Skip to content

Commit 9faaebf

Browse files
[CF1] Logs and DEX inline path updates
1 parent bae3113 commit 9faaebf

File tree

17 files changed

+92
-60
lines changed

17 files changed

+92
-60
lines changed

src/content/docs/cloudflare-one/insights/dex/ip-visibility.mdx

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -46,17 +46,16 @@ IP information is crucial for IT administrators to accurately troubleshoot netwo
4646

4747
To view IP information for a user device:
4848

49-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **Devices**.
50-
2. Select a device, then select **View details**.
51-
3. Under **Details**, scroll down to **IP details**.
52-
4. Review the IP details for your selected device's most recent session.
49+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
50+
2. Select a device, then select **View details** > **IP**.
51+
3. Under **IP details**, review the IP details for your selected device's most recent session.
5352

5453
## View a device's IP history
5554

5655
DEX's IP visibility allows you to review an event log of a device's IP history for the last seven days. To view a device's IP history:
5756

58-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **Devices**.
59-
2. Select a device > **View details** > under **Details**, scroll down to **IP details**.
57+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
58+
2. Select a device > **View details** > select **IP** > under **IP details**, review IP details from this device's most recent session.
6059
3. Select **View device history**.
6160
4. View the device's IP history and status from the last seven days.
6261
5. Select a time to view more information about the device at that time.
@@ -69,6 +68,6 @@ While IP visibility allows you to inspect a device's IP information, use [DEX's
6968

7069
To find which Cloudflare data center a device is connected to:
7170

72-
1. Follow the steps listed in [View IP information](#view-a-devices-ip-history) to find a device's IP information.
73-
2. Select **Device Monitoring** above **Device event log**.
74-
3. Find **Colo** in the **Device details** table to review which Cloudflare data center your selected device's egress traffic is connected to.
71+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
72+
2. Select a device, then select **View details**.
73+
3. Under **Client**, review the **Colocation** details to review which Cloudflare data center your selected device's egress traffic is connected to.

src/content/docs/cloudflare-one/insights/dex/monitoring.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,18 @@ Monitor performance and network status for your organization's [fleet](/cloudfla
99

1010
Network and device performance data helps IT administrators troubleshoot performance issues, investigate network connectivity problems, and monitor device health.
1111

12-
## Fleet status
12+
## Device overview
1313

14-
A fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Cloudflare Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
14+
A fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
1515

1616
To view fleet status:
1717

18-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Monitoring**.
19-
2. In **DEX Monitoring**, review the information under the **Fleet Status** tab.
18+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience**.
19+
2. In **Device overview**, review the information under the **Live analytics** tab.
2020

2121
### View metrics
2222

23-
The **Fleet Status** tab will show real-time and historical connectivity metrics for all devices in your organization.
23+
The **Device overview** tab will show real-time and historical connectivity metrics for all devices in your organization.
2424

2525
To view analytics on a per-device level, go to [Device monitoring](/cloudflare-one/insights/dex/monitoring/#device-monitoring).
2626

@@ -39,15 +39,15 @@ To view analytics on a per-device level, go to [Device monitoring](/cloudflare-o
3939

4040
- **Mode**: [WARP mode](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/) deployed on the device.
4141

42-
- **Colo**: Percentage of devices connected to a given Cloudflare data center.
42+
- **Colocation**: Percentage of devices connected to a given Cloudflare data center.
4343

4444
- **Platform**: Operating system of the device.
4545

46-
- **Major Version**: WARP client version installed on the device.
46+
- **Major version**: WARP client version installed on the device.
4747

48-
- **Device Status Over Time**: WARP client connection status over the selected time period.
48+
- **Device status over time**: WARP client connection status over the selected time period.
4949

50-
- **Connection Methods Over Time**: WARP mode used by the device over the selected time period.
50+
- **Connection methods over time**: WARP mode used by the device over the selected time period.
5151

5252
## Device monitoring
5353

@@ -57,10 +57,10 @@ Review network and device performance for a device enrolled in your fleet.
5757

5858
To view a device's network and device performance metrics:
5959

60-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **Devices**.
60+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
6161
2. Select a device > **View details**.
62-
3. Select the **DEX** tab.
63-
4. In **Device Monitoring**, scroll down to **Network performance** and **Device Performance**.
62+
3. Select the **Monitoring** tab.
63+
4. Scroll down to **Network performance** and **Device Performance**.
6464

6565
### Network and device performance metrics
6666

src/content/docs/cloudflare-one/insights/dex/rules.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ DEX rules are ideal for admins who want to define the scope of a test to a speci
1515

1616
To create a rule:
1717

18-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Rules**.
18+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Rules**.
1919
2. Select **Add a rule**.
2020
3. Give your rule a name and build your desired expressions.
2121
4. Select **Create rule** to finalize your rule.
@@ -44,7 +44,7 @@ After you have created a rule, you can add it to a test. If you do not add a rul
4444

4545
To add a rule to a test:
4646

47-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Tests**.
47+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Tests**.
4848
2. Choose an existing test and select **Edit**, or select **Add a test** to make a new test.
4949
3. Under **Select DEX rules**, select the rule you would like to apply.
5050
4. Select **Save test** for an existing rule or **Add rule** for the new test.
@@ -55,7 +55,7 @@ To add a rule to a test:
5555

5656
To view which tests a rule is being applied to:
5757

58-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Rules**.
58+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Rules**.
5959
2. Select a rule > **Edit**.
6060
3. Select the **DEX tests** tab and review the list of tests that include your selected rule.
6161

@@ -65,10 +65,10 @@ You can create a new test from the [DEX test dashboard as described above](/clou
6565

6666
To create a new test using a rule from DEX rules:
6767

68-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Rules**.
68+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Rules**.
6969
2. Select a rule > **Edit**.
7070
3. Select the **DEX tests** tab.
71-
4. You will be able to review all the tests that currently include this rule. To create a new test, select **Create a test using this rule**.
71+
4. You will be able to review all the tests that currently include this rule. To create a new test, select **Create a test for rule**.
7272
5. Enter all required information, making sure that the box next to your rule name is checked.
7373
6. Select **Add test**.
7474

src/content/docs/cloudflare-one/insights/dex/tests/http.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ An HTTP test sends a `GET` request from an end-user device to a specific web app
3030

3131
To set up an HTTP test for an application:
3232

33-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Tests**.
33+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Tests**.
3434
2. Select **Add a Test**.
3535
3. Fill in the following fields:
3636
- **Name**: Enter any name for the test.

src/content/docs/cloudflare-one/insights/dex/tests/traceroute.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ A traceroute test measures the network path of an IP packet from an end-user dev
3030

3131
To set up a traceroute test for an application:
3232

33-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Tests**.
33+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Tests**.
3434
2. Select **Add a Test**.
3535
3. Fill in the following fields:
3636
- **Name**: Enter any name for the test.

src/content/docs/cloudflare-one/insights/dex/tests/view-results.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,17 @@ Use the results of a DEX test to monitor availability and performance for a spec
1616

1717
To view an overview of test results for all devices:
1818

19-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Monitoring**.
19+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience** > **Tests**.
2020
2. Select the **Tests** tab.
21-
3. Under **Application tests**, select a test to view detailed results.
21+
3. Select a test to view detailed results.
2222

2323
## View results for an individual device
2424

2525
To view analytics on a per-device level:
2626

27-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Devices**.
28-
2. Select the device you want to view, and then select **View details**.
29-
3. Select the **Tests** tab.
27+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
28+
2. Select the device you want to view > select **View details**.
29+
3. Select the **Synthetic tests** tab.
3030
4. Select a test to view detailed results.
3131

3232
## Related resources

src/content/docs/cloudflare-one/insights/logs/audit-logs.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: reference
3-
title: Access audit logs
3+
title: Access authentication logs
44
sidebar:
55
order: 2
66
head: []
@@ -35,7 +35,7 @@ Authentication logs do not capture the user's actions during a self-hosted or Sa
3535

3636
To view logs for identity-based authentication events:
3737

38-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Logs** > **Access**.
38+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Logs** > **Access**.
3939
2. Select a row to view details such as the login method, the IP address of the user, and more.
4040

4141
</TabItem> <TabItem label="API">

src/content/docs/cloudflare-one/insights/logs/gateway-logs/index.mdx

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: reference
3-
title: Gateway activity logs
3+
title: Gateway activity logs (DNS query, HTTP request, Network logs)
44
sidebar:
55
order: 3
66
---
@@ -15,15 +15,25 @@ Gateway logs will only show the public IP address for the **Source IP** field. P
1515

1616
Gateway activity logs show the individual DNS queries, Network packets, and HTTP requests inspected by Gateway. You can also download encrypted [SSH command logs](/cloudflare-one/traffic-policies/network-policies/ssh-logging/) for sessions proxied by Gateway.
1717

18-
To view Gateway activity logs, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway**. Select an individual row to investigate the event in more detail.
18+
To view Gateway activity logs:
19+
20+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights**.
21+
2. Go to **Logs** and select the Gateway logs you are interested in reviewing (DNS queries, Network packets, or HTTP requests.)
22+
3. Select an individual row to investigate the event in more detail.
1923

2024
Enterprise users can generate more detailed logs with [Logpush](/cloudflare-one/insights/logs/logpush/).
2125

2226
## Selective logging
2327

24-
By default, Gateway logs all events, including DNS queries and HTTP requests that are allowed and not a risk. You can choose to disable logs or only log blocked requests. To customize what type of events are recorded, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Settings** > **Network**. Under **Activity Logging**, indicate your DNS, Network, and HTTP log preferences.
28+
By default, Gateway logs all events, including DNS queries and HTTP requests that are allowed and not a risk. You can choose to disable logs or only log blocked requests.
29+
30+
To customize what type of events are recorded:
31+
32+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies**.
33+
2. Go to **Traffic settings**.
34+
3. Select **Traffic logging**, and indicate your Gateway DNS, Network, and HTTP log preferences.
2535

26-
These settings will only apply to logs displayed in Zero Trust. Logpush data is unaffected.
36+
These settings will only apply to logs displayed in Cloudflare One. Logpush data is unaffected.
2737

2838
## DNS logs
2939

@@ -62,7 +72,7 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
6272
| **Registration ID** | UUID of the user's WARP client registration. A unique registration ID is generated each time a device is registered for a particular email. The same physical device may have multiple registration IDs. |
6373
| **Device name** | Display name of the device returned by the operating system to the WARP client. Typically this is the hostname of a device. Not all devices will have a device name. Device names are not guaranteed to be unique. |
6474
| **Device ID** | UUID of the device connected with the WARP client. Each physical device in your organization will have a UUID. |
65-
| **Last authenticated** | Date and time the user last authenticated their Zero Trust session. |
75+
| **Last authenticated** | Date and time the user last authenticated their session. |
6676

6777
#### DNS query details
6878

@@ -159,7 +169,7 @@ Gateway can log failed connections in [network session logs](/logs/logpush/logpu
159169
| **Registration ID** | ID of the user's device registration. This is generated by the WARP client. |
160170
| **Device name** | Name of the device that sent the packet. |
161171
| **Device ID** | ID of the physical device that sent the packet. This is generated by the WARP client. |
162-
| **Last authenticated** | Date and time the user last authenticated with Zero Trust. |
172+
| **Last authenticated** | Date and time the user last authenticated with Cloudflare One. |
163173

164174
#### Network query details
165175

@@ -229,7 +239,7 @@ When an HTTP request results in an error, Gateway logs the first 512 bytes of th
229239
| **Registration ID** | ID of the user's device registration. This is generated by the WARP client. |
230240
| **Device name** | Name of the device that made the request. |
231241
| **Device ID** | ID of the physical device that made the request. This is generated by the WARP client on the device that created the request. |
232-
| **Last authenticated** | Date and time the user last authenticated with Zero Trust. |
242+
| **Last authenticated** | Date and time the user last authenticated with Cloudflare One. |
233243

234244
#### HTTP query details
235245

@@ -275,13 +285,13 @@ Enhanced file detection is an optional feature to extract more file information
275285

276286
To turn on enhanced file detection:
277287

278-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network**.
279-
2. In **Firewall**, turn on **TLS decryption**.
288+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies** > **Traffic settings**.
289+
2. In **Proxy and inspection**, turn on **Inspect HTTPS requests with TLS decryption**.
280290
3. In **Gateway Logging**, turn on **Enable enhanced file detection**.
281291

282292
### Isolate requests
283293

284-
When a user creates an [isolation policy](/cloudflare-one/remote-browser-isolation/isolation-policies/), Gateway logs the initial request that triggers isolation as an Isolate action. Because this request is not isolated yet, the `is_isolated` field will return `false`. Zero Trust then securely returns the result to the user in an isolated browser. Gateway will log all subsequent requests in the isolated browser with the action (such as Allow or Block), and the `is_isolated` field will return `true`.
294+
When a user creates an [isolation policy](/cloudflare-one/remote-browser-isolation/isolation-policies/), Gateway logs the initial request that triggers isolation as an Isolate action. Because this request is not isolated yet, the `is_isolated` field will return `false`. Cloudflare One then securely returns the result to the user in an isolated browser. Gateway will log all subsequent requests in the isolated browser with the action (such as Allow or Block), and the `is_isolated` field will return `true`.
285295

286296
## Limitations
287297

src/content/docs/cloudflare-one/insights/logs/gateway-logs/manage-pii.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,11 @@ Cloudflare Gateway can log the following types of PII:
2323

2424
Enabling this setting means Cloudflare Gateway will log activity without storing any employee PII. Changes to this setting will not change PII storage of any previous logs. This means if Exclude PII is enabled and then disabled, there will be no PII data for logs captured while Exclude PII was enabled. The PII data will be unavailable to all roles within your Zero Trust organization, including the Super Admin.
2525

26-
To enable or disable this setting, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Traffic policies** > **Traffic settings** > **Exclude personally identifiable information (PII) from logs**.
26+
To enable or disable this setting:
27+
28+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies**.
29+
2. Go to **Traffic settings**.
30+
2. Toggle **Exclude personally identifiable information (PII) from logs** to your desired state.
2731

2832
## Redact PII
2933

src/content/docs/cloudflare-one/insights/logs/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ For more information, refer to [Log Explorer](/log-explorer/).
4040

4141
## Customer Metadata Boundary
4242

43-
Cloudflare Zero Trust can be used with the Data Localization Suite to ensure that data storage is restricted to a specific geographic region. For more information refer to [Customer Metadata Boundary](/data-localization/metadata-boundary/).
43+
Cloudflare Zero Trust can be used with the Data Localization Suite to ensure that data storage is restricted to a specific geographic region. For more information, refer to [Customer Metadata Boundary](/data-localization/metadata-boundary/).
4444

4545
## Data privacy
4646

47-
For more information on how we use this data, refer to our [Privacy Policy](https://www.cloudflare.com/application/privacypolicy/).
47+
For more information on how we use this data, refer to Cloudflare's [Privacy Policy](https://www.cloudflare.com/application/privacypolicy/).

0 commit comments

Comments
 (0)