settings

    Cloudflare Load Balancing Monitors migrate to new infrastructure to boost reliability, performance and accuracy of zone monitoring. Expect stronger authenticated origin pulls, Argo Smart Routing, HTTP/2 to origin, improved retries and redirects, with no expected health changes for existing pools.

    Cloudflare Load Balancing Monitors

    Cloudflare Load Balancing Monitors support loading and applying settings for a specific zone to monitoring requests to origin endpoints. This feature has been migrated to new infrastructure to improve reliability, performance, and accuracy.

    All zone monitors have been tested against the new infrastructure. There should be no change to health monitoring results of currently healthy and active pools. Newly created or re-enabled pools may need validation of their monitor zone settings before being introduced to service, especially regarding correct application of mTLS.

    What you can expect:

    • More reliable application of zone settings to monitoring requests, including
      • Authenticated Origin Pulls
      • Aegis Egress IP Pools
      • Argo Smart Routing
      • HTTP/2 to Origin
      • Improved support and bug fixes for retries, redirects, and proxied origin resolution
      • Improved performance and reliability of monitoring requests withing the Cloudflare network
      • Unrelated CDN or WAF configuration changes should have no risk of impact to pool health
    Original source Report a problem
  • Jun 19, 2025
    • Parsed from source:
      Jun 19, 2025
    • Detected by Releasebot:
      Oct 27, 2025
    • Modified by Releasebot:
      Nov 27, 2025

    Application Performance by Cloudflare

    Account-level DNS analytics now available via GraphQL Analytics API

    Cloudflare adds account‑level DNS analytics via the GraphQL Analytics API, letting you query cross‑zone DNS data across your entire account with an account filter. Includes sample NXDOMAIN queries and links to DNS Analytics docs for getting started.

    GraphQL example for account-level DNS analytics

    Authoritative DNS analytics are now available on the account level via the Cloudflare GraphQL Analytics API.

    This allows users to query DNS analytics across multiple zones in their account, by using the accounts filter.

    Here is an example to retrieve the most recent DNS queries across all zones in your account that resulted in an NXDOMAIN response over a given time frame. Please replace a30f822fcd7c401984bf85d8f2a5111c with your actual account ID.

    GraphQL example for account-level DNS analytics

    query GetLatestNXDOMAINResponses {
      viewer {
        accounts(filter: {accountTag: "a30f822fcd7c401984bf85d8f2a5111c"}) {
          dnsAnalyticsAdaptive(filter: {date_geq: "2025-06-16", date_leq: "2025-06-18", responseCode: "NXDOMAIN"}, limit: 10000, orderBy: [datetime_DESC]) {
            zoneTag
            queryName
            responseCode
            queryType
            datetime
          }
        }
      }
    }
    

    To learn more and get started, refer to the DNS Analytics documentation.

    Original source Report a problem
  • Jun 16, 2025
    • Parsed from source:
      Jun 16, 2025
    • Detected by Releasebot:
      Oct 27, 2025

    Application Performance by Cloudflare

    Internal DNS (beta) now manageable in the Cloudflare dashboard

    Cloudflare enables fully configurable Internal DNS in the dashboard for beta participants. Enterprise customers can create and manage internal zones, map private hostnames, and resolve DNS securely through Gateway with split-horizon DNS. The beta centralizes internal and public DNS management in one platform.

    Participating beta testers can now fully configure Internal DNS directly in the Cloudflare dashboard.

    Internal DNS enables customers to:

    • Map internal hostnames to private IPs for services, devices, and applications not exposed to the public Internet
    • Resolve internal DNS queries securely through Cloudflare Gateway
    • Use split-horizon DNS to return different responses based on network context
    • Consolidate internal and public DNS zones within a single management platform

    What’s new in this release:

    • Beta participants can now create and manage internal zones and views in the Cloudflare dashboard

    Note

    The Internal DNS beta is currently only available to Enterprise customers.

    To learn more and get started, refer to the Internal DNS documentation.

    Original source Report a problem

Related products