Changelog
2024-08-12
Cloudflare Snippets limits have been upgraded
Cloudflare Snippets (alpha) now allow multiple subrequests depending on your plan. For more information, refer to the Availability.
2024-07-31
Wildcard support added to Ruleset Engine products
Wildcards are now supported across our Ruleset Engine-based products, including Single Redirects, Cache Rules, Transform Rules, WAF, Waiting Room, and more:
- You can now use the
wildcard
andstrict wildcard
operators with any string field in the Ruleset Engine, such as full URI, host, headers, cookies, user-agent, and country. For more details, refer to Operators and Wildcard matching. - In Single Redirects, the
wildcard_replace()
function allows you to use segments matched by thewildcard
andstrict wildcard
operators in redirect URL targets. For more information, refer to Functions.
2024-07-01
Cloudflare Snippets now available to all paid customers
Cloudflare Snippets (alpha) are now available to all paid customers.
2024-06-03
Cloudflare Snippets now available to all Enterprise customers
Cloudflare Snippets (alpha) are now available to all Enterprise customers. Customers in other paid plans will gradually get access throughout 2024.
2024-05-14
Page Rules migration
The Page Rules migration guide is now available for users interested in transitioning to modern Rules features instead of Page Rules. Explore the guide for detailed instructions on migrating your configurations.
2024-05-13
New Configuration Rules setting for Web Analytics (RUM)
You can now turn off Cloudflare Web Analytics, also known as Real User Monitoring (RUM), for specific requests using a configuration rule.
2024-04-29
New Configuration Rules setting for Cloudflare Fonts
You can now turn on or off Cloudflare Fonts for specific requests using a configuration rule.
2024-03-22
New TLS fields in rule expressions
Customers can now use new fields cf.tls_client_hello_length
(the length of the client hello message sent in a TLS handshake), cf.tls_client_random
(the value of the 32-byte random value provided by the client in a TLS handshake), and cf.tls_client_extensions_sha1
(the SHA-1 fingerprint of TLS client extensions) in various products built on Ruleset Engine.
2024-03-20
Origin Rules now allow port numbers in Host Header Override
Customers can now use arbitrary port numbers in Host Header Override in Origin Rules. Previously, only hostname was allowed as a value (for example, example.com
). Now, you can set the value to hostname:port
(for example, example.com:1234
) as well.