Log Explorer

Investigate and Resolve with Native Observability

Cloudflare Log Explorer brings observability and forensics capabilities directly into your Cloudflare dashboard, providing a comprehensive and contextualized view of your environment. With Log Explorer, customers can efficiently search Cloudflare logs using familiar SQL queries, detect and diagnose issues quickly, and seamlessly transition from investigation to action.
Efficient Investigation and Troubleshooting

Log Explorer allows customers to efficiently search Cloudflare logs using familiar SQL queries, enabling quick detection and diagnosis of issues. With Log Explorer, customers can seamlessly transition from investigation to action, reducing mean time to detect and respond to security incidents.

Comprehensive Visibility and Context

Log Explorer provides a comprehensive and contextualized view of your environment, leveraging Cloudflare's vast global network. It writes each batch of log records to a Parquet file in R2, optimized for efficient data storage and retrieval. This enables organizations to gain deeper insights into their environment and make data-driven decisions.

Streamlined Collaboration and Query Management

Log Explorer enables customers to save time and collaborate with saved queries. Additionally, features like Custom Alerting and flexible retention are being actively developed to further enhance the experience, allowing teams to work more efficiently and effectively.

Native Observability with Log Explorer

Investigate and resolve issues with native observability and forensics capabilities directly in your Cloudflare dashboard

Background Pattern

Real-World Applications of Log Explorer

Discover how Log Explorer brings observability and forensics capabilities directly into your Cloudflare dashboard

Get started with Log Explorer

Detect and Diagnose Security Incidents

Security teams can use Log Explorer to detect and diagnose security incidents, such as Remote Code Execution (RCE) attacks, and correlate them with other security events like malicious content uploads, source IP addresses, and JA3/JA4 fingerprints. This enables quick identification of high-risk incidents, such as compromised machines spreading malware.

Monitor API Security and Performance

Log Explorer allows users to monitor the data transfer and exceptions of API endpoints within their application, as well as see timing data for API endpoints and error rates. This helps developers optimize application performance and identify potential security issues, ensuring the integrity of their APIs.

Identify and Respond to Malware Threats

Log Explorer can be used to monitor logs from Cloudflare Secure Web Gateway to identify malware, such as Katz Stealer, by analyzing DNS queries and HTTP requests from users within the company. This helps organizations detect and respond to potential threats, minimizing the risk of a security breach.

Investigate Compromised Systems and Contain Threats

After diagnosing a security issue, analysts can use Log Explorer to investigate whether an attacker accessed and compromised other internal systems by searching logs from Zero Trust services, using context such as compromised IP addresses. This enables organizations to contain threats and prevent further damage.

Build without boundaries

Join thousands of developers who've eliminated infrastructure complexity and deployed globally with Cloudflare. Start building for free — no credit card required.