Consumer Services Release Notes
Last updated: Mar 10, 2026
- Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 10, 2026
Consumer Services by Cloudflare
Workflow steps now expose retry attempt number via step context
Cloudflare Workflows adds per-step retry context by exposing ctx.attempt in step.do() for better logging, backoff, and conditional logic.
Cloudflare Workflows retry logic
Cloudflare Workflows allows you to configure specific retry logic for each step in your workflow execution. Now, you can access which retry attempt is currently executing for calls to
step.do():
// ctx.attempt is 1 on first try, 2 on first retry, etc. console.log(`Attempt ${ctx.attempt}`);You can use the step context for improved logging & observability, progressive backoff, or conditional logic in your workflow definition.
Note that the current attempt number is 1-indexed. For more information on retry behavior, refer to Sleeping and Retrying.
Sleeping and Retrying
Original source Report a problem - Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 9, 2026
Consumer Services by Cloudflare
Real-time transcription in RealtimeKit now supports 10 languages with regional variants
Cloudflare unveils real-time transcription in RealtimeKit now supports 10 languages with regional variants powered by Nova-3 on Workers AI. Transcription runs end-to-end on Cloudflare’s network, reducing latency. Users set language per meeting; multilingual detection is available. Ideal for multilingual voice workflows.
Real-time transcription in RealtimeKit
Real-time transcription in RealtimeKit now supports 10 languages with regional variants, powered by Deepgram Nova-3 running on Workers AI.
During a meeting, participant audio is routed through AI Gateway to Nova-3 on Workers AI — so transcription runs on Cloudflare's network end-to-end, reducing latency compared to routing through external speech-to-text services.
Set the language when creating a meeting via ai_config.transcription.language :
{ { "ai_config": { "transcription": { "language": "fr" } } }Supported languages include English, Spanish, French, German, Hindi, Russian, Portuguese, Japanese, Italian, and Dutch — with regional variants like en-AU, en-GB, en-IN, en-NZ, es-419, fr-CA, de-CH, pt-BR, and pt-PT. Use multi for automatic multilingual detection.
If you are building voice agents or real-time translation workflows, your agent can now transcribe in the caller's language natively — no extra services or routing logic needed.
- Transcription docs
- Nova-3 model page
- Workers AI
- AI Gateway
All of your release notes in one feed
Join Releasebot and get updates from Cloudflare and hundreds of other software products.
- Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 6, 2026
Consumer Services by Cloudflare
Region Filtering, AS Traffic Volume, and Navigation Improvements on Cloudflare Radar
Cloudflare Radar unveils region filtering, new traffic volume view by top AS and locations, and expanded AS and location dimensions in Data Explorer. Users can filter by continents, subregions, political regions, and US Census regions, plus breadcrumb navigation enhances browsing across pages.
Radar ships several new features that improve the flexibility and usability of the platform, as well as visibility into what is happening on the Internet.
Region filtering
All location-aware pages now support filtering by region, including continents, geographic subregions (Middle East ↗, Eastern Asia ↗, etc.), political regions (EU ↗, African Union ↗), and US Census regions/divisions (for example, New England ↗, US Northeast ↗ ).
Traffic volume by top autonomous systems and locations
A new traffic volume view shows the top autonomous systems and countries/territories for a given location. This is useful for quickly determining which network providers in a location may be experiencing connectivity issues, or how traffic is distributed across a region.
The new AS and location dimensions have also been added to the Data Explorer ↗ for the HTTP, DNS, and NetFlows datasets. Combined with other available filters, this provides a powerful tool for generating unique insights.
Finally, breadcrumb navigation is now available on most pages, allowing easier navigation between parent and related pages.
Check out these features on Cloudflare Radar ↗ .
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 5, 2026
- Modified by Releasebot:Mar 6, 2026
Consumer Services by Cloudflare
Browser Rendering: 3x higher REST API request rate
Cloudflare increases REST API rate limits for Workers Paid plans to 10 requests per second enabling faster browser tasks and notes upcoming Bindings limits.
REST API rate limits for Workers Paid plans have been increased from 3 requests per second (180/min) to 10 requests per second (600/min). No action is needed to benefit from the higher limit.
The REST API lets you perform common browser tasks with a single API call, and you can now do it at a higher rate.
If you use the Workers Bindings method, increases to concurrent browser and new browser limits are coming soon. Stay tuned.
For full details, refer to the Browser Rendering limits page.
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 4, 2026
Consumer Services by Cloudflare
User risk score selector in Access policies
New features
You can now use user risk scores in your Access policies. The new User Risk Score selector allows you to create Access policies that respond to user behavior patterns detected by Cloudflare's risk scoring system, including impossible travel, high DLP policy matches, and more.
For more information, refer to Use risk scores in Access policies.
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 4, 2026
Consumer Services by Cloudflare
Gateway Authorization Proxy and hosted PAC files (open beta)
Cloudflare opens Gateway Authorization Proxy and PAC hosting in open beta across plans, replacing IP trust with identity-driven Access. Logs show exact user activity and policies can be set by identity; supports multiple IdPs and Cloudflare-hosted PAC files for easy deployment.
The Gateway Authorization Proxy and PAC file hosting are now in open beta for all plan types.
Previously, proxy endpoints relied on static source IP addresses to authorize traffic, providing no user-level identity in logs or policies. The new authorization proxy replaces IP-based authorization with Cloudflare Access authentication, verifying who a user is before applying Gateway filtering without installing the WARP client.
This is ideal for environments where you cannot deploy a device client, such as virtual desktops (VDI), mergers and acquisitions, or compliance-restricted endpoints.Key capabilities
- Identity-aware proxy traffic
- Users authenticate through your identity provider (Okta, Microsoft Entra ID, Google Workspace, and others) via Cloudflare Access. Logs now show exactly which user accessed which site, and you can write identity-based policies like "only the Finance team can access this accounting tool."
- Multiple identity providers
- Display one or multiple login methods simultaneously, giving flexibility for organizations managing users across different identity systems.
- Cloudflare-hosted PAC files
- Create and host PAC files directly in Cloudflare One with pre-configured templates for Okta and Azure, hosted at https://pac.cloudflare-gateway.com// on Cloudflare's global network.
- Simplified billing
- Each user occupies a seat, exactly like they do with the Cloudflare One Client. No new metrics to track.
Get started
- In Cloudflare One , Cloudflare One , go to Networks > Resolvers & Proxies > Proxy endpoints.
- Create an authorization proxy endpoint and configure Access policies.
- Create a hosted PAC file or write your own.
- Configure browsers to use the PAC file URL.
- Install the Cloudflare certificate for HTTPS inspection.
For more details, refer to the proxy endpoints documentation and the announcement blog post announcement blog post.
Original source Report a problem - Mar 3, 2026
- Date parsed from source:Mar 3, 2026
- First seen by Releasebot:Mar 3, 2026
Consumer Services by Cloudflare
Workflows step limit increased to 25,000 steps per instance
Workflows on Workers Paid now support up to 10,000 steps by default and can be tuned to 25,000 steps via wrangler.jsonc. This enables longer running executions without extra recursion. State limits stay at 100 MB (Free) or 1 GB (Paid).
Workflows on Workers
Each Workflow on Workers Paid now supports 10,000 steps by default, configurable up to 25,000 steps in your wrangler.jsonc file:
{ "workflows": [ { "name": "my-workflow", "binding": "MY_WORKFLOW", "class_name": "MyWorkflow", "limits": { "steps": 25000 } } ] }Previously, each instance was limited to 1,024 steps. Now, Workflows can support more complex, long-running executions without the additional complexity of recursive or child workflow calls.
Note that the maximum persisted state limit per Workflow instance remains 100 MB for Workers Free and 1 GB for Workers Paid. Refer to Workflows limits for more information.
Workflows limits
Refer to Workflows limits for more information.
Original source Report a problem - Mar 2, 2026
- Date parsed from source:Mar 2, 2026
- First seen by Releasebot:Mar 3, 2026
- Modified by Releasebot:Mar 3, 2026
Consumer Services by Cloudflare
Agents SDK v0.7.0: Observability rewrite, keepAlive, and waitForMcpConnections
The Agents SDK unveils a full observability rewrite using diagnostics channels, adds a keepAlive heartbeat to prevent Durable Object eviction during long tasks, and makes MCP connections wait to ensure tool availability. It also brings MCP dedupe and security improvements for safer, quicker tool access.
Observability rewrite
The latest release of the
Agents SDK ↗
Agents SDK
rewrites observability from scratch with
diagnostics_channel
, adds
keepAlive()
to prevent Durable Object eviction during long-running work, and introduces
waitForMcpConnections
so MCP tools are always available when
onChatMessage
runs.The previous observability system used
console.log()
with a custom
Observability.emit()
interface. v0.7.0 replaces it with structured events published to
diagnostics channels
— silent by default, zero overhead when nobody is listening.
Every event has a
type
,
payload
, and
timestamp
. Events are routed to seven named channels:- agents:state - state:update
- agents:rpc - rpc, rpc:error
- agents:message - message:request, message:response, message:clear, message:cancel, message:error, tool:result, tool:approval
- agents:schedule - schedule:create, schedule:execute, schedule:cancel, schedule:retry, schedule:error, queue:retry, queue:error
- agents:lifecycle - connect, destroy
- agents:workflow - workflow:start, workflow:event, workflow:approved, workflow:rejected, workflow:terminated, workflow:paused, workflow:resumed, workflow:restarted
- agents:mcp - mcp:client:preconnect, mcp:client:connect, mcp:client:authorize, mcp:client:discover
Use the typed
subscribe()
helper from
agents/observability
for type-safe access:keepAlive() and keepAliveWhile()
keepAlive()
and
keepAliveWhile()Durable Objects are evicted after a period of inactivity (typically 70-140 seconds with no incoming requests, WebSocket messages, or alarms). During long-running operations — streaming LLM responses, waiting on external APIs, running multi-step computations — the agent can be evicted mid-flight.
keepAlive()
prevents this by creating a 30-second heartbeat schedule. The alarm firing resets the inactivity timer. Returns a disposer function that cancels the heartbeat when called.Key details:
- Multiple concurrent callers — Each
keepAlive()
call returns an independent disposer. Disposing one does not affect others. - AIChatAgent built-in —
AIChatAgent
automatically calls
keepAlive()
during streaming responses. You do not need to add it yourself. - Uses the scheduling system — The heartbeat does not conflict with your own schedules. It shows up in
getSchedules()
if you need to inspect it.
Note
keepAlive()
is marked
@experimental
and may change between releases.
For the full API reference and when-to-use guidance, refer to
Schedule tasks — Keeping the agent alive
.waitForMcpConnections
AIChatAgent
now waits for MCP server connections to settle before calling
onChatMessage
. This ensures
this.mcp.getAITools()
returns the full set of tools, especially after Durable Object hibernation when connections are being restored in the background.Other improvements
- MCP deduplication by name and URL —
addMcpServer
with HTTP transport now deduplicates on both server name and URL. Calling it with the same name but a different URL creates a new connection. URLs are normalized before comparison (trailing slashes, default ports, hostname case). - callbackHost optional for non-OAuth servers —
addMcpServer
no longer requires
callbackHost
when connecting to MCP servers that do not use OAuth. - MCP URL security — Server URLs are validated before connection to prevent SSRF. Private IP ranges, loopback addresses, link-local addresses, and cloud metadata endpoints are blocked.
- Custom denial messages —
addToolOutput
now supports
state: "output-error"
with
errorText
for custom denial messages in human-in-the-loop tool approval flows. - requestId in chat options —
onChatMessage
options now include a
requestId
for logging and correlating events.
Upgrade
To update to the latest version:
Original source Report a problemnpm i agents@latest @cloudflare/ai-chat@latest - Mar 2, 2026
- Date parsed from source:Mar 2, 2026
- First seen by Releasebot:Mar 3, 2026
- Modified by Releasebot:Mar 3, 2026
Consumer Services by Cloudflare
Get started with AI Gateway automatically
Cloudflare unveils AI Gateway for one call access with automatic gateway ID creation. It centralizes logging, caching, rate limiting and routes to multiple AI providers from a single endpoint. Quick start with an API token and curl.
AI Gateway: Single API call
You can now start using AI Gateway with a single API call — no setup required. Use default as your gateway ID, and AI Gateway creates one for you automatically on the first request.
To try it out, create an API token with AI Gateway - Read, AI Gateway - Edit, and Workers AI - Read permissions, then run:
curl -X POST https://gateway.ai.cloudflare.com/v1/$CLOUDFLARE_ACCOUNT_ID/default/compat/chat/completions \ --header "cf-aig-authorization: Bearer $CLOUDFLARE_API_TOKEN" \ --header 'Content-Type: application/json' \ --data '{ "model": "workers-ai/@cf/meta/llama-3.3-70b-instruct-fp8-fast", "messages": [ { "role": "user", "content": "What is Cloudflare?" } ] }'AI Gateway gives you logging, caching, rate limiting, and access to multiple AI providers through a single endpoint. For more information, refer to Get started.
Get started
For more information, refer to Get started.
Original source Report a problem - Mar 2, 2026
- Date parsed from source:Mar 2, 2026
- First seen by Releasebot:Mar 3, 2026
Consumer Services by Cloudflare
Copy Cloudflare One resources as JSON or POST requests
Cloudflare One now lets you copy resources as JSON or as a ready-to-use POST request from the dashboard, streamlining API calls and IaC automation. Exported outputs include only the resource fields for a clean starting point. Initially supported: Access apps, policies, tokens, providers, and more to come in 2026.
You can now copy Cloudflare One resources as JSON or as a ready-to-use API POST request directly from the dashboard. This makes it simple to transition workflows into API calls, automation scripts, or infrastructure-as-code pipelines.
To use this feature, click the overflow menu (⋮) on any supported resource and select Copy as JSON or Copy as POST request. The copied output includes only the fields present on your resource, giving you a clean and minimal starting point for your own API calls.
Initially supported resources:
- Access applications
- Access policies
- Gateway policies
- Resolver policies
- Service tokens
- Identity providers
We will continue to add support for more resources throughout 2026.
Original source Report a problem