Skip to content

Commit d36b90e

Browse files
ranbeldaisyfaithauma
authored andcommitted
[ZT] WARP settings lag (#22224)
* warp client notification lag * update cert install lag
1 parent a56d6d6 commit d36b90e

File tree

8 files changed

+28
-10
lines changed

8 files changed

+28
-10
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/automated-deployment.mdx

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ head: []
77
description: Automatically deploy a root certificate on desktop devices.
88
---
99

10-
import { Details } from "~/components";
10+
import { Details, Render } from "~/components";
1111

1212
<Details header="Feature availability">
1313

@@ -46,9 +46,11 @@ To configure WARP to install a root certificate on your organization's devices:
4646
5. [Enroll the device](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
4747
6. (Optional) If the device is running macOS Big Sur or newer, [manually trust the certificate](#manually-trust-the-certificate).
4848

49-
WARP will now download any [certificates set to **Available**](/cloudflare-one/connections/connect-devices/user-side-certificates/#activate-a-root-certificate). It may take up to 24 hours for newly available certificates to download to your users' devices.
49+
WARP will now download any [certificates set to **Available**](/cloudflare-one/connections/connect-devices/user-side-certificates/#activate-a-root-certificate). After download, WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem` and append the contents to the `installed_cert.pem` file. If you have any scripts using `installed_cert.pem`, Cloudflare recommends you set them to use the individual files in the `installed_certs/` directory instead. `installed_certs.pem` will be deprecated by 2025-06-31.
5050

51-
After download, WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem` and append the contents to the `installed_cert.pem` file. If you have any scripts using `installed_cert.pem`, Cloudflare recommends you set them to use the individual files in the `installed_certs/` directory instead. `installed_certs.pem` will be deprecated by 2025-06-31.
51+
:::note
52+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
53+
:::
5254

5355
WARP does not install certificates to individual applications. You will need to [manually add certificates](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/#add-the-certificate-to-applications) to applications that rely on their own certificate store instead of the system certificate store.
5456

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Send a `POST` request to the [Devices API](/api/resources/zero_trust/subresource
114114

115115
4. Select **Save profile**.
116116

117-
The new settings may take up to 24 hours to propagate to devices.
117+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
118118

119119
## Verify device profile
120120

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Split Tunnels can be configured to exclude or include IP addresses or domains fr
1313
Split Tunnels only impacts the flow of IP traffic. DNS requests are still resolved by Gateway and subject to DNS policies unless you add the domains to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration.
1414
:::
1515

16-
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users. It may take up to 10 minutes for changes to propagate to clients, depending on how many devices are connected to your organization.
16+
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users.
1717

1818
## Change Split Tunnels mode
1919

@@ -97,4 +97,6 @@ Removing default Split Tunnel entries may cause users to lose Internet connectiv
9797
3. Under **Split Tunnels**, select **Manage**.
9898
4. Find the IP address or hostname in the list and select **Delete**.
9999

100+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
101+
100102
If you need to revert to the default Split Tunnel entries recommended by Cloudflare, select **Restore default entries**.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ WARP settings define the WARP client modes and permissions available to end user
1919
- [Global settings](#global-settings) apply to all devices enrolled in your Zero Trust organization.
2020
- [Device settings](#device-settings) may vary across devices depending on which [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) is applied.
2121

22+
:::note
23+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
24+
:::
25+
2226
## Global settings
2327

2428
### Admin override
@@ -107,7 +111,7 @@ This setting is primarily used as a prerequisite for [WARP Connector](/cloudflar
107111

108112
- `Disabled`: (default) Sets the local interface IP to `172.16.0.2` on all devices. This configuration is only respected by devices using [WireGuard](#device-tunnel-protocol) and does not affect devices using [MASQUE](#device-tunnel-protocol).
109113

110-
- `Enabled`: Sets the local interface IP on each device to its <GlossaryTooltip term="CGNAT IP">CGNAT IP</GlossaryTooltip>. The change takes effect within 24 hours.
114+
- `Enabled`: Sets the local interface IP on each device to its <GlossaryTooltip term="CGNAT IP">CGNAT IP</GlossaryTooltip>.
111115

112116
The CGNAT IP assigned to a WARP device is permanent until the device unregisters from your Zero Trust organization. Disconnects and reconnects do not change the IP address assignment.
113117

@@ -181,7 +185,7 @@ When `Enabled`, users have the option to switch between [Gateway with WARP](/clo
181185

182186
</Details>
183187

184-
Configures the protocol used to route IP traffic from the device to Cloudflare Gateway. It may take up to 24 hours for all devices to switch to the new protocol. To check the active protocol on a device, open a terminal and run `warp-cli settings | grep protocol`.
188+
Configures the protocol used to route IP traffic from the device to Cloudflare Gateway. To check the active protocol on a device, open a terminal and run `warp-cli settings | grep protocol`.
185189

186190
**Value**:
187191

src/content/docs/cloudflare-one/faq/troubleshooting.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -217,7 +217,7 @@ After enabling certificate propagation, you must update your certificate:
217217

218218
For WARP versions on or above 2024.12.554.0, selecting **Activate** will download the new certificate to end-user devices.
219219

220-
Certificate propagation to end-user devices can take up to 24 hours, but can be expedited by resetting the encryption keys.
220+
Certificate propagation to end-user devices can take up to 10 minutes, but can be expedited by resetting the encryption keys.
221221

222222
To reset the encryption keys:
223223

src/content/docs/cloudflare-one/insights/dex/rules.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 4
66
---
77

8+
import { Render } from "~/components";
9+
810
DEX rules allow you to create and manage testing policies for targeted user groups within your [fleet](/cloudflare-one/insights/dex/tests/). After creating a rule, you can use it to define the scope of a [test](/cloudflare-one/insights/dex/tests/) to specific groups such as departments (like finance or sales), devices, and/or users. You can apply and reuse rules on your desired tests.
911

1012
DEX rules are ideal for admins who want to define the scope of a test to a specific group within their fleet to allow for more precise problem detection and resolution.
@@ -48,7 +50,7 @@ To add a rule to a test:
4850
4. Select **Save test** for an existing rule or **Add rule** for the new test.
4951

5052
:::note
51-
When applying or removing rules from an existing test, your change can take up to 24 hours to propagate.
53+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
5254
:::
5355

5456
To view which tests a rule is being applied to:

src/content/partials/cloudflare-one/warp/add-split-tunnels-route.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{}
33
---
44

5-
import { GlossaryTooltip, TabItem, Tabs } from "~/components";
5+
import { GlossaryTooltip, TabItem, Tabs, Render } from "~/components";
66

77
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
88
2. Under **Device settings**, locate the [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
@@ -33,4 +33,6 @@ import { GlossaryTooltip, TabItem, Tabs } from "~/components";
3333

3434
</TabItem> </Tabs>
3535

36+
<Render file="warp/client-notification-lag" product="cloudflare-one" />
37+
3638
We recommend keeping the Split Tunnels list short, as each entry takes time for the client to parse. In particular, domains are slower to action than IP addresses because they require on-the-fly IP lookups and routing table / local firewall changes. A shorter list will also make it easier to understand and debug your configuration. For information on device profile limits, refer to [Account limits](/cloudflare-one/account-limits/#warp).
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
{}
3+
4+
---
5+
6+
It may take up to 10 minutes for newly updated settings to propagate to devices.

0 commit comments

Comments
 (0)