Media Release Notes
Last updated: Mar 19, 2026
- Mar 18, 2026
- Date parsed from source:Mar 18, 2026
- First seen by Releasebot:Mar 19, 2026
- Modified by Releasebot:Apr 4, 2026
Media by Cloudflare
Media Transformations binding for Workers
Media adds a Workers binding for Media Transformations, letting users resize, crop, extract frames, and pull audio from videos stored anywhere, including private R2 buckets. It supports optimized video output, still frames, spritesheets, and audio extraction for AI workflows.
You can now use a Workers binding to transform videos with Media Transformations. This allows you to resize, crop, extract frames, and extract audio from videos stored anywhere, even in private locations like R2 buckets.
The Media Transformations binding is useful when you want to:
- Transform videos stored in private or protected sources
- Optimize videos and store the output directly back to R2 for re-use
- Extract still frames for classification or description with Workers AI
- Extract audio tracks for transcription using Workers AI
To get started, add the Media binding to your Wrangler configuration:
Then use the binding in your Worker to transform videos:
Output modes include video for optimized MP4 clips, frame for still images, spritesheet for multiple frames, and audio for M4A extraction.
For more information, refer to the Media Transformations binding documentation.
Original source Report a problem - Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 11, 2026
Media by Cloudflare
Real-time transcription in RealtimeKit now supports 10 languages with regional variants
Cloudflare reveals real-time transcription in RealtimeKit now supports 10 languages with regional variants, powered by Nova-3 on Workers AI. During meetings, audio routes through AI Gateway to Nova-3, transcribing end-to-end on Cloudflare’s network to cut latency. Language is set per meeting and automatic multilingual detection is available.
Real-time transcription in RealtimeKit
Real-time transcription in RealtimeKit now supports 10 languages with regional variants in RealtimeKit now supports 10 languages with regional variants, powered by Deepgram Nova-3 running on Workers AI .
During a meeting, participant audio is routed through AI Gateway to Nova-3 on Workers AI — so transcription runs on Cloudflare's network end-to-end, reducing latency compared to routing through external speech-to-text services.
Set the language when creating a meeting via ai_config.transcription.language :
{ "ai_config": { "transcription": { "language": "fr" } } }Supported languages include English, Spanish, French, German, Hindi, Russian, Portuguese, Japanese, Italian, and Dutch — with regional variants like en-AU, en-GB, en-IN, en-NZ, es-419, fr-CA, de-CH, pt-BR, , and pt-PT. Use multi for automatic multilingual detection.
If you are building voice agents or real-time translation workflows, your agent can now transcribe in the caller's language natively — no extra services or routing logic needed.
- Transcription docs
- Nova-3 model page
- Workers AI
- AI Gateway
All of your release notes in one feed
Join Releasebot and get updates from Cloudflare and hundreds of other software products.
- Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 10, 2026
Media by Cloudflare
Workflow steps now expose retry attempt number via step context
Cloudflare Workflows introduces per step retry insight by exposing the current attempt via ctx.attempt, enabling improved logging observability and conditional logic for progressive backoff.
Cloudflare Workflows: Access current retry attempt
Cloudflare Workflows allows you to configure specific retry logic for each step in your workflow execution. Now, you can access which retry attempt is currently executing for calls to step.do() :
await step.do( "my-step", async (ctx) => => { // ctx.attempt is 1 on first try, 2 on first retry, etc. console.log(`Attempt${${ctx.attempt}}`); } );You can use the step context for improved logging & observability, progressive backoff, or conditional logic in your workflow definition.
Note that the current attempt number is 1-indexed. For more information on retry behavior, refer to
Original source Report a problem
Sleeping and Retrying. - Mar 6, 2026
- Date parsed from source:Mar 6, 2026
- First seen by Releasebot:Mar 6, 2026
Media by Cloudflare
Region Filtering, AS Traffic Volume, and Navigation Improvements on Cloudflare Radar
Radar rolls out new features that boost flexibility and visibility. Region filtering covers continents and subregions, plus political regions and US census regions. A traffic volume view surfaces top autonomous systems and locations, with AS and location dimensions now in Data Explorer. Breadcrumbs improve navigation across pages. Try Cloudflare Radar now.
Radar ships several new features that improve the flexibility and usability of the platform, as well as visibility into what is happening on the Internet.
Region filtering
All location-aware pages now support filtering by region, including continents, geographic subregions (Middle East ↗, Eastern Asia ↗, etc.), political regions (EU ↗, African Union ↗), and US Census regions/divisions (for example, New England ↗, US Northeast ↗).
Traffic volume by top autonomous systems and locations
A new traffic volume view shows the top autonomous systems and countries/territories for a given location. This is useful for quickly determining which network providers in a location may be experiencing connectivity issues, or how traffic is distributed across a region.
The new AS and location dimensions have also been added to the Data Explorer ↗ for the HTTP, DNS, and NetFlows datasets. Combined with other available filters, this provides a powerful tool for generating unique insights.
Finally, breadcrumb navigation is now available on most pages, allowing easier navigation between parent and related pages.
Check out these features on Cloudflare Radar ↗.
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 5, 2026
Media by Cloudflare
Browser Rendering: 3x higher REST API request rate
Workers Paid REST API rate limits have increased from 3 to 10 requests per second, enabling faster HTML fetch, screenshots, PDFs, and more. Endpoints now include /content, /screenshot, /pdf, /markdown, /snapshot, /scrape, /json, /links, with more browser limits coming soon.
REST API rate limits
REST API rate limits for Workers Paid plans have been increased from 3 requests per second (180/min) to 10 requests per second (600/min). No action is needed to benefit from the higher limit.
The REST API lets you perform common browser tasks with a single API call, and you can now do it at a higher rate.
- /content - Fetch HTML
- /screenshot - Capture screenshot
- /pdf - Render PDF
- /markdown - Extract Markdown from a webpage
- /snapshot - Take a webpage snapshot
- /scrape - Scrape HTML elements
- /json - Capture structured data using AI
- /links - Retrieve links from a webpage
If you use the Workers Bindings method, increases to concurrent browser and new browser limits are coming soon. Stay tuned.
For full details, refer to the Browser Rendering limits page.
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 5, 2026
Media by Cloudflare
User risk score selector in Access policies
You can now use user risk scores in your Access policies
The new User Risk Score selector allows you to create Access policies that respond to user behavior patterns detected by Cloudflare's risk scoring system, including impossible travel, high DLP policy matches, and more.
For more information, refer to Use risk scores in Access policies.
Original source Report a problem - Mar 4, 2026
- Date parsed from source:Mar 4, 2026
- First seen by Releasebot:Mar 4, 2026
Media by Cloudflare
Gateway Authorization Proxy and hosted PAC files (open beta)
Cloudflare One opens open beta for Gateway Authorization Proxy and PAC hosting across all plans. Identity-aware proxy replaces IP checks with Cloudflare Access, logging user identity and enabling policy enforcement without a WARP client. Supports multiple IdPs and cloud-hosted PAC templates.
The Gateway Authorization Proxy and PAC file hosting are now in open beta for all plan types.
Previously, proxy endpoints relied on static source IP addresses to authorize traffic, providing no user-level identity in logs or policies. The new authorization proxy replaces IP-based authorization with Cloudflare Access authentication, verifying who a user is before applying Gateway filtering without installing the WARP client.
This is ideal for environments where you cannot deploy a device client, such as virtual desktops (VDI), mergers and acquisitions, or compliance-restricted endpoints.Key capabilities
- Identity-aware proxy traffic — Users authenticate through your identity provider (Okta, Microsoft Entra ID, Google Workspace, and others) via Cloudflare Access. Logs now show exactly which user accessed which site, and you can write identity-based policies like "only the Finance team can access this accounting tool."
- Multiple identity providers — Display one or multiple login methods simultaneously, giving flexibility for organizations managing users across different identity systems.
- Cloudflare-hosted PAC files — Create and host PAC files directly in Cloudflare One with pre-configured templates for Okta and Azure, hosted at https://pac.cloudflare-gateway.com// on Cloudflare's global network.
- Simplified billing — Each user occupies a seat, exactly like they do with the Cloudflare One Client. No new metrics to track.
Get started
- In Cloudflare One ↗, go to Networks > Resolvers & Proxies > Proxy endpoints.
- Create an authorization proxy endpoint and configure Access policies.
- Create a hosted PAC file or write your own.
- Configure browsers to use the PAC file URL.
- Install the Cloudflare certificate for HTTPS inspection.
For more details, refer to the proxy endpoints documentation and the announcement blog post announcement blog post.
Original source Report a problem - Mar 3, 2026
- Date parsed from source:Mar 3, 2026
- First seen by Releasebot:Mar 4, 2026
Media by Cloudflare
Workflows step limit increased to 25,000 steps per instance
Workflows on Workers Paid can now run up to 25,000 steps via wrangler.jsonc, up from 1,024, enabling longer, more complex executions. Persisted state limits stay at 100 MB (Free) and 1 GB (Paid).
Workflows on Workers
Each Workflow on Workers Paid now supports 10,000 steps by default, configurable up to 25,000 steps in your wrangler.jsonc file:
{ "workflows": [ { "name": "my-workflow", "binding": "MY_WORKFLOW", "class_name": "MyWorkflow", "limits": { "steps": 25000 } } ] }Previously, each instance was limited to 1,024 steps. Now, Workflows can support more complex, long-running executions without the additional complexity of recursive or child workflow calls.
Note that the maximum persisted state limit per Workflow instance remains 100 MB for Workers Free and 1 GB for Workers Paid. Refer to Workflows limits for more information.
Original source Report a problem - Mar 3, 2026
- Date parsed from source:Mar 3, 2026
- First seen by Releasebot:Mar 4, 2026
Media by Cloudflare
Real-time file watching in Sandboxes
Sandboxes gain real time filesystem watching with sandbox.watch, delivering SSE events for create modify delete and move inside containers. It supports path, type, recursive and include filters, and can be consumed by browser or server side. Upgrade with npm i @cloudflare/sandbox@latest.
Sandboxes now support real-time filesystem watching via sandbox.watch(). The method returns a Server-Sent Events stream backed by native inotify, so your Worker receives create, modify, delete, and move events as they happen inside the container.
sandbox.watch(path, options)
Pass a directory path and optional filters. The returned stream is a standard ReadableStream you can proxy directly to a browser client or consume server-side.Server-side consumption with parseSSEStream
Use parseSSEStream to iterate over events inside a Worker without forwarding them to a client.Each event includes a type field (create, modify, delete, or move) and the affected path. Move events also include a from field with the original path.
Options
Option Type Description recursive boolean Watch subdirectories. Defaults to false. include string[] Glob patterns to filter events. Omit to receive all events.Upgrade
To update to the latest version:
npm i @cloudflare/sandbox@latestFor full API details, refer to the Sandbox file watching reference.
Original source Report a problem - Mar 3, 2026
- Date parsed from source:Mar 3, 2026
- First seen by Releasebot:Mar 4, 2026
Media by Cloudflare
Network Quality Test on Cloudflare Radar
Network Quality Test
Radar now includes a Network Quality Test page. The tool measures Internet connection quality and performance, showing connection details such as IP address, server location, network (ASN), and IP version. For more detailed speed test results, the page links to speed.cloudflare.com.
Screenshot of the Network Quality Test page on Radar
Original source Report a problem