
Cloudflare
When your ops team needs a DNS record updated or a new zone provisioned, your AI agent handles it through natural language. Create records, audit firewall rules, inspect load balancer pools, and manage WAF lists without logging into the Cloudflare dashboard.




Your AI agent becomes an infrastructure assistant that creates zones, manages DNS entries, and audits WAF configurations through Cloudflare's API in real time.
Cloudflare
See how DevOps and security teams use AI agents to manage Cloudflare zones, DNS entries, and WAF configurations without switching between terminals and dashboards.
A developer deploys a new microservice and messages 'Create an A record for api-v2.example.com pointing to 203.0.113.50 with proxy enabled.' Your AI Agent creates the record in Cloudflare, sets the TTL to automatic, enables the orange cloud proxy, and confirms the record is live. No dashboard login, no ticket delay.
Before going live with a new app, your security lead asks the agent to review firewall rules on the production zone. The agent lists every rule sorted by priority, identifies any missing rate-limit protections, and flags WAF lists that reference deprecated IPs. Your team patches gaps before the first user hits the site.
During a quarterly compliance review, your ops team needs a complete DNS inventory across all zones. The agent queries every zone in the account, retrieves DNS records for each, and compiles a summary grouped by domain. Hours of manual dashboard clicking condensed into a single conversation request.

Cloudflare
FAQs
The agent supports all standard record types available through Cloudflare's API, including A, AAAA, CNAME, MX, TXT, SRV, CAA, and LOC records. It can set proxy status, TTL, priority for MX and SRV records, and add tags or comments to each entry.
Yes. The agent uses the List Zones endpoint to enumerate all zones under your account. It can then target any specific zone by name or ID for DNS record operations, firewall rule audits, or zone setting updates across your entire domain portfolio.
This integration uses the Global API Key paired with your account email for authentication. If you prefer scoped API tokens with limited permissions, use the Cloudflare API Key integration instead, which accepts Bearer token authentication for tighter access control.
Yes. When creating or updating DNS records, the agent sets the 'proxied' field to true or false. Proxied records route traffic through Cloudflare's CDN and security layer, while DNS-only records resolve directly to your origin server.
The agent can create WAF lists of type 'ip', 'redirect', 'hostname', or 'asn'. These lists are used in firewall rule expressions to block, allow, or redirect traffic based on your security policies. The agent can also update list descriptions and delete lists when they are no longer referenced.
No. The agent queries Cloudflare's API in real time during conversations. DNS records, zone details, and firewall configurations are fetched live and used only to respond. Tars does not maintain a separate copy of your Cloudflare infrastructure data.
The agent can delete DNS records and zones through the API. To prevent accidental removals, configure your AI Agent Gambit with approval workflows or restrict delete actions to specific authorized users. You can also limit the agent to read-only operations.
The dashboard requires manual navigation and individual record editing. With Tars, your team issues natural language commands like 'list all A records for example.com' and gets instant results. Bulk operations, audits, and cross-zone queries that take minutes in the UI happen in seconds through conversation.
Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security
At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.