Skip to content

Commit fb02b31

Browse files
committed
apply review feedback
1 parent 376cdd9 commit fb02b31

File tree

2 files changed

+37
-20
lines changed

2 files changed

+37
-20
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,21 +67,21 @@ The `warp-debugging-info-<date>-<time>.zip` archive contains the following files
6767
| `daemon_dns.log` | Contains detailed DNS logs if **Log DNS queries** is enabled in the WARP client. |
6868
| `daemon.log` | Detailed log of all actions performed by the WARP client, including all communication between the device and Cloudflare's global network. **Note:** This is the most useful debug log. |
6969
| `date.txt` | Date and time (UTC) when you ran the `warp-diag` command. |
70-
| `dex.log` | ? |
70+
| `dex.log` | Logs related to [DEX test](/cloudflare-one/insights/dex/tests/) execution. |
7171
| `dhcp-lease-plists.txt` | DHCP lease information from `/var/db/dhcpclient/leases/` for each interface that has a DHCP lease. |
7272
| `dhcp-lease.txt` | DHCP lease information from `ipconfig` (macOS) or `nmcli` (Linux). |
7373
| `dig.txt` | DNS lookup query output for `cloudflare.com` and `apple.com`. |
7474
| `dns_stats.log` | Statistics on the DNS queries received and resolved by WARP, generated every two minutes. |
7575
| `dns-check.txt` | Verifies that the WARP DNS servers are set as system default. For [operating modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) where DNS filtering is enabled, this file contains the IPs of the local WARP DNS proxy (`127.0.2.2:0`, `127.0.2.3:0`, `[fd01:db8:1111::2]:0`, and `[fd01:db8:1111::3]:0`). |
76-
| `dynamic.log` | ? |
76+
| `dynamic.log` | Reserved for use by Cloudflare Support. |
7777
| `etc-hosts.txt` | Static DNS config of device. |
7878
| `firewall-pfctl-all.txt` | Packet filter (pf) firewall configuration (macOS only). |
7979
| `firewall-rules.txt` | The [system firewall rules](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#system-firewall) configured by WARP. |
8080
| `gui-launcher.log` | macOS console log showing application launch. |
8181
| `gui-log.log` | Log file for the GUI app that users interact with. |
8282
| `hostname.txt` | Name of the device. |
8383
| `ifconfig.txt` <br/> `ipconfig.txt` | IP configuration of each network interface. |
84-
| `installed_applications.text` | List of installed applications. |
84+
| `installed_applications.txt` | List of installed applications. |
8585
| `installed_cert.pem` | [Root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) installed on the system. |
8686
| `installer.log` <br/> `msi-installer.log` | MSI or PKG installation log.|
8787
| `InstallHistory.plist` <br/> `macos_installer.log` | macOS software installation logs. |

src/content/docs/cloudflare-one/insights/dex/remote-captures.mdx

Lines changed: 34 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ import { Details, Render } from "~/components"
1717

1818
| System | Availability | Minimum WARP version |
1919
| -------- | ------------ | -------------------- |
20-
| Windows || 2024.9.346.0 |
21-
| macOS || 2024.9.346.0 |
22-
| Linux || 2024.9.346.0 |
20+
| Windows || 2024.9.346.0 |
21+
| macOS || 2024.9.346.0 |
22+
| Linux || 2024.9.346.0 |
2323
| iOS || |
2424
| Android || |
2525
| ChromeOS || |
@@ -28,6 +28,11 @@ import { Details, Render } from "~/components"
2828

2929
Remote captures allow administrators to collect packet captures (PCAPs) and WARP diagnostic logs directly from end user devices. This data can be used to troubleshoot network problems, investigate security incidents, and identify performance bottlenecks.
3030

31+
:::note
32+
DEX remote captures are available in early access. For more information, contact your account team.
33+
:::
34+
35+
3136
## Start a remote capture
3237

3338
To capture data from a remote device:
@@ -36,36 +41,48 @@ To capture data from a remote device:
3641
2. Select up to 10 devices that you want to run a capture on. Devices must be [registered](/cloudflare-one/connections/connect-devices/warp/deployment/) in your Zero Trust organization.
3742
3. Configure the types of captures to run.
3843
- **PCAP**: Performs packet captures for traffic outside of the WARP tunnel (default network interface) and traffic inside of the WARP tunnel ([WARP virtual interface](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic)).
39-
<Details header="PCAP capture limits">
40-
Packet captures are subject to the following limits:
41-
- **Maximum time limit**: 600 seconds
42-
- **Maximum file size**: 50 MB
43-
- **Maximum packet size**: 1500 bytes
44-
</Details>
4544
- **WARP Diagnostics Logs**: Generates a [WARP diagnostic log](/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs/#warp-diag-logs) of the past 96 hours. To include a routing test for all IPs and domains in your [Split Tunnel configuration](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/), select **Test all routes**.
46-
<Details header="WARP capture limits">
47-
WARP diagnostic logs have no file size limit, but files larger than 100 MB cannot be uploaded to Cloudflare and must be shared directly with the admin.
48-
</Details>
45+
:::note
46+
**Test all routes** will extend the time for diagnostics to run and may temporarily impact device performance during the test.
47+
:::
4948
4. Select **Start a capture**.
5049

5150
DEX will now send capture requests to the configured devices. If the WARP client is disconnected, the capture will time out after 10 minutes.
5251

5352
## Check remote capture status
5453

5554
To view a list of captures, go to **DEX** > **Remote captures**. The **Status** column displays one of the following options:
56-
- **Success**: The capture is complete and ready for download.
55+
- **Success**: The capture is complete and ready for download. Any partially successful captures will still upload to Cloudflare. For example, there could be a scenario where the PCAP succeeds on the primary network interface but fails on the WARP tunnel interface. You can [review PCAP results](/cloudflare-one/insights/dex/remote-captures/#download-remote-captures) to determine which PCAPs succeeded or failed.
5756
- **Running**: The capture is in progress on the device.
5857
- **Pending Upload**: The capture is complete but not yet ready for download.
59-
- **Failed**: The capture has either timed out or encountered an error. To retry the capture, verify the [connectivity status](/cloudflare-one/insights/dex/fleet-status/) of the device and start a [new capture](/cloudflare-one/insights/dex/remote-captures/#start-a-remote-capture).
58+
- **Failed**: The capture has either timed out or encountered an error. To retry the capture, check the WARP client version and [connectivity status](/cloudflare-one/insights/dex/fleet-status/), then start a [new capture](/cloudflare-one/insights/dex/remote-captures/#start-a-remote-capture).
6059

6160
## Download remote captures
6261

6362
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Remote captures**.
6463
2. Find a successful capture.
6564
3. Select the three-dot menu and select **Download**.
6665

67-
This will download a ZIP file to your local machine. You can analyze `.pcap` files using Wireshark or another third-party packet capture tool.
66+
This will download a ZIP file to your local machine called `<capture-id>.zip`. DEX will store capture data according to our [log retention policy](/cloudflare-one/insights/logs/#log-retention).
67+
68+
### Device PCAP contents
69+
70+
The downloaded PCAP folder contains three files:
71+
- `capture-default.pcap`: Packet captures for the primary network interface.
72+
- `capture-tunnel.pcap`: Packet captures for traffic inside of the WARP tunnel.
73+
- `results.json`: Reports successful and failed packet captures.
74+
75+
You can analyze `.pcap` files using Wireshark or another third-party packet capture tool.
76+
77+
### WARP Diag contents
78+
79+
Refer to [WARP diagnostic logs](/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs/#warp-diag-logs) for a description of each file.
6880

69-
## Data retention
81+
## Limitations
7082

71-
Cloudflare will store capture data for 7 days.
83+
- Packet captures are subject to the following limits:
84+
- **Maximum time limit**: 600 seconds
85+
- **Maximum file size**: 50 MB
86+
- **Maximum packet size**: 1500 bytes
87+
- WARP diagnostic logs have no file size limit, but files larger than 100 MB cannot be uploaded to Cloudflare and must be shared directly with the admin.
88+
- Windows devices do not support concurrent remote captures. If you start a remote capture while another is in progress, the second capture will fail immediately.

0 commit comments

Comments
 (0)