Cloudflare Tunnels

Home » Tutorials » Cloudflare Tunnels

What is Cloudflare Tunnel?

Cloudflare Tunnel is a secure, encrypted connection that allows users to expose applications and services to the internet without opening inbound firewall ports. It enables businesses and developers to securely route traffic through Cloudflare’s global network, protecting applications from DDoS attacks, unauthorised access, and other security threats.

With Cloudflare Tunnel, self-hosted services can be accessed from anywhere without requiring a public IP address, VPN, or complex networking configurations. It works by running a lightweight Cloudflare Connector (cloudflared) in your local environment, which establishes a persistent outbound connection to Cloudflare’s network.

Key Benefits:
Zero Trust Security – Protects applications with identity-based access controls.
No Open Ports – Eliminates the need to expose services to the public internet.
Automatic TLS Encryption – Ensures end-to-end encryption without managing certificates.
Seamless Integration – Works with Cloudflare Access, Zero Trust, and Load Balancing.

Prerequsites

  • Virtual Machine running Ubuntu 22.04 or newer

Update Package Repository and Upgrade Packages

sudo apt update
sudo apt upgrade

Download and Install Cloudflared

wget -q https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64.deb
sudo dpkg -i cloudflared-linux-amd64.deb
cloudflared --version

Authenticate with Cloudflare

cloudflared tunnel login

Provide your Cloudflare credentials and token

Create a new tunnel

cloudflared tunnel create my-tunnel

Configure the tunnel to route traffic to your local VM

cloudflared tunnel route dns my-tunnel jenkins.devopsfoundry.com
  • Copy tunnel ID

Create “config.yml” file in cloudflared dir

vim ~/.cloudflared/config.yml
tunnel: j-tunnel
credentials-file: /home/femi/.cloudflared/3e9dfb6f-63c9-4902-b48d-83aa2abb386a.json

ingress:
  - hostname: jenkins.devopsfoundry.com
    service: http://127.0.0.1:8080  # Another service using HTTPS
  - service: http_status:404  # Default for unmatched requests

Start the tunnel

cloudflared tunnel run my-tunnel

Exposing kubernetes Pods via Tunnel

Create Secret with tunnel ID

kubectl create secret generic tunnel-credentials \
--namespace argocd \
--from-file=credentials.json=/home/femi/.cloudflared/1fae3131-bf44-4430-afb9-7fa364fd48b9.json
vim cloudflared.yaml

Edit this file to suit your application

---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: cloudflared
  namespace: argocd
spec:
  selector:
    matchLabels:
      app: cloudflared
  replicas: 1
  template:
    metadata:
      labels:
        app: cloudflared
    spec:
      containers:
      - name: cloudflared
        image: cloudflare/cloudflared:2022.3.0
        args:
        - tunnel
        - --config
        - /etc/cloudflared/config/config.yaml
        - run
        livenessProbe:
          httpGet:
            path: /ready
            port: 2000
          failureThreshold: 1
          initialDelaySeconds: 10
          periodSeconds: 10
        volumeMounts:
        - name: config
          mountPath: /etc/cloudflared/config
          readOnly: true
        - name: creds
          mountPath: /etc/cloudflared/creds
          readOnly: true
      volumes:
      - name: creds
        secret:
          secretName: tunnel-credentials
      - name: config
        configMap:
          name: cloudflared
          items:
          - key: config.yaml
            path: config.yaml
---
apiVersion: v1
kind: ConfigMap
metadata:
  name: cloudflared
  namespace: argocd
data:
  config.yaml: |
    # Name of the tunnel you want to run
    tunnel: argo-tunnel
    credentials-file: /etc/cloudflared/creds/credentials.json
    metrics: 0.0.0.0:2000
    no-autoupdate: true
    ingress:
      - hostname: argocd.devopsfoundry.com
        service: https://argocd-server:443
        originRequest:
          noTLSVerify: true
      - service: http_status:404
kubectl apply -f cloudflared.yaml
Home » Tutorials » Cloudflare Tunnels