Remix.run Logo
farhadhf 10 hours ago

Pretty much everything is down (checking from the Netherlands). The Cloudflare dashboard itself is experiencing an outage as well.

Not-so-funny thing is that the Betterstack dashboard is down but our status page hosted by Betterstack is up, and we can't access the dashboard to create an incident and let our customers know what's going on.

Edit: wording.

huijzer 9 hours ago | parent | next [-]

Yep that's also my experience. Except HN because it does not use *** Cloudflare because it knows it is not necessary. I just wrote a blog titled "Do Not Put Your Site Behind Cloudflare if You Don't Need To" [1].

[1]: https://huijzer.xyz/posts/123/

firecall 8 hours ago | parent | next [-]

Sadly, AI bots and crawlers have made CF the only affordable way to actually keep my sites up without incurring excessive image serving costs.

Those TikTok AI crawlers were destroying some of my sites.

Millions of images served to ByteSpider bots, over and over again. They wouldn't stop. It was relentless abuse. :-(

Now I've just blocked them all with CF.

flakeoil 8 hours ago | parent | next [-]

> Now I've just blocked them all with CF.

Yeah, they for sure let nothing through right now. ;)

marcosdumay 8 hours ago | parent [-]

There isn't too much of a difference from their normal behavior.

zenmac 8 hours ago | parent | prev | next [-]

Wouldn't it be trivial to just to write a uwf to block the crawler ips?

At time like this really glad we self-hosted.

cornedor 8 hours ago | parent | next [-]

No, since they're simply too many. For an e-commerce site I work for, we once had an issue where some bad-actor tried to crawl the site to set up scam shops. The list of IPs were way too broad, and the user-agents way too generic or random.

72deluxe 8 hours ago | parent [-]

Could you not also use an ASN list like https://github.com/brianhama/bad-asn-list and add blocks of IPs to a blocklist (eg. ipset on Linux)? Most of the scripty traffic comes from VPSs.

jeroenhd 6 hours ago | parent [-]

Thanks to widespread botnets, most scrapers fall back to using "residential proxies" the moment you block their cloud addresses. Same load, but now you risk accidentally blocking customers coming from similar net blocks.

Blocking ASNs is one step of the fight, but unfortunately it's not the solution.

immibis an hour ago | parent [-]

Hypothetically, as a cyber-criminal, I'd like to thank the blacklist industry for bringing so much money into criminal enterprises by making residential proxies mandatory for all scraping.

tpetry 8 hours ago | parent | prev | next [-]

Its not one IP to block. Its thousands! And they're also scatter through different ip networks so no simple cidr block is possible. Oh, and just for the fun, when you block their datacenter ips they switch to hundreds of residential network ips.

Yes, they are really hard to block. In the end I switched to Cloudflare to just so they can handle this mess.

Bender 7 hours ago | parent | prev | next [-]

Wouldn't it be trivial to just to write a uwf to block the crawler ips?

Probably more effective would be to get the bots to exclude your IP/domain. I do this for SSH, leaving it open on my public SFTP servers on purpose. [1] If I can get 5 bot owners to exclude me that could be upwards of 250k+ nodes mostly mobile IP's that stop talking to me. Just create something that confuses and craps up the bots. With SSH bots this is trivial as most SSH bot libraries and code are unmaintained and poorly written to begin with. In my ssh example look for the VersionAddendum. Old versions of ssh, old ssh libraries and code that tries to implement ssh itself will choke on a long banner string. Not to be confused with the text banner file.

I'm sure the clever people here could make something similar for HTTPS and especially for GPT/LLM bots at the risk of being flagged "malicious".

[1] - https://mirror.newsdump.org/confuse-some-ssh-bots.html

About 90%+ of bots can not visit this URL, including real people that have disabled HTTP/2.0 in their browser.

firecall 8 hours ago | parent | prev [-]

Maybe :-)

But for a small operation, AKA just me, it's one more thing for me to get my head around and manage.

I don't run just one one website or one service.

It's 100s of sites across multiple platforms!

Not sure I could ever keep up playing AI Crawler and IP Whack-A-Mole!

UltraSane 41 minutes ago | parent | prev | next [-]

Can you use per-IP rate limiting?

immibis an hour ago | parent | prev | next [-]

How many requests is your site getting, and how long does your site require to process a request, and why is it that long?

unethical_ban 6 hours ago | parent | prev | next [-]

I don't understand. What exactly are they doing, what are their goals? I'm not trying to argue, I genuinely don't get it.

edit: I guess I understand "AI bots scraping sites for data to feed LLM training" but what about the image serving?

Aeolun 8 hours ago | parent | prev [-]

> Now I've just blocked them all with CF.

You realize it was possible to block bad actors before Cloudflare right? They just made it easier, not possible in the first place.

firecall 8 hours ago | parent | next [-]

Of course :-)

And my image CDN blocked ByteSpider for me.

For a while I also blocked the entirety of Singapore due to all the bots coming out of AWS over there!

But it's honestly something I just dont need to be thinking about for every single site I run across a multitude of platforms.

Having said that, I will now look at the options for the business critical services I operate for clients!

delfinom 7 hours ago | parent | prev [-]

Bad actors now have access to tens of thousands of IPs and servers on the fly.

The cost of hardware and software resources these days is absolute peanuts compared to 10 years ago. Cloud services and APIs has made managing them also trivial as hell.

Cloudflare is simply a evolution in response to the other side also having evolved greatly, both legitimate and illegitimate users.

MinimalAction 8 hours ago | parent | prev | next [-]

Yes, I never understand this obsession for centralized services like Cloudflare. To be fair though, if our tiny blogs anyway had a hundred or so visitors monthly, does it matter if it had an outage for a day?

ThunderSizzle 8 hours ago | parent [-]

I think partially is not having to worry about certs is a nice reason to hide behind the proxy. Also, to help hide your IP address, I guess.

Of course, on the other hand, I know that relying on Cloudflare cert's is basically inviting a MITM attack.

huijzer 8 hours ago | parent | next [-]

> I think partially is not having to worry about certs is a nice reason to hide behind the proxy.

Use Caddy. I never worry about certs.

ThunderSizzle 7 hours ago | parent | next [-]

Interesting. I've done a lot of manual work to set up a whole nginx layer to properly route stuff through one domain to various self-hosted services, with way to many hard lessons when I started this journey (from trying to do manual setup without docker, to moving onto repeatable setups via docker, etc.).

The setup appears very simple in Caddy - amazingly simple, honestly. I'm going to give it a good try.

immibis an hour ago | parent | prev [-]

Or certbot-plugin-nginx if you prefer a bit less magic.

ptx 7 hours ago | parent | prev [-]

Don't you need a cert anyway to secure the connection from Cloudflare to your server?

omcnoe 7 hours ago | parent | next [-]

Cloudflare explicitly supports customers placing insecure HTTP only sites behind a cloudflare HTTPS.

It's one of the more controversial parts of the business, it makes the fact that the traffic is unencrypted on public networks invisible to the end user.

ThunderSizzle 7 hours ago | parent | prev [-]

You could use a self-signed cert, since cloudflare doesn't care about that.

ramon156 8 hours ago | parent | prev | next [-]

Last time I tried this I got DDoS'd so I don't see a reason to step away from CF. That said, this is the price I pay

Illniyar 8 hours ago | parent | prev | next [-]

Does HN not experience DDOS? I would imagine being as popular as it is it'll experience DDOS.

q3k 8 hours ago | parent [-]

It does: https://m5hosting.status.io/pages/incident/5407b8e2b00244251...

But turns out that's fine :).

everybodyknows 5 hours ago | parent [-]

> Issues are stable at this time. The targeted customer has implemented CloudFlare, and we have taken steps to mitigate this event.

I'm still confused. Does this mean that HN switches CF on or off in response to recent volume of bot traffic?

zzzeek 8 hours ago | parent | prev [-]

~~two~~ three comments on that:

1. DDOS protection is not the only thing anymore, I use cloudflare because of vast amounts of AI bots from thousands of ASNs around the world crawling my CI servers (bloated Java VMs on very undersized hosts) and bringing them down (granted, I threw cloudflare onto my static sites as well which was not really necessary, I just liked their analytics UX)

2. the XKCD comic is mis-interpreted there, that little block is small because it's a "small open source project run by one person", cloudflare is the opposite of that

3. edit: also cloudflare is awesome if you are migrating hosts, did a migration this past month, you point cloudflare to the new servers and it's instant DNS propagation (since you didnt propagate anything :) )

dboreham 7 hours ago | parent [-]

Why are your CI servers open to the public network?

zzzeek 6 hours ago | parent [-]

because we're an open source project that accepts pull requests on github and we'd like our PR submitters to see why their PRs are failing tests

pell 9 hours ago | parent | prev | next [-]

It’s that time of the year again where we all realize that relying on AWS and Cloudflare to this degree is pretty dangerous but then again it’s difficult to switch at this point.

If there is a slight positive note to all this, then it is that these outages are so large that customers usually seem to be quite understanding.

isodev 9 hours ago | parent | next [-]

Unless you’re say at airport trying to file a luggage claim … or at the pharmacy trying to get your prescription. I think as a community we have a responsibility to do better than this.

ChrisMarshallNY 9 hours ago | parent | next [-]

> I think as a community we have a responsibility to do better than this.

I have always felt so, but my opinion is definitely in the minority.

In fact, I find that folks have extremely negative responses to any discussion of improving software Quality.

abustamam 4 hours ago | parent | next [-]

I always see such negative responses when HN brings up software bloat ("why is your static site measured in megabytes").

Now that we have an abundance of compute and most people run devices more powerful than the devices that put man on the moon, it's easier than ever to make app bloat, especially when using a framework like Electron or React Native.

People take it personally when you say they write poor quality software, but it's not a personal attack, it's an observation of modern software practices.

And I'm guilty of this, mainly because I work for companies that prioritize speed of development over quality of software, and I suspect most developers are in this trap.

ChrisMarshallNY 2 hours ago | parent [-]

What I find annoying, is people making fun of folks that choose to “roll their own.”

The typical argument that I see, is homemade encryption, which is quite valid.

However, encryption is just a tiny corner of the surface.

Most folks don’t want to haul in 1MB of junk, just so they can animate a transition.

Well, I guess I should qualify that: Most normal folks wouldn't want to do that, but, apparently, it's de rigueur for today's coders.

mosura 8 hours ago | parent | prev [-]

Merely reducing external dependencies causes people to come out in rashes.

A large proportion of “developers” enjoy build vs buy arguments far too much.

sigilis 9 hours ago | parent | prev [-]

You aren’t cloudflare’s customer in these examples. It depends on the companies that are actually paying for and using the service to complain. Odds are that they won’t care on your behalf due to how our society is structured.

Not really sure how our community is supposed to deal with this.

isodev 9 hours ago | parent [-]

“We” are the ones making the architecture and the technical specs of these services. Taking care for it to still work when your favourite FAANGMC is down seems like something we can help with.

dlisboa 9 hours ago | parent | prev | next [-]

> If there is a slight positive note to all this, then it is that these outages are so large that customers usually seem to be quite understanding.

Which only shows that chasing five 9s is worthless for almost all web products. The idea is that by relying on AWS or Cloudflare you can push your uptime numbers up to that standard, but these companies themselves are having such frequent outages that customers themselves don't expect that kind reliability from web products.

tommica 9 hours ago | parent | prev | next [-]

> It’s that time of the year again

It's monthly by now

lbreakjai 9 hours ago | parent | prev | next [-]

If I choose AWS/cloudflare and we're down with half of the internet, then I don't even need to explain it to my boss' bosses, because there will be an article in the mainstream media.

If I choose something else, we're down, and our competitors aren't, then my overlords will start asking a lot of questions.

stevepotter 9 hours ago | parent | next [-]

Yup. AWS went down at a previous job and everyone basically took the day off and the company collectively chuckled. Cloudflare is interesting because most execs don’t know about it so I’d imagine they’d be less forgiving. “So what does cloudflare do for us exactly? Don’t we already have aws?”

jfengel 9 hours ago | parent | prev | next [-]

And if everyone else is down, and you are not, you will get no credit.

lbreakjai 8 hours ago | parent | next [-]

Or _you_ aren't down, but a third-party you depend on is (auth0, payment gateway, what have you), and you invested a lot of time and effort into being reliable, but it was all for less than nothing, because your website loads but customers can't purchase, and they associate the problem with you, not with the AWS outage.

8 hours ago | parent [-]
[deleted]
trollbridge 8 hours ago | parent | prev [-]

Right. Whereas if we get whacked with a random DDoS, that's my fault.

timeon 9 hours ago | parent | prev [-]

In reality it is not half of the internet. That is just marketing. I've personally noticed one news site while others were working. And I guess sites like that will get the blame.

fusl 9 hours ago | parent | prev | next [-]

Happy to hear anyone's suggestions about where else to go or what else to do in regards to protecting from large-scale volumetric DDoS attacks. Pretty much every CDN provider nowadays has stacked up enough capacity to tank these kind of attacks, good luck trying to combat these yourself these days?

trollbridge 8 hours ago | parent | next [-]

Somehow KiwiFarms figured it out with their own "KiwiFlare" DDOS mitigation. Unfortunately, all of the other Cloudflare-like services seem exceptionally shady, will be less reliable than Cloudflare, and probably share data with foreign intelligence services I have even less trust for than the ones Cloudflare possibly shares them with.

isodev 9 hours ago | parent | prev | next [-]

Anubis and/or Bunny are good alternatives/combination depending on your exact needs

- https://anubis.techaro.lol/

- https://bunny.net/

fusl 9 hours ago | parent | next [-]

Unfortunately Anubis doesn't help where my pipe to the internet isn't fat enough to just eat up all the bandwidth that the attacker has available. Renting tens of terabits of capacity isn't cheap and DDoS attacks nowadays are in the scale of that. BunnyCDN's DDoS protection is unfortunately too basic to filter out anything that's ever so slightly more sophisticated. Cloudflare's flexibility in terms of custom rulesets and their global pre-trained rulesets (based on attacks they've seen in the past) is imo just unbeatable at this time.

isodev 9 hours ago | parent | next [-]

The Bunny Shield is quite similar to the Cloudflare setup. Maybe not 100% overlap of features but unless you’re Twitter or Facebook, it’s probably enough.

I think at the very least, one should plan the ability to switch to an alternative when your main choice fails… which together with AWS and GitHub is a weekly event now.

immibis an hour ago | parent | prev [-]

We live in the world of mass internet surveillance. DDoS like this are not very common, partly because people who do it keep going to jail.

Doman 9 hours ago | parent | prev | next [-]

bunny.net is not reachable for me too... really funny

https://imgur.com/a/8gh3hOb

isodev 5 hours ago | parent | next [-]

All the edges are gone! :)

haar 8 hours ago | parent | prev [-]

I clicked the image thinking I was seeing the message you were getting (geoblocked in the UK), then realised I'd clicked an imgur link :facepalm:

(Note: Zero negative sentiment towards imgur here)

7 hours ago | parent | prev | next [-]
[deleted]
RKFADU_UOFCCLEL 7 hours ago | parent | prev [-]

Why do people on a technical website suggest this? It's literally the same snake oil as Cloudflare. Both have an endgame of total web DRM; they want to make sure users "aren't bots". Each time the DRM is cracked, they will increase its complexity of the "verifier". You will be running arbitrary code in your big 4 browser to ensure you're running a certified big 4 browser, with 10 trillion man hours of development, on an certified OS.

callalex 4 hours ago | parent [-]

Because there is a real problem that needs to be solved one way or another.

RKFADU_UOFCCLEL 28 minutes ago | parent [-]

Anubis doesn't solve anything, bud.

bandrami 8 hours ago | parent | prev | next [-]

Is a DDOS more frequent and/or worse than stochastic CDN outages?

q3k 9 hours ago | parent | prev [-]

Just accept that a DDoS might happen and that there's nothing you can do about it. It's fine, it's just how the Internet works.

herbst 9 hours ago | parent | next [-]

That was possible when a DDos was usually still an occasional attack by a bad actor.

Most time I get ddosed now it's either Facebook directly, Something something Azure or any random AI.

q3k 9 hours ago | parent | next [-]

That sounds like an app-level (D)DoS, which is generally something you can mitigate yourself.

7 hours ago | parent | next [-]
[deleted]
geerlingguy 8 hours ago | parent | prev [-]

It's harder when it's a new group of IPs and happens 2-3x every month.

herbst 7 hours ago | parent [-]

And if you do rule based blocking they just change their approach. I am constantly blocking big corps these days, barely any work with normal bad actors.

And lots of real users time wasted for captchas.

nhecker 8 hours ago | parent | prev [-]

How (or to what end) would Facebook want to directly DoS someone?

herbst 7 hours ago | parent | next [-]

What do they even have an spider for? I never saw any actual traffic with source Facebook. I don't understand either, but it's their official IPs, their official bot headers and it behaves exactly like someone who wants my sites down.

Does it make sense? Nah, but is it part of the weird reality we live in. Looks like it

I have no way of contacting Facebook. All I can do is keep complaining on hackernews whenever the topic arrises.

Edit:// Oh and I see the same with Azure, however there I have no list of IPs to verify it's official just because it looks like it.

inferiorhuman 7 hours ago | parent | prev [-]

I got DoS'd by them once, email not HTTP traffic though. Quick slip of their finger and bam low cost load testing.

peanut-walrus 9 hours ago | parent | prev [-]

So accept that your customers won't be able to use your services whenever some russian teenager is bored? Yeah, good luck with justifying that choice.

q3k 9 hours ago | parent [-]

And how often does that happen?

peanut-walrus 8 hours ago | parent [-]

For the service I'm responsible for, 4 times in the last 24 hours.

q3k 8 hours ago | parent [-]

Congratulations, you're the exception rather than the norm.

weird-eye-issue 9 hours ago | parent | prev [-]

Oh no, we had 30 minutes of downtime this year :(

CableNinja 8 hours ago | parent | next [-]

5 9's is like 7 minutes a year. They are breaking SLAs and impacting services people depend on

Tbh though this is sort of all the other companies fault, "everyone" uses aws and cf and so others follow. now not only are all your chicks in one basket, so is everyone elses. When the basket inevitably falls into a lake....

Providers need to be more aware of their global impact in outages, and customers need to be more diverse in their spread.

world2vec 8 hours ago | parent | next [-]

99.999% availability is around 5 minutes or so of downtime per year.

weird-eye-issue 8 hours ago | parent | prev [-]

> Providers need to be more aware of their global impact in outages

So you think the problem is they aren't "aware"?

CableNinja 8 hours ago | parent [-]

These kinds of outages continue to happen and continue to impact 50+% of the internet, yes, they know they have that power, but they dont treat changes as such, so no, they arent aware. Awareness would imply more care in operations like code changes and deployments.

Outages happen, code changes occur; but you can do a lot to prevent these things on a large scale, and they simply dont.

Where is the A/B deployment, preventing a full outage? What about internally, where was the validation before the change, was the testing run against a prodlike environment or something that once resembled prod but hasnt forever?

They could absolutely mitigate impacting the entire global infra in multiple ways, and havent, despite their many outages.

richardwhiuk 7 hours ago | parent [-]

They are aware. They don't want to pay the cost benefit tradeoff. Education won't help - this is a very heavily argued tradeoff in every large software company.

pell 9 hours ago | parent | prev [-]

I do think this is tenable as long as these services are reliable. Even though there have been some outages I would argue that they’re incredibly reliable at this point. If though this ever changes the costs to move to a competitor won’t be as simple as pushing a repository elsewhere, especially for AWS. I think that’s where some of the potential danger lies.

swyx 8 hours ago | parent | next [-]

> 30 minutes of downtime

> this is tenable as long as these services are reliable

do you hear yourself, this is supposed to be a distributed CDN. imagine if HTTP had 30 minutes of downtime a year.

and judging by the HN post age, we're now past minute 60 of this incident.

weird-eye-issue 8 hours ago | parent [-]

> and judging by the HN post age, we're now past minute 60 of this incident.

Huh? It's been back up during most of this time. It was up and then briefly went back down again but it's been up for a while now. Total downtime was closer to 30 minutes

swyx 8 hours ago | parent [-]

twitter still down for me

mrkramer 7 hours ago | parent [-]

Twitter is down while Mastodon is proudly and strongly still standing up. I knew this day would come.

swyx 5 hours ago | parent [-]

i also can host apps for 100 users

weird-eye-issue 9 hours ago | parent | prev [-]

> especially for AWS

CF can be just as difficult if not more to migrate off of especially when using things like durable objects

postalcoder 9 hours ago | parent | prev | next [-]

Cloudflare dashboard is down-ish, not totally down. If you're persistent you can turn off the turnstile and proxy.

It took a few minutes but I got https://hcker.news off of it.

trollbridge 8 hours ago | parent | next [-]

I can't sign in since Turnstile is down so I can't complete the captcha to log in.

I also can't log in via Google SSO since Cloudflare's SSO service is down.

8 hours ago | parent [-]
[deleted]
farhadhf 9 hours ago | parent | prev | next [-]

I'm already logged in on the cloudflare dashboard and trying to disable the CF proxy, but getting "404 | Either this page does not exist, or you do not have permission to access it" when trying to access the DNS configuration page.

9 hours ago | parent [-]
[deleted]
skywhopper 9 hours ago | parent | prev [-]

Not saying not to do this to get through, but just as an observation, it’s also the sort of thing that can make these issues a nightmare to remediate, since the outage can actually draw more traffic just as things are warming up, from customers desperate to get through.

But then, that’s what Cloudflare signed up to be.

celltalk 9 hours ago | parent | prev | next [-]

I think there is a big business opportunity here. Make a site that let companies put their status update on local vps for $100.

alt227 9 hours ago | parent | next [-]

Atlassian has this business model sewn up

https://www.atlassian.com/software/statuspage

lc64 8 hours ago | parent [-]

It's worth noting that cloudflare's status page is hosted there. Pretty good proof that it works

dmit 7 hours ago | parent [-]

And I got a 504 error (served by CloudFront) on that status page earlier. The error message suggested there may have been a great increase in traffic that caused it.

codethief 9 hours ago | parent | prev | next [-]

Maybe that's precisely what Cloudflare did and now their status page is down because it's receiving an unusual amount of traffic that the VPS can't handle.

celltalk 8 hours ago | parent [-]

They should have had Cloudflare on it.

colinbartlett 9 hours ago | parent | prev | next [-]

Even the Cloudflare status page, hosted by Atlassian Statuspage, is suffering. Probably due to the traffic crush.

nrhrjrjrjtntbt 9 hours ago | parent | prev | next [-]

Status pigeons.

ramon156 9 hours ago | parent | prev [-]

on-demand status balancing!

compumike 8 hours ago | parent | prev | next [-]

Could always just use a status page that updates itself. For my side project Total Real Returns [1], if you scroll down and look at the page footer, I have a live status/uptime widget [2] (just an <img> tag, no JS) which links to an externally-hosted status page [3]. Obviously not critical for a side project, but kind of neat, and was fun to build. :)

[1] https://totalrealreturns.com/

[2] https://status.heyoncall.com/svg/uptime/zCFGfCmjJN6XBX0pACYY...

[3] https://status.heyoncall.com/o/zCFGfCmjJN6XBX0pACYY

jcfrei 7 hours ago | parent [-]

This is unrelated to the cloudflare incident but thanks a lot for making that page. I keep checking it from time to time and it's basically the main data source for my long term investing.

compumike 7 hours ago | parent [-]

I appreciate that, thank you! :)

biinjo 9 hours ago | parent | prev | next [-]

Same here. We’re using OhDear. The status page is available but I can’t post an incident because their service is also behind Cloudflare.

Mojah 9 hours ago | parent [-]

Co-founder here, we'll be working on better ways to handle this over the coming days.

Update: our app is available again without Cloudflare, you'll be able to post updates to status pages smoothly again.

davedx 8 hours ago | parent | prev | next [-]

All my stuff is working. Things on GCP. Things on Fly.io. Tooling I use.

"Only" 10% of the internet is behind Cloudflare so far ;)

grabcadder 8 hours ago | parent [-]

Happy for you :)

I am curious about these two things:

1- Does GCP also have any outages recently similar to AWS, Azure or CF? If a similar size (14 TB?) DDoS were to hit GCP, would it stand or would it fail?

2- If this DDoS was targeting Fly.io, would it stand? :)

davedx 8 hours ago | parent | next [-]

I actually spoke too soon, and accept I have egg on my face!

Apparently prisma's `npm exec prisma generate` command tries to download "engine binaries" from https://binaries.prisma.sh, which is behind... guess what...

So now my CI/CD is broken, while my production env is down, and I can't fix it.

Amazing lol

progbits 8 hours ago | parent | prev [-]

For GCP network that would be a rounding error. Of course GCP sometimes has outages too, all providers do.

talonx 7 hours ago | parent | prev | next [-]

BetterStack did report issues with some of their services, but they were not very informative.

esskay 9 hours ago | parent | prev | next [-]

When its back up, do yourself a favour and rent a $5/mo vps in another country from a provider like OVH or Hetzner and stick your status page on that.

"Yes but what if they go down" - it doesnt matter, having it hosted by someone who can be down for the same reason as your main product/service is a recipe for disaster.

fodi 8 hours ago | parent | next [-]

Definitely. Tangentially, I encountered 504 Gateway Timeout errors on cloudflarestatus.com about an hour ago. The error page also disclosed the fact that it's powered by CloudFront (Amazon's CDN).

jwr 9 hours ago | parent | prev | next [-]

Or use a service like https://updown.io/ (I host my status page there).

hcaz 9 hours ago | parent | prev [-]

https://cachethq.io/ is great for this

jwr 9 hours ago | parent | next [-]

Amusingly enough, it is down right now because of Cloudflare :-)

fusl 9 hours ago | parent | prev [-]

Been using Cachet for quite a while before inevitably migrating to Atlassian's Statuspage.io. I'm a huge fan of self-hosting and self-managing every single thing in existence but Cachet was just such a PITA to maintain and there was just no other good alternative to Cachet that was also open source.

touristtam 7 hours ago | parent | prev | next [-]

Thankfully the usual social media are still up ... oh wait https://www.bbc.co.uk/news/articles/c629pny4gl7o

ablation 10 hours ago | parent | prev | next [-]

This is a big one.

csomar 9 hours ago | parent | prev | next [-]

Seems like workers are less affected and maybe betterstack has decided to bypass cloudflare "stuff" for the status pages? (maybe to cut down costs). My site is still up though some GitHub runners did show it failed at certain points.

tyingq 9 hours ago | parent [-]

I have a workers + kv app that seems fine right now.

csomar 9 hours ago | parent [-]

Pretty sure they went down for a while because I have 4xx errors they returned but apparently it was short-lived. I wonder if their workers infra. failed for a moment and that let to a total collapse of all of their products?

chrisandchris 9 hours ago | parent | prev [-]

I don't get why you need such a service for a status page with 99.whatever% uptime. I mean, your status page only has to be up if everything else is down, so maybe 1% uptime is fine.

/s