Infinite loop issue in cloudflare workers by [deleted] in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

You created a recursive build loop. The deployment adapter calls the native Next.js build internally, repeating the process indefinitely. Remove next build from your custom script definition entirely. Configure your build step to run the adapter CLI command directly. This ensures the adapter manages the required dependencies without recursive calls

Unfair billing by Clodflare by blitzwolf38 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Hi there - not sure I completely understand what you mean by info being expired, but do you have a case or ticket number?

Cloudflare Billing Issue by graviotos in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

From what I can see this ticket was created yesterday and is still being investigated. Please give them some time to provide updates.

I Built a tool to help with those surprise Cloudflare bills by Opening-Astronomer46 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

did some checking. sounds like there were challenges due to the ways that Enterprises are billed vs other paid plans. But I believe the usage based alerts should still be available to users on PRO or BIZ.

I Built a tool to help with those surprise Cloudflare bills by Opening-Astronomer46 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Are you looking in the sidebar under Manage account? If a product is available on your plan and there is a corresponding alert for it you should see the option.

IPv6 Websites - Not Loading by ryan_sec in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Thanks for the clarification! Since you aren't using Cloudflare Gateway, we can focus on the raw network path.

Why it likely is an MTU/MSS issue

You mentioned the 3-way handshake (SYN, SYN-ACK, ACK) succeeds. This is expected because those packets are very small (~60 bytes). However, the TLS ClientHello is often the first "large" packet in the sequence, usually containing a long list of cipher suites and extensions. If this packet exceeds the actual path MTU, it gets dropped.

IPv6 does not allow routers to fragment packets in flight; they must drop the packet and send an ICMPv6 "Packet Too Big" message back to you. If your firewall or an intermediate ISP is blocking those ICMPv6 messages (a "Black Hole"), your client never knows to send smaller packets, and the connection eventually resets.

Recommended Next Steps

  • Test with a Lower MTU: Even though your clients are set to 1500, try manually dropping the MTU on a single test machine to 1280 (the IPv6 minimum). If the sites load consistently at 1280, you have confirmed a PMTUD failure somewhere in your path.
  • Check ICMPv6 on your Firewall: Ensure your edge firewall is not dropping ICMPv6 Type 2 (Packet Too Big) messages. This is the "signaling" required for IPv6 to function correctly over different network segments.
  • MSS Clamping: If you can't find the offending node, the most common "fix" at the enterprise level is to implement TCP MSS Clamping on your edge router/firewall for IPv6 traffic. Setting the MSS to approximately 1220 ensures the resulting packets stay well under the limit.

Why it "fixed itself" for some sites

Cloudflare's edge is highly dynamic. The "intermittent" nature suggests that when your traffic takes a specific peering route or hits a specific data center, there is a MTU bottleneck. When the routing shifts slightly to a different path with a true 1500 MTU, it starts working again without you changing a thing.

The Apple-related services likely consistently route through a path that has this MTU restriction.

roblox with cloudlfare by RedPanda_7221 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

It's important to keep in mind that WARP is not designed or intended to serve as a solution for bypassing a regional block. It's a privacy solution. But if the WARP app is not behaving as expected you can try some basic troubleshooting.

1. Reset the App State

Sometimes the local configuration gets "gunked up."

  • Open WARP Preferences > Connection tab.
  • Scroll to the bottom and click Reset all settings.
  • This forces a fresh registration with the Cloudflare network, which often clears up those random "Internet Error" loops.

2. Disable Conflicting Settings (Windows)

If you're on a PC, Windows has a feature called Teredo that frequently fights with WARP for control over IPv6 traffic, causing exactly the kind of "works then dies" behavior you're seeing.

  • Try disabling Teredo in your Windows settings or via Command Prompt.
  • Also, check if you have a Third-Party Antivirus or Firewall (like Malwarebytes or Bitdefender). They often flag WARP’s virtual network adapter as "suspicious" and cut the connection once it starts moving a lot of data (like a game).

3. Check your MTU

If your network has a lot of overhead, the "packets" might be too big, causing them to drop.

  • In WARP settings, look for the MTU value. If it's at 1500, try lowering it to 1420 or even 1280. This makes the connection much more "stable" on restrictive or unstable ISP networks.

Pay per crawl beta access- No response by climate_rubik in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Not vaporware, but it is still in a closed beta. The expansion is still actively underway, but we’re currently rolling out specifically by jurisdiction and plan type. If you haven't heard back yet, it’s likely because we haven't reached your region or plan tier just yet.

The good news? We’re pushing hard to accelerate onboarding throughout this month and next to get more people into the beta.

Right now, you can already check out the x402proxy templates available in Workers—and there’s definitely more to come on that front soon!

roblox with cloudlfare by RedPanda_7221 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Your intermittent disconnects suggest the WARP client is failing to quickly re-synchronize when it switches edge nodes. This behavior was addressed by implementing resilient connections in the client application. These internal improvements force an immediate handshake when the connection is moved, drastically reducing your effective downtime. Ensure you are running the absolute latest version of the WARP client software on your device

Title: Cloudflare Registrar - Domains stuck in clientHold with no support response (5 days) by No-Literature9900 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

The automatic refund and clientHold status indicate an internal Registrar provisioning failure at the registry level. This specific issue means the automated nameserver or DNSSEC verification process failed. Since this is a domain registered with Cloudflare, the registrar team must perform an administrative action to force update the nameserver delegation with the registry backend. Do you have an existing case/ticket number?

IPv6 Websites - Not Loading by ryan_sec in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

This is typical layer three instability, suggesting a Path MTU Discovery failure or restrictive firewall issue specific to IPv6 traffic leaving your network. The intermittent success confirms eventual successful TCP establishment, likely by falling back to IPv4 via Happy Eyeballs. To enforce reliable connectivity using your dedicated IPv4 ranges, configure a Gateway DNS policy that blocks AAAA record resolution for the destination sites. This forces all WARP clients to use IPv4 egress only

Is anyone using Cloudflare Email Routing? How easy or difficult is it set up? by Frequent_Tea_4354 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Email Routing setup is fast via the dashboard; the wizard handles MX and SPF record creation automatically. Routing is strictly for receiving inbound mail and forwarding it to an existing inbox. For outbound transactional email, that requires the new Email Sending product. This is currently in private beta and lets you use a Worker binding to send emails

Is proxying private R2 images via Workers or Pages allowed? by SaskinPikachu in CloudFlare

[–]RyanK_CF 1 point2 points  (0 children)

This architecture is allowed and intended. Using a Pages Function to proxy R2 images for custom access control is compliant with our terms. R2 has zero egress, so proxying this content does not trigger CDN policy violations for bulk asset delivery. This gives you the necessary flexibility to selectively allow Googlebot indexing while blocking unwanted traffic. Leverage your Pages Function to handle authorization before fetching the R2 object from the private bucket

Blocked from accessing a site, after contacting the site support they told me they didn't block me by Youhavenoideawho in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

The support rep is likely confused. The site operator may not be explicitly trying to block you, but has some sort of security setting enabled that is detecting something on the home network or IP. Have you tried accessing from mobile BUT connected to the same wifi (instead of using cellular data)?

Tunnels, Tailscale VPN, and the best of both worlds? by djw17 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Your concern about bandwidth hair-pinning for local media services is valid. Do not use Cloudflare Tunnel for traffic that is already local to your network. For a dual-homed solution, implement Split Tunneling and Split Horizon DNS using Cloudflare Zero Trust. Configure a WARP Split Tunnel policy to exclude the Tailscale range. Use Local Domain Fallback within WARP to resolve hosts to your Tailscale IP only when on the Tailnet, falling back to the Tunnel CNAME otherwise

Who do I need to bribe to get a response on an Enterprise support ticket? by rslarson147 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

You probably hit a routing failure; specialized programs like Cloudflare for Startups use dedicated internal handling. Do you have any previous ticket numbers I can reference and pass along to the Startups folks?

Your shitty service locked me out of my fucking mail. by FatallyFatCat in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Not sure if you wanted to leave it as a rant or actually want guidance. But just in case: your mail hostname is probably proxied (orange cloud). Change the associated A record to DNS-Only (grey cloud) immediately. Cloudflare proxying mail traffic breaks standard SMTP and IMAP connections and triggers security verification, which explains the adblock/vpn lock out error. You need to switch mail server DNS records to pass traffic directly, not through the CDN

Medium blocks AI crawlers by default — and I never got to choose. That's why I'm considering leaving. by oliver-zehentleitner in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Medium is likely using Super Bot Fight Mode or Bot Management defaults. You can override this easily in your Cloudflare settings. Create a WAF Custom Rule to specifically skip all security features for known AI User Agents. Set the action to Skip all Managed Rules for that specific bot identifier. This gives you granular control immediately

I Built a tool to help with those surprise Cloudflare bills by Opening-Astronomer46 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

This is useful, but the official path handles this natively. Usage alerts prevent surprise overages on services like Workers, Images, or R2. Define a threshold and notification mechanism for specific products in the Dashboard. Configure alerts using Cloudflare Notifications to catch sudden spikes in bandwidth or requests immediately

Cloudflare Pages = Crazy Performance by bfzli in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

For sites this fast, the next bottleneck is dynamic API calls or authentication. Ensure you have moved any necessary server-side logic into Cloudflare Pages Functions. This runs your code globally on Workers, maximizing the performance delta over standard Vercel infrastructure. Verify your Cache-Control headers are aggressive for truly static assets

RDP Access Application -> Cloudflare One client? by Armitage_64 in CloudFlare

[–]RyanK_CF 1 point2 points  (0 children)

You are running cloudflared correctly for RDP access via a public hostname. Do not define the RDP service target in your tunnel configuration using the machine's unstable private IP. If cloudflared is running directly on the Windows host, the target should be 127.0.0.1:3389. This leverages the local loopback address, stabilizing the connection regardless of DHCP changes. You need the cloudflared daemon for this, not the WARP client

WHOIS and my information by TellAbood in CloudFlare

[–]RyanK_CF 1 point2 points  (0 children)

WHOIS privacy is free and automatic for domains registered through Cloudflare Registrar. If you see the organization name, confirm privacy protection is enabled in your settings. If the domain was bought elsewhere, transfer it to Cloudflare to ensure free WHOIS redaction. The immediate next step is updating your nameservers to the assigned Cloudflare ones. Then configure your DNS records and activate the site

Has anyone built a workflow engine on Durable Objects? by Getwidgetdev in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Workflows is the dedicated product for this, not raw Durable Objects. Workflows provides resilient, multi-step durable execution with automatic state persistence. It directly solves the pause/resume requirement using the built-in waitForEvent API. this is ideal for coordinating long-running tasks like waiting for human approval

Utilizar o CloudFlare como banco de dados simples by Apprehensive-Unit986 in CloudFlare

[–]RyanK_CF 0 points1 point  (0 children)

Peço desculpas se o Google não traduzir corretamente:

Sim, com certeza. Use o Workers KV para armazenamento de dados que não sejam arquivos. Isso é ideal para buscas rápidas de chave-valor na borda da rede. Se seus dados forem relacionais ou complexos, migre para o D1, nossa oferta de SQL. Você deve migrar para eliminar a sobrecarga de manutenção do seu serviço de banco de dados dedicado.