
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 07 Apr 2026 17:14:24 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Code Orange: Fail Small — our resilience plan following recent incidents]]></title>
            <link>https://blog.cloudflare.com/fail-small-resilience-plan/</link>
            <pubDate>Fri, 19 Dec 2025 22:35:30 GMT</pubDate>
            <description><![CDATA[ We have declared “Code Orange: Fail Small” to focus everyone at Cloudflare on a set of high-priority workstreams with one simple goal: ensure that the cause of our last two global outages never happens again. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On <a href="https://blog.cloudflare.com/18-november-2025-outage/"><u>November 18, 2025</u></a>, Cloudflare’s network experienced significant failures to deliver network traffic for approximately two hours and ten minutes. Nearly three weeks later, on <a href="https://blog.cloudflare.com/5-december-2025-outage/"><u>December 5, 2025</u></a>, our network again failed to serve traffic for 28% of applications behind our network for about 25 minutes.</p><p>We published detailed post-mortem blog posts following both incidents, but we know that we have more to do to earn back your trust. Today we are sharing details about the work underway at Cloudflare to prevent outages like these from happening again.</p><p>We are calling the plan “<b>Code Orange: Fail Small</b>”, which reflects our goal of making our network more resilient to errors or mistakes that could lead to a major outage. A “Code Orange” means the work on this project is prioritized above all else. For context, we declared a “Code Orange” at Cloudflare <a href="https://blog.cloudflare.com/major-data-center-power-failure-again-cloudflare-code-orange-tested/"><u>once before</u></a>, following another major incident that required top priority from everyone across the company. We feel the recent events require the same focus.  Code Orange is our way to enable that to happen, allowing teams to work cross-functionally as necessary to get the job done while pausing any other work.</p><p>The Code Orange work is organized into three main areas:</p><ul><li><p>Require controlled rollouts for any configuration change that is propagated to the network, just like we do today for software binary releases.</p></li><li><p>Review, improve, and test failure modes of all systems handling network traffic to ensure they exhibit well-defined behavior under all conditions, including unexpected error states.</p></li><li><p>Change our internal “break glass”* procedures, and remove any circular dependencies so that we, and our customers, can act fast and access all systems without issue during an incident.</p></li></ul><p>These projects will deliver iterative improvements as they proceed, rather than one “big bang” change at their conclusion. Every individual update will contribute to more resiliency at Cloudflare. By the end, we expect Cloudflare’s network to be much more resilient, including for issues such as those that triggered the global incidents we experienced in the last two months.</p><p>We understand that these incidents are painful for our customers and the Internet as a whole. We’re deeply embarrassed by them, which is why this work is the first priority for everyone here at Cloudflare.</p><p><sup><b><i>*</i></b></sup><sup><i> Break glass procedures at Cloudflare allow certain individuals to elevate their privilege under certain circumstances to perform urgent actions to resolve high severity scenarios.</i></sup></p>
    <div>
      <h2>What went wrong?</h2>
      <a href="#what-went-wrong">
        
      </a>
    </div>
    <p>In the first incident, users visiting a customer site on Cloudflare saw error pages that indicated Cloudflare could not deliver a response to their request. In the second, they saw blank pages.</p><p>Both outages followed a similar pattern. In the moments leading up to each incident we instantaneously deployed a configuration change in our data centers in hundreds of cities around the world.</p><p>The November change was an automatic update to our Bot Management classifier. We run various artificial intelligence models that learn from the traffic flowing through our network to build detections that identify bots. We constantly update those systems to stay ahead of bad actors trying to evade our security protection to reach customer sites.</p><p>During the December incident, while trying to protect our customers from a vulnerability in the popular open source framework React, we deployed a change to a security tool used by our security analysts to improve our signatures. Similar to the urgency of new bot management updates, we needed to get ahead of the attackers who wanted to exploit the vulnerability. That change triggered the start of the incident.</p><p>This pattern exposed a serious gap in how we deploy configuration changes at Cloudflare, versus how we release software updates. When we release software version updates, we do so in a controlled and monitored fashion. For each new binary release, the deployment must successfully complete multiple gates before it can serve worldwide traffic. We deploy first to employee traffic, before carefully rolling out the change to increasing percentages of customers worldwide, starting with free users. If we detect an anomaly at any stage, we can revert the release without any human intervention.</p><p>We have not applied that methodology to configuration changes. Unlike releasing the core software that powers our network, when we make configuration changes, we are modifying the values of how that software behaves and we can do so instantly. We give this power to our customers too: If you make a change to a setting in Cloudflare, it will propagate globally in seconds.</p><p>While that speed has advantages, it also comes with risks that we need to address. The past two incidents have demonstrated that we need to treat any change that is applied to how we serve traffic in our network with the same level of tested caution that we apply to changes to the software itself.</p>
    <div>
      <h2>We will change how we deploy configuration updates at Cloudflare</h2>
      <a href="#we-will-change-how-we-deploy-configuration-updates-at-cloudflare">
        
      </a>
    </div>
    <p>Our ability to deploy configuration changes globally within seconds was the core commonality across the two incidents. In both events, a wrong configuration took down our network in seconds.</p><p>Introducing controlled rollouts of our configuration, just as we <b><i>already do</i></b> for software releases, is the most important workstream of our Code Orange plan.</p><p>Configuration changes at Cloudflare propagate to the network very quickly. When a user creates a new DNS record, or creates a new security rule, it reaches 90% of servers on the network within seconds. This is powered by a software component that we internally call Quicksilver.</p><p>Quicksilver is also used for any configuration change required by our own teams. The speed is a feature: we can react and globally update our network behavior very quickly. However, in both incidents this caused a breaking change to propagate to the entire network in seconds rather than passing through gates to test it.</p><p>While the ability to deploy changes to our network on a near-instant basis is useful in many cases, it is rarely necessary. Work is underway to treat configuration the same way that we treat code by introducing controlled deployments within Quicksilver to any configuration change.</p><p>We release software updates to our network multiple times per day through what we call our Health Mediated Deployment (HMD) system. In this framework, every team at Cloudflare that owns a service (a piece of software deployed into our network) must define the metrics that indicate a deployment has succeeded or failed, the rollout plan, and the steps to take if it does not succeed.</p><p>Different services will have slightly different variables. Some might need longer wait times before proceeding to more data centers, while others might have lower tolerances for error rates even if it causes false positive signals.</p><p>Once deployed, our HMD toolkit begins to carefully progress against that plan while monitoring each step before proceeding. If any step fails, the rollback will automatically begin and the team can be paged if needed.</p><p>By the end of Code Orange, configuration updates will follow this same process. We expect this to allow us to quickly catch the kinds of issues that occurred in these past two incidents long before they become widespread problems.</p>
    <div>
      <h2>How will we address failure modes between services?</h2>
      <a href="#how-will-we-address-failure-modes-between-services">
        
      </a>
    </div>
    <p>While we are optimistic that better control over configuration changes will catch more problems before they become incidents, we know that mistakes can and will occur. During both incidents, errors in one part of our network became problems in most of our technology stack, including the control plane that customers rely on to configure how they use Cloudflare.</p><p>We need to think about careful, graduated rollouts not just in terms of geographic progression (spreading to more of our data centers) or in terms of population progression (spreading to employees and customer types). We also need to plan for safer deployments that contain failures from service progression (spreading from one product like our Bot Management service to an unrelated one like our dashboard).</p><p>To that end, we are in the process of reviewing the interface contracts between every critical product and service that comprise our network to ensure that we a) <b>assume failure will occur</b> between each interface and b) handle that failure in the absolute <b>most reasonable way possible</b>. </p><p>To go back to our Bot Management service failure, there were at least two key interfaces where, if we had assumed failure was going to happen, we could have handled it gracefully to the point that it was unlikely any customer would have been impacted. The first was in the interface that read the corrupted config file. Instead of panicking, there should have been a sane set of validated defaults which would have allowed traffic to pass through our network, while we would have, at worst, lost the realtime fine-tuning that feeds into our bot detection machine-learning models.

The second interface was between the core software that runs our network and the Bot Management module itself. In the event that our bot management module failed (as it did), we should not have dropped traffic by default. Instead, we could have come up with, yet again, a more sane default of allowing the traffic to pass with a passable classification.</p>
    <div>
      <h2>How will we solve emergencies faster?</h2>
      <a href="#how-will-we-solve-emergencies-faster">
        
      </a>
    </div>
    <p>During the incidents, it took us too long to resolve the problem. In both cases, this was worsened by our security systems preventing team members from accessing the tools they needed to fix the problem, and in some cases, circular dependencies slowed us down as some internal systems also became unavailable.</p><p>As a security company, all our tools are behind authentication layers with fine-grained access controls to ensure customer data is safe and to prevent unauthorized access. This is the right thing to do, but at the same time, our current processes and systems slowed us down when speed was a top priority.</p><p>Circular dependencies also affected our customer experience. For example, during the November 18 incident, Turnstile, our no CAPTCHA bot solution, became unavailable. As we use Turnstile on the login flow to the Cloudflare dashboard, customers who did not have active sessions, or API service tokens, were not able to log in to Cloudflare in the moment of most need to make critical changes.</p><p>Our team will be reviewing and improving all of the break glass procedures and technology to ensure that, when necessary, we can access the right tools as fast as possible while maintaining our security requirements. This includes reviewing and removing circular dependencies, or being able to “bypass” them quickly in the event there is an incident.<b> </b>We will also increase the frequency of our training exercises, so that processes are well understood by all teams prior to any potential disaster scenario in the future. </p>
    <div>
      <h2>When will we be done?</h2>
      <a href="#when-will-we-be-done">
        
      </a>
    </div>
    <p>While we haven’t captured in this post all the work being undertaken internally, the workstreams detailed above describe the top priorities the teams are being asked to focus on. Each of these workstreams maps to a detailed plan touching nearly every product and engineering team at Cloudflare. We have a lot of work to do.</p><p>By the end of Q1, and largely before then, we will:</p><ul><li><p>Ensure all production systems are covered by Health Mediated Deployments (HMD) for configuration management.</p></li><li><p>Update our systems to adhere to proper failure modes as appropriate for each product set.</p></li><li><p>Ensure we have processes in place so the right people have the right access to provide proper remediation during an emergency.</p></li></ul><p>Some of these goals will be evergreen. We will always need to better handle circular dependencies as we launch new software and our break glass procedures will need to update to reflect how our security technology changes over time.</p><p>We failed our users and the Internet as a whole in these past two incidents. We have work to do to make it right. We plan to share updates as this work proceeds and appreciate the questions and feedback we have received from our customers and partners.</p> ]]></content:encoded>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <category><![CDATA[Code Orange]]></category>
            <guid isPermaLink="false">DMVZ2E5NT13VbQvP1hUNj</guid>
            <dc:creator>Dane Knecht</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare outage on December 5, 2025]]></title>
            <link>https://blog.cloudflare.com/5-december-2025-outage/</link>
            <pubDate>Fri, 05 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare experienced a significant traffic outage on  December 5, 2025, starting approximately at 8:47 UTC. The incident lasted approximately 25 minutes before resolution. We are sorry for the impact that it caused to our customers and the Internet. The incident was not caused by an attack and was due to configuration changes being applied to attempt to mitigate a recent industry-wide vulnerability impacting React Server Components. ]]></description>
            <content:encoded><![CDATA[ <p><i><sup></sup></i></p><p><i><sup>Note: This post was updated to clarify the relationship of the internal WAF tool with the incident on Dec. 5.</sup></i></p><p>On December 5, 2025, at 08:47 UTC (all times in this blog are UTC), a portion of Cloudflare’s network began experiencing significant failures. The incident was resolved at 09:12 (~25 minutes total impact), when all services were fully restored.</p><p>A subset of customers were impacted, accounting for approximately 28% of all HTTP traffic served by Cloudflare. Several factors needed to combine for an individual customer to be affected as described below.</p><p>The issue was not caused, directly or indirectly, by a cyber attack on Cloudflare’s systems or malicious activity of any kind. Instead, it was triggered by changes being made to our body parsing logic while attempting to detect and mitigate an industry-wide vulnerability <a href="https://blog.cloudflare.com/waf-rules-react-vulnerability/"><u>disclosed this week</u></a> in React Server Components.</p><p>Any outage of our systems is unacceptable, and we know we have let the Internet down again following the incident on November 18. We will be publishing details next week about the work we are doing to stop these types of incidents from occurring.</p>
    <div>
      <h3>What happened</h3>
      <a href="#what-happened">
        
      </a>
    </div>
    <p>The graph below shows HTTP 500 errors served by our network during the incident timeframe (red line at the bottom), compared to unaffected total Cloudflare traffic (green line at the top).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43yFyHQhKjhPoLh4yB7pQ8/c1eb08a3e056530311e6056ecac522ed/image1.png" />
          </figure><p>Cloudflare's Web Application Firewall (WAF) provides customers with protection against malicious payloads, allowing them to be detected and blocked. To do this, Cloudflare’s proxy buffers HTTP request body content in memory for analysis. Before today, the buffer size was set to 128KB.</p><p>As part of our ongoing work to protect customers who use React against a critical vulnerability, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55182"><u>CVE-2025-55182</u></a>, we started rolling out an increase to our buffer size to 1MB, the default limit allowed by Next.js applications, to make sure as many customers as possible were protected.</p><p>This first change was being rolled out using our gradual deployment system. During rollout, we noticed that our internal WAF testing tool did not support the increased buffer size. As this internal test tool was not needed at that time and had no effect on customer traffic, we made a second change to turn it off.</p><p>This second change of turning off our WAF testing tool was implemented using our global configuration system. This system does not perform gradual rollouts, but rather propagates changes within seconds to the entire fleet of servers in our network and is under review <a href="https://blog.cloudflare.com/18-november-2025-outage/"><u>following the outage we experienced on November 18</u></a>. </p><p>Unfortunately, in our FL1 version of our proxy, under certain circumstances, the second change of turning off our WAF rule testing tool caused an error state that resulted in 500 HTTP error codes to be served from our network.</p><p>As soon as the change propagated to our network, code execution in our FL1 proxy reached a bug in our rules module which led to the following Lua exception: </p>
            <pre><code>[lua] Failed to run module rulesets callback late_routing: /usr/local/nginx-fl/lua/modules/init.lua:314: attempt to index field 'execute' (a nil value)</code></pre>
            <p>resulting in HTTP code 500 errors being issued.</p><p>The issue was identified shortly after the change was applied, and was reverted at 09:12, after which all traffic was served correctly.</p><p>Customers that have their web assets served by our older FL1 proxy <b>AND</b> had the Cloudflare Managed Ruleset deployed were impacted. All requests for websites in this state returned an HTTP 500 error, with the small exception of some test endpoints such as <code>/cdn-cgi/trace</code>.</p><p>Customers that did not have the configuration above applied were not impacted. Customer traffic served by our China network was also not impacted.</p>
    <div>
      <h3>The runtime error</h3>
      <a href="#the-runtime-error">
        
      </a>
    </div>
    <p>Cloudflare’s rulesets system consists of sets of rules which are evaluated for each request entering our system. A rule consists of a filter, which selects some traffic, and an action which applies an effect to that traffic. Typical actions are “<code>block</code>”, “<code>log</code>”, or “<code>skip</code>”. Another type of action is “<code>execute</code>”, which is used to trigger evaluation of another ruleset.</p><p>Our internal logging system uses this feature to evaluate new rules before we make them available to the public. A top level ruleset will execute another ruleset containing test rules. It was these test rules that we were attempting to disable.</p><p>We have a killswitch subsystem as part of the rulesets system which is intended to allow a rule which is misbehaving to be disabled quickly. This killswitch system receives information from our global configuration system mentioned in the prior sections. We have used this killswitch system on a number of occasions in the past to mitigate incidents and have a well-defined Standard Operating Procedure, which was followed in this incident.</p><p>However, we have never before applied a killswitch to a rule with an action of “<code>execute</code>”. When the killswitch was applied, the code correctly skipped the evaluation of the execute action, and didn’t evaluate the sub-ruleset pointed to by it. However, an error was then encountered while processing the overall results of evaluating the ruleset:</p>
            <pre><code>if rule_result.action == "execute" then
  rule_result.execute.results = ruleset_results[tonumber(rule_result.execute.results_index)]
end</code></pre>
            <p>This code expects that, if the ruleset has action=”execute”, the “rule_result.execute” object will exist. However, because the rule had been skipped, the rule_result.execute object did not exist, and Lua returned an error due to attempting to look up a value in a nil value.</p><p>This is a straightforward error in the code, which had existed undetected for many years. This type of code error is prevented by languages with strong type systems. In our replacement for this code in our new FL2 proxy, which is written in Rust, the error did not occur.</p>
    <div>
      <h3>What about the changes being made after the incident on November 18, 2025?</h3>
      <a href="#what-about-the-changes-being-made-after-the-incident-on-november-18-2025">
        
      </a>
    </div>
    <p>We made an unrelated change that caused a similar, <a href="https://blog.cloudflare.com/18-november-2025-outage/"><u>longer availability incident</u></a> two weeks ago on November 18, 2025. In both cases, a deployment to help mitigate a security issue for our customers propagated to our entire network and led to errors for nearly all of our customer base.</p><p>We have spoken directly with hundreds of customers following that incident and shared our plans to make changes to prevent single updates from causing widespread impact like this. We believe these changes would have helped prevent the impact of today’s incident but, unfortunately, we have not finished deploying them yet.</p><p>We know it is disappointing that this work has not been completed yet. It remains our first priority across the organization. In particular, the projects outlined below should help contain the impact of these kinds of changes:</p><ul><li><p><b>Enhanced Rollouts &amp; Versioning</b>: Similar to how we slowly deploy software with strict health validation, data used for rapid threat response and general configuration needs to have the same safety and blast mitigation features. This includes health validation and quick rollback capabilities among other things.</p></li><li><p><b>Streamlined break glass capabilities:</b> Ensure that critical operations can still be achieved in the face of additional types of failures. This applies to internal services as well as all standard methods of interaction with the Cloudflare control plane used by all Cloudflare customers.</p></li><li><p><b>"Fail-Open" Error Handling: </b>As part of the resilience effort, we are replacing the incorrectly applied hard-fail logic across all critical Cloudflare data-plane components. If a configuration file is corrupt or out-of-range (e.g., exceeding feature caps), the system will log the error and default to a known-good state or pass traffic without scoring, rather than dropping requests. Some services will likely give the customer the option to fail open or closed in certain scenarios. This will include drift-prevention capabilities to ensure this is enforced continuously.</p></li></ul><p>Before the end of next week we will publish a detailed breakdown of all the resiliency projects underway, including the ones listed above. While that work is underway, we are locking down all changes to our network in order to ensure we have better mitigation and rollback systems before we begin again.</p><p>These kinds of incidents, and how closely they are clustered together, are not acceptable for a network like ours. On behalf of the team at Cloudflare we want to apologize for the impact and pain this has caused again to our customers and the Internet as a whole.</p>
    <div>
      <h3>Timeline</h3>
      <a href="#timeline">
        
      </a>
    </div>
    <table><tr><td><p>Time (UTC)</p></td><td><p>Status</p></td><td><p>Description</p></td></tr><tr><td><p>08:47</p></td><td><p>INCIDENT start</p></td><td><p>Configuration change deployed and propagated to the network</p></td></tr><tr><td><p>08:48</p></td><td><p>Full impact</p></td><td><p>Change fully propagated</p></td></tr><tr><td><p>08:50</p></td><td><p>INCIDENT declared</p></td><td><p>Automated alerts</p></td></tr><tr><td><p>09:11</p></td><td><p>Change reverted</p></td><td><p>Configuration change reverted and propagation start</p></td></tr><tr><td><p>09:12</p></td><td><p>INCIDENT end</p></td><td><p>Revert fully propagated, all traffic restored</p></td></tr></table><p></p> ]]></content:encoded>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <guid isPermaLink="false">7lRsBDx09Ye8w2dhpF0Yc</guid>
            <dc:creator>Dane Knecht</dc:creator>
        </item>
        <item>
            <title><![CDATA[Every Cloudflare feature, available to everyone]]></title>
            <link>https://blog.cloudflare.com/enterprise-grade-features-for-all/</link>
            <pubDate>Thu, 25 Sep 2025 14:05:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is making every feature available to any customer. ]]></description>
            <content:encoded><![CDATA[ <p>Over the next year Cloudflare will make nearly every feature we offer available to any customer who wants to buy and use it regardless of whether they are an enterprise account. No need to pick up a phone and talk to a sales team member. No requirement to find time with a solutions engineer in our team to turn on a feature. No contract necessary. We believe that if you want to use something we offer, you should just be able to buy it.</p><p>Today’s launch starts by bringing Single Sign-On (SSO) into our dashboard out of our enterprise plan and making it available to any user. That capability is the first of many. We will be sharing updates over the next few months as more and more features become available for purchase on any plan.</p><p>We are also making a commitment to ensuring that all future releases will follow this model. The goal is not to restrict new tools to the enterprise tier for some amount of time before making them widely available. We believe helping build a better Internet means making sure the best tools are available to anyone who needs them.</p>
    <div>
      <h3>Enterprise grade for everyone</h3>
      <a href="#enterprise-grade-for-everyone">
        
      </a>
    </div>
    <p>It’s not enough to build the best tools on the web. At Cloudflare our mission is to help build a better Internet and that means making the tools we build accessible. We believe the best way to make the Internet faster and more secure is to put powerful features into the hands of as many people as possible.</p><p>We first launched an Enterprise tier years ago when larger customers came to us looking to scale their usage of Cloudflare in new ways. They needed procurement options beyond a credit card, like invoices, custom contracts, and dedicated support. This offering was a necessary and important step to bring the benefits of our network and tools to large organizations with complex needs.</p><p>This created an unintended side effect in how we shipped products. Some of our most powerful and innovative features were launched within an enterprise-only tier. This created a gap, a two-tiered system where some of the most advanced features were reserved only for the largest companies.</p><p>It also created a divergence in our product development. Features built for our self-service customers had to be incredibly simple and intuitive from day-one. Features designated “enterprise-only” didn’t always face that same pressure to scale – we could instead rely on our solutions teams or partners to help set up and support.</p><p>It’s time to fix that. Starting today, we are doing away with the concept of “enterprise-only” features. Over the coming months and quarters, we will make many of our most advanced capabilities available to all of our customers.</p><p>The change will help build a more secure Internet by removing barriers to the adoption of the most advanced tools available. The change improves the experience for all customers. Smaller teams on our self-service plans will have access to the most powerful configuration options we offer. Existing enterprise teams will have easier pathways to adopt new tools without calling their account manager. And our own Product teams have even more reason to continue to make all features we ship easy to use.</p><p>Today we are beginning with dashboard SSO with instructions on how to begin setting that up right now below. It is the first of many though and capabilities like apex proxying and expanded upload limits, along with many others of our most requested enterprise features, will follow.</p>
    <div>
      <h3>Starting with how you sign in to Cloudflare</h3>
      <a href="#starting-with-how-you-sign-in-to-cloudflare">
        
      </a>
    </div>
    <p>One example of a feature we launched only to enterprise customers because of the complexity in setting it up is SSO. Enterprise teams maintain their own identity provider where they can manage internal employee accounts and how their team members log into different services.</p><p>They integrate these identity providers with the tools their employees need so that team members do not need to create and remember a username and password for each and every service. More importantly, the management of identity in a single place gives enterprises the ability to control authentication policies, onboard and offboard users, and hand out licenses for tools.</p><p>We first launched our own SSO support <a href="https://blog.cloudflare.com/introducing-single-sign-on-for-the-cloudflare-dashboard/"><u>way back in 2018</u></a>. In the last seven years we have been helping thousands of enterprise customers manually set this up, but we know that teams of all sizes rely on the security and convenience of an identity provider. As part of this announcement, the first enterprise feature we are making available to everyone is dashboard SSO.</p><p>The functionality is available immediately to anyone on any plan. To get started, follow the instructions <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/dash-sso-apps/"><u>here</u></a> to integrate your identity provider with Cloudflare and to then connect your domain with your account. By setting up your identity provider for dashboard SSO you will also be able to begin using the vast majority of our Zero Trust security features, as well, which are available <a href="https://www.cloudflare.com/plans/zero-trust-services/"><u>at no cost</u></a> for up to 50 users.</p><p>We also know that some teams are too early or distributed to have a full-fledged identity provider but want the convenience and security of managing logins in one place. To that end, we are also excited to launch support for GitHub as a social login provider to the Cloudflare dashboard as part of today’s announcement.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BI0r2eZHaNulh9ur0L5HD/386d1f63b0ece9bea08c51c036b6584c/unnamed__35_.png" />
          </figure>
    <div>
      <h3>And extending to almost everything else over the next year</h3>
      <a href="#and-extending-to-almost-everything-else-over-the-next-year">
        
      </a>
    </div>
    <p>We prioritized dashboard SSO because just about every team that uses Cloudflare wants it. This one change helps make nearly every customer safer by allowing them to centrally manage team access. As we burn down the list of previously enterprise-only features, we will continue targeting those that have similar broad impact.</p><p>Some capabilities, like Magic Transit, have less broad appeal. The organizations that maintain their own networks and want to deploy Magic Transit tend to already want to be enterprise customers for account management reasons. That said, we still can improve their experience by making tools like Magic Transit available to all plans because we will have to remove some of the friction in the setup that we have historically just solved with people hours from our solution engineers and partners.</p><p>We also realize that the way some of these features are priced only made sense with an invoice or enterprise license agreement model. To make this work, we need to revisit how some of our usage metering and billing functions. That will continue to be a priority for us, and we are excited about how this will push us to continue making our packaging and billing even simpler for all customers.</p><p>There are some features that we can’t make available to everyone because of non-technical reasons. For example, using our China Network has complicated legal requirements in China that are impossible for us to manage for millions of customers. </p>
    <div>
      <h3>Self-service by default going forward</h3>
      <a href="#self-service-by-default-going-forward">
        
      </a>
    </div>
    <p>One thing we are not announcing today is a strategy to continue to release “enterprise-only” features for a while before they eventually make it to the self-service plans. Going forward, to launch something at Cloudflare the team will need to make sure that any customer can buy it off the shelf without talking to someone.</p><p>We expect that requirement to improve how all products are built here, not just the more advanced capabilities. We also consider it mission-critical. We have a long history of making the kinds of tools that only the largest businesses could buy available to anyone, from universal SSL <a href="https://blog.cloudflare.com/introducing-universal-ssl/"><u>over a decade ago</u></a> to newer features this week that were available for self-service plans immediately like <a href="https://blog.cloudflare.com/per-customer-bot-defenses/"><u>per-customer bot detection IDs</u></a> and security of data in transit <a href="https://blog.cloudflare.com/saas-to-saas-security/"><u>between SaaS applications</u></a>. We are excited to continue this tradition.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>You can get started right now setting up dashboard SSO in your Cloudflare account using the documentation available <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/dash-sso-apps/"><u>here</u></a>. We will continue to share updates as previously enterprise-only features are made available to any plan.
</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[PAYGO]]></category>
            <category><![CDATA[Enterprise]]></category>
            <category><![CDATA[Plans]]></category>
            <guid isPermaLink="false">5GlnTlWFL0ezm1fRnEzoF1</guid>
            <dc:creator>Dane Knecht</dc:creator>
        </item>
        <item>
            <title><![CDATA[Help build the future: announcing Cloudflare’s goal to hire 1,111 interns in 2026]]></title>
            <link>https://blog.cloudflare.com/cloudflare-1111-intern-program/</link>
            <pubDate>Mon, 22 Sep 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ We are incredibly excited to announce our most ambitious intern program yet: Cloudflare aims to hire as many as 1,111 interns over the course of 2026. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, our mission is to help build a better Internet. That mission is ambitious, long-term, and requires constant innovation. But building for the future isn’t just about the technology we create — it’s also about investing in the people who will create it. That’s why today, we are incredibly excited to announce our most ambitious intern program yet: <b>Cloudflare aims to hire as many as 1,111 interns over the course of 2026. </b>This effort to grow our number of interns next year will happen in hub locations around the world.  </p>
    <div>
      <h2>Why is Cloudflare doing this? </h2>
      <a href="#why-is-cloudflare-doing-this">
        
      </a>
    </div>
    <p>We view internships as a vital pipeline for talent and a source of new energy and ideas. The number of our intern goal, a nod to our 1.1.1.1 public DNS resolver, is intentional. It represents our deep technical roots and our focus on building foundational infrastructure for the Internet. Now, we stand at the cusp of a new technological revolution: the age of AI. </p><p>To win in this new era, we can’t just rely on established methods. We need new ways of thinking, unconstrained by the "way things have always been done." That’s why this significantly increased class of interns will have a special focus: <b>to ramp up the creative and widespread application of AI with a fresh approach.</b></p><p>We want this group to challenge our assumptions. They will be tasked with looking at our customers’ needs, our products and features, our network, and our operations to find novel ways to utilize AI. How can AI make our network even smarter? How can it help our customers be more secure and efficient? How can it transform our own business processes? We believe that by empowering a large, diverse cohort of bright minds who have grown up as digital and now AI natives, we will unlock innovations we haven’t even imagined yet.</p>
    <div>
      <h2>This is the exact right time to expand our intern program </h2>
      <a href="#this-is-the-exact-right-time-to-expand-our-intern-program">
        
      </a>
    </div>
    <p>Like you, we have seen numerous <a href="https://digitaleconomy.stanford.edu/publications/canaries-in-the-coal-mine/"><u>reports</u></a> that more and more firms are capping their total headcount in favor of leaning on more AI tools, leading to <a href="https://www.nytimes.com/2025/08/10/technology/coding-ai-jobs-students.html"><u>downsizing their intern and new-graduate hiring</u></a>. This is resulting in increased <a href="https://www.theatlantic.com/economy/archive/2025/04/job-market-youth/682641/"><u>sidelining of new college graduates</u></a>. But we think this misreads the moment completely, so we’re heading in the opposite direction. </p><p>While we are excited about what AI tools can help do, we have a different philosophy about their role. AI tools make great team members even better, and allow firms to set more ambitious goals. They are not replacements for new hires — but ways to multiply how new hires can contribute to a team.</p><p>The next phase of Cloudflare’s success will be driven by considerable change in almost everything we do. And although we have an amazing team, we are humble enough to realize that we don’t possess everything we need to envision and implement that radical change. We need the innovation and fresh approach of a talented new generation of leaders. And we can’t press “pause” on bringing aboard that talent. </p><p>This isn’t the first time we’ve made a counter-cultural commitment to interns. Back in the 2020, as the world faced unprecedented uncertainty, many companies made the difficult decision to scale back or cancel their internship programs. We went in the opposite direction. Believing that investing in talent was more critical than ever, <b>we </b><a href="https://blog.cloudflare.com/cloudflare-doubling-size-of-2020-summer-intern-class/"><b><u>doubled</u></b></a><b> the </b><a href="https://techcrunch.com/2020/04/02/cloudflare-ceo-pledges-to-double-2020-internship-class/"><b><u>size</u></b></a><b> of our intern class.</b> We knew that these students represented the future, and abandoning them was not an option. That decision reinforced our culture of long-term thinking and our responsibility to foster emerging talent, especially during the toughest of times. And we’ve benefitted from it — some of our most promising young employees emerged from this batch.</p>
    <div>
      <h2>Interns ship at Cloudflare</h2>
      <a href="#interns-ship-at-cloudflare">
        
      </a>
    </div>
    <p>Interns at Cloudflare do real, meaningful work — they ship. They join active teams, and are expected to contribute to the problems that we solve everyday. Our interns don’t merely get a feel for the place and fetch coffee. This isn’t a “test drive.” We want every member of our intern program to take ownership of and conclude their time being able to point to a concrete deliverable that solved a real customer or internal problem at Cloudflare. </p><p>From day one, interns are embedded in teams across the company — from engineering and product to marketing, legal, and finance. They work alongside seasoned experts on critical projects, contributing code that ships to millions, launching marketing campaigns, and helping to shape the policies that govern the Internet. Our goal is not just to provide an internship experience; it's to provide the foundation for a career. We are committed to training the people who will one day lead our company, our industry, and the future of the Internet.</p><p>The challenges we address will vary by intern and by team. You can review examples of intern projects from last year in this post <a href="https://blog.cloudflare.com/2024-interns/"><u>here</u></a> and real, dedicated, announcements from interns who launched new technologies <a href="https://blog.cloudflare.com/introducing-high-definition-portrait-video-support-for-cloudflare-stream/"><u>here</u></a> and <a href="https://blog.cloudflare.com/embedded-function-calling/"><u>here</u></a>. Some of our interns operate as if they were just one more engineer or staff member on an existing team, helping contribute to its mission. Others are tasked with more exploratory projects where we ask them to go research and prototype new ideas.</p><p>Aside from impactful project work, our internship program offers a deep dive into our culture, while providing interns with practical experience and leadership skills. They'll build a valuable professional network, from engaging in social events and coffee chats to gaining direct access to executives through exclusive Q&amp;A sessions. Every intern is paired with a dedicated mentor, and they'll get the chance to present their final work to the entire company. By the end of the program, interns will not only have enhanced their skills but also built lasting relationships to benefit their future careers.</p>
    <div>
      <h2>What do we look for in an intern?</h2>
      <a href="#what-do-we-look-for-in-an-intern">
        
      </a>
    </div>
    <p>We are looking for talented, curious, empathetic, and hard working team members who are inspired by our mission to help build a better Internet. Come with the attitude to learn, and we will handle the rest. We do not expect interns to be immediate experts in the fields they are joining. The Internet is full of enough jokes about companies posting a job for an internship and asking for ten years of work experience.</p><p>We do try to match opportunities with the applicant’s study areas and relevant skills. We want to equip our interns for success and prefer, for example, finding software engineering opportunities for computer science students or accounting opportunities for finance majors. Each internship role posted will specify any specific preferences we have for areas of study. We recognize that many students have robust portfolios, GitHub projects, or open-source contributions. We'll optimize our matching process to connect you with a relevant team where you can immediately apply your skills and elevate your work.</p><p>Thousands of candidates apply for our internships each year. We expect this expansion to increase that level of interest significantly. To help identify the kinds of builders we want to recruit, we are going to fast track engineering and other candidates who complete an assignment to build a type of AI-powered application on Cloudflare (more details on that below).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Se0OPghkFMeVJM3MsCY5a/3a9630ad3845236229dcfb6d2d17715f/BLOG-2947_2.png" />
          </figure>
    <div>
      <h2>How does the internship program work?</h2>
      <a href="#how-does-the-internship-program-work">
        
      </a>
    </div>
    
    <div>
      <h3>Working in Hub Offices</h3>
      <a href="#working-in-hub-offices">
        
      </a>
    </div>
    <p>As part of this program, we will only be hiring interns who can be present multiple days each week in one of our hub offices (generally 3-4 days depending on the team). Cloudflare has adopted a hybrid approach to work centered in “hub” locations around the world. The various hybrid approaches adopted by different teams are based on experimentation and their unique functions. For interns, we think it is important for new and early career team members here for a brief tenure to connect with each other as well as more senior leaders in our organization. We believe that mentorship and coaching is best done in person. </p><p>We expect to post internship opportunities in the following Cloudflare office locations:</p><ul><li><p>Austin, USA</p></li><li><p>New York City, USA</p></li><li><p>San Francisco, USA</p></li><li><p>Bengaluru, India</p></li><li><p>Lisbon, Portugal</p></li><li><p>London, UK</p></li></ul>
    <div>
      <h3>Year Round</h3>
      <a href="#year-round">
        
      </a>
    </div>
    <p>Our internships generally last for 12 weeks. While we plan to prioritize summer internships, we expect to hire significant numbers of interns in the spring and fall of 2026 as well.</p><p>Summer internships give students an opportunity to get experience without interrupting a school semester. The seasonal approach also makes it possible for us to create cohorts of interns who support each other on projects. That said, we know that education has changed a bit since we were in school. An increasing number of universities have developed programs for students to work with companies as part of a normal school semester, and others are more flexible in their approach to letting students choose to reduce hours or take a semester away from classwork to support an internship. </p>
    <div>
      <h3>Real pay for real work</h3>
      <a href="#real-pay-for-real-work">
        
      </a>
    </div>
    <p>We pay our interns. This means a competitive rate that is generally akin to the prorated salary of an entry-level position. And if you have to relocate temporarily to a city where we have an office, we will give you a stipend to support your travel and housing needs. Since we expect interns at Cloudflare to contribute immediately to real problem solving, it’s only fair to pay them accordingly. </p><p>And we believe it's incredibly important to pay interns. Many long-term employment opportunities arise through internship programs, so it's unfair to limit those programs to those who can afford to relocate and work full time for little or no pay. </p>
    <div>
      <h2>How to apply</h2>
      <a href="#how-to-apply">
        
      </a>
    </div>
    <ol><li><p>Keep an eye on our <a href="https://www.cloudflare.com/careers/early-talent/"><u>career site</u></a>, and specifically our internship opportunities listed <a href="https://www.cloudflare.com/careers/jobs/?department=Early+Talent"><u>here</u></a>. We will start posting more internship opportunities for 2026 starting on October 15th. </p></li><li><p>The intern opportunities page will link to our internship application portal that will streamline the application process. We plan to review applications in batches until all positions are filled. Our interview process will take 3-4 weeks.</p></li><li><p>Want a leg up? For the Software Engineering internship, we plan to fast track review of candidates who complete an assignment to build a type of <a href="https://agents.cloudflare.com/"><u>AI-powered application</u></a> on Cloudflare. Submit directly with your application.</p></li></ol><p>We look forward to hearing from you.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Careers]]></category>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[Internship Experience]]></category>
            <guid isPermaLink="false">GMhGwtoDEE7S4PlPutkUn</guid>
            <dc:creator>Kelly Russell</dc:creator>
            <dc:creator>Dane Knecht</dc:creator>
            <dc:creator>Judy Cheong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Firebolt: the fastest, safest ads on the web]]></title>
            <link>https://blog.cloudflare.com/firebolt/</link>
            <pubDate>Mon, 30 Jan 2017 19:46:19 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s mission is to help build a better Internet. That means a faster, more secure, open Internet world-wide. We have millions of customers using our services like free SSL, an advanced WAF. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s mission is to help build a better Internet. That means a faster, more secure, open Internet world-wide. We have millions of customers using our services like <a href="https://www.cloudflare.com/application-services/products/ssl/">free SSL</a>, an advanced <a href="https://www.cloudflare.com/waf/">WAF</a>, the latest <a href="/a-very-webp-new-year-from-cloudflare/">compression</a> and the most up to date <a href="https://www.cloudflare.com/security/">security</a> to ensure that their web sites, mobile apps and APIs are secure and fast.</p><p>One vital area of web technology has lagged behind in terms of speed and security: online ads. And consumers have been turning to ad blocking technology to secure and speed up their own web browsing. </p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sU8gDStetbUmC87cHg7V2/d69b2e495d829f05040c1762739ec15e/image00-1.png" />
            
            </figure><p>Today, Cloudflare is introducing a new product to make web ads secure, fast and safe. That product is <i>Firebolt</i>.</p>
    <div>
      <h3>Firebolt</h3>
      <a href="#firebolt">
        
      </a>
    </div>
    <p>With Firebolt, ad networks can instantly speed up and secure their ads, resulting in happy consumers and better conversion rates.</p><p>Firebolt delivers: </p>
    <div>
      <h4>Lightning fast ad delivery</h4>
      <a href="#lightning-fast-ad-delivery">
        
      </a>
    </div>
    <p>Cloudflare's global network of 102 data centers in 50 countries, combined with routing and performance technologies, makes the delivery of online ads to any device up to five times faster.</p>
    <div>
      <h4>Free, simple SSL</h4>
      <a href="#free-simple-ssl">
        
      </a>
    </div>
    <p>Adding SSL to ad serving has been challenging for some ad networks. Cloudflare has years of experience providing <a href="https://www.cloudflare.com/application-services/products/ssl/">free, one click SSL</a> for our customers. Firebolt ads are automatically available over SSL with <a href="https://www.cloudflare.com/application-services/solutions/certificate-lifecycle-management/">no complex process of getting and maintaining SSL certificates</a>.</p>
    <div>
      <h4>Firebolt includes AMP for Ads</h4>
      <a href="#firebolt-includes-amp-for-ads">
        
      </a>
    </div>
    <p>Firebolt enables any independent ad network to leverage the new AMP ad format easily. This makes it possible for ads to appear in AMP content served by Google and an increasing number of sites. Firebolt is the only independent way to serve the <a href="https://www.cloudflare.com/website-optimization/firebolt/">newly announced AMP for Ads</a> outside of Google’s advertising network.</p>
    <div>
      <h4>Cryptographically signed ads</h4>
      <a href="#cryptographically-signed-ads">
        
      </a>
    </div>
    <p>All ad content delivered by Firebolt for AMP for Ads is cryptographically signed to ensure that it meets the required format and security standards. Signed ads reduce the risk of malware and increase confidence in ads for consumers.</p>
    <div>
      <h4>The most advanced browser security</h4>
      <a href="#the-most-advanced-browser-security">
        
      </a>
    </div>
    <p>Firebolt ads take advantage of web browser security features including CORS, X-Content-Type-Options and Strict-Transport-Security to ensure the integrity of ads delivered to browsers.</p>
    <div>
      <h3>A faster, safer Internet for everyone</h3>
      <a href="#a-faster-safer-internet-for-everyone">
        
      </a>
    </div>
    <p>Firebolt takes us one step closer to making the Internet a better place by benefitting everyone in the ad ecosystem, including the consumer.</p><p>During a recent test, ad platform TripleLift used Cloudflare's Firebolt to serve AMP ads on Time Inc.'s properties. Ads loaded <b>six times faster</b> and Time Inc. saw <b>13 percent more revenue</b> relative to traditional ads. “<i>Cloudflare was easy to set up, and we saw an impressive difference in the speed of ad delivery with Firebolt's support for AMP for Ads</i>," said Shaun Zacharia, co-founder and President of TripleLift. "<i>AMP Ads loaded six times faster and were three times lighter than comparable standard ads.</i>"</p><p>If you are an ad network or publisher, please reach out to <a>firebolt@cloudflare.com</a> to learn more about Firebolt and how Cloudflare can help you monetize the Internet content we all rely on.</p> ]]></content:encoded>
            <category><![CDATA[Advertising]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[AMP]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4IP5JTJN5gmrdshxjVlRLe</guid>
            <dc:creator>Dane Knecht</dc:creator>
        </item>
        <item>
            <title><![CDATA[Patching a WHMCS zero day on day zero]]></title>
            <link>https://blog.cloudflare.com/patching-a-whmcs-zero-day-on-day-zero/</link>
            <pubDate>Thu, 03 Oct 2013 11:00:00 GMT</pubDate>
            <description><![CDATA[ A critical zero-day vulnerability was published today affecting any hosting provider using WHMCS. As part of building a safer web, CloudFlare has added a ruleset to our Web Application Firewall (WAF)  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>A critical zero-day vulnerability was published today affecting any hosting provider using WHMCS. As part of building a safer web, CloudFlare has added a ruleset to our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a> to block the published attack vector. Hosting partners running their WHMCS behind CloudFlare's WAF can enable the WHMCS Ruleset and implement <a href="/ddos-prevention-protecting-the-origin">best practices</a> to be fully protected from the attack. </p><p>Our friends at WHMCS quickly published a patch here: <a href="http://blog.whmcs.com/?t=79427">blog.whmcs.com/?t=79427</a></p><p>CloudFlare recommends applying the patch for your current version of WHMCS or updating WHMCS to version 5.2.8 to close this vulnerability.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[WAF]]></category>
            <guid isPermaLink="false">6aVecqAQFNtrd51CkHo58I</guid>
            <dc:creator>Dane Knecht</dc:creator>
        </item>
    </channel>
</rss>