If you’re self-hosting n8n on your home network and accessing it through a Cloudflare Tunnel, you might run into an issue where Telegram or webhook triggers stop working. This typically occurs when you create a Zero Trust application for the tunnel’s subdomain and attach a login access policy to it. While that policy is great for restricting access to your n8n instance, it also blocks external services—like Telegram—from reaching your webhook endpoints and triggering workflows.
Posts for: #Cloudflare
n8n Local Hosting with Cloudflare Tunnels - Quick Version
These are the bare bones, just tell me what to do set of instructions. See the previous article for a detailed explanation each step.
What you’ll need:
- A machine to host n8n. This can be a spare PC or Raspberry Pi.
- A free Cloudflare account.
- A web domain that lives on Cloudflare’s nameservers. You can purchase a new one from Cloudflare or move a domain you already own to the Cloudflare nameservers.
Step 1 - Install Docker:
Here’s the official documentation on how to install Docker: https://docs.docker.com/engine/install/
n8n Local Hosting with Cloudflare Tunnels - Long Version
Using Cloudflare Tunnels with self-hosted n8n offers a secure and hassle-free way to expose your automation workflows to the internet without opening ports or configuring firewalls. It eliminates the need for a static IP or dynamic DNS by creating an encrypted outbound connection from your server to Cloudflare’s edge network. This not only simplifies deployment but also adds a layer of protection against DDoS attacks and unauthorized access. With built-in TLS and fine-grained access controls, Cloudflare Tunnels make it easy to trigger n8n webhooks and integrations from anywhere while keeping your infrastructure locked down.
Cloudflare Zero Trust Application and Tunnels
Cloudflare Zero Trust Applications and Tunnels provide a powerful, secure way to expose internal services without opening ports or relying on traditional VPNs. By routing traffic through encrypted outbound tunnels, you eliminate attack surfaces and gain fine-grained access control using identity-based policies. This setup simplifies remote access, integrates seamlessly with identity providers, and protects apps from unauthorized users, bots, and DDoS attacks. Whether you’re self-hosting dashboards, automation tools like n8n, or admin panels, Cloudflare Zero Trust ensures secure, scalable access with minimal configuration and maximum peace of mind