Skip to content

Commit dc0a3fa

Browse files
committed
Add initial entries for several CF1 products + pointer to previous changelog entries
1 parent 913674a commit dc0a3fa

File tree

15 files changed

+239
-110
lines changed

15 files changed

+239
-110
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Explore product updates for Cloudflare Zero Trust
3+
description: New changelog format for Cloudflare Zero Trust
4+
products:
5+
- access
6+
- browser-isolation
7+
- cloudflare-tunnel
8+
- dex
9+
- dlp
10+
- email-security
11+
- gateway
12+
- risk-score
13+
- zero-trust-warp
14+
date: 2024-09-01T11:00:00Z
15+
---
16+
17+
Welcome to your new home for product updates on [Cloudflare Zero Trust](/cloudflare-one/).
18+
19+
Our [new changelog](/changelog/) lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.
20+
21+
If you are looking for older product updates, refer to the [Cloudflare Zero Trust changelog](/cloudflare-one/changelog/).
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Find security misconfigurations in your AWS cloud environment
3+
description: CASB and DLP with Cloud Data Extraction for AWS cloud environments
4+
date: 2024-11-22T11:00:00Z
5+
products:
6+
- dlp
7+
---
8+
9+
import { Render } from "~/components";
10+
11+
You can now use CASB to find security misconfigurations in your AWS cloud environment using [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/).
12+
13+
You can also [connect your AWS compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.
14+
15+
<Render file="casb/aws-compute-account" product="cloudflare-one" />
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Troubleshoot tunnels with diagnostic logs
3+
description: View tunnel diagnostic logs
4+
date: 2024-12-19T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
The latest `cloudflared` build [2024.12.2](https://github.com/cloudflare/cloudflared/releases/tag/2024.12.2) introduces the ability to collect all the diagnostic logs needed to troubleshoot a `cloudflared` instance.
10+
11+
A diagnostic report collects data from a single instance of `cloudflared` running on the local machine and outputs it to a `cloudflared-diag` file.
12+
13+
<Render file="tunnel/tunnel-diag-file" product="cloudflare-one" />
14+
15+
For more information, refer to [Diagnostic logs](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/diag-logs/).
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Detect source code leaks with Data Loss Prevention
3+
description: Added source code confidence levels to Data Loss Prevention
4+
date: 2025-01-03T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
You can now detect source code leaks with Data Loss Prevention (DLP) with predefined checks against common programming languages.
10+
11+
<Render
12+
file="data-loss-prevention/programming-language-list"
13+
product="cloudflare-one"
14+
/>
15+
16+
For more details, refer to [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Increased transparency for phishing email submissions
3+
description: New Email reclassifications tab
4+
date: 2024-12-19T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
Customers now have more transparency about team and user submissions for phishing emails through a **Reclassification** tab in the Zero Trust dashboard.
10+
11+
Reclassifications happen when users or admins [submit a phish](/cloudflare-one/email-security/phish-submissions/) to Email Security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models.
12+
13+
This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are.
14+
15+
{/* Need screenshot here + more details potentially */}
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Block files that are password-protected, compressed, or otherwise unscannable.
3+
description: Unscannable files for Download and Upload File Types selectors
4+
date: 2025-02-03T11:00:00Z
5+
products:
6+
- dlp
7+
---
8+
9+
import { Render } from "~/components";
10+
11+
Gateway HTTP policies can now block files that are password-protected, compressed, or otherwise unscannable.
12+
13+
These unscannable files are now matched with the [Download and Upload File Types traffic selectors](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) for HTTP policies:
14+
15+
<Render file="gateway/policies/unscannable-files" product="cloudflare-one" />
16+
17+
To get started inspecting and modifying behavior based on these and other rules, refer to [HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).

src/content/docs/cloudflare-one/applications/casb/casb-integrations/aws-s3.mdx

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,10 @@ import { Render } from "~/components";
88

99
<Render
1010
file="casb/integration-description"
11-
params={{ integrationName: "Amazon Web Services (AWS) S3", integrationAccountType: "AWS account" }}
11+
params={{
12+
integrationName: "Amazon Web Services (AWS) S3",
13+
integrationAccountType: "AWS account",
14+
}}
1215
/>
1316

1417
## Integration prerequisites
@@ -32,13 +35,7 @@ You can connect an AWS compute account to your CASB integration to perform [Data
3235

3336
### Add a compute account
3437

35-
To connect a compute account to your AWS integration:
36-
37-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Integrations**.
38-
2. Find and select your AWS integration.
39-
3. Select **Open connection instructions**.
40-
4. Follow the instructions provided to connect a new compute account.
41-
5. Select **Refresh**.
38+
<Render file="casb/aws-compute-account" />
4239

4340
You can only connect one computer account to an integration. To remove a compute account, select **Manage compute accounts**.
4441

src/content/docs/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/diag-logs.mdx

Lines changed: 68 additions & 84 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Diagnostic logs
77
---
88

9-
import {Details} from "~/components";
9+
import { Details, Render } from "~/components";
1010

1111
Cloudflare Tunnel generates a set of diagnostic logs that can be used to troubleshoot issues with `cloudflared`. A diagnostic report collects data from a single instance of `cloudflared` running on the local machine.
1212

@@ -22,129 +22,113 @@ The steps for getting diagnostic logs depend on your `cloudflared` deployment en
2222

2323
These instructions apply to remotely-managed and locally-managed tunnels running directly on the host machine.
2424

25-
1. (Linux only) To include network diagnostics in the logs, allow the `cloudflared` user to create RAW and PACKET sockets without root permissions:
25+
1. (Linux only) To include network diagnostics in the logs, allow the `cloudflared` user to create RAW and PACKET sockets without root permissions:
2626

27-
```sh
28-
sudo setcap cap_net_raw+ep /usr/bin/traceroute && sudo setcap cap_net_raw+ep /usr/bin/traceroute
29-
```
27+
```sh
28+
sudo setcap cap_net_raw+ep /usr/bin/traceroute && sudo setcap cap_net_raw+ep /usr/bin/traceroute
29+
```
3030

31-
If you do not set `cap_net_raw`, then traceroute data will be unavailable.
31+
If you do not set `cap_net_raw`, then traceroute data will be unavailable.
3232

33-
2. Get diagnostic logs:
33+
2. Get diagnostic logs:
3434

35-
```sh
36-
cloudflared tunnel diag
37-
```
35+
```sh
36+
cloudflared tunnel diag
37+
```
3838

39-
If multiple instances of `cloudflared` are running on the same host, specify the [metrics server IP and port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#configure-the-metrics-server-address) for the instance you want to diagnose. For example:
39+
If multiple instances of `cloudflared` are running on the same host, specify the [metrics server IP and port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#configure-the-metrics-server-address) for the instance you want to diagnose. For example:
4040

41-
```sh
42-
cloudflared tunnel diag --metrics 127.0.0.1:20241
43-
```
41+
```sh
42+
cloudflared tunnel diag --metrics 127.0.0.1:20241
43+
```
4444

4545
This command will output the status of each diagnostic task and place a `cloudflared-diag-YYYY-MM-DDThh-mm-ss.zip` file in your working directory.
4646

4747
### Docker
4848

4949
`cloudflared` reads diagnostic data from the [tunnel metrics server](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/). To get diagnostic logs, the metrics server must be exposed from the Docker container and reachable from the host machine.
5050

51-
1. Determine the [metrics server port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#default-metrics-server-address) for the `cloudflared` instance running in Docker.
51+
1. Determine the [metrics server port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#default-metrics-server-address) for the `cloudflared` instance running in Docker.
5252

53-
2. Ensure the container is deployed with port forwarding enabled. The diagnostic feature will request information from the Docker instance using local port `20241`, therefore you should forward port `20241` to the container port obtained in Step 1:
53+
2. Ensure the container is deployed with port forwarding enabled. The diagnostic feature will request information from the Docker instance using local port `20241`, therefore you should forward port `20241` to the container port obtained in Step 1:
5454

55-
```sh
56-
docker run -d -p 20241:<metrics_port> docker.io/cloudflare/cloudflared tunnel ...
57-
```
55+
```sh
56+
docker run -d -p 20241:<metrics_port> docker.io/cloudflare/cloudflared tunnel ...
57+
```
5858

59-
3. Verify that you can reach the metrics server address from the Docker host environment:
59+
3. Verify that you can reach the metrics server address from the Docker host environment:
6060

61-
```sh
62-
curl localhost:20241/diag/tunnel
63-
```
61+
```sh
62+
curl localhost:20241/diag/tunnel
63+
```
6464

65-
This command should return a JSON:
66-
```json
67-
{
68-
"tunnelID": "ef96b330-a7f5-4bce-a00e-827ce5be077f",
69-
"connectorID": "d236670a-9f74-422f-adf1-030f5c5f0523",
70-
"connections": [
71-
{ "isConnected": true, "protocol": 1, "edgeAddress": "198.41.192.167"},
72-
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.200.113", "index": 1},
73-
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.192.47", "index": 2},
74-
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.200.73", "index": 3}
75-
],
76-
"icmp_sources": ["192.168.1.243", "fe80::c59:bd4a:e815:ed6"]
77-
}
78-
```
65+
This command should return a JSON:
66+
```json
67+
{
68+
"tunnelID": "ef96b330-a7f5-4bce-a00e-827ce5be077f",
69+
"connectorID": "d236670a-9f74-422f-adf1-030f5c5f0523",
70+
"connections": [
71+
{ "isConnected": true, "protocol": 1, "edgeAddress": "198.41.192.167"},
72+
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.200.113", "index": 1},
73+
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.192.47", "index": 2},
74+
{"isConnected": true, "protocol": 1, "edgeAddress": "198.41.200.73", "index": 3}
75+
],
76+
"icmp_sources": ["192.168.1.243", "fe80::c59:bd4a:e815:ed6"]
77+
}
78+
```
7979

80-
4. Run the diagnostic using the Docker container ID:
80+
4. Run the diagnostic using the Docker container ID:
8181

82-
```sh
83-
cloudflared tunnel diag --diag-container-id=<containerID>
84-
```
82+
```sh
83+
cloudflared tunnel diag --diag-container-id=<containerID>
84+
```
8585

86-
Alternatively, you can specify the container's name instead of its ID:
87-
```sh
88-
cloudflared tunnel diag --diag-container-id=<containerName>
89-
```
86+
Alternatively, you can specify the container's name instead of its ID:
87+
```sh
88+
cloudflared tunnel diag --diag-container-id=<containerName>
89+
```
9090

91-
Running the diagnostic command with the container ID allows `cloudflared` to collect information from the Docker environment such as logs and container details.
91+
Running the diagnostic command with the container ID allows `cloudflared` to collect information from the Docker environment such as logs and container details.
9292

9393
This command will output the status of each diagnostic task and place a `cloudflared-diag-YYYY-MM-DDThh-mm-ss.zip` file in your working directory.
9494

9595
### Kubernetes
9696

9797
The diagnostic feature will request data from the [tunnel metrics server](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/) using ports `20241` to `20245`. You will need to use port forwarding to allow the local `cloudflared` instance to connect to the metrics server on one of these ports.
9898

99-
1. Determine the tunnel's [metrics server port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#default-metrics-server-address).
99+
1. Determine the tunnel's [metrics server port](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#default-metrics-server-address).
100100

101-
2. Enable port forwarding:
101+
2. Enable port forwarding:
102102

103-
```sh
104-
kubectl port-forward <pod> <diagnostic_port>:<metrics_port>
105-
```
103+
```sh
104+
kubectl port-forward <pod> <diagnostic_port>:<metrics_port>
105+
```
106106

107-
- `<pod>`: Name of the pod where the tunnel is running
108-
- `<diagnostic_port>` is any local port in the range `20241` to `20245`.
109-
- `<metrics_port>` is the Kubernetes pod port for the `cloudflared` instance you want to diagnose (obtained in Step 1).
107+
- `<pod>`: Name of the pod where the tunnel is running
108+
- `<diagnostic_port>` is any local port in the range `20241` to `20245`.
109+
- `<metrics_port>` is the Kubernetes pod port for the `cloudflared` instance you want to diagnose (obtained in Step 1).
110110

111-
For example, if you set the metrics server address to `0.0.0.0:12345`:
111+
For example, if you set the metrics server address to `0.0.0.0:12345`:
112112

113-
```sh
114-
kubectl port-forward cloudflared-6d4897585b-r8kfz 20244:12345
115-
```
116-
Connections made to local port `20244` are forwarded to port `12345` of the pod that is running the tunnel.
113+
```sh
114+
kubectl port-forward cloudflared-6d4897585b-r8kfz 20244:12345
115+
```
116+
Connections made to local port `20244` are forwarded to port `12345` of the pod that is running the tunnel.
117117

118-
3. Run the diagnostic:
118+
3. Run the diagnostic:
119119

120-
```sh
121-
cloudflared tunnel diag --diag-pod-id=<podID>
122-
```
120+
```sh
121+
cloudflared tunnel diag --diag-pod-id=<podID>
122+
```
123123

124-
If the pod has multiple applications/services running and `cloudflared` is not the first in the pod, you must specify either the container ID or name:
124+
If the pod has multiple applications/services running and `cloudflared` is not the first in the pod, you must specify either the container ID or name:
125125

126-
```sh
127-
cloudflared tunnel diag --diag-pod-id=<podID> --diag-container-id=<containerName>
128-
```
126+
```sh
127+
cloudflared tunnel diag --diag-pod-id=<podID> --diag-container-id=<containerName>
128+
```
129129

130130
This command will output the status of each diagnostic task and place a `cloudflared-diag-YYYY-MM-DDThh-mm-ss.zip` file in your working directory.
131131

132132
## cloudflared-diag files
133133

134-
The `cloudflared-diag-YYYY-MM-DDThh-mm-ss.zip` archive contains the files listed below. The data in a file either applies to the `cloudflared` instance being diagnosed (`diagnosee`) or the instance that triggered the diagnosis (`diagnoser`). For example, if your tunnel is running in a Docker container, the diagnosee is the Docker instance and the diagnoser is the host instance.
135-
136-
| File name | Description | Instance |
137-
| -| - | - |
138-
| `cli-configuration.json`| [Tunnel run parameters](/cloudflare-one/connections/connect-networks/configure-tunnels/cloudflared-parameters/run-parameters/) used when starting the tunnel | diagnosee|
139-
| `cloudflared_logs.txt` | [Tunnel log file](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/)[^1] | diagnosee|
140-
| `configuration.json` | Tunnel configuration parameters | diagnosee|
141-
| `goroutine.pprof` | goroutine profile made available by `pprof` | diagnosee|
142-
| `heap.pprof` | heap profile made available by `pprof`| diagnosee|
143-
| `metrics.txt` | Snapshot of [Tunnel metrics](/cloudflare-one/connections/connect-networks/monitor-tunnels/metrics/#available-metrics) at the time of diagnosis | diagnosee|
144-
| `network.txt` | JSON traceroutes to Cloudflare's global network using IPv4 and IPv6 | diagnoser|
145-
| `raw-network.txt` | Raw traceroutes to Cloudflare's global network using IPv4 and IPv6 | diagnoser|
146-
| `systeminformation.json` | Operating system information and resource usage | diagnosee|
147-
| `task-result.json` | Result of each diagnostic task | diagnoser |
148-
| `tunnelstate.json` | Tunnel connections at the time of diagnosis| diagnosee|
149-
150-
[^1]: If the log file is blank, you may need to [set `--loglevel` to `debug`](/cloudflare-one/connections/connect-networks/monitor-tunnels/logs/#view-logs-on-the-server) when you start the tunnel. The `--loglevel` parameter is only required if you ran the tunnel from the CLI using a `cloudflared tunnel run` command. It is not necessary if the tunnel runs as a Linux/macOS service or runs in Docker/Kubernetes.
134+
<Render file="tunnel/tunnel-diag-file" />

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles.mdx

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -78,17 +78,4 @@ The following national identifier detections are validated algorithmically when
7878

7979
## Source Code
8080

81-
The following programming languages are validated with natural language processing (NLP).
82-
83-
- C
84-
- C++
85-
- C#
86-
- Go
87-
- Haskell
88-
- Java
89-
- JavaScript
90-
- Lua
91-
- Python
92-
- R
93-
- Rust
94-
- Swift
81+
<Render file="data-loss-prevention/programming-language-list" />

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -527,10 +527,7 @@ These selectors will scan file signatures in the HTTP body. You can select from
527527

528528
**Unscannable**
529529

530-
- Password-protected Microsoft Office document
531-
- Password-protected PDF
532-
- Password-protected ZIP archive
533-
- Unscannable ZIP archive
530+
<Render file="gateway/policies/unscannable-files" />
534531

535532
</Details>
536533

0 commit comments

Comments
 (0)