Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ date: 2025-03-03T6:00:00Z

[Access for SaaS applications](/cloudflare-one/applications/configure-apps/saas-apps/) now include more configuration options to support a wider array of SaaS applications.

### SAML and OIDC Field Additions
### SAML and OIDC field additions

OIDC apps now include:

Expand Down
3 changes: 2 additions & 1 deletion src/content/changelog/agents/2025-03-18-npm-i-agents.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -15,11 +15,12 @@ import npmAgentsAnimated from "~/assets/images/agents/npm-i-agents.apng"

#### `agents-sdk` -> `agents` <Badge text="Updated" variant="tip" size="small" />

📝 **We've renamed the Agents package to `agents`**!
📝 **We have renamed the Agents package to `agents`.**

If you've already been building with the Agents SDK, you can update your dependencies to use the new package name, and replace references to `agents-sdk` with `agents`:

```sh

# Install the new package
npm i agents
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ products:
date: 2025-01-30T14:00:00Z
---

We have released new [Workers bindings API methods](/ai-gateway/integrations/worker-binding-methods/), allowing you to connect Workers applications to AI Gateway directly. These methods simplify how Workers calls AI services behind your AI Gateway configurations, removing the need to use the REST API and manually authenticate.
We've released new [Workers bindings API methods](/ai-gateway/integrations/worker-binding-methods/), allowing you to connect Workers applications to AI Gateway directly. These methods simplify how Workers calls AI services behind your AI Gateway configurations, removing the need to use the REST API and manually authenticate.

To add an AI binding to your Worker, include the following in your [Wrangler configuration file](/workers/wrangler/configuration/):

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ date: 2025-02-05T12:00:00Z

[AI Gateway](/ai-gateway/) has added three new providers: [Cartesia](/ai-gateway/providers/cartesia/), [Cerebras](/ai-gateway/providers/cerebras/), and [ElevenLabs](/ai-gateway/providers/elevenlabs/), giving you more even more options for providers you can use through AI Gateway. Here's a brief overview of each:

- [Cartesia](/ai-gateway/providers/cartesia/) provides text-to-speech models that produce natural-sounding speech with low latency.
- [Cartesia](/ai-gateway/providers/cartesia/) provides text-to-speech models that produce natural-sounding speech with low latency.
- [Cerebras](/ai-gateway/providers/cerebras/) delivers low-latency AI inference to Meta's Llama 3.1 8B and Llama 3.3 70B models.
- [ElevenLabs](/ai-gateway/providers/elevenlabs/) offers text-to-speech models with human-like voices in 32 languages.

Expand Down
4 changes: 2 additions & 2 deletions src/content/changelog/ai-gateway/2025-03-20-websockets.mdx
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
---
title: AI Gateway launches Realtime WebSockets API
description: AI Gateway now supports end-to-end, client-to-provider WebSockets
description: AI Gateway now supports end-to-end, client-to-provider WebSockets
date: 2025-03-21T09:00:00Z
---
We are excited to announce that [AI Gateway](/ai-gateway/) now supports real-time AI interactions with the new [Realtime WebSockets API](/ai-gateway/configuration/websockets-api/realtime-api/).
We are excited to announce that [AI Gateway](/ai-gateway/) now supports real-time AI interactions with the new [Realtime WebSockets API](/ai-gateway/configuration/websockets-api/realtime-api/).

This new capability allows developers to establish persistent, low-latency connections between their applications and AI models, enabling natural, real-time conversational AI experiences, including speech-to-speech interactions.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,11 +13,11 @@ View these risks in [Endpoint Management](/api-shield/management-and-monitoring/
...or in [Security Center Insights](/security-center/security-insights/):

![An example security center insight](~/assets/images/changelog/api-shield/posture-management-insight.png)

API Shield will scan for risks on your API inventory daily. Here are the new risks we're scanning for and automatically labelling:
API Shield will scan for risks on your API inventory daily. Here are the new risks we're scanning for and automatically labelling:

- **cf-risk-sensitive**: applied if the customer is subscribed to the [sensitive data detection ruleset](/waf/managed-rules/reference/sensitive-data-detection/) and the WAF detects sensitive data returned on an endpoint in the last seven days.
- **cf-risk-missing-auth**: applied if the customer has configured a session ID and no successful requests to the endpoint contain the session ID.
- **cf-risk-missing-auth**: applied if the customer has configured a session ID and no successful requests to the endpoint contain the session ID.
- **cf-risk-mixed-auth**: applied if the customer has configured a session ID and some successful requests to the endpoint contain the session ID while some lack the session ID.
- **cf-risk-missing-schema**: added when a learned schema is available for an endpoint that has no active schema.
- **cf-risk-error-anomaly**: added when an endpoint experiences a recent increase in response errors over the last 24 hours.
Expand All @@ -29,6 +29,6 @@ In addition, API Shield has two new 'beta' scans for **Broken Object Level Autho
- **cf-risk-bola-enumeration**: added when an endpoint experiences successful responses with drastic differences in the number of unique elements requested by different user sessions.
- **cf-risk-bola-pollution**: added when an endpoint experiences successful responses where parameters are found in multiple places in the request.

We are currently accepting more customers into our beta. Contact your account team if you are interested in BOLA attack detection for your API.
We're currently accepting more customers into our beta. Contact your account team if you are interested in BOLA attack detection for your API.

Refer to the [blog post](https://blog.cloudflare.com/cloudflare-security-posture-management/) for more information about Cloudflare's expanded posture management capabilities.
Original file line number Diff line number Diff line change
Expand Up @@ -3,16 +3,16 @@ title: Audit logs (version 2) - Beta Release
description: New version of audit logs
date: 2025-03-27T11:00:00Z
---
The latest version of audit logs streamlines audit logging by automatically capturing all user and system actions performed through the Cloudflare Dashboard or public APIs. This update leverages Cloudflares existing API Shield to generate audit logs based on OpenAPI schemas, ensuring a more consistent and automated logging process.
The latest version of audit logs streamlines audit logging by automatically capturing all user and system actions performed through the Cloudflare Dashboard or public APIs. This update leverages Cloudflare's existing API Shield to generate audit logs based on OpenAPI schemas, ensuring a more consistent and automated logging process.

Availability: Audit logs (version 2) is now in Beta, with support limited to **API access**.

Use the following API endpoint to retrieve audit logs:
```js
GET https://api.cloudflare.com/client/v4/accounts/<account_id>/logs/audit?since=<date>&before=<date>

GET 'https://api.cloudflare.com/client/v4/accounts/<account_id>/logs/audit?since=<date>&before=<date>'
```
```
You can access detailed documentation for audit logs (version 2) Beta API release [here](https://developers.cloudflare.com/api/resources/accounts/subresources/logs/subresources/audit/methods/list/).
You can access detailed documentation for the audit logs (version 2) Beta API release in the [Audit Logs API documentation for listing audit logs](https://developers.cloudflare.com/api/resources/accounts/subresources/logs/subresources/audit/methods/list/).

**Key Improvements in the Beta Release:**

Expand All @@ -27,7 +27,7 @@ You can access detailed documentation for audit logs (version 2) Beta API releas
* **Comprehensive activity capture**: Expanded logging to include GET requests and failed attempts, ensuring that all critical activities are recorded.

**Known Limitations in Beta**
* Error handling for the API is not implemented.
* Error handling for the API isn't implemented.
* There may be gaps or missing entries in the available audit logs.
* UI is unavailable in this Beta release.
* System-level logs and User-Activity logs are not included.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: User action logs for Remote Browser Isolation
date: 2025-03-04T11:00:00Z
---

We're excited to announce that new logging capabilities for [Remote Browser Isolation (RBI)](/cloudflare-one/policies/browser-isolation/) through [Logpush](/logs/reference/log-fields/account/) are available in Beta starting today!
We're pleased to announce that new logging capabilities for [Remote Browser Isolation (RBI)](/cloudflare-one/policies/browser-isolation/) through [Logpush](/logs/reference/log-fields/account/) are available in Beta starting today.

With these enhanced logs, administrators can gain visibility into end user behavior in the remote browser and track blocked data extraction attempts, along with the websites that triggered them, in an isolated session.

Expand Down