How to see distribution of requests by colocation server?

Can you see that data on dashboard?
If not, can it be added as an header in the request?

Thanks for your help!

Best you can do (on non-enterprise) is to look at the Geography sectio in the Analytics tab


Note that this is just based on country, and won’t show you the specific collocations used.

You can configure your origin web server to log Cloudflare cf-ray id and cf country headers and parse you logs. This is what I do with my nginx based origin servers

1 Like

To further @eva2000’s point the ray ID contains the colo ID after the dash in the value.


Yup very handy

for top 20 IATA airport code based CF Datacenter connections to my origin

pzcat -f cf-access.log{,-*} | awk '{print $NF}' | awk -F '-' '{print $2}' |  sed -e 's|\"||g' | sort | uniq -c | sort -rn | awk '{print $1, $2, ""$2}' | head -n20
166880 SEA
108610 FRA
72431 DFW
47621 IAD
47618 AMS
38194 SIN
30617 LHR
27575 ORD
24423 SYD
23454 EWR
23165 SJC
18757 NRT
17968 DME
15119 LAX
10865 CDG
9130 HKG
8139 KBP
7935 ARN
7225 MCI
4088 HEL

top TLS protocol/ciphers communicated over for CF to origin connections

pzcat -f cfssl-access.log{,-*} | grep -v 'SERVER_IP' | awk '{n = 2; for (--n; n >= 0; n--){ printf "%s\t",$(NF-n)} print ""}' | sort | uniq -c | sort -rn | head -n20 | column -t
753574  TLSv1.2  ECDHE-ECDSA-AES128-GCM-SHA256
107     TLSv1.2  ECDHE-ECDSA-AES256-GCM-SHA384
81      -        -
19      TLSv1.2  ECDHE-ECDSA-CHACHA20-POLY1305
7       TLSv1    ECDHE-ECDSA-AES128-SHA

eventually we shall see TLS 1.3 in that mix for CF to origin communication Cloudflare speak TLS 1.3 0-RTT with Origin Backend? :slight_smile:

This topic was automatically closed after 31 days. New replies are no longer allowed.