
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 07:38:42 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The crawl-to-click gap: Cloudflare data on AI bots, training, and referrals]]></title>
            <link>https://blog.cloudflare.com/crawlers-click-ai-bots-training/</link>
            <pubDate>Fri, 29 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ By mid-2025, training drives nearly 80% of AI crawling, while referrals to publishers (especially from Google) are falling and crawl-to-refer ratios show AI consumes far more than it sends back. ]]></description>
            <content:encoded><![CDATA[ <p>In 2025, Generative AI is reshaping how people and companies use the Internet. Search engines once drove traffic to content creators through links. Now, AI training crawlers — the engines behind commonly-used LLMs — are consuming vast amounts of web data, while sending far fewer users back. We covered this shift, along with related <a href="https://blog.cloudflare.com/from-googlebot-to-gptbot-whos-crawling-your-site-in-2025/"><u>trends</u></a> and Cloudflare <a href="https://blog.cloudflare.com/tag/pay-per-crawl/"><u>features</u></a> (like pay per crawl) in early July. Studies from Pew Research Center (<a href="https://www.pewresearch.org/short-reads/2025/04/28/americans-largely-foresee-ai-having-negative-effects-on-news-journalists/"><u>1</u></a>, <a href="https://www.pewresearch.org/short-reads/2025/07/22/google-users-are-less-likely-to-click-on-links-when-an-ai-summary-appears-in-the-results/"><u>2</u></a>) and <a href="https://pressgazette.co.uk/media-audience-and-business-data/google-ai-overviews-publishers-report-clickthroughs-authoritas-report/"><u>Authoritas</u></a> already point to AI overviews — Google’s new AI-generated summaries shown at the top of search results — contributing to sharp declines in news website traffic. For a news site, this means lots of bot hits, but far fewer real readers clicking through — which in turn means fewer people clicking on ads or chances to convert to subscriptions.</p><p>Cloudflare's data shows the same pattern. Crawling by search engines and AI services surged in the first half of 2025 — up 24% year-over-year in June — before slowing to just 4% year-over-year growth in July. How is the space evolving? Which crawling purposes are most common, and how is that changing? Spoiler: training-related crawling is leading the way. In this post, we track AI and search bot crawl activity, what purposes dominate, and which platforms contribute the least referral traffic back to creators.</p>
    <div>
      <h3>Key takeaways</h3>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <ul><li><p>Training crawling grows: Training now drives nearly 80% of AI bot activity, up from 72% a year ago.</p></li><li><p>Publisher referrals drop: Google referrals to news sites fell, with March 2025 down ~9% compared to January.</p></li><li><p>AI &amp; search crawling increase: Crawling rose 32% year-over-year in April 2025, before slowing to 4% year-over-year growth in July.</p></li><li><p>AI-only crawler shifts: OpenAI’s GPTBot more than doubled in share of AI crawling traffic (4.7% to 11.7%), Anthropic’s ClaudeBot rose (6% to ~10%), while ByteDance’s Bytespider fell from 14.1% to 2.4%.</p></li><li><p>Crawl-to-refer imbalance (how many pages a bot crawls per page that a user clicks back to): Anthropic increased referrals but still leads with 38,000 crawls per visitor in July (down from 286,000:1 in January). Perplexity decreased referrals in 2025 — with more crawling but fewer referrals at 194 crawls per visitor in July.</p></li></ul><p>Several of the trends in this blog use <a href="https://radar.cloudflare.com/ai-insights"><u>Cloudflare Radar’s new AI Insights</u></a> features, explained in more detail in the post: “<a href="http://blog.cloudflare.com/ai-crawler-traffic-by-purpose-and-industry"><b><u>A deeper look at AI crawlers: breaking down traffic by purpose and industry</u></b></a>.”</p>
    <div>
      <h2>Google referrals fall as AI Overviews expand</h2>
      <a href="#google-referrals-fall-as-ai-overviews-expand">
        
      </a>
    </div>
    <p>Referral traffic from search is already shifting, as we noted above and as <a href="http://studies"><u>studies</u></a> have shown. In our dataset of news-related customers (spanning the Americas, Europe, and Asia), Google’s referrals have been clearly declining since February 2025. This drop is unusual, since overall Internet traffic (and referrals as well) historically has only dipped during July and August — the summer months when the Northern Hemisphere is largely on break from school or work. The sharpest and least seasonal decline came in March. Despite being a 31-day month, March had almost the same referral volume as the shorter, 28-day February.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZWlDsTAtPveEo2Kq8nzu9/ebd655d9ea51f35cfae1f4d09cfecc76/1.png" />
          </figure><p>Looking at longer comparisons: March 2025 referral traffic from Google was 9% lower than January, the same drop seen in June. April was worse, down 15% compared with January.</p><p>This drop seems to coincide with some of Google’s changes. AI Overviews launched in the U.S. in <a href="https://blog.google/products/search/generative-ai-google-search-may-2024/"><u>May 2024</u></a>, but in March 2025, Google upgraded AI Overviews with Gemini 2.0, introduced AI Mode in Labs, and <a href="https://blog.google/feed/were-bringing-the-helpfulness-of-ai-overviews-to-more-countries-in-europe/"><u>expanded</u></a> Overviews to more European countries. By May 2025, AI Mode rolled out broadly in the U.S. with Gemini 2.5, adding conversational search, Deep Search, and personalized recommendations.</p><p>The search-to-news site pipeline seems to be weakening, replaced in part by AI-driven results.</p><p>Looking at a daily perspective, we can also spot a clear U.S.-election-related peak in referrals from Google to the cohort of known news sites on November 5–6, 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Gtq4mnTg8KdVWaUkpH51A/86e7f7dfeb31f846df4ae8486c25b4aa/2.png" />
          </figure>
    <div>
      <h2>AI and search crawling: spring surge (+24%), summer slowdown</h2>
      <a href="#ai-and-search-crawling-spring-surge-24-summer-slowdown">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/from-googlebot-to-gptbot-whos-crawling-your-site-in-2025/"><u>In June</u></a>, we talked about search and AI crawler growth, and our picture of the trend is now more complete with more data. To focus only on AI and search crawlers, and to remove the bias of customer growth, we analyzed a fixed set of customers from specific weeks, a method we’ve also used in the <a href="http://radar.cloudflare.com/year-in-review/"><u>Cloudflare Radar Year in Review</u></a>.</p><p>What the data shows: crawling spiked twice: first in November 2024, then again between March and April 2025. April 2025 alone was up 32% compared with May 2024, the first full month where we have comparable data. After that surge, growth stabilized. In June 2025, crawling traffic was still 24% higher year-over-year, but by July the increase was down to just 4%. That shift highlights how quickly crawler activity can accelerate and then cool down.</p><p>As the chart below shows, crawling traffic rose sharply in March and April. It remained high but slightly lower in May, before starting to drop in June. The seasonal dip is similar to what we see in overall Internet traffic during the Northern Hemisphere’s summer months (August and September are often the quietest), though in the case of crawlers, this is likely due to reduced overall web activity rather than bots themselves taking a “break.” Historically, activity tends to rise again in November — as it did in 2024 for AI and search bot traffic — when people spend more time online for shopping and seasonal habits (a pattern we’ve seen in <a href="https://blog.cloudflare.com/from-deals-to-ddos-exploring-cyber-week-2024-internet-trends/"><u>past years</u></a>).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SKJcH4r7smlgCBC9vjULt/1311a9ded068a142122630af5afc3766/3.png" />
          </figure><p>Googlebot is <a href="https://blog.cloudflare.com/from-googlebot-to-gptbot-whos-crawling-your-site-in-2025/"><u>still</u></a> the anchor, accounting for 39% of all AI and search crawler traffic, but the fastest growth now comes from AI-specific crawlers, though bots related to Amazon and ByteDance (Bytespider) have lost significant ground. GPTBot’s share grew from 4.7% in July 2024 to 11.7% in July 2025. ClaudeBot also increased, from 6% to nearly 10%, while Meta’s crawler jumped from 0.9% to 7.5%. By contrast, Amazonbot dropped from 10.2% to 5.9%, and ByteDance’s Bytespider dropped from 14.1% to just 2.4%.</p><p>The table below shows how market shares have shifted between July 2024 and July 2025:</p><table><tr><td><p>
</p></td><td><p><b>Bot name</b></p></td><td><p><b>% share July 2024</b></p></td><td><p><b>% share July 2025</b></p></td><td><p><b>Δ percentage-point change</b></p></td></tr><tr><td><p><b>1</b></p></td><td><p>Googlebot</p></td><td><p>37.5</p></td><td><p>39</p></td><td><p>1.5</p></td></tr><tr><td><p><b>2</b></p></td><td><p>GPTBot</p></td><td><p>4.7</p></td><td><p>11.7</p></td><td><p>7</p></td></tr><tr><td><p><b>3</b></p></td><td><p>ClaudeBot</p></td><td><p>6</p></td><td><p>9.9</p></td><td><p>3.9</p></td></tr><tr><td><p><b>4</b></p></td><td><p>Bingbot</p></td><td><p>8.7</p></td><td><p>9.3</p></td><td><p>0.6</p></td></tr><tr><td><p><b>5</b></p></td><td><p>Meta-ExternalAgent</p></td><td><p>0.9</p></td><td><p>7.5</p></td><td><p>6.5</p></td></tr><tr><td><p><b>6</b></p></td><td><p>Amazonbot</p></td><td><p>10.2</p></td><td><p>5.9</p></td><td><p>-4.3</p></td></tr><tr><td><p><b>7</b></p></td><td><p>Googlebot-Image</p></td><td><p>4.1</p></td><td><p>3.3</p></td><td><p>-0.8</p></td></tr><tr><td><p><b>8</b></p></td><td><p>Yandex</p></td><td><p>5</p></td><td><p>2.9</p></td><td><p>-2.1</p></td></tr><tr><td><p><b>9</b></p></td><td><p>GoogleOther</p></td><td><p>4.6</p></td><td><p>2.7</p></td><td><p>-1.8</p></td></tr><tr><td><p><b>10</b></p></td><td><p>Bytespider</p></td><td><p>14.1</p></td><td><p>2.4</p></td><td><p>-11.6</p></td></tr><tr><td><p><b>11</b></p></td><td><p>Applebot</p></td><td><p>1.8</p></td><td><p>1.5</p></td><td><p>-0.3</p></td></tr><tr><td><p><b>12</b></p></td><td><p>ChatGPT-User</p></td><td><p>0.1</p></td><td><p>0.9</p></td><td><p>0.9</p></td></tr><tr><td><p><b>13</b></p></td><td><p>OAI-SearchBot</p></td><td><p>0</p></td><td><p>0.9</p></td><td><p>0.9</p></td></tr><tr><td><p><b>14</b></p></td><td><p>Baiduspider</p></td><td><p>0.5</p></td><td><p>0.5</p></td><td><p>0</p></td></tr><tr><td><p><b>15</b></p></td><td><p>Googlebot-Mobile</p></td><td><p>0.2</p></td><td><p>0.4</p></td><td><p>0.2</p></td></tr></table>
    <div>
      <h2>AI-only crawlers: OpenAI rises, ByteDance falls</h2>
      <a href="#ai-only-crawlers-openai-rises-bytedance-falls">
        
      </a>
    </div>
    <p>Looking only at AI bot traffic (as tracked on our <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;groupBy=user_agent&amp;dt=2025-07-01_2025-07-31&amp;timeCompare=2024-07-01"><u>Radar AI page</u></a>), the trend is clear. Since January 2025, GPTBot has steadily increased its crawling volume, driven mainly by training-related activity. ClaudeBot crawling accelerated in June, while Amazonbot and Bytespider activity slowed.</p><p>The <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;groupBy=user_agent&amp;dt=2025-07-01_2025-07-31&amp;timeCompare=2024-07-01"><u>chart</u></a> below shows how GPTBot surged over the past 12 months, overtaking Amazonbot and Bytespider, which both fell sharply:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5XRamYFTPqDrQ0bMQSG4C7/e741692f7019a4842b5d82bf4ab64106/4.png" />
          </figure><p>A comparison between July 2024 and July 2025 makes the shift even more obvious. GPTBot gained 16 percentage points, Meta’s crawler rose by more than 15, and ClaudeBot grew by 8. On the shrinking side, Amazonbot dropped 12 percentage points and Bytespider dropped over 31 percentage points.</p><table><tr><td><p>
</p></td><td><p><b>AI-only bots</b></p></td><td><p>July 2024 %</p></td><td><p>July 2025 %</p></td><td><p>Δ percentage-point change</p></td></tr><tr><td><p>1</p></td><td><p>GPTBot</p></td><td><p>11.9</p></td><td><p>28.1</p></td><td><p>16.1</p></td></tr><tr><td><p>2</p></td><td><p>ClaudeBot</p></td><td><p>15</p></td><td><p>23.3</p></td><td><p>8.3</p></td></tr><tr><td><p>3</p></td><td><p>Meta-ExternalAgent</p></td><td><p>2.4</p></td><td><p>17.7</p></td><td><p>15.3</p></td></tr><tr><td><p>4</p></td><td><p>Amazonbot</p></td><td><p>26.4</p></td><td><p>14.1</p></td><td><p>-12.3</p></td></tr><tr><td><p>5</p></td><td><p>Bytespider</p></td><td><p>37.3</p></td><td><p>5.8</p></td><td><p>-31.5</p></td></tr><tr><td><p>6</p></td><td><p>Applebot</p></td><td><p>4.9</p></td><td><p>3.7</p></td><td><p>-1.2</p></td></tr><tr><td><p>7</p></td><td><p>ChatGPT-User</p></td><td><p>0.2</p></td><td><p>2.4</p></td><td><p>2.2</p></td></tr><tr><td><p>8</p></td><td><p>OAI-SearchBot</p></td><td><p>0</p></td><td><p>2.2</p></td><td><p>2.2</p></td></tr><tr><td><p>9</p></td><td><p>TikTokSpider</p></td><td><p>0</p></td><td><p>0.7</p></td><td><p>0.7</p></td></tr><tr><td><p>10</p></td><td><p>imgproxy</p></td><td><p>0</p></td><td><p>0.7</p></td><td><p>0.7</p></td></tr><tr><td><p>11</p></td><td><p>PerplexityBot</p></td><td><p>0</p></td><td><p>0.4</p></td><td><p>0.4</p></td></tr><tr><td><p>12</p></td><td><p>Google-CloudVertexBot</p></td><td><p>0</p></td><td><p>0.3</p></td><td><p>0.3</p></td></tr><tr><td><p>13</p></td><td><p>AI2Bot</p></td><td><p>0</p></td><td><p>0.2</p></td><td><p>0.2</p></td></tr><tr><td><p>14</p></td><td><p>Timpibot</p></td><td><p>0.6</p></td><td><p>0.1</p></td><td><p>-0.5</p></td></tr><tr><td><p>15</p></td><td><p>CCBot</p></td><td><p>0.1</p></td><td><p>0.1</p></td><td><p>0</p></td></tr></table>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71p4CgiUXwYrb9LIsJCruI/44dd4b232a715b852417853e7026fbcb/5.png" />
          </figure><p>We covered the functionality of these bots in our <a href="https://blog.cloudflare.com/from-googlebot-to-gptbot-whos-crawling-your-site-in-2025/#ai-only-crawlers-perspective"><u>June blog post</u></a>.</p>
    <div>
      <h2>Crawling by purpose: training dominates</h2>
      <a href="#crawling-by-purpose-training-dominates">
        
      </a>
    </div>
    <p>Training is the clear leader.<i> (We classify purpose based on operator disclosures and industry sources, a method we explained in this </i><a href="http://blog.cloudflare.com/ai-crawler-traffic-by-purpose-and-industry"><i><u>AI Week blog</u></i></a><i>.)</i> Over the past 12 months, 80% of AI crawling was for training, compared with 18% for search and just 2% for user actions. In the last six months, the share for training rose further to 82%, while search dropped to 15% and user actions increased slightly to 3%.</p><p>The <a href="https://radar.cloudflare.com/ai-insights#crawl-purpose"><u>chart</u></a> below shows how training-related crawling steadily grew over the past year, far outpacing other purposes:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10lBzdfhgLKiWrEAIcs691/8b11d8d733c48938a7235dc07f65a83a/6.png" />
          </figure><p>The year-over-year comparison reinforces this trend. In July 2024, training accounted for 72% of AI crawling. By July 2025, it had risen to 79%. Over the same period, search fell from 26% to 17%, while user actions grew modestly from 2% to 3.2%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2OcV2pA5nOBpOrl8pKPotL/4901f128d5feaba82357972509ba09f2/7.png" />
          </figure>
    <div>
      <h2>Crawl-to-refer ratios shifts: tens of thousands of bot crawls per human click</h2>
      <a href="#crawl-to-refer-ratios-shifts-tens-of-thousands-of-bot-crawls-per-human-click">
        
      </a>
    </div>
    <p>The crawl-to-refer ratio measures how many pages a platform crawls compared with how often it drives users to a website. In practice, a high ratio means heavy crawling but little referral traffic. For example, for every visitor Anthropic refers back to a website, its crawlers have already visited tens of thousands of pages.</p><p>Why does this metric matter? It highlights the imbalance between how much content AI systems consume and how little traffic they return. For publishers, it can feel like giving away the raw material for free. With that in mind, here’s how different platforms compare from January to July 2025.</p><p>Anthropic remains the most crawl-heavy platform. Even after an 87% decline this year, it still crawled 38,000 pages for every referred page visit in July 2025 — the highest imbalance among major AI players. Referrals may be improving, though, after Anthropic added <a href="https://www.anthropic.com/news/web-search"><u>web search to Claude in March 2025</u></a> (initially for U.S. paid users) and expanded it globally by <a href="https://www.brightedge.com/claude-search"><u>May to all users, including the free tier</u></a>. The feature introduced direct citations with clickable URLs, creating new referral pathways.</p><p>The full dataset is below, showing January–July 2025 ratios by platform ordered by the highest ratio average:
(Note: a rising ratio means <i>more</i> bot crawling per human click sent back, while a falling ratio means <i>less</i> bot crawling per human click sent back)

<b>Crawl-to-refer ratio (from </b><a href="https://radar.cloudflare.com/ai-insights?dateStart=2025-07-01&amp;dateEnd=2025-07-31#crawl-to-refer-ratio"><b><u>Cloudflare Radar’s data</u></b></a><b>)</b></p><table><tr><td><p><b>Service</b></p></td><td><p><b>Jan</b></p></td><td><p><b>Feb</b></p></td><td><p><b>Mar</b></p></td><td><p><b>Apr</b></p></td><td><p><b>May</b></p></td><td><p><b>Jun</b></p></td><td><p><b>Jul</b></p></td><td><p><b>Average</b></p></td><td><p><b>% Change Jan-Jul</b></p></td></tr><tr><td><p><b>Anthropic</b></p></td><td><p>286,930.1</p></td><td><p>271,748.2</p></td><td><p>121,612.7</p></td><td><p>130,330.2</p></td><td><p>114,313</p></td><td><p>71,282.8</p></td><td><p>38,065.7</p></td><td><p>147,754.7</p></td><td><p>-86.7%</p></td></tr><tr><td><p><b>OpenAI</b></p></td><td><p>1,217.4</p></td><td><p>1,774.5</p></td><td><p>2,217</p></td><td><p>1200</p></td><td><p>995.6</p></td><td><p>1,655.9</p></td><td><p>1,091.4</p></td><td><p>1,437.8</p></td><td><p>-10.4%</p></td></tr><tr><td><p><b>Perplexity</b></p></td><td><p>54.6</p></td><td><p>55.3</p></td><td><p>201.3</p></td><td><p>300.9</p></td><td><p>199.1</p></td><td><p>200.6</p></td><td><p>194.8</p></td><td><p>172.4</p></td><td><p>256.7%</p></td></tr><tr><td><p><b>Microsoft</b></p></td><td><p>38.5</p></td><td><p>44.2</p></td><td><p>42.3</p></td><td><p>43.3</p></td><td><p>45.1</p></td><td><p>42</p></td><td><p>40.7</p></td><td><p>42.3</p></td><td><p>5.7%</p></td></tr><tr><td><p><b>Yandex</b></p></td><td><p>15.5</p></td><td><p>13.1</p></td><td><p>13.1</p></td><td><p>15.7</p></td><td><p>14.7</p></td><td><p>15.9</p></td><td><p>21.4</p></td><td><p>15.6</p></td><td><p>38.3%</p></td></tr><tr><td><p><b>Google</b></p></td><td><p>3.8</p></td><td><p>6.3</p></td><td><p>14.6</p></td><td><p>22.5</p></td><td><p>16.7</p></td><td><p>13.1</p></td><td><p>5.4</p></td><td><p>11.8</p></td><td><p>43%</p></td></tr><tr><td><p><b>ByteDance</b></p></td><td><p>18</p></td><td><p>16.4</p></td><td><p>3.5</p></td><td><p>2.3</p></td><td><p>1.6</p></td><td><p>1.6</p></td><td><p>0.9</p></td><td><p>6.3</p></td><td><p>-95%</p></td></tr><tr><td><p><b>Baidu</b></p></td><td><p>0.6</p></td><td><p>0.7</p></td><td><p>0.8</p></td><td><p>1.5</p></td><td><p>1.2</p></td><td><p>1</p></td><td><p>0.9</p></td><td><p>1</p></td><td><p>44.5%</p></td></tr><tr><td><p><b>DuckDuckGo</b></p></td><td><p>0.1</p></td><td><p>0.2</p></td><td><p>0.2</p></td><td><p>0.2</p></td><td><p>0.3</p></td><td><p>0.3</p></td><td><p>0.3</p></td><td><p>0.2</p></td><td><p>116.3%</p></td></tr></table><p>Looking at the changes from January to July 2025:</p><ul><li><p><b>Anthropic</b> recorded the steepest decrease in bot to human traffic, down <b>86.7%</b>. From 286,930 bots per human in January, to 38,065 bots per human in July, the change shows a dramatic increase in referrals. Despite the change, it remains by far the most crawl-heavy platform, with tens of thousands of pages still crawled for every referral.</p></li><li><p><b>Perplexity</b> moved in the opposite direction, with bot crawling increasing <b>+256.7%</b> relative to human visitors; climbing from <b>54 bots per human</b> in January to <b>195 bots per human</b> in July. While the ratio is still far below Anthropic, the increase shows it is crawling more heavily, relative to the traffic it refers, than it did earlier.</p></li><li><p><b>OpenAI</b> ratio dropped slightly, from 1,217 bots per human in January to 1,091 in July (-10%). The shift is smaller than Anthropic’s but suggests OpenAI is sending a bit more referral traffic relative to its crawling.</p></li><li><p><b>Microsoft</b> stayed steady, with its ratio moving only slightly, from 38.5 bots per human in January to 40.7 in July (+6%). This consistency suggests stable behavior from Bing-linked services.</p></li><li><p><b>Yandex</b> increased from 15.5 bots per human in January to 21.4 in July (+38%). The overall ratio is far smaller than Anthropic’s or Perplexity’s, but it shows Yandex is crawling more heavily relative to the traffic it sends back.</p></li></ul><p>Alongside measuring crawling volumes and referral traffic (now also visible on the<a href="https://radar.cloudflare.com/ai-insights#ai-bot-best-practices"><u> AI Insights page of Cloudflare Radar</u></a>), it’s worth looking at whether AI operators follow good practices when deploying their bots. Cloudflare data shows that most leading AI crawlers are on our <a href="https://radar.cloudflare.com/bots#verified-bots"><u>verified bots</u></a> list, meaning their IP addresses match published ranges and they respect robots.txt. But adoption of newer standards like <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/web-bot-auth/"><u>WebBotAuth</u></a> — which uses cryptographic signatures in HTTP messages to confirm a request comes from a specific bot, and is especially relevant today — is still missing. </p><p>Meta, OpenAI, and Anthropic run distinct bots for different purposes, while Google and Microsoft rely on unified crawlers. Anthropic, however, still lags in verification, which makes it easier for bad actors to spoof its crawler and ignore robots.txt. Without verification, it’s difficult to distinguish real from fake traffic — leaving its compliance effectively unclear. (A longer list of AI bots is available <a href="https://radar.cloudflare.com/ai-insights#ai-bot-best-practices"><u>here</u></a>).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EvNGFKp6pGQUP84P33qJG/b646c0aad05d68d3f9c4a37d08bd483f/8.png" />
          </figure>
    <div>
      <h2>Conclusion and what’s next</h2>
      <a href="#conclusion-and-whats-next">
        
      </a>
    </div>
    <p>If training-related crawling continues to dominate while referrals stay flat, creators face a paradox: feeding AI systems without gaining traffic in return. Many want their content to appear in chatbot answers, but without monetization or cooperation, the incentive to produce quality work declines.</p><p>The Web now stands at a fork in the road. Either a new balance emerges — one where the new AI era helps sustain publishers and creators — or AI turns the open web into a one-way training set, extracting value with little flowing back.</p><p>You can learn more about some of these data trends on Cloudflare Radar’s updated<a href="https://radar.cloudflare.com/ai-insights"><u> AI Insights page</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Bots]]></category>
            <guid isPermaLink="false">71UVAVb7ICHgxWp6yhCLoA</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[A deeper look at AI crawlers: breaking down traffic by purpose and industry]]></title>
            <link>https://blog.cloudflare.com/ai-crawler-traffic-by-purpose-and-industry/</link>
            <pubDate>Thu, 28 Aug 2025 14:05:00 GMT</pubDate>
            <description><![CDATA[ We are extending AI-related insights on Cloudflare Radar with new industry-focused data and a breakdown of bot traffic by purpose, such as training or user action.  ]]></description>
            <content:encoded><![CDATA[ <p>Search platforms historically crawled web sites with the implicit promise that, as the sites showed up in the results for relevant searches, they would send traffic on to those sites — in turn leading to ad revenue for the publisher. This model worked fairly well for several decades, with a whole industry emerging around optimizing content for optimal placement in search results. It led to higher click-through rates, more eyeballs for publishers, and, ideally, more ad revenue. However, the emergence of AI platforms over the last several years, and the incorporation of AI "overviews" into classic search platforms, has turned the model on its head. When users turn to these AI platforms with queries that used to go to search engines, they often won't click through to the original source site once an answer is provided — and that assumes that a link to the source is provided at all! No clickthrough, no eyeballs, and no ad revenue. </p><p>To provide a perspective on the scope of this problem, Radar <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/"><u>launched</u></a> <a href="https://radar.cloudflare.com/ai-insights#crawl-to-refer-ratio"><u>crawl/refer ratios</u></a> on July 1, based on traffic seen across our whole customer base. These ratios effectively compare the number of crawling requests for HTML pages from the <a href="https://www.cloudflare.com/learning/bots/what-is-a-web-crawler/"><u>crawler</u></a> associated with a given platform, to the number of HTML page requests referred by that platform (measuring human traffic). This data complements insights into <a href="https://radar.cloudflare.com/ai-insights#ai-bot-crawler-traffic"><u>AI bot &amp; crawler traffic trends</u></a> that were <a href="https://blog.cloudflare.com/bringing-ai-to-cloudflare/#ai-bot-traffic-insights-on-cloudflare-radar"><u>launched</u></a> during Birthday Week 2024.</p><p>Today, we're adding two new capabilities to the <a href="https://radar.cloudflare.com/ai-insights"><b><u>AI Insights</u></b></a> page on Cloudflare Radar to give you more insight into this activity: industry-focused AI bot traffic data, and a new breakdown of AI bot traffic by its purpose.</p>
    <div>
      <h2>Traffic by type</h2>
      <a href="#traffic-by-type">
        
      </a>
    </div>
    <p>Since the launch of <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>LLMs</u></a> into the public consciousness in November 2022, much of the crawling traffic seen from user agents associated with AI platforms has been to collect content used to train AI models. This crawling activity can be aggressive at times, often ignoring <a href="https://radar.cloudflare.com/ai-insights#ai-user-agents-found-in-robotstxt"><u>directives found in robots.txt files</u></a>. In addition to offering chatbots trained on this <a href="https://www.cloudflare.com/learning/bots/what-is-content-scraping/"><u>scraped content</u></a>, AI platforms have emerged that aim to replace classic search tools, while those tools have themselves integrated AI-powered summaries as part of their results. These platforms may crawl your site to build indexes for their search engines. And some AI platforms may crawl your site in response to a specific user prompt, such as looking for flights to plan a vacation.</p><p>The new <b>Crawl purpose</b> selector within the <b>AI bot &amp; crawler traffic</b> card allows users to select between <b>Training</b>, <b>Search</b>, <b>User action</b>, and <b>Undeclared</b>. (The latter is for crawlers where no information is available from the operator or other industry sources regarding its purpose.) </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bIoxF54OFCmecoOWOHDQ3/8e252d3ffbb4f948a76158661a4b013a/1_-_crawlpurpose-dropdown.png" />
          </figure><p>Once a purpose is selected, the <a href="https://radar.cloudflare.com/ai-insights#http-traffic-by-bot"><b><u>HTTP traffic by bot</u></b></a> graph updates to show traffic trends over the selected time period for the top five most active AI bots that crawl for the selected purpose.</p><p>As an example, selecting <b>User action</b> results in a <a href="https://radar.cloudflare.com/ai-insights?dateStart=2025-07-01&amp;dateEnd=2025-07-28#http-traffic-by-bot"><u>graph</u></a> like the one below, which covers the first 28 days of July 2025. OpenAI’s <i>ChatGPT-User</i> bot is responsible for nearly three quarters of the request traffic from this cohort of crawlers. A daily cycle is clearly evident, suggesting regular usage of ChatGPT in that fashion, with such usage gradually increasing throughout the month. If <i>ChatGPT-User </i>is removed from the chart, <i>Perplexity-User</i> also exhibits a similar pattern.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Vt5HUwATxJgWezhbpyA0N/f1b2745802ba4c1b7ee33b3c77b6ed4d/2_-_http_traffic_-_user_action.png" />
          </figure><p>A new <a href="https://radar.cloudflare.com/ai-insights#crawl-purpose"><b><u>Crawl purpose</u></b></a> graph has also been added to Radar, breaking out traffic trends by purpose. <i>Training</i> traffic, responsible for nearly 80% of the crawling from AI bots, is somewhat erratic in nature, with no clear cyclical pattern. However, such patterns are visible for the <i>User action</i> and <i>Undeclared</i> purposes, as shown in the <a href="https://radar.cloudflare.com/ai-insights?dateStart=2025-07-01&amp;dateEnd=2025-07-28#crawl-purpose"><u>graph</u></a> below, although they account for less than 5% of AI bot traffic across this time period.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2jis2lHk6KjbWpOQPcARmy/7ae33385be2ac1d820104a2dc22f489a/3_-_crawlpurpose-graph.png" />
          </figure><p>Within the <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots"><u>Data Explorer</u></a> view for the <b>AI Bots &amp; Crawlers</b> dataset, you can now <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;dt=28d&amp;groupBy=crawl_purpose"><u>break the data down by </u><b><u>Crawl purpose</u></b></a> to explore how the activity has changed over time. Alternatively, you can <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;dt=28d&amp;groupBy=user_agent&amp;filters=crawlPurpose%253DTraining"><u>break the data down by </u><b><u>User agent</u></b><u>, and filter by </u><b><u>Crawl purpose</u></b></a>, to explore traffic trends across a larger set of bots (beyond the top five). <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;dt=28d&amp;groupBy=user_agent&amp;filters=crawlPurpose%253DTraining&amp;timeCompare=1"><u>Comparisons with previous time periods</u></a> are available here as well.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kCgMWSeVGYdQ9jnkAOMhe/ab71e21d0b620b78b72aaf90f7ecbb46/4_-_dataexplorer_-_training.png" />
          </figure>
    <div>
      <h2>Visibility by industry</h2>
      <a href="#visibility-by-industry">
        
      </a>
    </div>
    <p>You can use your own traffic data to see how aggressively crawlers <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">scrape</a> your content. You can also see how frequently they refer traffic back to you. However, you may also want to understand how those measurements compare with your peer group — are you being crawled more or less frequently, and are the platforms referring more or less traffic back to your sites? The new industry set filtering available for the <a href="https://radar.cloudflare.com/ai-insights#http-traffic-by-bot"><b><u>HTTP traffic by bot</u></b><u> graph</u></a> and the <a href="https://radar.cloudflare.com/ai-insights#crawl-to-refer-ratio"><b><u>Crawl-to-refer ratio</u></b><u> table</u></a> in the <a href="https://radar.cloudflare.com/ai-insights"><b><u>AI Insights</u></b></a> section of Radar can provide you with this perspective.</p><p>Within the <b>AI bot &amp; crawler traffic</b> card on the AI Insights page, select an industry set from the drop-down list at the top right of the card. The graphs in the <b>HTTP traffic by bot</b> and <b>Crawl purpose</b> sections of the card update to reflect the selection, as does the <b>Crawl-to-refer ratio</b> table. (Selecting a <b>Crawl purpose</b> from that drop-down menu will further update the <b>HTTP traffic by bot</b> graph.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NBLZ4KnJ2A75L92a3bVK4/1665549e5761b0ae449d651a49ba7e64/5_-_industry_set_-_dropdown.png" />
          </figure><p>It is interesting to observe how the crawling patterns change between industry sets, along with the mix of most active bots and crawl-to-refer ratios. For example, across the first week of August, with <a href="https://radar.cloudflare.com/ai-insights?dateStart=2025-08-01&amp;dateEnd=2025-08-07#http-traffic-by-bot"><u>no vertical or crawl purpose selected</u></a>, <b>ClaudeBot</b> and <b>GPTBot</b> account for nearly half of the observed crawling activity, with <b>Meta-ExternalAgent</b> the only one among the top five exhibiting activity that remotely resembles a pattern. For the default view, Anthropic had the highest crawl-to-refer ratio at nearly 50,000:1, followed by OpenAI at 887:1 and Perplexity at 118:1.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2StNvYYHAK9PZ6U0tGvwiH/68266c10a50ef70507a645a5dfcc2059/6_-_http_traffic_-_no_vertical.png" />
          </figure><p>However, when the <a href="https://radar.cloudflare.com/ai-insights?industrySet=News+%26+Publications&amp;dateStart=2025-08-01&amp;dateEnd=2025-08-07"><b><u>News and Publications industry set is selected</u></b></a>, we see<b> </b>a much tighter distribution of traffic among the top five, ranging from <b>ChatGPT-User</b>’s 14.9% share of traffic to <b>GPTBot</b>’s 17.4% share. <b>ChatGPT-User</b>’s presence among the top five suggests that a significant number of users may have been asking questions about current events during that period of time. For these <b>News and Publications</b> sites, the crawl-to-refer ratios are lower than the default view, with Anthropic at 2,500:1, OpenAI at 152:1, and Perplexity at 32.7:1. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EpH7k6tQKSMTdXIQtoG1y/7ad2383f442e390760d0eb2a3d3b7127/7_-_industry_set_-_news___publications.png" />
          </figure><p>As a third example, we find that the mix again shifts for the <a href="https://radar.cloudflare.com/ai-insights?industrySet=Computer+%26+Electronics&amp;dateStart=2025-08-01&amp;dateEnd=2025-08-07#http-traffic-by-bot"><b><u>Computer and Electronics industry set</u></b></a>. While <b>GPTBot</b> was again the most active AI bot, <b>Amazonbot</b> moved up into second place; together these bots now account for over 40% of crawling traffic. <b>ClaudeBot</b> and <b>Meta-ExternalAgent</b> both had a 13.9% share of the crawling traffic, with ByteDance’s <b>ByteSpider</b> rounding out the top five. The crawl-to-refer ratios for this vertical are again lower than for the unfiltered view, with Anthropic down to 8,800:1, OpenAI at 401.7:1, and Perplexity at 88:1.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KjHMu0t6uCJAHEjgzDiNz/31267af8484006c6be1b834107cb3052/8_-_industry_set_-_computer___electronics.png" />
          </figure><p>Within Data Explorer, you can now break down <b>AI Bots &amp; Crawler</b> data by Vertical and Industry. (A vertical is a pre-defined collection of multiple related industries), and you can also filter <b>Crawl purpose</b> and <b>User agent</b> breakdowns by Vertical and Industry. For example, the graphs below illustrate the <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;groupBy=user_agent&amp;dt=2025-08-01_2025-08-07&amp;filters=vertical%253DFinance%252Cindustry%253DCryptocurrency#result"><u>traffic trends by AI crawler</u></a> for sites within the <b>Cryptocurrency</b> industry under the <b>Finance</b> vertical, as well as the <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;groupBy=crawl_purpose&amp;dt=2025-08-01_2025-08-07&amp;filters=vertical%253DFinance%252Cindustry%253DCryptocurrency#result"><u>traffic trends by crawl purpose</u></a> for that industry/vertical pair. While these sites see crawling traffic from quite a few bots, three-quarters of that traffic during the first week of August was concentrated in just four bots, and 80% of it was for gathering information to train models.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39MVSCz4a41eKDqIR0Dj4Z/5489805b938051212ca0374e892ef756/9_-_dataexplorer_-_http_traffic_-_finance_cryptocurrency.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ppfZea6L4fdZ4RKWIVNq5/a605a2f3b45bb6ef540ca57d78bb145e/10_-_dataexplorer_-_crawl_purpose_-_finance_cryptocurrency.png" />
          </figure><p>Because the Industry sets shown on the main <b>AI Insights</b> page are manually curated collections of related industries, clicking through to the Data Explorer view from one of those graphs will pre-populate the Industry selector with the relevant entries. For example, clicking through from the <a href="https://radar.cloudflare.com/ai-insights?industrySet=Gaming+%26+Gambling#http-traffic-by-bot"><b><u>HTTP traffic by bot</u></b><u> graph for the </u><b><u>Gaming &amp; Gambling</u></b><u> industry set</u></a> results in the following <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;groupBy=user_agent&amp;filters=industry%253DComputer%25252520Games%25252CGambling%25252520%25252526%25252520Casinos%25252CGambling%25252520and%25252520Casinos%2525253B%25252520Recreation%25252CGaming&amp;dt=2025-08-01_2025-08-07"><u>Data Explorer view</u></a>, which lists the component industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60FepjNCd25CFKWTQzdVsq/2772c2782c93772f4a55364f06846bd5/11_-_dataexplorer_-_gaming_gambling_industries.png" />
          </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>AI crawler traffic has become a fact of life for content owners, and the complexity of dealing with it has increased as bots are used for purposes beyond LLM training. <a href="https://contentsignals.org/"><u>Work is underway</u></a> to allow website publishers to declare how automated systems should use their content. However, it will take some time for these proposed solutions to be standardized, and for both publishers and crawlers to adopt them. As the space evolves, we’ll continue to expand Cloudflare Radar’s insights into AI crawler activity.</p><p>If you share our AI-related graphs on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). If you have questions or comments, you can reach out to us on social media, or contact us via <a href="#"><u>email</u></a>.</p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Bots]]></category>
            <guid isPermaLink="false">6PuiWWmAnS4oHYFYoYysBU</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity]]></title>
            <link>https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/</link>
            <pubDate>Mon, 28 Apr 2025 21:30:00 GMT</pubDate>
            <description><![CDATA[ A massive power outage struck significant portions of Portugal and Spain at 10:34 UTC on April 28, disrupting everyday activities and services. ]]></description>
            <content:encoded><![CDATA[ <p>A massive <a href="https://www.reuters.com/world/europe/large-parts-spain-portugal-hit-by-power-outage-2025-04-28/"><u>power outage struck significant portions of Portugal and Spain</u></a> at 10:34 UTC on April 28, grinding transportation to a halt, shutting retail businesses, and otherwise disrupting everyday activities and services. Parts of France were also reportedly impacted by the power outage. Portugal’s electrical grid operator <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Aa1493644-407b-44c0-aef9-c6f64d7fad0e#post"><u>blamed</u></a> the outage on a "<i>fault in the Spanish electricity grid</i>”, and <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Addda9592-0346-4fe8-a17a-2261efc1ba5b#post"><u>later stated</u></a> that "<i>due to extreme temperature variations in the interior of Spain, there were anomalous oscillations in the very high voltage lines (400 kilovolts), a phenomenon known as 'induced atmospheric vibration'</i>" and that "<i>These oscillations caused synchronisation failures between the electrical systems, leading to successive disturbances across the interconnected European network</i>." However, the operator later <a href="https://sicnoticias.pt/pais/2025-04-28-e-falso-que-fenomeno-atmosferico-raro-tenha-estado-na-origem-do-apagao-1a078544"><u>denied</u></a> these claims. </p><p>The breadth of Cloudflare’s network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the Internet impact of this power outage at both a local and national level, as well as at a network level, across traffic, network quality, and routing metrics.</p>
    <div>
      <h2>Impacts in Portugal</h2>
      <a href="#impacts-in-portugal">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Portugal, Internet traffic dropped as the power grid failed, with traffic immediately dropping by half as compared to the previous week, falling to approximately 90% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21ezFb3KrFDR36Gn66twwd/99ed60e71501eccf948e7e1d2c0eb3a3/BLOG-2817_2.png" />
          </figure><p>Request traffic from users in Portugal to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 40% as compared to the previous week, and falling further over the next several hours. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GgzpC2ll27P1cfv0dQlFw/69dfabcfddd2dcb4db5f00885b12c67f/BLOG-2817_3.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, the loss of Internet traffic from local providers including NOS, Vodafone, MEO, and NOWO was swift and significant. The Cloudflare Radar graphs below show that traffic from those networks effectively evaporated over the hours after the power outage began. The <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous systems (ASNs)</u></a> shown below for these providers may carry a mix of fixed and mobile broadband traffic. However, MEO breaks out at least some of their mobile traffic onto a separate ASN, and the graph below for MEO-MOVEL (AS42863) shows that request traffic from that network more than doubled after the power went out, as subscribers turned to their mobile devices for information about what was happening. However, despite the initial spike, this mobile traffic also fell over the next several hours, dropping to approximately half of the volume seen the prior week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fys8MdtL3ImmHS6b25x0i/b1ccbd24818e4ec93170ae9f699c9727/BLOG-2817_4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LCdCDX9XoOHMgdVRzyjD0/1e276a9bb6eae716ee22059d88517615/BLOG-2817_5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fxFCuhYkBHXSDDizyj6AX/87d9e5f6e9e610cff365d3f5be8c75cb/BLOG-2817_6.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RfJ5HwTx3AqMKJ6c5FaaI/f595795b57dfb1b54fb6013ccca532fc/BLOG-2817_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kYztdmWgq6n8lZgokElhh/a34f81d3dce5c259ee43b567ebbb8e9a/BLOG-2817_8.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In addition to looking at traffic at a national and network level, we can also look at traffic at a regional level. As noted above, the power outage did not impact every region of the country. The traffic graphs below show the changes in Internet traffic from the parts of Portugal where an impact was observed.</p><p>In Lisbon and Porto, a sharp, but limited drop in traffic was observed as the power outage began, with traffic recovering slightly almost as quickly. However, traffic gradually declined in the subsequent hours, in contrast to the other regions reviewed below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78BxDMSIsfvNyoPUczJ1Cv/aa4cf6cd71684726fc891c63dcb5108f/BLOG-2817_9.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/23KJh2ptN7NynAACvmFH9L/d71dc49bcd20ede70847592fb0d55b72/BLOG-2817_10.png" />
          </figure><p>The most significant immediate traffic drops were observed in Aveiro, Beja, Bragança, Castelo Branco, Évora, Faro, Guarda, Portalegre, Santarém, Viana do Castelo, Vila Real, and Viseu. In these areas, traffic fell and then quickly stabilized at very low volumes. In Braga and Setúbal, traffic declined more gradually after the initial drop.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tF73OLez4RM8I7x2I9ST0/06751ebb8bfdc22bc243939881eb2d16/BLOG-2817_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fYFHRgvyG8jlSZtIQ55St/1b3656d6212c1dd0a1e8ee6be5863f26/BLOG-2817_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JKrwsr5k82cDreQluW336/61cc1d1b278a42995e71f98a02924d8c/BLOG-2817_13.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q736FpU8TFEFZzNMl3ahB/b4f0105be84f00a9dc28d63ffb820124/BLOG-2817_14.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/717jnbhzFFBGxC8oKQzbWc/44ca9f1d5ca08104434f651750825bc9/BLOG-2817_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sghSM0J7Hx793fpzBNhBa/8e105feb10216547aa6fc4c829c5c95f/BLOG-2817_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TRbyRB0hrjClK3S74Z6U1/71dc72b9b2bff67fd58fa43d5566aefb/BLOG-2817_17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IEvNIigmrvmQ0qELWpLgO/63388e385162c421bb5ddf225993d300/BLOG-2817_18.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KWHQhpaMdU8EZUAjvJyZn/8de4ec173e79971e06cdbbc931e3f149/BLOG-2817_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NCILxkS2oymGlRpKcoiG6/89977e5bc093ce81311585f397fff97e/BLOG-2817_20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5s16pM0WdaX2bwDZuMuxda/af239a2a28abfeb5ce7da93c1094dd8c/BLOG-2817_21.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jkQrdlsCsGr4qyXX8EN42/7d90bbc1afcf138094a0f87d88b342e7/BLOG-2817_22.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xnoq8NQjx0nMruchenCRW/4a0a29367a0a4903a7623a9c3db72031/BLOG-2817_23.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sN1UZ4YYy7ZuOOy98KyIw/7c837a3034144937b8b9f3d43e0d7ffa/BLOG-2817_24.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Portugal. Prior to the loss of power, median download speeds across the country were around 40 Mbps, but within several hours after the state of the outage, fell as low as 15 Mbps. As expected, latency at a country level saw an opposite impact. Prior to the loss of power, median latency was around 20 ms. However, it gradually grew to as much as 50 ms. The lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IZu3b640cB11ZjnqQGcFh/886c356c4d8124be7f8b2ce01c9582cc/BLOG-2817_25.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nq7wmaWEZOgusVYw9v1it/8685d5ad7a343f22b94e09c72a34a0d5/BLOG-2817_26.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/the-net/network-infrastructure/">Network infrastructure </a>in Portugal was also impacted by the power outage, with the impact seen as a drop in announced IP address space. (This means that portions of Portuguese providers’ networks are no longer visible to the rest of the Internet.) The number of announced IPv4 /24s (blocks of 256 IPv4 addresses) dropped by ~300 (around 1.2%), and the number of announced IPv6 /48s (blocks of over 1.2 octillion IPv6 addresses) dropped from 17,928,551 to 16,355,607 (around 9%). Address space began to drop further after 16:00 UTC, possibly as a result of backup power being exhausted and associated network infrastructure falling offline.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZaC5NQzz6dzDzo5ywePst/417192abd6fc942ff85d06e247f7de66/BLOG-2817_27.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/asO2sxhD9Adue3q0FiBJv/40b8159855bd3c2156df49360adf898b/BLOG-2817_28.png" />
          </figure>
    <div>
      <h2>Impacts in Spain</h2>
      <a href="#impacts-in-spain">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Spain, Internet traffic dropped as the power grid failed, with traffic immediately dropping by around 60% as compared to the previous week, falling to approximately 80% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NWiuqfI5Z3MI5Q8fTXJM/df6438db91848c3faff11aaae43a7328/BLOG-2817_29.png" />
          </figure><p>Request traffic from users in Spain to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 54% as compared to the previous week, but quickly stabilizing. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1N4JwFD2543isQ7laC6k/cf7ad7cce146ed18fd84ad9a32872e6e/BLOG-2817_30.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, traffic volumes from the <a href="https://radar.cloudflare.com/traffic/es?dateRange=1d#autonomous-systems"><u>top five ASNs in Spain</u></a> fell rapidly once power was lost, with most declining gradually over the next several hours. In contrast, traffic from Digi Spain Telecom (AS57269) fell quickly, but then stabilized at the lower level. In comparison to the previous week, traffic from these providers fell between 75% and 93% in the hours after the power outage began.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oFLKubgeo2NsffE9tGx2f/89af580571c94e14703b218feadb058b/BLOG-2817_31.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YTkS67VGnW9ACB3t58kBF/672f7e3e7d990bc7f33aa9a5155e133f/BLOG-2817_32.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56sGr0XxMAifw2ZqYnvSWU/07f168a415a2f0801bb2aebb1a7b45f9/BLOG-2817_33.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CpRU7YzB4LnTJppDnN2DZ/e479899ec5d6a0034c38361abf311d2f/BLOG-2817_34.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qYPxLDJQM2bfv0LTrY547/694f327f221bbc094580dbea731527d1/BLOG-2817_35.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In most of the impacted regions in Spain, traffic dropped off quickly and stabilized, or continued to fall further. However, some recovery in traffic is also evident, and can be seen in Navarre, La Rioja, Cantabria, and Basque Country. This traffic recovery is likely associated with an initial restoration of power in those regions, as an <a href="https://www.ree.es/es/sala-de-prensa/actualidad/nota-de-prensa/2025/04/proceso-de-recuperacion-de-la-tension-en-el-sistema-electrico-peninsular"><u>update</u></a> from <a href="https://www.redeia.com/en/about-us/our-brand"><u>Red Eléctrica</u></a> (operator of Spain’s national electricity grid) noted that “<i>Electricity is now available in parts of Catalonia, Aragon, the Basque Country, Galicia, Asturias, Navarre, Castile and León, Extremadura, Andalusia, and La Rioja.</i>”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ziGXO8PBjWNAwhiYNa8hT/9af98f7fad1b22f482445d90314a524e/BLOG-2817_36.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17WcnWkXfG1BlxBCUwp5fW/1688269ff5dd6dbad06c09278e9ccd8d/BLOG-2817_37.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ho5Cc18AYxd8G54mtmfcH/739731e105a9236a00a6531a1a61c10f/BLOG-2817_38.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K4A82RT9L0tCXUBEVjZOw/a0798877806ac2c071cf82e71101a558/BLOG-2817_39.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6zFHmbct6zR2155GbfyM0F/af7f5aad5076bafc373127f7e5da82be/BLOG-2817_40.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FBbLHYIziEcd0qJJM02s1/404bcca11c826a758d174ce4ff94a638/BLOG-2817_41.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/349JW0IsbTDKRALrlQd91P/97b397344d72d3e6322a572e9c562ee2/BLOG-2817_42.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BNKpHFhRfNOlv1smU5BXr/9cda4655d68648c216f741cb200f0c51/BLOG-2817_43.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2g9WMm6XRkUvJxpW8pE0QJ/214f04aa2f8caa307e5f422db7a85dd3/BLOG-2817_44.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TeXN8cdr56fUFyNnbBtXo/f5ec765241d0b4af2f15eab70b65aa5c/BLOG-2817_45.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2h2R1k3eabXg7qB0XvfP0t/637dd2050cbc0e25b6ae441fe79bb14c/BLOG-2817_46.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37gqrGzlp0dIFinCinmAYk/6ed9f0b5c5d73490bbc539e577125df2/BLOG-2817_47.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Cr2Otys8KDJA0amR3PpUj/f51a2f1ffdbb50ce4f3ca7501352fc5d/BLOG-2817_48.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K415209i5YGlJmcMuoRMr/1b5285b4872b1dc904ddb0f3a0417704/BLOG-2817_49.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AGjopp98UyZh52X5Jf1F9/df72d3f181012e07bb566aec3ab01ca6/BLOG-2817_50.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Spain. Prior to the loss of power, median download speeds across the country were around 35 Mbps, but within several hours after the state of the outage, fell as low as 19 Mbps. Interestingly, the median bandwidth didn’t see the clean gradual decline as it did in Portugal, instead falling and recovering twice before gradually declining.</p><p>As expected, latency at a country level saw a significant increase. Prior to the loss of power, median latency was around 22 ms, but grew to as much as 40 ms. As in Portugal, the lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SvaDFDPdleRDctpTezUIf/65834285ceb6d7dedc76c97095871859/BLOG-2817_51.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BxQUuqVQdIHxro6XDAzUC/83e6001ffaa1492079cf54f25c36785c/BLOG-2817_52.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p>Similar to Portugal, network infrastructure in Spain was also impacted by the power outage, with the impact seen as a drop in announced IP address space. By 14:30 UTC, the number of announced IPv4 /24 address blocks had fallen by around 2.4%, and continued to drop further over the following hours. The number of announced IPv6 /48 address blocks fell by over 8% during that same time span, and also continued to drop in the following hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6o4hGGWXhf8aoqkqUUCNnO/5ad97dafb731679c368f837f69fc7044/BLOG-2817_53.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZfoHrCrwHAMACg0oCTceD/8f816416c4cde1c562aa519099eed058/BLOG-2817_54.png" />
          </figure>
    <div>
      <h2>Impacts in other European countries</h2>
      <a href="#impacts-in-other-european-countries">
        
      </a>
    </div>
    <p>Parts of Andorra and France were also <a href="https://www.euronews.com/my-europe/2025/04/28/spain-portugal-and-parts-of-france-hit-by-massive-power-outage"><u>reportedly impacted</u></a> by the power outage, with additional outages reported as far away as Belgium. At a national level, no traffic disruptions were evident in any of the countries.</p><p>
</p><p>Analysis of traffic at a regional level in France shows a slight decline concurrent with the power outage in several regions, but the drops were nominal in comparison to Spain and Portugal, and traffic volumes recovered to expected levels within 90 minutes. No impact was evident at a regional level in Andorra.</p><p>It appears that Morocco may have been impacted in some fashion by the power outage, or at least Orange Maroc was. In a <a href="https://x.com/OrangeMaroc/status/1916866583047147690"><u>post on X</u></a>, the provider stated (translated) “<i>Internet traffic has been disrupted following a massive power outage in Spain and Portugal, which is affecting international connections.</i>” Cloudflare Radar shows that traffic from the network fell sharply around 12:00 UTC, 90 minutes after the power outage began, with a full outage beginning around 15:00 UTC.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62cA1IF7zleHp8RpCZu2Dq/2733086494e7d05b3feac5fd700e1c0f/BLOG-2817_55.png" />
          </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Power restoration in Spain had already started as this post was being written, and full recovery will likely take hours to days. As power is restored, Internet traffic and other metrics will recover as well. The current state of Internet connectivity in <a href="https://radar.cloudflare.com/es"><u>Spain</u></a> and <a href="https://radar.cloudflare.com/pt"><u>Portugal</u></a> can be tracked on Cloudflare Radar.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a href="#">email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">3Zqv5LUUJauYsk7Dn0BIye</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Some TXT about, and A PTR to, new DNS insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/new-dns-section-on-cloudflare-radar/</link>
            <pubDate>Thu, 27 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ The new Cloudflare Radar DNS page provides increased visibility into aggregate traffic and usage trends seen by our 1.1.1.1 resolver ]]></description>
            <content:encoded><![CDATA[ <p>No joke – Cloudflare's <a href="https://www.cloudflare.com/en-gb/learning/dns/what-is-1.1.1.1/"><u>1.1.1.1 resolver</u></a> was <a href="https://blog.cloudflare.com/dns-resolver-1-1-1-1"><u>launched</u></a> on April Fool's Day in 2018. Over the last seven years, this highly <a href="https://www.dnsperf.com/#!dns-resolvers"><u>performant</u></a> and <a href="https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/"><u>privacy</u></a>-<a href="https://blog.cloudflare.com/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination"><u>conscious</u></a> service has grown to handle an average of 1.9 Trillion queries per day from approximately 250 locations (countries/regions) around the world. Aggregated analysis of this traffic provides us with unique insight into Internet activity that goes beyond simple Web traffic trends, and we currently use analysis of 1.1.1.1 data to power Radar's <a href="https://radar.cloudflare.com/domains"><u>Domains</u></a> page, as well as the <a href="https://blog.cloudflare.com/radar-domain-rankings"><u>Radar Domain Rankings</u></a>.</p><p>In December 2022, Cloudflare <a href="https://blog.cloudflare.com/the-as112-project/"><u>joined the AS112 Project</u></a>, which helps the Internet deal with misdirected DNS queries. In March 2023, we launched an <a href="https://radar.cloudflare.com/as112"><u>AS112 statistics</u></a> page on Radar, providing insight into traffic trends and query types for this misdirected traffic. Extending the basic analysis presented on that page, and building on the analysis of resolver data used for the Domains page, today we are excited to launch a dedicated DNS page on Cloudflare Radar to provide increased visibility into aggregate traffic and usage trends seen across 1.1.1.1 resolver traffic. In addition to looking at global, location, and <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (ASN)</u></a> traffic trends, we are also providing perspectives on protocol usage, query and response characteristics, and <a href="https://www.cloudflare.com/learning/dns/dnssec/how-dnssec-works/"><u>DNSSEC</u></a> usage.</p><p>The traffic analyzed for this new page may come from users that have manually configured their devices or local routers to use 1.1.1.1 as a resolver, ISPs that set 1.1.1.1 as the default resolver for their subscribers, ISPs that use 1.1.1.1 as a resolver upstream from their own, or users that have installed Cloudflare’s <a href="https://one.one.one.one/"><u>1.1.1.1/WARP app</u></a> on their device. The traffic analysis is based on anonymised DNS query logs, in accordance with <a href="https://www.cloudflare.com/privacypolicy/"><u>Cloudflare’s Privacy Policy</u></a>, as well as our <a href="https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/"><u>1.1.1.1 Public DNS Resolver privacy commitments</u></a>.</p><p>Below, we walk through the sections of Radar’s new DNS page, reviewing the included graphs and the importance of the metrics they present. The data and trends shown within these graphs will vary based on the location or network that the aggregated queries originate from, as well as on the selected time frame.</p>
    <div>
      <h3>Traffic trends</h3>
      <a href="#traffic-trends">
        
      </a>
    </div>
    <p>As with many Radar metrics, the <a href="https://radar.cloudflare.com/dns"><u>DNS page</u></a> leads with traffic trends, showing normalized query volume at a worldwide level (default), or from the selected location or <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (ASN)</u></a>. Similar to other Radar traffic-based graphs, the time period shown can be adjusted using the date picker, and for the default selections (last 24 hours, last 7 days, etc.), a comparison with traffic seen over the previous period is also plotted.</p><p>For location-level views (such as <a href="https://radar.cloudflare.com/dns/lv"><u>Latvia</u></a>, in the example below), a table showing the top five ASNs by query volume is displayed alongside the graph. Showing the network’s share of queries from the selected location, the table provides insights into the providers whose users are generating the most traffic to 1.1.1.1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tFv24QhHPReek393iHte7/03894de5973a1fed2805f69dcd9323c6/01.png" />
            
            </figure><p>When a country/region is selected, in addition to showing an aggregate traffic graph for that location, we also show query volumes for the <a href="https://en.wikipedia.org/wiki/Country_code_top-level_domain"><u>country code top level domain (ccTLD)</u></a> associated with that country. The graph includes a line showing worldwide query volume for that ccTLD, as well as a line showing the query volume based on queries from the associated location. <a href="https://radar.cloudflare.com/dns/ai#dns-query-volume-for-ai-domains"><u>Anguilla’s</u></a> ccTLD is .ai, and is a popular choice among the growing universe of AI-focused companies. While most locations see a gap between the worldwide and “local” query volume for their ccTLD, Anguilla’s is rather significant — as the graph below illustrates, this size of the gap is driven by both the popularity of the ccTLD and Anguilla’s comparatively small user base. (Traffic for <a href="https://www.cloudflare.com/application-services/products/registrar/buy-ai-domains/">.ai domains</a> from Anguilla is shown by the dark blue line at the bottom of the graph.) Similarly, sizable gaps are seen with other “popular” ccTLDs as well, such as .io (<a href="https://radar.cloudflare.com/dns/io#dns-query-volume-for-io-domains"><u>British Indian Ocean Territory</u></a>), .fm (<a href="https://radar.cloudflare.com/dns/fm#dns-query-volume-for-fm-domains"><u>Federated States of Micronesia</u></a>), and .co (<a href="https://radar.cloudflare.com/dns/co#dns-query-volume-for-co-domains"><u>Colombia</u></a>). A higher “local” ccTLD query volume in other locations results in smaller gaps when compared to the worldwide query volume.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LXc2OLAoHqAVbgspo5cjb/c01b9f7e90d1d27f66eb3dcb35bf2622/02.png" />
            
            </figure><p>Depending on the strength of the signal (that is, the volume of traffic) from a given location or ASN, this data can also be used to corroborate reported Internet outages or shutdowns, or reported blocking of 1.1.1.1. For example, the <a href="https://radar.cloudflare.com/dns/as8048?dateStart=2025-01-10&amp;dateEnd=2025-02-06"><u>graph below</u></a> illustrates the result of Venezuelan provider <a href="https://radar.cloudflare.com/as8048"><u>CANTV</u></a> reportedly <a href="https://x.com/vesinfiltro/status/1879943715537711233"><u>blocking access to 1.1.1.1</u></a> for its subscribers. A <a href="https://radar.cloudflare.com/dns/as22313?dateStart=2025-01-10&amp;dateEnd=2025-01-23"><u>comparable drop</u></a> is visible for <a href="https://radar.cloudflare.com/as22313"><u>Supercable</u></a>, another Venezuelan provider that also reportedly blocked access to Cloudflare’s resolver around the same time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hR11TuJDhzWDFhoCo3Uh7/970ecbc951edd352f80a3b87f607e580/03.png" />
            
            </figure><p>Individual domain pages (like the one for <a href="https://radar.cloudflare.com/domains/domain/cloudflare.com"><u>cloudflare.com</u></a>, for example) have long had a choropleth map and accompanying table showing the <a href="https://radar.cloudflare.com/domains/domain/cloudflare.com#visitor-location"><u>popularity of the domain by location</u></a>, based on the share of DNS queries for that domain from each location. A <a href="https://radar.cloudflare.com/dns#geographical-distribution"><u>similar view</u></a> is included at the bottom of the worldwide overview page, based on the share of total global queries to 1.1.1.1 from each location.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2kchGpH4fmYxmX4up953VC/744632815d78a9a77526e97d8c4d1664/04.png" />
            
            </figure>
    <div>
      <h3>Query and response characteristics</h3>
      <a href="#query-and-response-characteristics">
        
      </a>
    </div>
    <p>While traffic trends are always interesting and important to track, analysis of the characteristics of queries to 1.1.1.1 and the associated responses can provide insights into the adoption of underlying transport protocols, record type popularity, cacheability, and security.</p><p>Published in November 1987, <a href="https://datatracker.ietf.org/doc/html/rfc1035#section-4.2"><u>RFC 1035 notes</u></a> that “<i>The Internet supports name server access using TCP [</i><a href="https://datatracker.ietf.org/doc/html/rfc793"><i><u>RFC-793</u></i></a><i>] on server port 53 (decimal) as well as datagram access using UDP [</i><a href="https://datatracker.ietf.org/doc/html/rfc768"><i><u>RFC-768</u></i></a><i>] on UDP port 53 (decimal).</i>” Over the subsequent three-plus decades, UDP has been the primary transport protocol for DNS queries, falling back to TCP for a limited number of use cases, such as when the response is too big to fit in a single UDP packet. However, as privacy has become a significantly greater concern, encrypted queries have been made possible through the specification of <a href="https://datatracker.ietf.org/doc/html/rfc7858"><u>DNS over TLS</u></a> (DoT) in 2016 and <a href="https://datatracker.ietf.org/doc/html/rfc8484"><u>DNS over HTTPS</u></a> (DoH) in 2018. Cloudflare’s 1.1.1.1 resolver has <a href="https://blog.cloudflare.com/announcing-1111/#toward-a-better-dns-infrastructure"><u>supported both of these privacy-preserving protocols since launch</u></a>. The <a href="https://radar.cloudflare.com/dns#dns-transport-protocol"><b><u>DNS transport protocol</u></b></a> graph shows the distribution of queries to 1.1.1.1 over these four protocols. (Setting up 1.1.1.1 <a href="https://one.one.one.one/dns/"><u>on your device or router</u></a> uses DNS over UDP by default, although recent versions of <a href="https://developers.cloudflare.com/1.1.1.1/setup/android/#configure-1111-manually"><u>Android</u></a> support DoT and DoH. The <a href="https://one.one.one.one/"><u>1.1.1.1 app</u></a> uses DNS over HTTPS by default, and users can also <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/"><u>configure their browsers</u></a> to use DNS over HTTPS.)</p><p>Note that Cloudflare's resolver also services queries over DoH and <a href="https://blog.cloudflare.com/oblivious-dns/"><u>Oblivious DoH (ODoH)</u></a> for <a href="https://developers.cloudflare.com/1.1.1.1/privacy/cloudflare-resolver-firefox/"><u>Mozilla</u></a> and other large platforms, but this traffic is not currently included in our analysis. As such, DoH adoption is under-represented in this graph.</p><p>Aggregated worldwide between February 19 - February 26, distribution of transport protocols was 86.6% for UDP, 9.6% for DoT, 2.0% for TCP, and 1.7% for DoH. However, in some locations, these ratios may shift if users are more privacy conscious. For example, the graph below shows the distribution for <a href="https://radar.cloudflare.com/dns/eg"><u>Egypt</u></a> over the same time period. In that country, the UDP and TCP shares are significantly lower than the global level, while the DoT and DoH shares are significantly higher, suggesting that users there may be more concerned about the privacy of their DNS queries than the global average, or that there is a larger concentration of 1.1.1.1 users on Android devices who have set up 1.1.1.1 using DoT manually. (The 2024 Cloudflare Radar Year in Review found that <a href="https://radar.cloudflare.com/year-in-review/2024/eg#ios-vs-android"><u>Android had an 85% mobile device traffic share in Egypt</u></a>, so mobile device usage in the country leans very heavily toward Android.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1srd6prVQCUxHvxw8eFNjL/987f2d925120be867174fd04a8c7eb2c/05-b.png" />
            
            </figure><p>RFC 1035 also defined a number of <a href="https://datatracker.ietf.org/doc/html/rfc1035#section-3.3"><u>standard</u></a> and <a href="https://datatracker.ietf.org/doc/html/rfc1035#section-3.4"><u>Internet specific</u></a> resource record types that return the associated information about the submitted query name. The most common record types are <code>A</code> and <code>AAAA</code>, which return the hostname’s IPv4 and IPv6 addresses respectively (assuming they exist). The <a href="https://radar.cloudflare.com/dns#dns-query-type"><b><u>DNS query type</u></b></a> graph below shows that globally, these two record types comprise on the order of 80% of the queries received by 1.1.1.1. Among the others shown in the graph, <a href="https://blog.cloudflare.com/speeding-up-https-and-http-3-negotiation-with-dns/#service-bindings-via-dns"><code><u>HTTPS</u></code></a> records can be used to signal HTTP/3 and HTTP/2 support, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-ptr-record/"><code><u>PTR</u></code></a> records are used in reverse DNS records to look up a domain name based on a given IP address, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-ns-record/"><code><u>NS</u></code></a> records indicate authoritative nameservers for a domain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LI2EW249EtFFX5FvlONDg/4b150dfbdd8de5c0e9def9eb18c81d70/06.png" />
            
            </figure><p>A response code is sent with each response from 1.1.1.1 to the client. Six possible values were <a href="https://datatracker.ietf.org/doc/html/rfc1035#section-4.1.1"><u>originally defined in RFC 1035</u></a>, with the list <a href="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-6"><u>further extended</u></a> in <a href="https://datatracker.ietf.org/doc/html/rfc2136"><u>RFC 2136</u></a> and <a href="https://datatracker.ietf.org/doc/html/rfc2671"><u>RFC 2671</u></a>. <code>NOERROR</code>, as the name suggests, means that no error condition was encountered with the query. Others, such as <code>NXDOMAIN</code>, <code>SERVFAIL</code>, <code>REFUSED</code>, and <code>NOTIMP</code> define specific error conditions encountered when trying to resolve the requested query name. The response codes may be generated by 1.1.1.1 itself (like <code>REFUSED</code>) or may come from an upstream authoritative nameserver (like <code>NXDOMAIN</code>).</p><p>The <a href="https://radar.cloudflare.com/dns#dns-response-code"><b><u>DNS response code</u></b></a> graph shown below highlights that the vast majority of queries seen globally do not encounter an error during the resolution process (<code>NOERROR</code>), and that when errors are encountered, most are <a href="https://datatracker.ietf.org/doc/html/rfc8020"><code><u>NXDOMAIN</u></code></a> (no such record). It is worth noting that <code>NOERROR</code> also includes empty responses, which occur when there are no records for the query name and query type, but there are records for the query name and some other query type.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZXQ8kcT0H7zfb8najn42C/df8c8c2f54c492484bb5d59f437eee5d/07.png" />
            
            </figure><p>With DNS being a first-step dependency for many other protocols, the amount of queries of particular types can be used to indirectly measure the adoption of those protocols. But to effectively measure adoption, we should also consider the fraction of those queries that are met with useful responses, which are represented with the <a href="https://radar.cloudflare.com/dns#dns-record-adoption"><b><u>DNS record adoption</u></b></a> graphs.</p><p>The example below shows that queries for <code>A</code> records are met with a useful response nearly 88% of the time. As IPv4 is an established protocol, the remaining 12% are likely to be queries for valid hostnames that have no <code>A </code>records (e.g. email domains that only have MX records). But the same graph also shows that there’s still a <a href="https://blog.cloudflare.com/ipv6-from-dns-pov/"><u>significant adoption gap</u></a> where IPv6 is concerned.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6blxaHcK6UtPp67V3SGNML/daed03be6793aab32ec21b2bb2f08374/08.png" />
            
            </figure><p>When Cloudflare’s DNS resolver gets a response back from an upstream authoritative nameserver, it caches it for a specified amount of time — more on that below. By caching these responses, it can more efficiently serve subsequent queries for the same name. The <a href="https://radar.cloudflare.com/dns#dns-cache-hit-ratio"><b><u>DNS cache hit ratio</u></b></a> graph provides insight into how frequently responses are served from cache. At a global level, as seen below, over 80% of queries have a response that is already cached. These ratios will vary by location or ASN, as the query patterns differ across geographies and networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sj0gBv53GdPF0slfGlKlr/fa86ff6fc610aefad2e675c5dc926f54/09.png" />
            
            </figure><p>As noted in the preceding paragraph, when an authoritative nameserver sends a response back to 1.1.1.1, each record inside it includes information about how long it should be cached/considered valid for. This piece of information is known as the <a href="https://developers.cloudflare.com/dns/manage-dns-records/reference/ttl/"><u>Time-To-Live (TTL)</u></a> and, as a response may contain multiple records, the smallest of these TTLs (the “minimum” TTL) defines how long 1.1.1.1 can cache the entire response for. The TTLs on each response served from 1.1.1.1’s cache decrease towards zero as time passes, at which point 1.1.1.1 needs to go back to the authoritative nameserver. Hostnames with relatively low TTL values suggest that the records may be somewhat dynamic, possibly due to traffic management of the associated resources; longer TTL values suggest that the associated resources are more stable and expected to change infrequently.</p><p>The <a href="https://radar.cloudflare.com/dns#dns-minimum-ttl"><b><u>DNS minimum TTL</u></b></a> graphs show the aggregate distribution of TTL values for five popular DNS record types, broken out across seven buckets ranging from under one minute to over one week. During the third week of February, for example, <code>A</code> and <code>AAAA</code> responses had a concentration of low TTLs, with over 80% below five minutes. In contrast, <code>NS</code> and <code>MX</code> responses were more concentrated across 15 minutes to one hour and one hour to one day. Because <code>MX</code> and <code>NS</code> records change infrequently, they are generally configured with higher TTLs. This allows them to be cached for longer periods in order to achieve faster DNS resolution.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r6ppahpkqyfAHi89LWNA1/6dc6f52e92c1d7aa2dfaeaa411deb982/10.png" />
            
            </figure>
    <div>
      <h3>DNS security</h3>
      <a href="#dns-security">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/dns/dns-security/"><u>DNS Security Extensions (DNSSEC)</u></a> add an extra layer of authentication to DNS establishing the integrity and authenticity of a DNS response. This ensures subsequent HTTPS requests are not routed to a spoofed domain. When sending a query to 1.1.1.1, a DNS client can indicate that it is DNSSEC-aware by setting a specific flag (the “DO” bit) in the query, which lets our resolver know that it is OK to return DNSSEC data in the response. The <a href="https://radar.cloudflare.com/dns#dnssec-client-awareness"><b><u>DNSSEC client awareness</u></b></a> graph breaks down the share of queries that 1.1.1.1 sees from clients that understand DNSSEC and can require validation of responses vs. those that don’t. (Note that by default, 1.1.1.1 tries to protect clients by always validating DNSSEC responses from authoritative nameservers and not forwarding invalid responses to clients, unless the client has explicitly told it not to by setting the “CD” (checking-disabled) bit in the query.)</p><p>Unfortunately, as the graph below shows, nearly 90% of the queries seen by Cloudflare’s resolver are made by clients that are not DNSSEC-aware. This broad lack of client awareness may be due to several factors. On the client side, DNSSEC is not enabled by default for most users, and enabling DNSSEC requires extra work, even for technically savvy and security conscious users. On the authoritative side, for domain owners, supporting DNSSEC requires extra operational maintenance and knowledge, and a mistake can cost your domain to <a href="https://blog.cloudflare.com/dnssec-issues-fiji/"><u>disappear from the Internet</u></a>, causing significant (including financial) issues.</p><p>The companion <a href="https://radar.cloudflare.com/dns#end-to-end-security"><b><u>End-to-end security</u></b></a> graph represents the fraction of DNS interactions that were protected from tampering, when considering the client’s DNSSEC capabilities and use of encryption (use of DoT or DoH). This shows an even greater imbalance at a global level, and highlights the importance of further adoption of encryption and DNSSEC.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nErpp8o9tPuE0jt5PQ3fg/3e509065967a8f43c6679d400fd31454/11.png" />
            
            </figure><p>For DNSSEC validation to occur, the query name being requested must be part of a DNSSEC-enabled domain, and the <a href="https://radar.cloudflare.com/dns#dnssec-validation-status"><b><u>DNSSEC validation status</u></b></a> graph represents the share of queries where that was the case under the <b>Secure</b> and <b>Invalid</b> labels. Queries for domains without DNSSEC are labeled as <b>Insecure</b>, and queries where DNSSEC validation was not applicable (such as various kinds of errors) fall under the <b>Other</b> label. Although nearly 93% of generic Top Level Domains (TLDs) and 65% of country code Top Level Domains (ccTLDs) are <a href="https://ithi.research.icann.org/graph-m7.html"><u>signed with DNSSEC</u></a> (as of February 2025), the adoption rate across individual (child) domains lags significantly, as the graph below shows that over 80% of queries were labeled as <b>Insecure</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3shBkfRYcpHKgXI6Y9jcjq/26929261c5c6800fa1fee562dad5ce53/12.png" />
            
            </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>DNS is a fundamental, foundational part of the Internet. While most Internet users don’t think of DNS beyond its role in translating easy-to-remember hostnames to IP addresses, there’s a lot going on to make even that happen, from privacy to performance to security. The new DNS page on Cloudflare Radar endeavors to provide visibility into what’s going on behind the scenes, at a global, national, and network level.</p><p>While the graphs shown above are taken from the DNS page, all the underlying data is available via the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/dns/"><u>API</u></a> and can be interactively explored in more detail across locations, networks, and time periods using Radar’s <a href="https://radar.cloudflare.com/explorer?dataSet=dns"><u>Data Explorer and AI Assistant</u></a>. And as always, Radar and Data Assistant charts and graphs are downloadable for sharing, and embeddable for use in your own blog posts, websites, or dashboards.</p><p>If you share our DNS graphs on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> and <a href="https://x.com/1111Resolver"><u>@1111Resolver</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). If you have questions or comments, you can reach out to us on social media, or contact us via <a href="#"><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[1.1.1.1]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Resolver]]></category>
            <category><![CDATA[DNSSEC]]></category>
            <category><![CDATA[DoH]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">2aI8Y4m36DD0HQghRNFZ2n</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Carlos Rodrigues</dc:creator>
            <dc:creator>Vicky Shrestha</dc:creator>
            <dc:creator>Hannes Gerhart</dc:creator>
        </item>
        <item>
            <title><![CDATA[No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/expanded-ai-insights-on-cloudflare-radar/</link>
            <pubDate>Tue, 04 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are launching a new dedicated “AI Insights” page on Cloudflare Radar that incorporates this graph and builds on it with additional metrics. ]]></description>
            <content:encoded><![CDATA[ <p>During 2024’s Birthday Week, we <a href="https://blog.cloudflare.com/bringing-ai-to-cloudflare/#ai-bot-traffic-insights-on-cloudflare-radar"><u>launched an AI bot &amp; crawler traffic graph</u></a> on Cloudflare Radar that provides visibility into which bots and crawlers are the most aggressive and have the highest volume of requests, which crawl on a regular basis, and more. Today, we are launching a new dedicated <a href="https://radar.cloudflare.com/ai-insights"><u>“AI Insights” page on Cloudflare Radar</u></a> that incorporates this graph and builds on it with additional metrics that you can use to understand AI-related trends from multiple perspectives. In addition to the traffic trends, the new section includes a view into the relative popularity of publicly available Generative AI services based on <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> traffic, the usage of robots.txt directives to restrict AI bot access to content, and open source model usage as seen by Cloudflare Workers AI.</p><p>Below, we’ll review each section of the new AI Insights page in more detail.</p>
    <div>
      <h3>AI bots and crawlers traffic trends</h3>
      <a href="#ai-bots-and-crawlers-traffic-trends">
        
      </a>
    </div>
    <p>Tracking traffic trends for AI bots can help us better understand their activity over time. Initially launched in September 2024 on Radar’s Traffic page, the <a href="https://radar.cloudflare.com/ai-insights#ai-bot-crawler-traffic"><b><u>AI bot &amp; crawler traffic</u></b></a> graph has moved to the AI Insights page and provides visibility into traffic trends gathered globally over the selected time period for the top five most active AI bots &amp; crawlers. The associated list of user agents tracked here is based on the <a href="https://github.com/ai-robots-txt/ai.robots.txt"><u>ai.robots.txt list</u></a>, and will be updated with new entries as they are identified. The <a href="https://developers.cloudflare.com/api/operations/radar-get-ai-bots-timeseries-group-by-user-agent"><u>time series</u></a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-ai-bots-summary-by-user-agent"><u>summary</u></a> data for this graph is available from the Radar API, and traffic trends for the full set of AI bots &amp; crawlers we see traffic from <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots"><u>can be viewed in the Data Explorer</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EicYZIfSdeRMBCIID5Fbr/0213b9501e22033ac5315bbef48c5a7a/image3.png" />
          </figure>
    <div>
      <h3>Popularity of Generative AI services</h3>
      <a href="#popularity-of-generative-ai-services">
        
      </a>
    </div>
    <p>Over the last several years, the Cloudflare Radar Year in Review has analyzed request traffic data from our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> to present rankings of the most popular Internet services, both generally and across several categories. In both <a href="https://radar.cloudflare.com/year-in-review/2023#internet-services"><u>2023</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>2024</u></a>, this section included rankings for publicly-available Generative AI services, with ChatGPT topping the list both years. While an <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/#ready-to-face-the-generative-ai-era"><u>accompanying blog post</u></a> provides a more detailed look at how the rankings shifted over the course of the year, it too is looking through the rearview mirror. That is, it doesn’t provide visibility into the changes as they are occurring. The new <a href="https://radar.cloudflare.com/ai-insights#generative-ai-services-popularity"><b><u>Generative AI services popularity</u></b></a> graph shows the relative rankings of these services and platforms based on DNS request traffic for domains associated with these services aggregated at a daily level. The underlying time series data is available through the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/ranking/subresources/internet_services/methods/timeseries_groups/"><u>Radar API</u></a>, using the <code>serviceCategory=Generative%20AI</code> parameter.</p><p>The graph below shows that as of the end of January 2025, the top five services were fairly stable over the preceding four weeks, but there was regular movement among those ranked #6-10. We expect that the rankings will continue to change over time. <a href="https://www.deepseek.com/"><u>DeepSeek</u></a>, a Generative AI service that took the industry by storm at the end of January, can be seen making its initial appearance at #9 on January 26, rising rapidly to #3 on January 29, just three days later. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fzh8oz8ZhybkKlJXBE0qq/4f695ddd38dd676c3b418d5ceac939fb/image5.png" />
          </figure>
    <div>
      <h3>Analysis of robots.txt files</h3>
      <a href="#analysis-of-robots-txt-files">
        
      </a>
    </div>
    <p>Content providers can attempt to control access to their full site, or specific portions of it, through the use of Allow or Disallow directives in a <a href="https://www.robotstxt.org/"><u>robots.txt</u></a> file. However, successful access control is dependent on the bots respecting the listed directives. Cloudflare's <a href="https://blog.cloudflare.com/ai-audit-enforcing-robots-txt/"><u>AI Audit</u></a> gives you visibility and control into how AI bots are interacting with your website, and now Cloudflare Radar gives you insights into how other sites are handling them.</p><p>On a weekly basis, we analyze Radar’s <a href="https://radar.cloudflare.com/domains"><u>top 10,000 domains</u></a> to determine which associated sites publish robots.txt files, as well as aggregating the AI-specific directives within those files. In our new <a href="https://radar.cloudflare.com/ai-insights#ai-user-agents-found-in-robotstxt"><b><u>AI user agents found in robots.txt</u></b></a> graph, seen below, we are now providing insights into actions that these top sites are taking with respect to AI bots. These actions are specified by directives that allow or disallow access by a given user agent (bot identifier) for either all content on the site (Fully Allowed/Disallowed) or certain sections (Partially Allowed/Disallowed).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16U4GdEyxsUlzqjKd4Y1jH/25535296e710ae31aa8658b4c338296e/image6.png" />
          </figure><p>In addition, we have also organized these domains by category (for example, Ecommerce or News &amp; Media), highlighting the specific bots that the sites within those categories have listed in their directives. For example, the News &amp; Media domain category graph shown below illustrates that these types of sites almost universally fully disallow access to their sites by AI user agents.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7i1a23p2FfasbJvrS65S7l/0f476352a9573f9822b5ca9d351795d7/image4.png" />
          </figure><p>Changing the directive to “Allow” shows a much smaller set of user agents, with a drastically smaller set of sites explicitly allowing full or partial access. (Note that if a user agent is not listed in a robots.txt file, and a wildcard “*” user agent is not specified, then access is fully allowed by default.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5I7OgW10PrX8wKVtRRWmnQ/193d5be5f5211b32c29b8c4601ee38ba/image2.png" />
          </figure><p>In addition to appearing on the AI Insights page, the underlying data is available for further exploration and analysis through the Radar <a href="https://developers.cloudflare.com/api/resources/radar/subresources/robots_txt/subresources/top/subresources/user_agents/methods/directive/"><u>API</u></a> and the <a href="https://radar.cloudflare.com/explorer?dataSet=robots_txt&amp;groupBy=user_agents%2Fdirective&amp;filters=directive%253DDISALLOW"><u>Data Explorer</u></a>. </p>
    <div>
      <h3>Popularity of models and tasks on Workers AI</h3>
      <a href="#popularity-of-models-and-tasks-on-workers-ai">
        
      </a>
    </div>
    <p>The AI model landscape is rapidly evolving, with providers regularly releasing more powerful models, capable of tasks like text and image generation, speech recognition, and image classification. Cloudflare works closely with AI model providers to ensure that <a href="https://developers.cloudflare.com/workers-ai/models/"><u>Workers AI supports these models</u></a> as soon as possible following their release. On the new AI Insights page, Radar now provides visibility into the popularity of publicly available supported models (<a href="https://radar.cloudflare.com/ai-insights/#workers-ai-model-popularity"><b><u>Workers AI model popularity</u></b></a>) as well as the types of tasks (<a href="https://radar.cloudflare.com/ai-insights/#workers-ai-task-popularity"><b><u>Workers AI task popularity</u></b></a>) that these models perform, based on customer account share. Extended insights, including share trends and summary shares for the full list of <a href="https://radar.cloudflare.com/explorer?dataSet=ai.inference&amp;groupBy=model"><u>models</u></a> and <a href="https://radar.cloudflare.com/explorer?dataSet=ai.inference&amp;groupBy=task"><u>tasks</u></a>, as well as the ability to compare <a href="https://radar.cloudflare.com/explorer?dataSet=ai.inference&amp;groupBy=model&amp;timeCompare=1"><u>model</u></a> and <a href="https://radar.cloudflare.com/explorer?dataSet=ai.inference&amp;groupBy=task&amp;timeCompare=1"><u>task</u></a> shares across time periods, are available through the Data Explorer. The underlying <a href="https://developers.cloudflare.com/api/resources/radar/subresources/ai/subresources/inference/subresources/timeseries_groups/subresources/summary/methods/model/"><u>model popularity</u></a> and <a href="https://developers.cloudflare.com/api/resources/radar/subresources/ai/subresources/inference/subresources/timeseries_groups/subresources/summary/methods/task/"><u>task popularity</u></a> data is also available through API endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c7YE87EdMsoN4bYELM4Rw/556abd2ebb70cbc7839fa98c653e816d/image7.png" />
          </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The AI space is extremely dynamic, with new platforms, services, and models regularly appearing. In some cases, these new entrants even have the power to <a href="https://www.reuters.com/technology/chinas-deepseek-sets-off-ai-market-rout-2025-01-27/"><u>upset the market</u></a> as they see <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lgxs6i4lco2e"><u>rapid growth</u></a> in interest and usage. And over two years since ChatGPT was announced, there <a href="https://www.techpolicy.press/generative-ai-and-copyright-issues-globally-ani-media-v-openai/"><u>continues to be tension</u></a> between content providers and AI platforms about scraping content for model training. The new <a href="https://radar.cloudflare.com/ai-insights"><u>“AI Insights” page on Cloudflare Radar</u></a> provides timely trends and information about this dynamic space, enabling industry observers and participants to better understand how it is changing and evolving over time.</p><p>If you share AI Insights graphs on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). You can also reach out on social media, or contact us via email, with suggestions for AI metrics that we can explore adding to the page in the future.</p> ]]></content:encoded>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Workers AI]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">20evxTmECGafWqkCbVLN6v</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilient Internet connectivity in Europe mitigates impact from multiple cable cuts]]></title>
            <link>https://blog.cloudflare.com/resilient-internet-connectivity-baltic-cable-cuts/</link>
            <pubDate>Wed, 20 Nov 2024 21:30:00 GMT</pubDate>
            <description><![CDATA[ Two recent cable cuts that occurred in the Baltic Sea resulted in little-to-no observable impact to the affected countries, in large part because of the significant redundancy and resilience of Internet infrastructure in Europe.
 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>When cable cuts occur, whether submarine or terrestrial, they often result in observable disruptions to Internet connectivity, knocking a network, city, or country offline. This is especially true when there is insufficient resilience or alternative paths — that is, when a cable is effectively a single point of failure. Associated observations of traffic loss resulting from these disruptions are frequently covered by Cloudflare Radar in social media and blog posts. However, two recent cable cuts that occurred in the Baltic Sea resulted in little-to-no observable impact to the affected countries, as we discuss below, in large part because of the significant redundancy and resilience of Internet infrastructure in Europe.</p>
    <div>
      <h2>BCS East-West Interlink</h2>
      <a href="#bcs-east-west-interlink">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic volume indicators</h3>
      <a href="#traffic-volume-indicators">
        
      </a>
    </div>
    <p>On Sunday, November 17 2024, the <a href="https://www.submarinecablemap.com/submarine-cable/bcs-east-west-interlink"><u>BCS East-West Interlink submarine cable</u></a> connecting Sventoji, Lithuania and Katthammarsvik, Sweden was <a href="https://www.datacenterdynamics.com/en/news/lithuania-sweden-subsea-cable-cut-was-10m-from-severed-finnish-german-cable/"><u>reportedly damaged</u></a> around 10:00 local (Lithuania) time (08:00 UTC). A <a href="https://www.datacenterdynamics.com/en/news/lithuania-sweden-subsea-cable-cut-was-10m-from-severed-finnish-german-cable/"><u>Data Center Dynamics article about the cable cut</u></a> quotes the CTO of Telia Lietuva, the telecommunications provider that operates the cable, and notes “<i>The Lithuanian cable carried about a third of the nation's Internet capacity, but capacity was carried via other routes.</i>”</p><p>As the Cloudflare Radar graphs below show, there was no apparent impact to traffic volumes in either country at the time that the cables were damaged. The NetFlows graphs represent the number of bytes that Cloudflare sends to users and clients in response to their requests.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xDllSeyPtet5ovpXI3GMH/6bc5680bbd8219f417e891102c4ffb0e/BLOG-2626_2.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RE0V8M2CFPt1uxsOjhSBz/dc5c261808c021fc9ff0ab65963fce0b/BLOG-2626_3.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wjHy79iHDqcuzknxcK14o/a4526787c3fdde54a6627b16717aaec0/BLOG-2626_4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2zPi0GZ54gGDjCMyivhH0C/f6e50728ae7dc110fd15edc40f43b694/BLOG-2626_5.png" />
          </figure>
    <div>
      <h3>Internet quality</h3>
      <a href="#internet-quality">
        
      </a>
    </div>
    <p>Internet quality metrics for both countries show changes in measured bandwidth and latency throughout the day on Sunday, but with no sudden anomalous shifts visible around the time of the cable cut. (The loss of connectivity associated with a cable cut potentially manifests itself as an increase in latency and concurrent decrease in bandwidth due to loss of capacity.) The latency graph for Sweden does show an increase in latency, but it began before the cable cut occurred, is similar to a pattern visible several hours earlier, and is matched by an increase in measured bandwidth, so it is unlikely to be related to the cable cut event.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aXlBjU08WKKT0OSnWBsIP/eb32b937d1729160dec83204bba06e91/BLOG-2626_6.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5eeR8OlwA5CHROGkqKn1KJ/e372a25ad2a93aaa38339f360f3a7b0e/BLOG-2626_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wGJFP5K0LkEjw8DXbQ45z/516cf3b04ac5c5f2f82398be508fe4b0/BLOG-2626_8.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ZLyXG9lCsfazoMm1b6c4z/1af296913ff00da991c04d1422bd49fd/BLOG-2626_9.png" />
          </figure>
    <div>
      <h3>Visibility in BGP events, announced IP address space unaffected</h3>
      <a href="#visibility-in-bgp-events-announced-ip-address-space-unaffected">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements"><u>BGP announcements</u></a> are a way for network providers to communicate routing information to other networks, and announcement activity observed on Telia Lietuva’s <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous systems</u></a> around the time of the cable cut may be related to the re-routing referenced in the article. No change in announced IP address space was visible for any of these autonomous systems, suggesting no loss of connectivity as the capacity was re-routed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dWHQYn0cJ3PdivPgI2sDI/696207021bf5e75d061040c33505923a/BLOG-2626_10.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QPU28IyaW3QPCqaIzTZec/19b3ed7675d23441c9493c2313134a41/BLOG-2626_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zSx3b14HwaBIFX5qc59bq/4f8e2b4951498a2edcae846068927350/BLOG-2626_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1P04AQZbfZOTisBPutbLZa/5e6520bfd1782976538c98914134fe94/BLOG-2626_13.png" />
          </figure><p>Telegeography’s <a href="http://submarinecablemap.com"><u>submarinecablemap.com</u></a> illustrates, at least in part, the resilience in connectivity enjoyed by these two countries. In addition to the damaged cable, it shows that <a href="https://www.submarinecablemap.com/country/lithuania"><u>Lithuania</u></a> is <a href="https://www.submarinecablemap.com/submarine-cable/bcs-east"><u>connected to neighboring Latvia</u></a> as well as <a href="https://www.submarinecablemap.com/submarine-cable/nordbalt"><u>to the Swedish mainland</u></a>. Over 20 submarine cables land in <a href="https://www.submarinecablemap.com/country/sweden"><u>Sweden</u></a>, connecting it to multiple countries across Europe. In addition to the submarine resilience, network providers in both countries can take advantage of terrestrial fiber connections to neighboring countries, such as those illustrated in a <a href="https://www.arelion.com/our-network"><u>European network map from Arelion</u></a> (formerly Telia), which is only one of the large European backbone providers.</p>
    <div>
      <h2>C-Lion1</h2>
      <a href="#c-lion1">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic volume indicators</h3>
      <a href="#traffic-volume-indicators">
        
      </a>
    </div>
    <p>Less than a day later, the <a href="https://www.submarinecablemap.com/submarine-cable/c-lion1"><u>C-Lion1 submarine cable</u></a>, which connects Helsinki, Finland and Rostock Germany was <a href="https://www.datacenterdynamics.com/en/news/helsinki-rostock-subsea-cable-between-finland-and-germany-severed/"><u>reportedly damaged</u></a> during the early morning hours of Monday, November 18. Cinia, the telecommunications company that owns the cable, <a href="https://www.theguardian.com/world/2024/nov/19/baltic-sea-cables-damage-sabotage-german-minister"><u>said</u></a> that the cable stopped working at about 02:00 UTC. </p><p>In this situation as well, as the Cloudflare Radar graphs below show, there was no apparent impact to traffic volumes in either country at the time that the cables were damaged. The Finland graphs, week-on-week, show fewer bytes transferred and fewer HTTP requests, but that difference is present before the cable cut at 02:00 UTC. However, the trend of the current line does not change after the cable cut, so the two events would appear unrelated. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OQtSFBgBzdmnzWz8AdM7Z/3a66cec98698bf6d506d93fc13fe4c74/BLOG-2626_14.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gqxHsD3ykjWGWhATVU8iw/f74916e1faf186efef94e6dc29bbca58/BLOG-2626_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gh5eLQZNabsz9XnOSgtU1/fb6d0770c62ce016d73c1a3c47ae99f1/BLOG-2626_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FIKh8U2nxHkxMdXho6HsI/9e349d0767df5d34d3b8274710c2cb0b/BLOG-2626_17.png" />
          </figure>
    <div>
      <h3>Internet quality</h3>
      <a href="#internet-quality">
        
      </a>
    </div>
    <p>By looking at volume-related metrics, alone, Internet connectivity would appear to be unaffected by the cable cut.</p><p>If, however, we change perspective and look at Internet quality, a brief yet interesting change is visible for Finland around the reported time of the cable damage, though it isn’t clear whether it is related in any way. Just after midnight, median measured bandwidth, previously consistent around 50 Mbps begins to grow, peaking just over 200 Mbps around 03:00 UTC. Around that same time, measured median latency also begins to drop, falling from around 30 ms to a low of 13 ms, also around 03:00 UTC. Median bandwidth returned to normal levels around 06:00 UTC, while latency took about two hours longer to return to normal levels.  These observed  improvements in bandwidth and latency could have been due to traffic being re-routed to along paths with better connectivity to measurement endpoints, but because the shifts began before the cable damage occurred, and recovered shortly thereafter, that is unlikely to be the root cause.</p><p>In Germany, a brief minor increase in median bandwidth peaked around 02:45 UTC, while no notable changes were observed in latency.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/94V0coi6oFBdUMX1SVyl7/44738b06af2e51b4e436c84dbe6a1a79/BLOG-2626_18.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Bqy5uQ76FwmmOX92Co4cE/96190329454e264966119a0f9a4533ff/BLOG-2626_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BJCVdjJMILFubi4SW8HR6/7b97343910ab70cc1a4cad3d3565a727/BLOG-2626_20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lf5GR9ElhjpW0wYzPieNI/c02a588af54ac36521f901307d9f62f7/BLOG-2626_21.png" />
          </figure>
    <div>
      <h3>BGP business as usual</h3>
      <a href="#bgp-business-as-usual">
        
      </a>
    </div>
    <p>From a routing perspective, there was no notable BGP announcement activity observed for top autonomous systems in either Finland or Germany around 02:00 on November 18, and total announced IP address space aggregated at a country level also demonstrated no change.</p><p>Telegeography’s <a href="http://submarinecablemap.com"><u>submarinecablemap.com</u></a> shows that both Finland and Germany also have significant redundancy and resilience from a submarine cable perspective, with over 10 cables landing in <a href="https://www.submarinecablemap.com/country/finland"><u>Finland</u></a>, and nearly 10 landing in <a href="https://www.submarinecablemap.com/country/germany"><u>Germany</u></a>, including <a href="https://www.submarinecablemap.com/submarine-cable/atlantic-crossing-1-ac-1"><u>Atlantic Crossing-1 (AC-1)</u></a>, which connects to the United States over two distinct paths. Terrestrial fiber maps from <a href="https://www.arelion.com/our-network"><u>Arelion</u></a> and <a href="https://map.eunetworks.com/?_ga=2.220121625.1822578510.1543942339-1757484894.1536310774"><u>eunetworks</u></a> (as just two examples) show multiple redundant fiber routes within both countries, as well as cross-border routes to other neighboring countries, enabling more resilient Internet connectivity.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As we have discussed in multiple prior blog posts (<a href="https://blog.cloudflare.com/not-one-not-two-but-three-undersea-cables-cut-in-jersey"><u>Jersey, 2016</u></a>; <a href="https://blog.cloudflare.com/aae-1-smw5-cable-cuts"><u>AAE-1/SMW5, 2022</u></a>; <a href="https://blog-cloudflare-com.webpkgcache.com/doc/-/s/blog.cloudflare.com/undersea-cable-failures-cause-internet-disruptions-across-africa-march-14-2024"><u>WACS/MainOne/SAT3/ACE, 2024</u></a>; <a href="https://blog.cloudflare.com/east-african-internet-connectivity-again-impacted-by-submarine-cable-cuts/"><u>EASSy/Seacom, 2024</u></a>), cable cuts often cause significant disruptions to Internet connectivity, in many cases because they represent a concentrated point of vulnerability, whether for an individual network provider, city/state, or country. These disruptions are often quite lengthy as well, due to the time needed to marshal repair resources, identify the location of the damage, etc. Although it is not always feasible due to financial or geographic constraints, building redundant and resilient network architecture, at multiple levels, is a best practice. This includes the sending traffic over multiple physical cables (both submarine and terrestrial), connecting to multiple peer and upstream network providers, and even avoiding single points of failure in core Internet resources like DNS servers.</p><p>The Cloudflare Radar team continually monitors the status of Internet connectivity in countries/regions around the world, and we share our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <guid isPermaLink="false">5DP2F9GATeUBYyfl6pQMej</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Waiting Room adds multi-host and path coverage, unlocking broader protection and multilingual setups]]></title>
            <link>https://blog.cloudflare.com/multihost-waiting-room/</link>
            <pubDate>Wed, 04 Oct 2023 13:00:44 GMT</pubDate>
            <description><![CDATA[ Today, we are thrilled to announce that Waiting Room now supports coverage of multiple hostname and path combinations with a single waiting room, giving customers more flexibility and offering broader site coverage without interruptions to end-user flows ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ifF5x8IwXAYRztjYxlQOW/b9680e3b38df8bb0eae48d4444b80c65/image4.png" />
            
            </figure><p><a href="https://www.cloudflare.com/application-services/products/waiting-room/">Cloudflare Waiting Room</a> protects sites from overwhelming traffic surges by placing excess visitors in a fully customizable virtual waiting room, admitting them dynamically as spots become available. Instead of throwing error pages or delivering poorly-performing site pages, Waiting Room empowers customers to take control of their end-user experience during unmanageable traffic surges.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pq031M9XklIgj4DHLZN8O/b1083ed0bfc0b6cb0fd4aea86b21f7ac/image1.png" />
            
            </figure><p>A key decision customers make when setting up a waiting room is what pages it will protect. Before now, customers could select one hostname and path combination to determine what pages would be covered by a waiting room. Today, we are thrilled to announce that Waiting Room now supports coverage of multiple hostname and path combinations with a single waiting room, giving customers more flexibility and offering broader site coverage without interruptions to end-user flows. This new capability is available to all Enterprise customers with an Advanced Purchase of Waiting Room.</p>
    <div>
      <h3>Waiting Room site placement</h3>
      <a href="#waiting-room-site-placement">
        
      </a>
    </div>
    <p>As part of the simple, no-coding-necessary process for deploying a waiting room, customers specify a hostname and path combination to indicate which pages are covered by a particular waiting room. When a site visitor makes a preliminary request to that hostname and path or any of its subpaths, they will be issued a waiting room cookie and either be admitted to the site or placed in a waiting room if the site is at capacity.</p><p>Last year, we added <a href="/waiting-room-bypass-rules/">Waiting Room Bypass Rules</a>, giving customers many options for creating exceptions to this hostname and path coverage. This unlocked capabilities such as User Agent Bypassing, geo-targeting, URL exclusions, and administrative IP bypassing. It also allowed for some added flexibility regarding which pages a waiting room would apply to on a customer’s site by adding the ability to exclude URLs, paths, and query strings. While this update allowed for greater specificity regarding which traffic should be gated by Waiting Room, it didn’t offer the broader coverage that many customers still needed to protect greater portions of their sites with a single waiting room.</p>
    <div>
      <h3>Why customers needed broader Waiting Room coverage</h3>
      <a href="#why-customers-needed-broader-waiting-room-coverage">
        
      </a>
    </div>
    <p>Let’s review some simple yet impactful examples of why this broader coverage option was important for our customers. Imagine you have an online store, example.com, and you want to ensure that a single waiting room covers the entire customer journey — from the homepage, to product browsing, to checkout. Many sites would delineate these steps in the flow using paths: example.com/, example.com/shop/product1, example.com/checkout. Because Waiting Room assumes an implied wildcard at the end of a waiting room’s configured path, this use case was already satisfied for these sites. Thus, placing a waiting room at example.com/ would cover all the URLs associated with every step of this customer journey. In this setup, once a site visitor has passed the waiting room, they would not be re-queued at any step in their user flow because they are still using the same waiting room’s cookie, which indicates to Waiting Room that they are the same user between URLs.</p><p>However, many sites delineate different steps of this type of shopping flow using subdomains instead of or as well as paths. For example, many sites will have their checkout page on a different subdomain, such as checkout.example.com. Before now, if a customer had this site structure and wanted to protect their entire site with a single waiting room, they would have needed to deploy a waiting room at example.com/ and another at checkout.example.com/. This option was not ideal for many customers because a site visitor could be queued at two different parts of the same customer journey. This is because the waiting room at checkout.example.com/ would count the same visitor as a different user than the waiting room covering example.com/.</p><p>That said, there are cases where it is wise to separate waiting rooms on a single site. For example, a ticketing website could place a waiting room at its apex domain (example.com) and distinct waiting rooms with pre-queues on pages for specific events (example.com/popular_artist_tour). The waiting room set at example.com/ ensures that the main point of entry to the site does not get overwhelmed and crash when ticket sales for any one event open. The waiting room placed on the specific event page ensures that traffic for a single event can start queuing ahead of the event without impacting traffic going to other parts of the site.</p><p>Ultimately, whether a customer wants one or multiple waiting rooms to protect their site, we wanted to give our customers the flexibility to deploy Waiting Room however was best for their use cases and site structure. We’re thrilled to announce that Waiting Room now supports multi-hostname and path coverage with a single waiting room!</p>
    <div>
      <h3>Getting started with multi-host and path coverage</h3>
      <a href="#getting-started-with-multi-host-and-path-coverage">
        
      </a>
    </div>
    <p>Customers can now configure a waiting room on multiple hostname and path combinations — or routes — belonging to the same zone. To do so, navigate to Traffic &gt; Waiting Room and select Create. The name of your domain will already be populated. To add additional routes to your waiting room configuration, select Add Hostname and Path. You can then enter another hostname and path to be covered by the same waiting room. Remember, there is an implied wildcard after each path. Therefore, creating a waiting room for each URL you want your waiting room to cover is unnecessary. Only create additional routes for URLs that wouldn’t be covered by the other hostname and path combinations you have already entered.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VNkM6S6x01KPvXmCgOSyw/6457b0c19b97437c52d9273ec5f9a6cd/image3.png" />
            
            </figure><p>When deploying a waiting room that covers multiple hostname and path combinations, you must create a unique cookie name for this waiting room (more on that later!). Then, proceed with the <a href="https://developers.cloudflare.com/waiting-room/how-to/create-waiting-room/">same workflow</a> as usual to deploy your waiting room.</p>
    <div>
      <h3>Deploying a multi-language waiting room</h3>
      <a href="#deploying-a-multi-language-waiting-room">
        
      </a>
    </div>
    <p>A frequent customer request was the ability to cover a multi-language site with a single waiting room — offering different text per language while counting all site traffic toward the same waiting room limits. There are various ways a site can be structured to delineate between different language options, but the two most common are either by subdomain or path. For a site that uses path delineation, this could look like example.com/en and example.com/es for English and Spanish, respectively. For a site using subdomain delineation, this could look like en.example.com/ and es.example.com/. Before multihost Waiting Room coverage, the subdomain variation would not have been able to be covered by a single waiting room.</p><p>Waiting Room’s existing configuration options already supported the path variation. However, this was only true if the customer wanted to gate the entire site, which they could do by placing the waiting room at example.com/. Many e-commerce customers asked for the ability to gate different high-demand product pages selling the same product but with different language options. For instance, consider example.com/en/product_123 and example.com/es/product_123, where the customer wants the same waiting room and traffic limits to cover both URLs. Before now, this would not have been possible without some complex bypass rule logic.</p><p>Now, customers can deploy a waiting room that accommodates either the subdomain or path approach to structuring a multi-language site. The only remaining step is setting up your waiting room to serve different languages when a user is queued in a waiting room. This can be achieved by constructing a template that reads the URL to determine the locale and define the appropriate translations for each of the locales within the template.</p><p>Here is an example of a template that determines the locale from the URL path, and renders the translated text:</p>
            <pre><code>&lt;!DOCTYPE html&gt;
&lt;html&gt;
  &lt;head&gt;
    &lt;title&gt;Waiting Room powered by Cloudflare&lt;/title&gt;
  &lt;/head&gt;
  &lt;body&gt;
    &lt;section&gt;
      &lt;h1 id="inline-msg"&gt;
        You are now in line.
      &lt;/h1&gt;
      &lt;h1 id="patience-msg"&gt;
        Thank you for your patience.
      &lt;/h1&gt;
    &lt;/section&gt;
    &lt;h2 id="waitTime"&gt;&lt;/h2&gt;

    &lt;script&gt;
      var locale = location.pathname.split("/")[1] || "en";
      var translations = {
        "en": {
          "waittime_60_less": "Your estimated wait time is {{waitTime}} minute.",
          "waittime_60_greater": "Your estimated wait time is {{waitTimeHours}} hours and {{waitTimeHourMinutes}} minutes.",
          "inline-msg": "You are now in line.",
          "patience-msg": "Thank you for your patience.",
        },
        "es": {
          "waittime_60_less": "El tiempo de espera estimado es {{waitTime}} minuto.",
          "waittime_60_greater": "El tiempo de espera estimado es {{waitTimeHours}} de horas y {{waitTimeHourMinutes}} minutos.",
          "inline-msg": "Ahora se encuentra en la fila de espera previa.",
          "patience-msg": "Gracias por su paciencia.",
        }
      };

      {{#waitTimeKnown}}
      var minutes = parseInt( {{waitTime}} , 10);
      var time = document.getElementById('waitTime');

      if ( minutes &lt; 61) {
        time.innerText = translations[locale]["waittime_60_less"]
      } else {
        time.innerText = translations[locale]["waittime_60_greater"]
      }
      {{/waitTimeKnown}}

      // translate template text for each of the elements with “id” suffixed with “msg”
      for (const msg of ["inline-msg", "patience-msg"]) {
        const el = document.getElementById(msg);
        if (el == null) continue;
        el.innerText = translations[locale][msg];
      }
    &lt;/script&gt;
  &lt;/body&gt;
&lt;/html&gt;</code></pre>
            <p>Here’s how the template works: given a site distinguishes different locales with various paths such as <code>/en/product_123</code> or <code>/es/product_123</code> in the <code>&lt;script /&gt;</code> body after the rendering the page, the locale is extracted from the <code>location.pathname</code> via <code>locale = location.pathname.split(“/”)[1]</code>. If there isn’t a locale specified within the <code>translations</code> object we default it to “en”. For example, if a user visits example.com/product_123, then by default render the English text template.</p><p>Similarly, in order to support a multi-language waiting room for sites that delineate site structure via subdomain, it would only require you to update how you extract the locale from the URL. Instead of looking at the <code>pathname</code> we look at the <code>hostname</code> property of the <code>window.location</code> object like <code>locale = location.hostname.split(“.”)[0]</code>, given, we have site structure as following: en.example.com, es.example.com.</p><p>The above code is a pared down example of starter templates we have added to our <a href="https://developers.cloudflare.com/waiting-room/how-to/customize-waiting-room/#multiple-language-support">developer documentation</a>, which we have included to make it easier for you to get started with a multi-language waiting room. You can download these templates and edit them to have the look and feel aligned with your site and with the language options your site offers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7jf9G0L2xNFyVKFmxOjlgy/b5f4fdbcb3ba6ea7ac836b8463e7342b/image2.png" />
            
            </figure><p>This is an example of the starter template provided in dev docs. This waiting room is in Queue-all mode and displays the Spanish text when the user visits example.com/es/product_123.</p><p>These templates can further be expanded to include other languages by adding translations to the `translations` object for each of the locales. Thus, a single template is able to serve multiple languages depending on whatever the locale the site is being served as either via subdomain or path.</p>
    <div>
      <h3>How we handle cookies with a multihostname and path waiting room</h3>
      <a href="#how-we-handle-cookies-with-a-multihostname-and-path-waiting-room">
        
      </a>
    </div>
    <p>The waiting room assigns a <code>__cfwaitingroom</code> <a href="https://developers.cloudflare.com/waiting-room/reference/waiting-room-cookie/">cookie</a> to each user to manage the state of the user that determines the position of the user in line <a href="/building-waiting-room-on-workers-and-durable-objects/#:~:text=What%20is%20in%20the%20cookie%20returned%20to%20an%20end%20user%3F">among other properties</a> needed to make the queueing decisions for the user. Traditionally, for a single hostname and path configuration it was trivial to just set the cookie as <code>__cfwaitingroom=[cookie-value]; Domain=example.com; Path=/es/product_123</code>. This ensured that when the page refreshed it would send us the same Waiting Room cookie for us to examine and update. However, this became non-trivial when we wanted to share the same cookie across different subdomain or path combinations, for example, on <code>example.com/en/product_123</code>.</p>
    <div>
      <h3>Approaches to setting multiple cookies</h3>
      <a href="#approaches-to-setting-multiple-cookies">
        
      </a>
    </div>
    <p>There were two approaches that we brainstormed and evaluated to allow the sharing of the cookie for the same waiting room.</p><p>The first approach we considered was to issue multiple <code>Set-Cookie</code> headers in the HTTP response. For example, in the multi-language example above, we could issue the following in the response header:</p>
            <pre><code>Set-Cookie: __cfwaitingroom=[cookie-value]…Domain=example.com; Path=/en/product_123 …
Set-Cookie: __cfwaitingroom=[cookie-value]...Domain=example.com; Path=/es/product_123 …</code></pre>
            <p>This approach would allow us to handle the multiple hostnames and paths for the same waiting room. However, it does not present itself as a very scalable solution. Per <a href="https://datatracker.ietf.org/doc/html/rfc6265#section-5.2">RFC6265</a>, there isn’t a strict limit defined in the specification, browsers have their own implementation-specific limits. For example, Chrome allows the response header to grow up to <a href="https://source.chromium.org/chromium/chromium/src/+/main:net/http/http_stream_parser.h;l=168;drc=4cc7ba01d3c5dc996ddc98f9d0bd709e3d5bbfd3?q=ERR_RESPONSE_HEADERS_TOO_BIG&amp;ss=chromium">256K bytes</a> before throwing the transaction with ERR_RESPONSE_HEADERS_TOO_BIG. Additionally, in this case, the response header would grow proportionally to the number of unique hostname and path combinations, and we would be redundantly repeating the same cookie value N (where N is the number of additional routes) number of times. While this approach would have allowed us to effectively handle a bounded list of hostname and path combinations that need to be set, it was not ideal for cases where we can expect more than a handful routes for a particular site.</p><p>The second approach that we considered and chose to move forward with was to set the cookie on the apex domain (or the most common subdomain). In other words, we would figure out the most common subdomain from the list of routes and use that as the domain. Similarly, for the paths, this would entail determining the least common prefix from the list of paths and use that as the value to be set on the path attribute. For example, consider a waiting room with the following two routes configured, a.example.com/shoes/product_123 and b.example.com/shoes/product_456.</p><p>To determine the domain that would be set for the cookie, we can see that <code>example.com</code> is the most common subdomain among the list of domains. Applying the most common subdomain algorithm, we would get <code>example.com</code> as the domain. Applying the least common prefix algorithm on the set of paths, <code>/shoes/product_123</code> and <code>/shoes/product_456</code>, we would get <code>/shoes</code> as the path. Thus, the set-cookie header would be the following:</p>
            <pre><code>Set-Cookie: … __cfwaitingroom=[cookie-value]; Domain=example.com; Path=/shoes …</code></pre>
            <p>Now, when a visitor accesses any of the pages covered by this waiting room, we can guarantee Waiting Room receives the right cookie and there will only be Set-Cookie included in the response header.</p><p>However, we are still not there yet. Although we are able to identify the common subdomain (or apex domain) and common path prefix, there would still be a problem if routes from one waiting room would overlap with another waiting room. For example, say we configure two waiting rooms for the same site where we are selling our special shoes:</p><p>Waiting Room A<br />
    a.example.com/shoes/product_123<br />
    b.example.com/shoes/product_456</p>

<p>Waiting Room B<br />
    c.example.com/shoes/product_789<br />
    d.example.com/shoes/product_012</p><p>If we apply the same algorithm as described above, we would get the same domain and path properties set for the two cookies. For Waiting Room A, the domain would be <code>example.com</code> and the path would be <code>/shoes</code>. Similarly, for Waiting Room B, the most common subdomain would also be example.com and least common path prefix would be <code>/shoes</code>. This would effectively prevent us from distinguishing the two cookies and route the visitor to the right waiting room. In order to solve the issue of overlapping cookie names, we introduced the requirement of setting a custom suffix that is unique to the customer’s zone. This is why it is required to provide a custom cookie suffix when configuring a waiting room that covers multiple hostnames or paths. Therefore, if Waiting Room A was assigned cookie suffix “a” and Waiting Room B was assigned cookie suffix “b”, the two <code>Set-Cookie</code> definitions would look like the following:</p><p><b>Waiting Room A</b></p>
            <pre><code>Set-Cookie: __cfwaitingroom_a=[cookie-value]; Domain=example.com; Path=/shoes</code></pre>
            <p><b>Waiting Room B</b></p>
            <pre><code>Set-Cookie: __cfwaitingroom_b=[cookie-value]; Domain=example.com; Path=/shoes</code></pre>
            <p>When a visitor makes a request to any pages where the two different waiting rooms are configured, Waiting Room can distinguish and select which cookie corresponds to the given request and use this to determine which waiting room’s settings apply to that user depending on where they are on the site.</p><p>With the addition of multihost and multipath Waiting Room coverage, we’re thrilled to offer more flexible options for incorporating Waiting Room into your site, giving your visitors the best experience possible while protecting your site during times of high traffic. Make sure your site is always protected from traffic surges. Try out <a href="https://dash.cloudflare.com/?to=/:account/:zone/traffic/waiting-rooms">Waiting Room</a> today or <a href="https://www.cloudflare.com/application-services/products/waiting-room/">reach out to us</a> to learn more about the Advanced Waiting Room!</p> ]]></content:encoded>
            <category><![CDATA[Waiting Room]]></category>
            <category><![CDATA[Always Online]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">55w0QUCoPwqzUfaTJm5LRg</guid>
            <dc:creator>Arielle Olache</dc:creator>
            <dc:creator>Yawar Jamal</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare’s systems dynamically route traffic across the globe]]></title>
            <link>https://blog.cloudflare.com/meet-traffic-manager/</link>
            <pubDate>Mon, 25 Sep 2023 13:00:16 GMT</pubDate>
            <description><![CDATA[ Meet the smartest member of the Cloudflare network team that helps keep you online no matter what happens to the Internet underneath us ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NgKY8lcObRRPp4XUwHWRH/fd6462ace767589fd26f2f52aa98252f/image14-1.png" />
            
            </figure><p>Picture this: you’re at an airport, and you’re going through an airport security checkpoint. There are a bunch of agents who are scanning your boarding pass and your passport and sending you through to your gate. All of a sudden, some of the agents go on break. Maybe there’s a leak in the ceiling above the checkpoint. Or perhaps a bunch of flights are leaving at 6pm, and a number of passengers turn up at once. Either way, this imbalance between localized supply and demand can cause huge lines and unhappy travelers — who just want to get through the line to get on their flight. How do airports handle this?</p><p>Some airports may not do anything and just let you suffer in a longer line. Some airports may offer fast-lanes through the checkpoints for a fee. But most airports will tell you to go to another security checkpoint a little farther away to ensure that you can get through to your gate as fast as possible. They may even have signs up telling you how long each line is, so you can make an easier decision when trying to get through.</p><p>At Cloudflare, we have the same problem. We are located in 300 cities around the world that are built to receive end-user traffic for all of our product suites. And in an ideal world, we always have enough computers and bandwidth to handle everyone at their closest possible location. But the world is not always ideal; sometimes we take a data center offline for maintenance, or a connection to a data center goes down, or some equipment fails, and so on. When that happens, we may not have enough attendants to serve every person going through security in every location. It’s not because we haven’t built enough kiosks, but something has happened in our data center that prevents us from serving everyone.</p><p>So, we built Traffic Manager: a tool that balances supply and demand across our entire global network. This blog is about Traffic Manager: how it came to be, how we built it, and what it does now.</p>
    <div>
      <h3>The world before Traffic Manager</h3>
      <a href="#the-world-before-traffic-manager">
        
      </a>
    </div>
    <p>The job now done by Traffic Manager used to be a manual process carried out by network engineers: our network would operate as normal until something happened that caused user traffic to be impacted at a particular data center.</p><p>When such events happened, user requests would start to fail with 499 or 500 errors because there weren’t enough machines to handle the request load of our users. This would trigger a page to our network engineers, who would then remove some Anycast routes for that data center. The end result: by no longer advertising those prefixes in the impacted data center, user traffic would divert to a different data center. This is how Anycast fundamentally works: user traffic is drawn to the closest data center advertising the prefix the user is trying to connect to, as determined by Border Gateway Protocol. For a primer on what Anycast is, check out <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">this reference article</a>.</p><p>Depending on how bad the problem was, engineers would remove some or even all the routes in a data center. When the data center was again able to absorb all the traffic, the engineers would put the routes back and the traffic would return naturally to the data center.</p><p>As you might guess, this was a challenging task for our network engineers to do every single time any piece of hardware on our network had an issue. It didn’t scale.</p>
    <div>
      <h3>Never send a human to do a machine’s job</h3>
      <a href="#never-send-a-human-to-do-a-machines-job">
        
      </a>
    </div>
    <p>But doing it manually wasn’t just a burden on our Network Operations team. It also resulted in a sub-par experience for our customers; our engineers would need to take time to diagnose and re-route traffic. To solve both these problems, we wanted to build a service that would immediately and automatically detect if users were unable to reach a Cloudflare data center, and withdraw routes from the data center until users were no longer seeing issues. Once the service received notifications that the impacted data center could absorb the traffic, it could put the routes back and reconnect that data center. This service is called Traffic Manager, because its job (as you might guess) is to manage traffic coming into the Cloudflare network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38NInVKI4VizcCukXlF7o4/77758610378a6721ecf30127b6246d0f/image19.png" />
            
            </figure>
    <div>
      <h3>Accounting for second order consequences</h3>
      <a href="#accounting-for-second-order-consequences">
        
      </a>
    </div>
    <p>When a network engineer removes a route from a router, they can make the best guess at where the user requests will move to, and try to ensure that the failover data center has enough resources to handle the requests — if it doesn’t, they can adjust the routes there accordingly prior to removing the route in the initial data center. To be able to automate this process, we needed to move from a world of intuition to a world of data — accurately predicting where traffic would go when a route was removed, and feeding this information to Traffic Manager, so it could ensure it doesn’t make the situation worse.</p>
    <div>
      <h3>Meet Traffic Predictor</h3>
      <a href="#meet-traffic-predictor">
        
      </a>
    </div>
    <p>Although we can adjust which data centers advertise a route, we are unable to influence what proportion of traffic each data center receives. Each time we add a new data center, or a new peering session, the distribution of traffic changes, and as we are in over 300 cities and 12,500 peering sessions, it has become quite difficult for a human to keep track of, or predict the way traffic will move around our network. Traffic manager needed a buddy: Traffic Predictor.</p><p>In order to do its job, Traffic Predictor carries out an ongoing series of real world tests to see where traffic actually moves. Traffic Predictor relies on a testing system that simulates removing a data center from service and measuring where traffic would go if that data center wasn’t serving traffic. To help understand how this system works, let’s simulate the removal of a subset of a data center in Christchurch, New Zealand:</p><ul><li><p>First, Traffic Predictor gets a list of all the IP addresses that normally connect to Christchurch. Traffic Predictor will send a ping request to hundreds of thousands of IPs that have recently made a request there.</p></li><li><p>Traffic Predictor records if the IP responds, and whether the response returns to Christchurch using a special Anycast IP range specifically configured for Traffic Predictor.</p></li><li><p>Once Traffic Predictor has a list of IPs that respond to Christchurch, it removes that route containing that special range from Christchurch, waits a few minutes for the Internet routing table to be updated, and runs the test again.</p></li><li><p>Instead of being routed to Christchurch, the responses are instead going to data centers around Christchurch. Traffic Predictor then uses the knowledge of responses for each data center, and records the results as the failover for Christchurch.</p></li></ul><p>This allows us to simulate Christchurch going offline without actually taking Christchurch offline!</p><p>But Traffic Predictor doesn’t just do this for any one data center. To add additional layers of resiliency, Traffic Predictor even calculates a second layer of indirection: for each data center failure scenario, Traffic Predictor also calculates failure scenarios and creates policies for when surrounding data centers fail.</p><p>Using our example from before, when Traffic Predictor tests Christchurch, it will run a series of tests that remove several surrounding data centers from service including Christchurch to calculate different failure scenarios. This ensures that even if something catastrophic happens which impacts multiple data centers in a region, we still have the ability to serve user traffic. If you think this data model is complicated, you’re right: it takes several days to calculate all of these failure paths and policies.</p><p>Here’s what those failure paths and failover scenarios look like for all of our data centers around the world when they’re visualized:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NxD3OynAnVJFP9yfv9pa1/1b518728e831062aa5bcae1d8329ffe8/image17.png" />
            
            </figure><p>This can be a bit complicated for humans to parse, so let’s dig into that above scenario for Christchurch, New Zealand to make this a bit more clear. When we take a look at failover paths specifically for Christchurch, we see they look like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6JGMDbR9jjZHFTpQMEkfZI/29dbc0bfeb4fa4147156d331831d8ebc/image20.png" />
            
            </figure><p>In this scenario we predict that 99.8% of Christchurch’s traffic would shift to Auckland, which is able to absorb all Christchurch traffic in the event of a catastrophic outage.</p><p>Traffic Predictor allows us to not only see where traffic will move to if something should happen, but it allows us to preconfigure Traffic Manager policies to move requests out of failover data centers to prevent a thundering herd scenario: where sudden influx of requests can cause failures in a second data center if the first one has issues. With Traffic Predictor, Traffic Manager doesn’t just move traffic out of one data center when that one fails, but it also proactively moves traffic out of other data centers to ensure a seamless continuation of service.</p>
    <div>
      <h3>From a sledgehammer to a scalpel</h3>
      <a href="#from-a-sledgehammer-to-a-scalpel">
        
      </a>
    </div>
    <p>With Traffic Predictor, Traffic Manager can dynamically advertise and withdraw prefixes while ensuring that every datacenter can handle all the traffic. But withdrawing prefixes as a means of traffic management can be a bit heavy-handed at times. One of the reasons for this is that the only way we had to add or remove traffic to a data center was through advertising routes from our Internet-facing routers. Each one of our routes has thousands of IP addresses, so removing only one still represents a large portion of traffic.</p><p>Specifically, Internet applications will advertise prefixes to the Internet from a /24 subnet at an absolute minimum, but many will advertise prefixes larger than that. This is generally done to prevent things like route leaks or route hijacks: many providers will actually filter out routes that are more specific than a /24 (for more information on that, check out this blog on <a href="/route-leak-detection-with-cloudflare-radar/">how we detect route leaks</a>). If we assume that Cloudflare maps protected properties to IP addresses at a 1:1 ratio, then each /24 subnet would be able to service 256 customers, which is the number of IP addresses in a /24 subnet. If every IP address sent one request per second, we’d have to move 4 /24 subnets out of a data center if we needed to move 1,000 requests per second (RPS).</p><p>But in reality, Cloudflare maps a single IP address to hundreds of thousands of protected properties. So for Cloudflare, a /24 might take 3,000 requests per second, but if we needed to move 1,000 RPS out, we would have no choice but to move a single /24 out. And that’s just assuming we advertise at a /24 level. If we used /20s to advertise, the amount we can withdraw gets less granular: at a 1:1 website to IP address mapping, that’s 4,096 requests per second for each prefix, and even more if the website to IP address mapping is many to one.</p><p>While withdrawing prefix advertisements improved the customer experience for those users who would have seen a 499 or 500 error — there may have been a significant portion of users who wouldn’t have been impacted by an issue who still were moved away from the data center they should have gone to, probably slowing them down, even if only a little bit. This concept of moving more traffic out than is necessary is called “stranding capacity”: the data center is theoretically able to service more users in a region but cannot because of how Traffic Manager was built.</p><p>We wanted to improve Traffic Manager so that it only moved the absolute minimum of users out of a data center that was seeing a problem and not strand any more capacity. To do so, we needed to shift percentages of prefixes, so we could be extra fine-grained and only move the things that absolutely need to be moved. To solve this, we built an extension of our <a href="/unimog-cloudflares-edge-load-balancer/">Layer 4 load balancer Unimog,</a> which we call Plurimog.</p><p>A quick refresher on Unimog and layer 4 load balancing: every single one of our machines contains a service that determines whether that machine can take a user request. If the machine can take a user request then it sends the request to our HTTP stack which processes the request before returning it to the user. If the machine can’t take the request, the machine sends the request to another machine in the data center that can. The machines can do this because they are constantly talking to each other to understand whether they can serve requests for users.</p><p>Plurimog does the same thing, but instead of talking between machines, Plurimog talks in between data centers and points of presence. If a request goes into Philadelphia and Philadelphia is unable to take the request, Plurimog will forward to another data center that can take the request, like Ashburn, where the request is decrypted and processed. Because Plurimog operates at layer 4, it can send individual TCP or UDP requests to other places which allows it to be very fine-grained: it can send percentages of traffic to other data centers very easily, meaning that we only need to send away enough traffic to ensure that everyone can be served as fast as possible. Check out how that works in our Frankfurt data center, as we are able to shift progressively more and more traffic away to handle issues in our data centers. This chart shows the number of actions taken on free traffic that cause it to be sent out of Frankfurt over time:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NqLJgn8hYCuHKXRaJfX2P/c666ab9c6c8aba3071a3528b274f997b/pasted-image-0-1.png" />
            
            </figure><p>But even within a data center, we can route traffic around to prevent traffic from leaving the datacenter at all. Our large data centers, called Multi-Colo Points of Presence (MCPs) contain logical sections of compute within a data center that are distinct from one another. These MCP data centers are enabled with another version of Unimog called Duomog, which allows for traffic to be shifted between logical sections of compute automatically. This makes MCP data centers fault-tolerant without sacrificing performance for our customers, and allows Traffic Manager to work within a data center as well as between data centers.</p><p>When evaluating portions of requests to move, Traffic Manager does the following:</p><ul><li><p>Traffic Manager identifies the proportion of requests that need to be removed from a data center or subsection of a data center so that all requests can be served.</p></li><li><p>Traffic Manager then calculates the aggregated space metrics for each target to see how many requests each failover data center can take.</p></li><li><p>Traffic Manager then identifies how much traffic in each plan we need to move, and moves either a proportion of the plan, or all of the plan through Plurimog/Duomog, until we've moved enough traffic. We move Free customers first, and if there are no more Free customers in a data center, we'll move Pro, and then Business customers if needed.</p></li></ul><p>For example, let’s look at Ashburn, Virginia: one of our MCPs. Ashburn has nine different subsections of capacity that can each take traffic. On 8/28, one of those subsections, IAD02, had an issue that reduced the amount of traffic it could handle.</p><p>During this time period, Duomog sent more traffic from IAD02 to other subsections within Ashburn, ensuring that Ashburn was always online, and that performance was not impacted during this issue. Then, once IAD02 was able to take traffic again, Duomog shifted traffic back automatically. You can see these actions visualized in the time series graph below, which tracks the percentage of traffic moved over time between subsections of capacity within IAD02 (shown in green):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tHxLx4GG2vfqVOfscJlCr/c4864e24dc18b7ad1866c716862d79ee/pasted-image-0--1--1.png" />
            
            </figure>
    <div>
      <h3>How does Traffic Manager know how much to move?</h3>
      <a href="#how-does-traffic-manager-know-how-much-to-move">
        
      </a>
    </div>
    <p>Although we used requests per second in the example above, using requests per second as a metric isn’t accurate enough when actually moving traffic. The reason for this is that different customers have different resource costs to our service; a website served mainly from cache with the WAF deactivated is much cheaper CPU wise than a site with all WAF rules enabled and caching disabled. So we record the time that each request takes in the CPU. We can then aggregate the CPU time across each plan to find the CPU time usage per plan. We record the CPU time in ms, and take a per second value, resulting in a unit of milliseconds per second.</p><p>CPU time is an important metric because of the impact it can have on latency and customer performance. As an example, consider the time it takes for an eyeball request to make it entirely through the Cloudflare front line servers: we call this the cfcheck latency. If this number goes too high, then our customers will start to notice, and they will have a bad experience. When cfcheck latency gets high, it’s usually because CPU utilization is high. The graph below shows 95th percentile cfcheck latency plotted against CPU utilization across all the machines in the same data center, and you can see the strong correlation:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZNFbWlf35KUMAh9SchRHb/4e415f7d847d10bbe68585c9a7695266/Untitled.png" />
            
            </figure><p>So having Traffic Manager look at CPU time in a data center is a very good way to ensure that we’re giving customers the best experience and not causing problems.</p><p>After getting the CPU time per plan, we need to figure out how much of that CPU time to move to other data centers. To do this, we aggregate the CPU utilization across all servers to give a single CPU utilization across the data center. If a proportion of servers in the data center fail, due to network device failure, power failure, etc., then the requests that were hitting those servers are automatically routed elsewhere within the data center by Duomog. As the number of servers decrease, the overall CPU utilization of the data center increases. Traffic Manager has three thresholds for each data center; the maximum threshold, the target threshold, and the acceptable threshold:</p><ul><li><p>Maximum: the CPU level at which performance starts to degrade, where Traffic Manager will take action</p></li><li><p>Target: the level to which Traffic Manager will try to reduce the CPU utilization to restore optimal service to users</p></li><li><p>Acceptable: the level below which a data center can receive requests forwarded from another data center, or revert active moves</p></li></ul><p>When a data center goes above the maximum threshold, Traffic Manager takes the ratio of total CPU time across all plans to current CPU utilization, then applies that to the target CPU utilization to find the target CPU time. Doing it this way means we can compare a data center with 100 servers to a data center with 10 servers, without having to worry about the number of servers in each data center. This assumes that load increases linearly, which is close enough to true for the assumption to be valid for our purposes.</p><p>Target ratio equals current ratio:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EGE8UPINB9MUPtpETprf5/0f82d6166774a63f8e252dea7f169490/Screenshot-2023-09-18-at-22.11.27.png" />
            
            </figure><p>Therefore:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uyhAhuKbaFhMpdxtJTBFq/89f9032c5e4380b895f5bf9542ced1d9/Screenshot-2023-09-18-at-22.12.17.png" />
            
            </figure><p>Subtracting the target CPU time from the current CPU time gives us the CPU time to move:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SQDzRDMKby1OrhYxrLhBY/74142207095c5b9a4e869e2fe735ce6f/Screenshot-2023-09-18-at-22.13.14.png" />
            
            </figure><p>For example, if the current CPU utilization was at 90% across the data center, the target was 85%, and the CPU time across all plans was 18,000, we would have:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2A074OHvmPertIwkAIb0ev/e49abb26ac4b17cba2a96a4e5ccb7a8f/Screenshot-2023-09-18-at-22.14.02.png" />
            
            </figure><p>This would mean Traffic Manager would need to move 1,000 CPU time:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qKnOiyzymcphDes5ee2cS/d7cec01541398c1b3ae1b075622626c9/Screenshot-2023-09-25-at-10.44.41.png" />
            
            </figure><p>Now we know the total CPU time needed to move, we can go through the plans, until the required time to move has been met.</p>
    <div>
      <h3>What is the maximum threshold?</h3>
      <a href="#what-is-the-maximum-threshold">
        
      </a>
    </div>
    <p>A frequent problem that we faced was determining at which point Traffic Manager should start taking action in a data center - what metric should it watch, and what is an acceptable level?</p><p>As said before, different services have different requirements in terms of CPU utilization, and there are many cases of data centers that have very different utilization patterns.</p><p>To solve this problem, we turned to <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a>. We created a service that will automatically adjust the maximum thresholds for each data center according to customer-facing indicators. For our main service-level indicator (SLI), we decided to use the cfcheck latency metric we described earlier.</p><p>But we also need to define a service-level objective (SLO) in order for our machine learning application to be able to adjust the threshold. We set the SLO for 20ms. Comparing our SLO to our SLI, our 95th percentile cfcheck latency should never go above 20ms and if it does, we need to do something. The below graph shows 95th percentile cfcheck latency over time, and customers start to get unhappy when cfcheck latency goes into the red zone:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3A9IRcG1ztxPxIxF0ljSLj/9db6c767756a2e0e17b7c8b1d00089fa/Untitled--1-.png" />
            
            </figure><p>If customers have a bad experience when CPU gets too high, then the goal of Traffic Manager’s maximum thresholds are to ensure that customer performance isn’t impacted and to start redirecting traffic away before performance starts to degrade. At a scheduled interval the Traffic Manager service will fetch a number of metrics for each data center and apply a series of machine learning algorithms. After cleaning the data for outliers we apply a simple quadratic curve fit, and we are currently testing a linear regression algorithm.</p><p>After fitting the models we can use them to predict the CPU usage when the SLI is equal to our SLO, and then use it as our maximum threshold. If we plot the cpu values against the SLI we can see clearly why these methods work so well for our data centers, as you can see for Barcelona in the graphs below, which are plotted against curve fit and linear regression fit respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/695BSI9vd6OJ0jfhHwSj43/df037d425ddf50b3579696c770e6ff80/Untitled--2-.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LDLfdY2PNOTJjA1FU6lQM/e4341455c659795ce9ee2e004d1eb5b0/Untitled--3-.png" />
            
            </figure><p>In these charts the vertical line is the SLO, and the intersection of this line with the fitted model represents the value that will be used as the maximum threshold. This model has proved to be very accurate, and we are able to significantly reduce the SLO breaches. Let’s take a look at when we started deploying this service in Lisbon:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vK8dNvcvRFb0L9WiKuaOI/9ed8d056f903d5ce09b62515c6ecb9c2/Untitled--4-.png" />
            
            </figure><p>Before the change, cfcheck latency was constantly spiking, but Traffic Manager wasn’t taking actions because the maximum threshold was static. But after July 29, we see that cfcheck latency has never hit the SLO because we are constantly measuring to make sure that customers are never impacted by CPU increases.</p>
    <div>
      <h3>Where to send the traffic?</h3>
      <a href="#where-to-send-the-traffic">
        
      </a>
    </div>
    <p>So now that we have a maximum threshold, we need to find the third CPU utilization threshold which isn’t used when calculating how much traffic to move - the acceptable threshold. When a data center is below this threshold, it has unused capacity which, as long as it isn’t forwarding traffic itself, is made available for other data centers to use when required. To work out how much each data center is able to receive, we use the same methodology as above, substituting target for acceptable:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1yHCxMMzytg6BnYdigXx1w/9f441adfb38cc474ab8580cdd1b5c72d/Screenshot-2023-09-18-at-22.16.48.png" />
            
            </figure><p>Therefore:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6A0qMzXEmTPhVl8KRIiTRO/7830d77baee83d779ff01ff3605f0f09/Screenshot-2023-09-18-at-22.17.36.png" />
            
            </figure><p>Subtracting the current CPU time from the acceptable CPU time gives us the amount of CPU time that a data center could accept:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yQPGjUGnLWy9C9GGOzIRN/ad105de71360d03299039453b554059e/Screenshot-2023-09-18-at-22.18.16.png" />
            
            </figure><p>To find where to send traffic, Traffic Manager will find the available CPU time in all data centers, then it will order them by latency from the data center needing to move traffic. It moves through each of the data centers, using all available capacity based on the maximum thresholds before moving onto the next. When finding which plans to move, we move from the lowest priority plan to highest, but when finding where to send them, we move in the opposite direction.</p><p>To make this clearer let's use an example:</p><p>We need to move 1,000 CPU time from data center A, and we have the following usage per plan: Free: 500ms/s, Pro: 400ms/s, Business: 200ms/s, Enterprise: 1000ms/s.</p><p>We would move 100% of Free (500ms/s), 100% of Pro (400ms/s), 50% of Business (100ms/s), and 0% of Enterprise.</p><p>Nearby data centers have the following available CPU time: B: 300ms/s, C: 300ms/s, D: 1,000ms/s.</p><p>With latencies: A-B: 100ms, A-C: 110ms, A-D: 120ms.</p><p>Starting with the lowest latency and highest priority plan that requires action, we would be able to move all the Business CPU time to data center B and half of Pro. Next we would move onto data center C, and be able to move the rest of Pro, and 20% of Free. The rest of Free could then be forwarded to data center D. Resulting in the following action: Business: 50% → B, Pro: 50% → B, 50% → C, Free: 20% → C, 80% → D.</p>
    <div>
      <h3>Reverting actions</h3>
      <a href="#reverting-actions">
        
      </a>
    </div>
    <p>In the same way that Traffic Manager is constantly looking to keep data centers from going above the threshold, it is also looking to bring any forwarded traffic back into a data center that is actively forwarding traffic.</p><p>Above we saw how Traffic Manager works out how much traffic a data center is able to receive from another data center — it calls this the available CPU time. When there is an active move we use this available CPU time to bring back traffic to the data center — we always prioritize reverting an active move over accepting traffic from another data center.</p><p>When you put this all together, you get a system that is constantly measuring system and customer health metrics for every data center and spreading traffic around to make sure that each request can be served given the current state of our network. When we put all of these moves between data centers on a map, it looks something like this, a map of all Traffic Manager moves for a period of one hour. This map doesn’t show our full data center deployment, but it does show the data centers that are sending or receiving moved traffic during this period:</p><div>
  
</div>
<p></p><p>Data centers in red or yellow are under load and shifting traffic to other data centers until they become green, which means that all metrics are showing as healthy. The size of the circles represent how many requests are shifted from or to those data centers. Where the traffic is going is denoted by where the lines are moving. This is difficult to see at a world scale, so let’s zoom into the United States to see this in action for the same time period:</p><div>
  
</div>
<p></p><p>Here you can see Toronto, Detroit, New York, and Kansas City are unable to serve some requests due to hardware issues, so they will send those requests to Dallas, Chicago, and Ashburn until equilibrium is restored for users and data centers. Once data centers like Detroit are able to service all the requests they are receiving without needing to send traffic away, Detroit will gradually stop forwarding requests to Chicago until any issues in the data center are completely resolved, at which point it will no longer be forwarding anything. Throughout all of this, end users are online and are not impacted by any physical issues that may be happening in Detroit or any of the other locations sending traffic.</p>
    <div>
      <h3>Happy network, happy products</h3>
      <a href="#happy-network-happy-products">
        
      </a>
    </div>
    <p>Because Traffic Manager is plugged into the user experience, it is a fundamental component of the Cloudflare network: it keeps our products online and ensures that they’re as fast and reliable as they can be. It’s our real time load balancer, helping to keep our products fast by only shifting necessary traffic away from data centers that are having issues. Because less traffic gets moved, our products and services stay fast.</p><p>But Traffic Manager can also help keep our products online and reliable because they allow our products to predict where reliability issues may occur and preemptively move the products elsewhere. For example, Browser Isolation directly works with Traffic Manager to help ensure the uptime of the product. When you connect to a Cloudflare data center to create a hosted browser instance, Browser Isolation first asks Traffic Manager if the data center has enough capacity to run the instance locally, and if so, the instance is created right then and there. If there isn’t sufficient capacity available, Traffic Manager tells Browser Isolation which the closest data center with sufficient available capacity is, thereby helping Browser Isolation to provide the best possible experience for the user.</p>
    <div>
      <h3>Happy network, happy users</h3>
      <a href="#happy-network-happy-users">
        
      </a>
    </div>
    <p>At Cloudflare, we operate this huge network to service all of our different products and customer scenarios. We’ve built this network for resiliency: in addition to our MCP locations designed to reduce impact from a single failure, we are constantly shifting traffic around on our network in response to internal and external issues.</p><p>But that is our problem — not yours.</p><p>Similarly, when human beings had to fix those issues, it was customers and end users who would be impacted. To ensure that you’re always online, we’ve built a smart system that detects our hardware failures and preemptively balances traffic across our network to ensure it’s online and as fast as possible. This system works faster than any person — not only allowing our network engineers to sleep at night — but also providing a better, faster experience for all of our customers.</p><p>And finally: if these kinds of engineering challenges sound exciting to you, then please consider checking out the Traffic Engineering team's open position on Cloudflare’s <a href="https://cloudflare.com/careers/jobs">Careers</a> page!</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Routing]]></category>
            <category><![CDATA[Anycast]]></category>
            <category><![CDATA[Interconnection]]></category>
            <guid isPermaLink="false">lz1BR25h48nezzhD7C1Gr</guid>
            <dc:creator>David Tuber</dc:creator>
            <dc:creator>Luke Orden</dc:creator>
            <dc:creator>Gonçalo Grilo</dc:creator>
        </item>
        <item>
            <title><![CDATA[Elevate load balancing with Private IPs and Cloudflare Tunnels: a secure path to efficient traffic distribution]]></title>
            <link>https://blog.cloudflare.com/elevate-load-balancing-with-private-ips-and-cloudflare-tunnels-a-secure-path-to-efficient-traffic-distribution/</link>
            <pubDate>Fri, 08 Sep 2023 13:00:01 GMT</pubDate>
            <description><![CDATA[ We are extremely excited to announce a new addition to our Load Balancing solution, Private Network Load Balancing with deep integrations with Zero Trust!
 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ILMvjlajN04XDxywfXL1a/fcaf05a762de5ac61baa3b001fd4edc7/image7-1.png" />
            
            </figure><p>In the dynamic world of modern applications, efficient load balancing plays a pivotal role in delivering exceptional user experiences. Customers commonly leverage load balancing, so they can efficiently use their existing infrastructure resources in the best way possible. Though, load balancing is not a ‘one-size-fits-all, out of the box’ solution for everyone. As you go deeper into the details of your traffic shaping requirements and as your architecture becomes more complex, different flavors of load balancing are usually required to achieve these varying goals, such as steering between datacenters for public traffic, creating high availability for critical internal services with private IPs, applying steering between servers in a single datacenter, and more. We are extremely excited to announce a new addition to our Load Balancing solution, Private Network Load Balancing with deep integrations with Zero Trust!  </p><p>A common problem businesses run into is that almost no providers can satisfy all these requirements, resulting in a growing list of vendors to manage disparate data sources to get a clear view of your traffic pipeline, and investment into incredibly expensive hardware that is complicated to set up and maintain. Not having a single source of truth to dwindle down ‘time to resolution’ and a single partner to work with in times when things are not operating within the ideal path can be the difference between a proactive, healthy growing business versus one that is reactive and constantly having to put out fires. The latter can result in extreme slowdown to developing amazing features/services, reduction in revenue, tarnishing of brand trust, decreases in adoption - the list goes on!</p><p>For eight years, we have provided top-tier global traffic load balancing (GTM) capabilities to thousands of customers across the globe. But why should the steering intelligence, failover, and reliability we guarantee stop at the front door of the selected datacenter and only operate with public traffic? We came to the conclusion that we should go even further. Today is the start of a long series of new features that allow traffic steering, failover, session persistence, SSL/TLS offloading and much more to take place between servers after datacenter selection has occurred! Instead of relying <i>only</i> on the relative weight to determine which server traffic should be sent to, you can now bring the same intelligent steering policies, such as <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-steering/origin-level-steering/least-outstanding-requests-pools/"><u>least outstanding requests steering</u></a> or <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-steering/origin-level-steering/hash-origin-steering/"><u>hash steering</u></a>, to any of your many data centers. This also means you have a single partner for <b>all</b> of your load balancing initiatives and a single pane of glass to inform business decisions! Cloudflare is thrilled to introduce the powerful combination of private IP support for Load Balancing with Cloudflare Tunnels and Private Network Load Balancing, offering customers a solution that blends unparalleled efficiency, security, flexibility, and privacy.</p>
    <div>
      <h3>What is a load balancer?</h3>
      <a href="#what-is-a-load-balancer">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2batHEyi8vzCMEjgy2E2rD/601bc0a81e751b02dc332cc531623546/pasted-image-0.png" />
            
            </figure><p>A Cloudflare load balancer directs a request from a user to the appropriate origin pool within a data center</p><p>Load balancing — functionality that’s been around for the last 30 years to help businesses leverage their existing infrastructure resources. <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">Load balancing</a> works by proactively steering traffic away from unhealthy origin servers and — for more advanced solutions — intelligently distributing traffic load based on different steering <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-steering/">algorithms</a>. This process ensures that errors aren’t served to end users and empowers businesses to tightly couple overall business objectives to their traffic behavior. Cloudflare Load Balancing has made it simpler and easier to securely and reliably manage your traffic across multiple data centers around the world. With Cloudflare Load Balancing, your traffic will be directed reliably regardless of the scale of traffic or where it originates with customizable steering, affinity and failover. This clearly has an advantage over a physical load balancer since it can be configured easily and traffic doesn’t have to reach one of your data centers to be routed to another location, introducing single points of failure and significant <a href="https://www.cloudflare.com/learning/performance/glossary/what-is-latency/">latency</a>. When compared with other global traffic management load balancers, Cloudflare’s Load Balancing offering is easier to set up, simpler to understand, and is fully integrated with the Cloudflare platform as one single product for all load balancing needs.</p>
    <div>
      <h3>What are Cloudflare Tunnels?</h3>
      <a href="#what-are-cloudflare-tunnels">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Pn6iWjweXKPpg0Kl00s0W/6a0ef1886f7ce5ea114e010e9b5a32eb/Group-3345--1-.png" />
            
            </figure><p>Origins and servers of various types can be connected to Cloudflare using Cloudflare Tunnel. Users can also secure their traffic using WARP, allowing traffic to be secured and managed end to end through Cloudflare.‌ ‌</p><p>In 2018, Cloudflare introduced <a href="https://www.cloudflare.com/products/tunnel">Cloudflare Tunnels</a>, a private, secure connection between your data center and Cloudflare. Traditionally, from the moment an Internet property is deployed, developers spend an exhaustive amount of time and energy locking it down through access control lists, rotating IP addresses, or more complex solutions like <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE tunnels</a>. We built Tunnel to help alleviate that burden. With Tunnels, users can create a private link from their origin server directly to Cloudflare without exposing your services directly to the public internet or allowing incoming connections in your data center’s firewall. Instead, this private connection is established by running a lightweight daemon, <code>cloudflared</code>, in your data center, which creates a secure, outbound-only connection. This means that only traffic that you’ve configured to pass through Cloudflare can reach your private origin.</p>
    <div>
      <h3>Unleashing the potential of Cloudflare Load Balancing with Cloudflare Tunnels</h3>
      <a href="#unleashing-the-potential-of-cloudflare-load-balancing-with-cloudflare-tunnels">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fxiGzB4slJt02ZgQppT1d/1eadd4e57c66458024c2247080c7a07d/After-Elevate-Load-Balancing-with-Private-IP-Support-and-Cloudflare-Tunnels.png" />
            
            </figure><p>Cloudflare Load Balancing can easily and securely direct a user’s request to a specific origin within your private data center or public cloud using Cloudflare Tunnels</p><p>Combining Cloudflare Tunnels with Cloudflare Load Balancing allows you to remove your physical load balancers from your data center and have your Cloudflare load balancer reach out to your servers directly via their private IP addresses with health checks, steering, and all other Load Balancing features currently available. Instead of configuring your on-premise load balancer to expose each service and then updating your Cloudflare load balancer, you can configure it all in one place. This means that from the end-user to the server handling the request, all your configuration can be done in a single place – the Cloudflare dashboard. On top of this, you can say goodbye to the multi hundred thousand dollar price tag to hardware appliances, the incredible management overhead and investing in a solution that has a time limit for its delivered value.</p><p>Load Balancing serves as the backbone for online services, ensuring seamless traffic distribution across servers or data centers. Traditional load balancing techniques often require exposing services on a data center’s public IP addresses, forcing organizations to create complex configurations vulnerable to security risks and potential data exposure. By harnessing the power of private IP support for Load Balancing in conjunction with Cloudflare Tunnels, Cloudflare is revolutionizing the way businesses <a href="https://www.cloudflare.com/application-services/solutions/">protect and optimize their applications</a>. With clear steps to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/install-and-setup/tunnel-guide/">install</a> the cloudflared agent to connect your private network to Cloudflare’s network via Cloudflare Tunnels, directly and securely routing traffic into your data centers becomes easier than ever before!</p>
    <div>
      <h3>Publicly exposing services in private data centers is complicated</h3>
      <a href="#publicly-exposing-services-in-private-data-centers-is-complicated">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fGhHqn2IZj4gMUL24c7lb/16ec2f39fbb2fe37fd26eff7f6d2479f/Before-Elevate-Load-Balancing-with-Private-IP-Support-and-Cloudflare-Tunnels_-A-Secure-Path-to-Efficient-Traffic-Distributio.png" />
            
            </figure><p><sup>A visitor’s request hits a global traffic management (GTM) load balancer directing the request to a data center, then a firewall, then a local load balancer and then an origin</sup></p><p>Load balancing within a private data center can be expensive and difficult to manage. The idea of keeping security first while ensuring ease of use and flexibility for your internal workforce is a tricky balance to strike. It’s not only the ‘how’ of securely exposing internal services, but how to best balance traffic between servers at a single location within your private network!</p><p>In a private data center, even a very simple website can be fairly complex in terms of networking and configuration. Let’s walk through a simple example of a customer device connecting to a website. A customer device performs a DNS lookup for the business’s website and receives an IP address corresponding to a customer data center. The customer then makes an HTTPS request to that IP address, passing the original hostname via <a href="https://www.cloudflare.com/learning/ssl/what-is-sni/">Server Name Indication</a> (SNI). That load balancer forwards that request to the corresponding origin server and returns the response to the customer device.</p><p>This example doesn’t have any advanced functionality and the stack is already difficult to configure:</p><ul><li><p>Expose the service or server on a private IP.</p></li><li><p>Configure your data center’s networking to expose the LB on a public IP or IP range.</p></li><li><p>Configure your load balancer to forward requests for that hostname and/or public IP to your server’s private IP.</p></li><li><p>Configure a DNS record for your domain to point to your load balancer’s public IP.</p></li></ul><p>In large enterprises, each of these configuration changes likely requires approval from several stakeholders and modified through different repositories, websites and/or private web interfaces. Load balancer and networking configurations are often maintained as complex configuration files for Terraform, Chef, Puppet, Ansible or a similar infrastructure-as-code service. These configuration files can be syntax checked or tested but are rarely tested thoroughly prior to deployment. Each deployment environment is often unique enough that thorough testing is often not feasible given the time and hardware requirements needed to do so. This means that changes to these files can negatively affect other services within the data center. In addition, opening up an ingress to your data center <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">widens the attack surface</a> for varying security risks such as <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> or catastrophic data breaches. To make things worse, each vendor has a different interface or API for configuring their devices or services. For example, some <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrars</a> only have XML APIs while others have JSON REST APIs. Each device configuration may have different Terraform providers or Ansible playbooks. This results in complex configurations accumulating over time that are difficult to consolidate or standardize, inevitably resulting in technical debt.</p><p>Now let’s add additional origins. For each additional origin for our service, we’ll have to go set up and expose that origin and configure the physical load balancer to use our new origin. Now let’s add another data center. Now we need another solution to distribute across our data centers. This results in one system for global traffic management and another, separate system, for local traffic. . These solutions have in the past come from different vendors and will have to be configured in different ways even though they should serve the same purpose: load balancing. This makes managing your web traffic unnecessarily difficult. Why should you have to configure your origins in two different load balancers? Why can’t you manage all the traffic for all the origins for a service in the same place?</p>
    <div>
      <h3>Simpler and better: Load Balancing with Tunnels</h3>
      <a href="#simpler-and-better-load-balancing-with-tunnels">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uBuu8as4xTsf4QLZtpjt7/b361efe686342832c1c1de254e22cccf/pasted-image-0--1-.png" />
            
            </figure><p>Cloudflare Load Balancing can manage traffic for all your offices, data centers, remote users, public clouds, private clouds and hybrid clouds in one place‌ ‌</p><p>With Cloudflare Load Balancing and Cloudflare Tunnel, you can manage all your public and private origins in one place: the Cloudflare dashboard. Cloudflare load balancers can be easily configured using the Cloudflare dashboard or the Cloudflare API. There’s no need to <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> or open a remote desktop to modify load balancer configurations for your public or private servers. All configurations can be done through the dashboard UI or Cloudflare API, with full parity between the two.</p><p>With Cloudflare Tunnel <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/install-and-setup/tunnel-guide/">set up and running</a> in your data center, everything is ready to connect your origin server to Cloudflare network and load balancers. You do not need to configure any ingress to your data center since Cloudflare Tunnel operates only over outbound connections and can securely reach out to privately addressed services inside your data center. To expose your service to Cloudflare, you just <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/private-net/tunnel-virtual-networks/#route-ips-over-virtual-networks">set up your private IP range to be routed over that tunnel</a>. Then, you can create a Cloudflare load balancer and input the corresponding private IP address and <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-management/">virtual network ID into your origin pool</a>. After that, Cloudflare manages the DNS and load balancing across your private servers. Now your origin is receiving traffic exclusively via Cloudflare Tunnel and your physical load balancer is no longer needed!</p><p>This groundbreaking integration enables organizations to deploy load balancers while keeping their applications securely shielded from the public Internet. The customer’s traffic passes through Cloudflare’s data centers, allowing customers to continue to take full advantage of Cloudflare’s security and performance services. Also, by leveraging Cloudflare Tunnels, traffic between Cloudflare and customer origins remains isolated within trusted networks, bolstering privacy, security, and peace of mind.</p>
    <div>
      <h3>The advantages of Private IP support with Cloudflare Tunnels</h3>
      <a href="#the-advantages-of-private-ip-support-with-cloudflare-tunnels">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zxhWEuT3ZCugzEXSDSHiL/ce99377d9cdbd29aebe95130ac8dd6d1/pasted-image-0--2-.png" />
            
            </figure><p><sup>Cloudflare Load Balancing works in conjunction with all the security and privacy products that Cloudflare has to offer including DDoS protection, Web Application Firewall and Bot Management</sup></p><p><b>Unified Traffic Management : </b>All the features and ease of use that were part of Cloudflare Load Balancing for Global Traffic Management are also available with Private Network Load Balancing. You can configure your public and private origins in one dashboard as opposed to several services and vendors. Now, all your private origins can benefit from the features that Cloudflare Load Balancing is known for: instant failover, customizable steering between data centers, ease of use, custom rules and configuration updates in a matter of seconds. They will also benefit from our newer features including least connection steering, least outstanding request steering, and session affinity by header. This is just a small subset of the expansive feature set for Load Balancing. See our <a href="https://developers.cloudflare.com/load-balancing/"><u>dev docs</u></a> for more features and details on the offering.</p><p><b>Enhanced Security</b>: By combining private IP support with Cloudflare Tunnels, organizations can fortify their security posture and protect sensitive data. With private IP addresses and encrypted connections via Cloudflare Tunnel, the risk of unauthorized access and potential attacks is significantly reduced – traffic remains within trusted networks. You can also configure <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/">Cloudflare Access</a> to add single sign-on support for your application and restrict your application to a subset of authorized users. In addition, you still benefit from Firewall rules, Rate Limiting rules, Bot Management, DDoS protection and all the other Cloudflare products available today allowing comprehensive security configurations.</p><p><b>Uncompromising Privacy</b>: As data privacy continues to take center stage, businesses must ensure the confidentiality of user information. Cloudflare's private IP support with Cloudflare Tunnels enables organizations to segregate applications and keep sensitive data within their private network boundaries. Custom rules also allow you to direct traffic for specific devices to specific data centers. For example, you can use custom rules to direct traffic from Eastern and Western Europe to your European data centers, so you can easily keep those users’ data within Europe. This minimizes the exposure of data to external entities, preserving user privacy and complying with strict privacy regulations across different geographies.</p><p><b>Flexibility &amp; Reliability</b>: Scale and adaptability are some of the major foundations of a well-operating business. <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Implementing solutions</a> that fit your business’ needs today is not enough. Customers must find solutions that meet their needs for the next three or more years. The blend of Load Balancing with Cloudflare Tunnels within our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solution</a> lends to the very definition of flexibility and reliability! Changes to load balancer configurations propagate around the world in a matter of seconds, making load balancers an effective way to respond to incidents. Also, instant failover, health monitoring, and steering policies all help to maintain high availability for your applications, so you can deliver the reliability that your users expect. This is all in addition to best in class <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> capabilities that are deeply integrated such as, but not limited to Secure Web Gateway (SWG), remote browser isolation, network logs and data loss prevention.</p><p><b>Streamlined Infrastructure</b>: Organizations can consolidate their network architecture and establish secure connections across distributed environments. This unification reduces complexity, lowers operational overhead, and facilitates efficient resource allocation. Whether you need to apply a global traffic manager to intelligently direct traffic between datacenters within your private network, or steer between specific servers after datacenter selection has taken place, there is now a clear, single lens to manage your global and local traffic, regardless of whether the source or destination of the traffic is public or private. Complexity can be a large hurdle in achieving and maintaining fast, agile business units. Consolidating into a single provider, like Cloudflare, that provides security, reliability, and observability will not only save significant cost but allows your teams to move faster and focus on growing their business, enhancing critical services, and developing incredible features, rather than taping together infrastructure that may not work in a few years. Leave the heavy lifting to us, and let us empower you and your team to focus on creating amazing experiences for your employees and end-users.</p><p>The lack of agility, flexibility, and lean operations of hardware appliances for local traffic does not justify the hundreds of thousands of dollars spent on them, along with the huge overhead of managing CPU, memory, power, cooling, etc. Instead, we want to help businesses move this logic to the cloud by abstracting away the needless overhead and bringing more focus back to teams to do what they do best, building amazing experiences, and allowing Cloudflare to do what we do best, protecting, accelerating, and building heightened reliability. Stay tuned for more updates on Cloudflare's Private Network Load Balancing and how it can reduce architecture complexity while bringing more insight, security, and control to your teams. In the meantime, check out our new <a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/7siMQh0goJJnH4PYbAzOxC/f4a66ebdf20cca2ec85c2b9261fb8a38/Optimize-Web-Performance.pdf"><u>whitepaper</u></a>!</p>
    <div>
      <h3>Looking to the future</h3>
      <a href="#looking-to-the-future">
        
      </a>
    </div>
    <p>Cloudflare's impactful solution, private IP support for Load Balancing with Cloudflare Tunnels as part of the Zero Trust solution, reaffirms our commitment to providing cutting-edge tools that prioritize security, privacy, and performance. By leveraging private IP addresses and secure tunnels, Cloudflare empowers businesses to fortify their network infrastructure while ensuring compliance with regulatory requirements. With enhanced security, uncompromising privacy, and streamlined infrastructure, load balancing becomes a powerful driver of efficient and secure public or private services.</p><p>As a business grows and its systems scale up, they'll need the features that Cloudflare Load Balancing is known for: health monitoring, steering, and failover. As availability requirements increase due to growing demands and standards from end-users, customers can add health checks, enabling automatic failover to healthy servers when an unhealthy server begins to fail. When the business begins to receive more traffic from around the world, they can create new pools for different regions and use dynamic steering to reduce latency between the user and the server. For intensive or long-running requests, such as complex datastore queries, customers can benefit from leveraging <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-steering/origin-level-steering/least-outstanding-requests-pools/"><u>least outstanding requests steering</u></a> to reduce the number of concurrent requests per server. Before, this could all be done with publicly addressable IPs, but it is now available for pools with public IPs, private servers, or combinations of the two. Private Network Load Balancing  is live and ready to use today! Check out our <a href="https://developers.cloudflare.com/load-balancing/understand-basics/traffic-management/"><u>dev docs for instructions on how to get started</u></a>.</p><p>Stay tuned for our next addition to add new Load Balancing onramp support for Spectrum and WARP with Cloudflare Tunnels with private IPs for your <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/network-layers/">Layer 4</a> traffic, allowing us to support TCP and UDP applications in your private data centers!</p> ]]></content:encoded>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Cloudflare Tunnel]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">6WBtRI0c6K4SqCsCAd3hgn</guid>
            <dc:creator>Brian Batraski</dc:creator>
            <dc:creator>Mathew Jacob</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s view of the Virgin Media outage in the UK]]></title>
            <link>https://blog.cloudflare.com/virgin-media-outage-april-4-2023/</link>
            <pubDate>Tue, 04 Apr 2023 18:57:46 GMT</pubDate>
            <description><![CDATA[ UK ISP Virgin Media (AS5089) experienced several outages on April 4, 2023. We examine the impact to Internet traffic, availability of Virgin Media web properties, and how BGP activity may provide insights into the underlying cause ]]></description>
            <content:encoded><![CDATA[ <p>Just after midnight (UTC) on April 4, subscribers to UK ISP Virgin Media (AS5089) began experiencing an Internet outage, with subscriber complaints multiplying rapidly on platforms including <a href="https://twitter.com/search?q=(%40virginmedia)%20until%3A2023-04-05%20since%3A2023-04-04&amp;src=typed_query&amp;f=live">Twitter</a> and <a href="https://www.reddit.com/r/VirginMedia/">Reddit</a>.</p><p>Cloudflare Radar data shows Virgin Media traffic dropping to near-zero around 00:30 UTC, as seen in the figure below. Connectivity showed some signs of recovery around 02:30 UTC, but fell again an hour later. Further nominal recovery was seen around 04:45 UTC, before again experiencing another complete outage between around 05:45-06:45 UTC, after which traffic began to recover, reaching expected levels around 07:30 UTC.</p><p>After the initial set of early-morning disruptions, Virgin Media experienced another round of issues in the afternoon. Cloudflare observed instability in traffic from Virgin Media’s network (called an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a> in Internet jargon) <a href="https://radar.cloudflare.com/as5089">AS5089</a> starting around 15:00 UTC, with a significant drop just before 16:00 UTC. However in this case, it did not appear to be a complete outage, with traffic recovering approximately a half hour later.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2I8FoTltIjjhXZNyAXHa3g/8747600986328dee7e77006a8d5ef800/image2-2.png" />
            
            </figure><p>Virgin Media’s Twitter account acknowledged the early morning disruption several hours after it began, posting <a href="https://twitter.com/virginmedia/status/1643157411417542656">responses</a> stating <i>“We’re aware of an issue that is affecting broadband services for Virgin Media customers as well as our contact centres. Our teams are currently working to identify and fix the problem as quickly as possible and we apologise to those customers affected.”</i> Further <a href="https://twitter.com/virginmedia/status/1643230963797831682">responses</a> after service restoration noted <i>“We’ve restored broadband services for customers but are closely monitoring the situation as our engineers continue to investigate. We apologise for any inconvenience caused.”</i></p><p>However, the second disruption was acknowledged on Virgin Media’s Twitter account much more rapidly, with a <a href="https://twitter.com/virginmedia/status/1643288614585917450">post</a> at 16:25 UTC stating <i>“Unfortunately we have seen a repeat of an earlier issue which is causing intermittent broadband connectivity problems for some Virgin Media customers. We apologise again to those impacted, our teams are continuing to work flat out to find the root cause of the problem and fix it.”</i></p><p>At the time of the outages, <a href="http://www.virginmedia.com">www.virginmedia.com</a>, which includes the provider’s <a href="https://www.virginmedia.com/help/service-status">status page</a>, was unavailable. As seen in the figure below, a DNS lookup for the hostname resulted in a <a href="/unwrap-the-servfail/">SERVFAIL</a> error, indicating that the lookup failed to return a response. This is because the authoritative nameservers for <code>virginmedia.com</code> are listed as <code>ns{1-4}.virginmedia.net</code>, and these nameservers are all hosted within Virgin Media’s network (AS5089) and thus are not accessible during the outage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KfQz1KaMcDIcq9x9Q4btG/e20aa0fc3fea49b7bb771a1f3ef141bc/image3-2.png" />
            
            </figure><p>Although Virgin Media has not publicly released a root cause for the series of disruptions that its network has experienced, looking at <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> activity can be instructive.</p><p>BGP is a mechanism to exchange routing information between networks on the Internet. The big routers that make the Internet work have huge, constantly updated lists of the possible routes that can be used to deliver each network packet to its final destination. Without BGP, the Internet routers wouldn't know what to do, and the Internet wouldn't exist.</p><p>The Internet is literally a network of networks, or for math fans, a graph, with each individual network a node in it, and the edges representing the interconnections. All of this is bound together by BGP, which allows one network (Virgin Media, for instance) to advertise its presence to other networks that form the Internet. When Virgin Media is not advertising its presence, other networks can’t find its network and it becomes effectively unavailable.</p><p>BGP announcements inform a router of changes made to the routing of a prefix (a group of IP addresses) or entirely withdraws the prefix, removing it from the routing table. The figure below shows aggregate BGP announcement activity from AS5089 with spikes that align with the decreases and increases seen in the traffic graph above, suggesting that the underlying cause may in fact be BGP-related, or related to problems with core network infrastructure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HfTtqH9be1WsW0r3U3WRu/ac9cfb0854611375c2279e04ddf63b77/image1-5.png" />
            
            </figure><p>We can drill down further to break out the observed activity between BGP announcements (dark blue) and withdrawals (light blue) seen in the figure below, with key activity coincident with the loss and return of traffic. An initial set of withdrawals are seen just after midnight, effectively removing Virgin Media from the Internet resulting in the initial outage.</p><p>A set of announcements occurred just before 03:00 UTC, aligning with the nominal increase in traffic noted above, but those were followed quickly by another set of withdrawals. A similar announcement/withdrawal exchange was observed at 05:00 and 05:30 UTC respectively, before a final set of announcements restored connectivity at 07:00 UTC.</p><p>Things remained relatively stable through the morning into the afternoon, before another set of withdrawals presaged the afternoon’s connectivity problems, with a spike of withdrawals at 15:00 UTC, followed by additional withdrawal/announcement exchanges over the next several hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1g0bxSdA83arYRujZ4O27A/28f024c829e951028c33e23911bd7e40/image4-2.png" />
            
            </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Track ongoing traffic trends for Virgin Media <a href="https://radar.cloudflare.com/as5089">on Cloudflare Radar</a>, and follow us on <a href="https://twitter.com/CloudflareRadar">Twitter</a> and <a href="https://noc.social/@cloudflareradar">Mastodon</a> for regular updates.</p> ]]></content:encoded>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">3KOcaG40JM9enTO05YdEJD</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Who won Super Bowl LV? A look at Internet traffic during the game]]></title>
            <link>https://blog.cloudflare.com/who-won-super-bowl-lv/</link>
            <pubDate>Mon, 08 Feb 2021 17:40:00 GMT</pubDate>
            <description><![CDATA[ The obvious answer is the Tampa Bay Buccaneers but the less obvious answer comes from asking “which Super Bowl advertiser got the biggest Internet bump?”. This blog aims to answer that question. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The obvious answer is the <a href="http://www.buccaneers.com/">Tampa Bay Buccaneers</a> but the less obvious answer comes from asking “which Super Bowl advertiser got the biggest Internet bump?”. This blog aims to answer that question.</p><p>Before, during, and after the game a crack team of three people who work on <a href="https://radar.cloudflare.com/superbowl-lv">Cloudflare Radar</a> looked at real time statistics for traffic to advertisers’ websites, social media in the US, US food delivery services, and websites covering (American) football. Luckily, one of us (Kari) is (a) American and (b) a fan of football. Unluckily, one of us (Kari) is a fan of the <a href="https://www.chiefs.com/">Kansas City Chiefs</a>.</p><p>Cloudflare Radar uses a variety of sources to provide aggregate information about Internet traffic and attack trends. In this blog post we use DNS name resolution data to estimate traffic to websites. We can’t see who visited the websites mentioned below, or what anyone did on the websites, but DNS can give us an estimate of the interest generated by the commercials. This analysis only looked at the top-level names in each domain (so example.com and <a href="http://www.example.com">www.example.com</a> and not any other subdomains).</p>
    <div>
      <h3>The Big Picture</h3>
      <a href="#the-big-picture">
        
      </a>
    </div>
    <p>To get the ball rolling here’s a look at traffic to NFL team websites and sports websites. Traffic builds to a peak as the game begins just after 1830 local time. As the game progresses traffic to those websites drops off hitting a mid-game low at about 2015 before jumping up for 30 minutes during the halftime show.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sG2yFhc0A6WtBNc6wQt2z/7de9a3ddf6fca34d543daadb35137a73/image2-6.png" />
            
            </figure><p>The big peak at around 2145 appears to be at the same time as a streaker ran onto the field. A lesser peak comes soon after 2200 when the Buccaneers sealed their victory.</p><p>As well as reading about the game, fans were also using social media to get news and add their own commentary. Here’s a look at US social media use during the game.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AWGVmXKhrWqnTKHc8wpSb/0a8c8b1f2c2959e6b6f17767089a0870/image10.png" />
            
            </figure><p>Social media use dips a little just as the game is about to begin and then ramps up until the Buccaneers’ victory is final. And then, as people go to sleep, social media use falls away.</p><p>Taking a look at food delivery services it looks like folks orders ramped up about 90 minutes before the game started and people’s hunger was sated before the game ended.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GXNozadZmBtuSMRejxfvI/8a8003203e0a8b93a08a89854bfb773f/general-food-delivery.png" />
            
            </figure>
    <div>
      <h3>The Internet Impact of Commercials</h3>
      <a href="#the-internet-impact-of-commercials">
        
      </a>
    </div>
    <p>One question is “Does a Super Bowl commercial drive traffic to the company’s web site while the game is on?” Answer: yes. Here’s one that went vroom peaking at over 40x baseline:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hVAKy6ycsRpcPX4f9IDxb/d4a7de3dc9bfa0a5b4a63a94b9b4e99d/image7-1.png" />
            
            </figure><p>Vehicles and related services played a big part. <a href="https://www.youtube.com/watch?v=mdsPvbSpB2Y">GM</a> tried to take on Norway with a commercial about their electric vehicle batteries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fBACGBLOpLTSx1WruPK8L/c742a372f5911c99fa9dd6f663c7bd77/image3-6.png" />
            
            </figure><p>And the electric vehicle theme continued with <a href="https://www.youtube.com/watch?v=0KAlqthD6Gc">Cadillac</a>:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31AtcEgyBIBfJ72fKvQ10f/2126b95ef0cf46bfdf61bb6e79590191/image23.png" />
            
            </figure><p>And <a href="https://www.youtube.com/watch?v=D2XYH-IEvhI">Jeep</a>’s commercial caused a similar spike:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ke7alCtaTAjMMug1jJfQ0/98b59a5412888b41c827bf60e0cc78f5/image16.png" />
            
            </figure>
    <div>
      <h3>Food and Drink</h3>
      <a href="#food-and-drink">
        
      </a>
    </div>
    <p><a href="https://www.youtube.com/watch?v=WDvNUJUVmGk">Anheuser-Busch</a> had a “corporate” commercial this time (as opposed to a commercial for their individual brands). You can clearly see from this chart when that aired.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hgxHA9p8zXVWzcGl5y79a/ffac6fff0f77abb94312ac05d37a008a/image24.png" />
            
            </figure><p>And Bud Light got a boost that seemed to keep people thinking about beer through the game.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4y1vLbJPyZ31LodvMzyQSY/a33a29e0dac232ad9b866e2615612547/image13.png" />
            
            </figure><p>Some brands see a spike when the commercial airs and then traffic reverts fairly quickly towards the baseline. Another brand that lingered on post-commercial is <a href="https://www.youtube.com/watch?v=sjMalUSxBvs">Mountain Dew</a>. Prior to the commercial, traffic to the Mountain Dew website was steady, then came the airing of the commercial with a greater than 25x peak followed by interest throughout the game and into the night.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lU9yVUPqTt6U7bdx8B4ei/3594347560d097118f7bb2601c486a66/image20.png" />
            
            </figure><p>Pepsi sponsored the halftime show and that’s clearly visible in the charts as they get a boost through <a href="https://www.youtube.com/watch?v=9rhadTURsrw">The Weeknd’s performance</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Npe0SWJ79h6aQv015Xr7u/dd33c2374350b338f7daedae97304681/image9.png" />
            
            </figure><p>Moving on from drinks and reaching for the snacks we can see that <a href="https://www.youtube.com/watch?v=BLuqtTn4610">Doritos</a> were pretty popular all evening long with visible commercial induced spikes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nMQIycajtMmAO0QIoRMMN/00c44c532a8feb2ca47074d9af5cb24e/image14.png" />
            
            </figure><p>Brands that might not be so well known get a large traffic boost from their Super Bowl commercials. Here’s the impact on oat milk company <a href="https://www.youtube.com/c/OatlyTV/videos">Oatly</a>:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5P5HFDYLDoom48wQWdRdmZ/578c8986c3fd129a4bc40647f12c9aa6/image17.png" />
            
            </figure><p>And ever popular chain <a href="https://www.youtube.com/watch?v=bbU2ChdI4Ro">Jimmy John</a>’s saw a large traffic jump when their commercial aired.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7cG69JjtOh2qZDvorWbWrL/e3a78385048354c4f7af19d0819a7572/image12.png" />
            
            </figure>
    <div>
      <h3>Keeping Clean</h3>
      <a href="#keeping-clean">
        
      </a>
    </div>
    <p>Cleaning products (household and personal) were also the order of the day. First up, we have <a href="https://www.youtube.com/watch?v=vDHNMqOLw_o">Dr. Squatch</a> advertising their soap products for men.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1S6N0w49R76AT1d4g0mLSk/028acc55769cfe5cc386a2ba61d973eb/image22.png" />
            
            </figure><p><a href="https://www.youtube.com/watch?v=HoFib2o6Bi8">Microban24</a> makes hand sanitizer and got a jump from their commercial:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PYaR2o6ZhHrRZeof3wgxG/3c0a749dbbe71ef95e6e76c650ec63fd/image18.png" />
            
            </figure><p>But perhaps the biggest surprise in this category is <a href="https://www.youtube.com/watch?v=YvjuL6Bci6M">Tide</a>, which not only jumped up but stayed up throughout the game. Maybe it was the sight of all the sportswear on the field that was going to need cleaning:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9h2dCSbvf7aAUnMJOn5ks/55a79a9ff821c94f7a6b5b041d8013c6/image11.png" />
            
            </figure>
    <div>
      <h3>Highlights</h3>
      <a href="#highlights">
        
      </a>
    </div>
    <p>The folks at <a href="https://www.youtube.com/watch?v=rF6Jjm5547k">WeatherTech</a> showed their commercial more than once and hit over 20x baseline.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UVSeTKzrP03NIs8wQUcAb/b5c66b7bad8c651552d5da9c0fbb008d/image6-2.png" />
            
            </figure><p><a href="https://www.youtube.com/watch?v=EMgA-y2nRWE">Rocket Mortgage</a> got a lot of people thinking about mortgages well into the night:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1iI1Ufu0pXO5mEXmpZUNVH/b1e2a696b54ece0601d94ba598a24325/image8-1.png" />
            
            </figure><p>Financial services firm <a href="https://www.youtube.com/watch?v=GeLM3-J4BlU">Klarna</a> got a big jump as the game was wrapping up.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZwqmfFLY5UKdyoGh3RhGG/d65ef4bb4b8e6711f30378b7e9eebb6c/image21.png" />
            
            </figure><p>Throughout the game <a href="https://www.youtube.com/watch?v=LVuTCDB1iMc">Paramount+</a> was touted more than once. Another streaming service? Definitely looked interesting to many.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YisAXnNFbi5DB8nARMfd8/0f11d0a0ad8382aeb44a3e884c2f4fdc/image5-4.png" />
            
            </figure><p><a href="https://www.youtube.com/watch?v=dgu5ppBIr9A&amp;feature=emb_title">Skechers’</a> got people thinking about what they put on their feet throughout the first half of the game:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4c48k6MCy9wUVa5xCjo4xD/74efe099c593b66afc878edd7ebd37ba/sketchers-2.png" />
            
            </figure><p>And lastly, for this look at just some of the Super Bowl LV commercials, <a href="https://www.youtube.com/watch?v=XelsNvpibpQ">Fiverr</a> got the message out about about freelancing:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HiFMZvdFZvcJB61FEqW92/bfdbdf956b632109bb7b9bc21816ac3f/fiverr.png" />
            
            </figure><p>Which brings us to the all important question...</p>
    <div>
      <h3>So, who won Super Bowl LV?</h3>
      <a href="#so-who-won-super-bowl-lv">
        
      </a>
    </div>
    <p>Taking “highest commercial induced peak” as the measure then it’s <a href="https://www.youtube.com/watch?v=zN8naTqX3TI">Dexcom</a>. Dexcom makes wearable continuous glucose monitors for people with diabetes. They got a 100x boost.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3k6vHa8RF27Lw60piQLNrQ/f56bdb1e6fe4b1ceef0d83ec40ba1df5/Dexcom.png" />
            
            </figure><p>A close runner up is <a href="https://www.youtube.com/watch?v=_nwSmOEiDls">Inspiration4</a>, a privately funded trip into space where one seat is up for grabs via a lottery. Inspiration4 went from very little traffic to over 70x and continuous interest throughout.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CA7MnFPQiwfeIg9N28ku4/e926274375278f1ef9ee2b34ee83b7ad/image4-2.png" />
            
            </figure><p>Of course, this doesn’t tell the whole story. Inspiration4 had very little traffic prior to the game so the magnitude of the peak isn’t that surprising.</p><p>After a tough 2020 perhaps it’s not a surprise that a healthcare product and an inspirational project should “win” Super Bowl LV.</p><p>Of course, for brands that already get a lot of Internet traffic that spikes aren’t so high yet represent a great deal of traffic because the baseline is so much higher. Here’s online marketplace <a href="https://www.youtube.com/watch?v=6w_1gjbJEmA">Mercari</a> getting a 2x jump.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eLjIEV0cAatWLZjR0i56Y/5ed8f5477948c9f2bc8e459484d2272f/image1-5.png" />
            
            </figure><p>And businesses like Disney or Amazon have so much traffic that commercials might drive a small increase in overall traffic but it tends to get lost.</p>
    <div>
      <h3>One More Thing: Tom Brady</h3>
      <a href="#one-more-thing-tom-brady">
        
      </a>
    </div>
    <p>One person who didn’t advertise during the game but nevertheless got a bump in traffic to their website was Tom Brady. Brady’s fitness and nutrition brand TB12 saw traffic grow as the game ended and continued interest into the night.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4kvcT0P7fPgLRDMzDTZBZi/e15e2e90b3da9d4f495db2f8294d986e/image19.png" />
            
            </figure>
    <div>
      <h3>Want more?</h3>
      <a href="#want-more">
        
      </a>
    </div>
    <p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for up to date Internet traffic and attack trends.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Super Bowl]]></category>
            <guid isPermaLink="false">1nV2wF0CWRwcHnK4Rb0rg7</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>Kari Linder</dc:creator>
        </item>
        <item>
            <title><![CDATA[Uganda's January 13, 2021 Internet Shut Down]]></title>
            <link>https://blog.cloudflare.com/uganda-january-13-2021-internet-shut-down/</link>
            <pubDate>Fri, 15 Jan 2021 17:54:43 GMT</pubDate>
            <description><![CDATA[ Two days ago, through its communications regulator, Uganda's government ordered the "Suspension Of The Operation Of Internet Gateways" hours before the country's general election. This action was confirmed by several users and journalists who got access to the letter sent to Internet providers.  ]]></description>
            <content:encoded><![CDATA[ <p>Two days ago, through its communications regulator, Uganda's government ordered the "Suspension Of The Operation Of Internet Gateways" the day before the country's general election. This action was confirmed by several <a href="https://twitter.com/kyleville/status/1349455038310211590">users</a> and <a href="https://twitter.com/samirasawlani/status/1349425885485690886">journalists</a> who got access to the letter sent to Internet providers. In other words, the government effectively cut off Internet access from the population to the rest of the world.</p><blockquote><p>Ahead of tomorrow’s election the Internet has been shutdown in Uganda (confirmed by a few friends in Kampala).<br />Letter from communications commission below: <a href="https://t.co/tRpTIXTPcW">pic.twitter.com/tRpTIXTPcW</a></p>— Samira Sawlani (@samirasawlani) <a href="https://twitter.com/samirasawlani/status/1349425885485690886?ref_src=twsrc%5Etfw">January 13, 2021</a></blockquote> <p>On <a href="https://radar.cloudflare.com/ug">Cloudflare Radar</a>, we want to help anyone understand what happens on the Internet. We are continually monitoring our network and exposing insights, threats, and trends based on the aggregated data that we see.</p><p>Uganda's unusual traffic patterns quickly popped up in our charts. Our <a href="https://radar.cloudflare.com/ug">7-day change in Internet Traffic chart</a> in Uganda shows a clear drop to near zero starting around 1900 local time, when the providers received the letter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ej57n3qTRSrLSzqjjMOhs/7714b4a63f6c1e3e61acb8b96f52451f/unnamed.png" />
            
            </figure><p>This is also obvious in the Application-level Attacks chart.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1wIwHTpyxemVAHmaGbFWYM/4b721c0998c16d8299d355e814444c83/pasted-image-0.png" />
            
            </figure><p>The traffic drop was also confirmed by the Uganda Internet eXchange point, a place where <a href="https://uixp.co.ug/networks">many</a> providers exchange their data traffic, on their public <a href="https://portal.uixp.co.ug/public-statistics/public">statistics</a> page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/W31YhuWoNaL45rSecjJQu/ddc3a0e20bb9e12429d14dd47d6965f8/week-graph-uganda-jan-2021.png" />
            
            </figure><p>We keep an eye on traffic levels and BGP routing to our edge network, and are able to see which networks carry traffic to and from Uganda and their relative traffic levels. The cutoff is clear in those statistics also. Each colored line is a different network inside Uganda (such as ISPs, mobile providers, etc.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Idh4EVZQz3vBC8XIgUvII/f3e718501aa239b09f25a32a1f31037c/image3-7.png" />
            
            </figure><p>We will continue to keep an eye on traffic levels from Uganda and update the blog when we see significant changes. At the time of writing, Internet access appears to be still cut off.</p>
    <div>
      <h3>January 18 update</h3>
      <a href="#january-18-update">
        
      </a>
    </div>
    <p>We see that Uganda appears to have re-established its connections with the outside world around 1100 UTC and is back online. Traffic now appears to be at close to normal levels, but the BBC <a href="https://www.bbc.com/news/world-africa-55705404">reports</a> that social media is still blocked.</p><p>The shutdown and restart are both visible on <a href="https://radar.cloudflare.com/ug">Cloudflare Radar’s Uganda</a> page:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nUbPNPXVLhwSASteY0SKL/3c8ab3199e97562676a949068c7aba33/pasted-image-0-1.png" />
            
            </figure><p>And on the Uganda Internet <a href="https://portal.uixp.co.ug/public-statistics/public">eXchange</a> Point Public Traffic Statistics:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4BqApUceU8UYSPLeEtuj3z/3c994bc36bfe48036011d5be015abe5c/pasted-image-0--1-.png" />
            
            </figure><p>The shutdown lasted just under five days, from January 13, 1700 UTC to today.</p><p>We will continue to keep an eye on Uganda and update the blog if we see something worth reporting.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">6meZgTtUI6RglWoKl6uwIA</guid>
            <dc:creator>Celso Martinho</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Radar's 2020 Year In Review]]></title>
            <link>https://blog.cloudflare.com/cloudflare-radar-2020-year-in-review/</link>
            <pubDate>Tue, 12 Jan 2021 16:55:00 GMT</pubDate>
            <description><![CDATA[ Today we are launching a dedicated Year In Review page with interactive maps and charts where you can explore what changed on the Internet in 2020. Year In Review is part of Cloudflare Radar.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Throughout 2020, we tracked changing Internet trends as the SARS-Cov-2 pandemic forced us all to change the way we were living, working, exercising and learning. In early April, we created a dedicated website <a href="https://builtforthis.net/">https://builtforthis.net/</a> that showed some of the ways in which Internet use had changed, suddenly, because of the crisis.</p><p>On that website, we showed how traffic patterns had changed; for example, where people accessed the Internet from, how usage had jumped up dramatically, and how Internet attacks continued unabated and ultimately increased.</p><p>Today we are launching a dedicated Year In Review page with interactive maps and charts you can use to explore what changed on the Internet in 2020. <a href="https://radar.cloudflare.com/year-in-review">Year In Review</a> is part of <a href="https://radar.cloudflare.com">Cloudflare Radar</a>. We launched <a href="/introducing-cloudflare-radar/">Radar</a> in September 2020 to give anyone access to Internet use and abuse trends that Cloudflare normally had reserved only for employees.</p>
    <div>
      <h3>Where people accessed the Internet</h3>
      <a href="#where-people-accessed-the-internet">
        
      </a>
    </div>
    <p>To get a sense for the Year In Review, let’s zoom in on London (you can do the same with any city from a long list of locations that we’ve analyzed). Here’s a map showing the change in Internet use comparing April (post-lockdown) and February (pre-lockdown). This map compares working hours Internet use on a weekday between those two months.</p><p>As you can clearly see, with offices closed in central London (and elsewhere), Internet use dropped (the blue colour) while usage increased in largely residential areas. Looking out to the west of London, a blue area near Windsor shows how Internet usage dropped at London’s Heathrow airport and surrounding areas.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WuruCfSUuHFyut0Wb0jNF/ba3dbea82e129a9135c0febbb524c5d6/image4-4.png" />
            
            </figure><p>A similar story plays out slightly later in the San Francisco Bay Area.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RuAY8WQ9FKR0sLQB4WyjZ/bf46279dbe7b6a5a43683e84e9c4d03b/image5-2.png" />
            
            </figure><p>But that trend reverses in July, with an increase in Internet use in many places that saw a rapid decrease in April.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1s0iSyhSDYUjlFvBLrEsLs/6dfacdf592bf13576533acb0a1d9d89f/image6-1.png" />
            
            </figure><p>When you select a city from the map, a second chart shows the overall trend in Internet use for the country in which that city is located. For example, here’s the chart for the United States. The Y-axis shows the percentage change in Internet traffic compared to the start of the year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YVJpi8TMP6bQlGfcveLaW/00994ebc13a827183e1838903cb801f6/image1-5.png" />
            
            </figure><p>Internet use really took off in March (when the lockdowns began) and rapidly increased to 40% higher than the start of the year. And usage has pretty much stayed there for all of 2020: that’s the new normal.</p><p>Here’s what happened in France (when selecting Paris) on the map view.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NuTiPwa6w6t8GBTvzge7P/249e54ca23f30a9627532854ec6fed24/image9.png" />
            
            </figure><p>Internet use was flat until the lockdowns began. At that point, it took off and grew close to 40% over the beginning of the year. But there’s a visible slow down during the summer months, with Internet use up “only” 20% over the start of the year. Usage picked up again at “la rentrée” in September, with a new normal of about 30% growth in 2020.</p>
    <div>
      <h3>What people did on the Internet</h3>
      <a href="#what-people-did-on-the-internet">
        
      </a>
    </div>
    <p>Returning to London, we can zoom into what people did on the Internet as the lockdowns began. The UK government announced a lockdown on March 23. On that day, the mixture of Internet use looked like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3P9rfGgpXVJMPRP0ga2GT3/af5631e720dbd1009cf5339fc9208b45/image3-5.png" />
            
            </figure><p>A few days later, the E-commerce category had jumped from 12.9% to 15.1% as people shopped online for groceries, clothing, webcams, school supplies, and more. Travel dropped from 1.5% of traffic to 1.1% (a decline of 30%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HToWTD64HITFOEO3u6FaD/f02389ae489d0757172cf2dceb6de667/image8-1.png" />
            
            </figure><p>And then by early mid-April E-commerce had increased to 16.2% of traffic with Travel remaining low.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2saIHswxGoDg0VIwJEFS5I/efe3223903065cc649978c9e789a6674/image7-1.png" />
            
            </figure><p>But not all the trends are pandemic-related. One question is: to what extent is Black Friday (November 27, 2020) an event outside the US? We can answer that by moving the London slider to late November and look at the change in E-commerce. Watch carefully as E-commerce traffic grows towards Black Friday and actually peaks at 21.8% of traffic on Saturday, November 28.</p><div></div><p>As Christmas approached, E-commerce dropped off, but another category became very important: Entertainment. Notice how it peaked on Christmas Eve, as Britons, no doubt, turned to entertainment online during a locked-down Christmas.</p><br />
    <div>
      <h3>And Hacking 2020</h3>
      <a href="#and-hacking-2020">
        
      </a>
    </div>
    <p>Of course, a pandemic didn’t mean that hacking activity decreased. Throughout 2020 and across the world, hackers continued to run their tools to attack websites, overwhelm APIs, and try to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vzwrP43hGLd0xf6JBCln4/4663e37fb6476578bc36de7c32c3f3ea/image2-2.png" />
            
            </figure>
    <div>
      <h3>Explore More</h3>
      <a href="#explore-more">
        
      </a>
    </div>
    <p>To explore data for 2020, you can check out Cloudflare Radar’s <a href="https://radar.cloudflare.com/year-in-review">Year In Review</a> page. To go deep into any specific country with up-to-date data about current trends, start at Cloudflare Radar’s <a href="https://radar.cloudflare.com">homepage</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">2Z5rCw34UpaxEOUGAJcLLS</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[Internet traffic disruption caused by the Christmas Day bombing in Nashville]]></title>
            <link>https://blog.cloudflare.com/internet-traffic-disruption-caused-by-the-christmas-day-bombing-in-nashville/</link>
            <pubDate>Wed, 06 Jan 2021 17:05:44 GMT</pubDate>
            <description><![CDATA[ On Christmas Day 2020, an apparent suicide bomb exploded in Nashville, TN. The explosion happened outside an AT&T network building on Second Avenue in Nashville at 1230 UTC. ]]></description>
            <content:encoded><![CDATA[ <p>On December 25th, 2020, <a href="https://en.wikipedia.org/wiki/2020_Nashville_bombing">an apparent suicide bomb exploded</a> in Nashville, TN. The explosion happened outside an AT&amp;T network building on Second Avenue in Nashville at 1230 UTC. Damage to the AT&amp;T building and its <a href="https://www.nytimes.com/2020/12/29/us/nashville-bombing-telecommunications.html">power supply and generators</a> quickly caused an outage for telephone and Internet service for local people. These outages continued for two days.</p><p>Looking at traffic flow data for AT&amp;T in the Nashville area to Cloudflare we can see that services continued operating (on battery power according to reports) for over five hours after the explosion, but at 1748 UTC we saw a dramatic drop in traffic. 1748 UTC is close to noon in Nashville when reports indicate that people lost phone and Internet service.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rNd3EMvdXKVZTrfPHk07K/2da4698a507f6a956ce487ee1b1344b7/Screenshot-2021-01-06-at-09.37.36.png" />
            
            </figure><p>We saw traffic from Nashville via AT&amp;T start to recover over a 45 minute period on December 27 at 1822 UTC making the total outage 2 days and 34 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DVUF734G1jYEU2v8huXNc/f1ccf9683efd225ac5487989dc948558/image1.png" />
            
            </figure><p>Traffic flows continue to be normal and no further disruption has been seen.</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Internet Performance]]></category>
            <guid isPermaLink="false">2ls7rv27giPHsdSitmaYVH</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[The truth about Black Friday and Cyber Monday]]></title>
            <link>https://blog.cloudflare.com/the-truth-about-black-friday-and-cyber-monday/</link>
            <pubDate>Tue, 11 Dec 2018 10:50:44 GMT</pubDate>
            <description><![CDATA[ Something we all see and hear a lot about at this time of year are Black Friday (23 November this year) and Cyber Monday (26 November) - but just how important are these days on the Internet? ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare we handle a lot of traffic on behalf of our customers. Something we all see and hear a lot about at this time of year are Black Friday (23 November this year) and Cyber Monday (26 November) - but just how important are these days on the Internet?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2CdCcJWms9KfhkHVoS8obS/938d6625acf464be16dd9b5e7692f685/15894285291_b73d2af904_k-2.jpg" />
            
            </figure><p>Black Friday by <a href="https://www.flickr.com/photos/perolofforsberg/">Per-Olof Forsberg</a>, license: <a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a></p><p>To try and answer this question, we took a look at anonymised samples of HTTP requests crossing our network. First of all, let’s look at total page views from across our global network from the last few weeks and see if we can spot Black Friday and Cyber Monday:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FhmseKPIpDhYFvNE0fqOn/cfa7beda1f5fde5b49d4c760d8497f13/all_page_views_black_friday_cyber_monday_utc-1.png" />
            
            </figure><p>All page views</p><p>So this is total page views by day (UTC) from November 19 (a week before Cyber Monday) until Monday December 3. Other than follow-the-sun fluctuations in a repeating daily pattern, each whole day is pretty similar in shape and size compared to the last. Black Friday and Cyber Monday aren’t visible in overall traffic patterns.</p>
    <div>
      <h2>Get specific</h2>
      <a href="#get-specific">
        
      </a>
    </div>
    <p>We have a very diverse set of customers across <a href="https://www.cloudflare.com/products/registrar/">12 million domain names</a> and not all of them are selling products or doing so directly online. To identify those websites that are, I used metadata from the wonderful <a href="https://httparchive.org/">HTTP Archive</a> project to export a list of domains using Cloudflare that were also running ecommerce software.</p><p>Here are the page views for these ecommerce sites over the same time period:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6En6Ly7MNHWzu5zhvLHNzr/763c7a846c0dbc998396b91810a3d070/ecommerce_page_views_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Ecommerce page views</p><p>So we can see clearly that our <a href="https://www.cloudflare.com/ecommerce/">ecommerce customers</a> are seeing a big increase in page views on November 23 and 26. Black Friday and Cyber Monday are most certainly a thing. This year Black Friday was quite a bit busier than Cyber Monday - around 22% busier in terms of page views. If we compare the page views of each day to the week prior, we can see the changes clearly:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xC7tSp6bWyMWTNXa4C4MI/9bceb6fa2bc3f6d2391b92b73f5d290e/page_views_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% page view change vs previous week</p><p>The uplift starts on Wednesday but really kicks in during Thanksgiving with an increase of more than 100% on Black Friday.</p>
    <div>
      <h2>Browsing vs Buying</h2>
      <a href="#browsing-vs-buying">
        
      </a>
    </div>
    <p>So we’ve established that these shopping days are important in terms of visitor activity. More pages are being viewed on these days - but is anyone buying anything?</p><p>We’re dealing with trillions of requests across a really large data set of different websites without any specific knowledge of what a purchase transaction would look like for each - so to approximate this I took a crude approach, which is to look for successful checkout interactions in the data. If you imagine a typical ecommerce application makes a purchase with a HTTP request like “POST /store/checkout HTTP/1.1” we can look for requests similar to this to understand the activity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/e14XnD1aGOZXbdleVqdo2/95ae4b72b586605876078a33a53cba25/checkout_interaction_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% of checkout interactions vs prior week</p><p>We can see here that Black Friday has an almost 200% increase in checkout interactions compared to the previous Friday.</p><p>Using this raw number of checkout interactions to compare with the page views we have something approximating a conversion %. This is not a true conversion figure - calculating a true conversion figure would require data that identifies individuals and detailed action tracking for each website. What we have is the total number of page views (HTTP requests that return HTML successfully) compared to the total number of POST requests to a checkout. This gives us a baseline to compare changes in “conversion” over these big November shopping days:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52Mr9YjKoGVvdq2pavrx6A/a48394c8bcb8ce02bed6505677eb881a/checkout_interaction_as_percentage_of_page_views_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% of checkout interactions / page views vs prior week</p><p>Each bar on this chart represents the % change in checkout interactions as a proportion of page views compared to the same day the previous week. We can see this increased by 45% on Black Friday compared to the Friday before (boring old beige Friday November 16). The following Saturday was booming at 60% - because we’re dealing with time in UTC, a UTC Saturday actually includes Black Friday traffic for some parts of the world, the same can be said of Tuesday which contains overlap from Cyber Monday - we’ll break this down a bit later.</p><p>On Cyber Monday, the increase actually beats Black Friday, meaning page views lead to cart interactions 57% more often than the prior Monday (boring old vanilla Monday November 19), albeit from a lower number of transactions.</p>
    <div>
      <h2>What devices are people buying on?</h2>
      <a href="#what-devices-are-people-buying-on">
        
      </a>
    </div>
    <p>What we see here is just how much more browsing people do on mobiles today vs desktop, with mobile winning most days:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SXxZ4SEd2S8TIoAANXeNg/99a1fe2e2ec68a1e5e99debeede1694f/page_views_by_device_type_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Page Views by Device Type</p><p>When it comes to checkout interactions though, we can see the situation is switched with visitors more likely to interact with the checkout on a desktop overall, but even more so on Black Friday (14% more likely) and Cyber Monday (20% more likely).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AT2Ig9vnQWZwgnoRt9iHx/1548111f5f18ebfdb37595c3240513c9/checkout_interaction_by_device_type_as_percentage_of_page_views_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Checkout Interaction as % of Page Views</p><p>Let’s look at a specific region to understand more, starting with the US:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MNHlkz9LG0NHrjides5bB/e904a148d6e36b5d4ddf6be3d1faa15c/usa_black_friday_cyber_monday_page_views_pst.png" />
            
            </figure><p>USA Page Views (PST)</p><p>We can see a more normal weekday pattern on the prior Thursday &amp; Friday (15 &amp; 16 Nov) whereby desktop page views eclipse mobile during the daytime while people are at their desks. In the evenings and weekends, mobile takes over. What we see from the 21st onward is evidence of people taking time off work and doing more with their mobile devices. Even on Thanksgiving, there is still a big rise in activity as people start gearing up for Friday’s deals or finding ways to avoid political discussion with relatives at home!</p><p>On Cyber Monday, traffic earlier in the day is lower as people return to work, however we are seeing heavy use of desktop devices. As the working day ends, mobile once again dominates. Things begin to settle back into a more regular pattern from Tuesday November 27 onwards.</p><p>Let's take a look at checkout interaction over the Black Friday to Cyber Monday weekend by device type.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/240tKTStoBAVPrvsNPI6ct/5431367a6989f0d836cdacce7821fbd7/usa_black_friday_cyber_monday_checkout_interaction_percentage_by_device_type_pst.png" />
            
            </figure><p>USA Checkout Interaction % (PST)</p><p>Despite all of that mobile browsing activity, desktop devices are more commonly used for checkout actions. People seem to browse more on mobile, committing to buy more often with desktop, it may also just be that mobile users have more distractions both on the device and in the real world and are therefore less likely to complete a purchase. From personal experience, I also think the poor <a href="https://www.cloudflare.com/performance/accelerate-mobile-experiences/">mobile optimisation</a> of some sites’ checkout flows make desktop preferrable - and when customers are incentivised with discounts &amp; deals, they are more likely to switch devices to complete a transaction if they hit an issue.</p>
    <div>
      <h2>Is Black Friday / Cyber Monday international?</h2>
      <a href="#is-black-friday-cyber-monday-international">
        
      </a>
    </div>
    <p>It might be obvious if you’re reading this from the UK, but despite the fact that Thanksgiving is not a holiday here, <a href="https://www.cloudflare.com/retail/">retailers</a> have very much picked up the mantle from US retailers and seized the opportunity to drive sales over this weekend.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10DVGES8qxwWCJRpLktybt/a53651260d0f3748bb89fd7de9f9c485/uk_black_friday_cyber_monday_page_views_utc.png" />
            
            </figure><p>UK Page Views (UTC)</p><p>Page views to ecommerce websites on Cloudflare look very similar in shape to the US on Black Friday. However, mobile is more dominant in the UK, even during working hours. It’s worth noting one big difference here - Cyber Monday in the UK was only 22% up in terms of page views compared to the prior Monday - in the US the increase was more than 4x that.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uX8Wt5UWFDEYLhEXJ1Htm/fd5253c0919f8aea3805d46c6476c00c/uk_checkout_interaction_as_percentage_of_page_views_utc.png" />
            
            </figure><p>UK Checkout Interaction as % of Page Views</p><p>When it comes to checkout, it also looks like UK visitors to ecommerce sites commit more with their mobile, but desktop is still more likely to lead to more conversion.</p><p>Taking Germany as another example, here’s how page views look:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18g6BZETsanoJr838h9A3J/05e2cef6eeff99b29eca64ca69e00ade/germany_black_friday_cyber_monday_page_views_cet.png" />
            
            </figure><p>Germany Page Views (CET)</p><p>Desktop use during typical working hours is much more pronounced in Germany. Black Friday and Cyber Monday show higher page views than a normal Friday / Monday but the difference is much smaller than regions such as the US &amp; UK.</p>
    <div>
      <h2>Conclusions</h2>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Black Friday is spreading internationally despite these still being normal working days for the rest of the world. Cyber Monday is also increasing ecommerce activity internationally but tends to be quieter than Black Friday. Overall, mobile browsing eclipses desktop, but those desktop page views tend to lead to checkout more often.</p><p>Retailers should continue to invest in making their mobile &amp; desktop ecommerce experiences fast &amp; resilient to seize on these key days.</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Holidays]]></category>
            <category><![CDATA[eCommerce]]></category>
            <category><![CDATA[Mobile]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Germany]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">1F38cCJdX8Omxx2IftVfwD</guid>
            <dc:creator>Simon Moore</dc:creator>
        </item>
        <item>
            <title><![CDATA[African traffic growth and predictions for the future]]></title>
            <link>https://blog.cloudflare.com/african-traffic-growth-and-predictions-for-the-future/</link>
            <pubDate>Sun, 19 Aug 2018 17:00:00 GMT</pubDate>
            <description><![CDATA[ Looking back at our historical data, we realized how much the Internet and Cloudflare grew. With more than 150 data centers, 10 percent of web-based applications, customers everywhere around the world, from the tiny islands in the Pacific to the big metropolises. ]]></description>
            <content:encoded><![CDATA[ <p>Looking back at our historical data, we realized how much the Internet and Cloudflare grew. With more than 150 datacenters, 10 percent of web-based applications, customers everywhere around the world, from the tiny islands in the Pacific to the big metropolises, we have an Internet landscape of almost every country and continent.</p><p>Cloudflare’s mission is to help build a better Internet. To do that we operate datacenters across the globe. By having datacenters close to end user we provide a fast, secure experience for everyone. Today I’d like to talk about our datacenters in Africa and our plans to serve a population of 1.2 billion people over 58 countries.</p><p>Internet penetration in developed countries skyrocketed since the 2000s, Internet usage is growing rapidly across Africa. We are seeing a 4% to 7% increase in traffic month on month. As of July 2018, we have 8 datacenters on the African Continent:</p><ul><li><p><a href="/amsterdam-to-zhuzhou-cloudflare-global-network/">Angola</a></p></li><li><p><a href="/curacao-and-djibouti/">Djibouti</a></p></li><li><p><a href="/cairo/">Egypt</a></p></li><li><p><a href="/mombasa-kenya-cloudflares-43rd-data-center/">Kenya</a></p></li><li><p><a href="/durban-and-port-louis/">Mauritius</a></p></li><li><p>Three in <a href="/cape-town-south-africa/">South Africa</a></p></li></ul><p>While we see changes on the horizon, the majority of Internet content providers are located in North America and Western Europe. This means that only the billion people living in those areas close to the content they are trying to reach. When it comes to Africa, submarine cables will usually bring back the packets to Europe to hubs like Marseille, Paris, London, Lisbon and sometimes Frankfurt or Amsterdam, adding precious milliseconds, slowing down communications.</p><p>By setting up datacenters on the African continent, Cloudflare is able to serve content locally, increasing download speed in the region, improving the end-user experience, and ultimately increasing Internet usage.</p>
    <div>
      <h3>Growth of a continent</h3>
      <a href="#growth-of-a-continent">
        
      </a>
    </div>
    <p>We wondered if the Internet usage increased when we set-up a datacenter in a region which was previously not well served.</p><p>It was surprising to see a fast growth in the following months in each of the countries we turn on our equipment. We took into account bandwidth and also quantity of information exchanged. The increase in bandwidth usually leads to an increase in usage.</p>
    <div>
      <h4>Why is bandwidth increasing with lower latency?</h4>
      <a href="#why-is-bandwidth-increasing-with-lower-latency">
        
      </a>
    </div>
    <p>Bandwidth is the maximum rate information can be transferred over a link. The interpretation of maximum depends on the type of transmission.</p><p>The explanation why the rate is dependent on latency comes from the TCP protocol specification on which run most of the web applications. Every transmission ends with an acknowledgement, to determine if the data was correctly received. The next transmission will begin after the sender receives the acknowledgement. This means while the acknowledgement is transmitting, nothing is actually being received. The difference of data received over time is the transfer rate.</p><p>This is summarized in the following diagram:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ciNQ7m8gZojOdxqjY06qQ/ed567ec2fe56af7147defcbd446cebff/rtt-explained-01.png" />
            
            </figure><p>With the most common algorithms, the amount of data sent before an acknowledgment increases until an error appears. Any link will drop packets: whether there is a transmission issue (wireless and perturbations) or a processing issue (router dropping packets to reduce load). This contributes never reaching the maximum bandwidth of a link. This is why above 80 milliseconds latency, performances start to worsen drastically. Coast to coast in the USA is around 70 milliseconds. Paris to London is 10 milliseconds. <a href="https://en.wikipedia.org/wiki/Performance-enhancing_proxy#Split_TCP">Satellites connections implement proxies</a> to allow sustainable throughput despite 600 milliseconds round-time-trip.</p>
    <div>
      <h4>Why is the amount of requests increasing with higher bandwidth?</h4>
      <a href="#why-is-the-amount-of-requests-increasing-with-higher-bandwidth">
        
      </a>
    </div>
    <p>The explanation is behavioral. If an Internet connection is slow and frustrating, chances are we will use it only if we are forced to. While getting access to the content immediately, people are likely to fetch more content and click on links.</p><p>The following chart shows the growth of requests from a country after every datacenter turn up. Traffic is normalized on the latest value (July 2018).</p><p>Djibouti shows the biggest increase in traffic after the launch.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VIwrGIHlRyRbaCXrbgRY4/d846c2b08f39785675c83b173be10dd9/download--34-.png" />
            
            </figure><p>For the rest of the continent, we are seeing a steady increase in delivered traffic over the last four years.</p><p>Overall, Sierra Leone is the country which grew the most at around 8% per month. At the opposite scale, Algeria only increased its traffic by 2% per month. The mean of all those countries is 6.2% per month, which is also the Internet traffic growth of South Africa.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6tFISugklVl4XNn6Saog16/8909fb565dbb7f6863e5d064d07a8488/download.png" />
            
            </figure><p>In comparison to Europe, North America, it will take, at the current rate, 4 years and 3 months for Africa to reach today’s traffic levels of those two continents. However, if Europe, North America keeps its current 4% growth rate, then the African continent will take approximately eight to twelve years to catch up.</p><p>Please note these estimations are not perfectly representative as Cloudflare only see a part of the Internet and the numbers also includes our growing base of customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2u37hoQ0UYOzqaGypdLXiI/4a713967a0ea8503559006ee923bb5d7/download--1--copy.png" />
            
            </figure><p>The units on the vertical axis represent the growth based on the initial ratio between Europe/USA/Canada and Africa.</p>
    <div>
      <h3>Latencies and inter-African routing</h3>
      <a href="#latencies-and-inter-african-routing">
        
      </a>
    </div>
    <p>We analyzed the latencies between Europe and African IP addresses that hit our edge. On the following Demer map from <a href="https://twitter.com/vastur">Vasco Asturiano</a>, the area of the country is exponentially proportional to the response time in milliseconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/rp3vLWEat239h6Mr9h9E1/77fb6f190611655933d05b53e08dd10e/quadratic-3-01.png" />
            
            </figure><p>All the coastal Africa is well connected with submarines cables. The only exception is Eritrea, where the main provider (EriTel) which uses <a href="https://bgp.he.net/AS30987#_peers">two satellite providers</a> for its outbound links.</p><p>The island of <a href="https://en.wikipedia.org/wiki/Saint_Helena">Saint Helena</a> is on the path of the future <a href="https://en.wikipedia.org/wiki/SAex">SAex cable</a>, but the only connection at the moment for its 5000 inhabitants is through satellite, causing a latency of 600ms.Central African Republic also uses satellite or connections through Cameroon.</p><p>On average a packet round trip from Northern Africa to Europe will take around 50-100ms while a round trip from the South will take 250ms.</p><p>Regarding inter-African routing, Africa has only a limited number of cities where interconnection happens successfully: Johannesburg in South Africa, Nairobi in Kenya, and Djibouti with datacenters and internet exchange points. The rest of the continent is mostly split between providers which will interconnect in Europe or Asia. Chances are, a user in Cameroon talking to a user in Ghana will likely go through Paris.</p><p>Using RIPE Atlas, we are able to show inter-provider routing usually happens in Europe. Only one traceroute showed packets being exchanged in South Africa.</p><p>Traceroute to two Ghana Atlas probes from other Atlas Probes</p><p>To Ghana only via Europe</p><p>To Ghana with one through South Africa</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YaiQ67eE243NRqGLV00nU/6a7bf5e7965daef78e5f4375e1b15713/Screen-Shot-2018-07-27-at-2.56.37-PM.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bxQ2OFyFziSF6Jl4q8iVY/591cef69dd65c7e6ee33ebf54157fc35/Screen-Shot-2018-07-27-at-2.58.50-PM.png" />
            
            </figure><p>Cloudflare and many network operators are using extensively RIPE Atlas to determine performance and troubleshoot issues. If you want to help us improve Internet quality in Africa, become a <a href="https://atlas.ripe.net/get-involved/become-a-host/">probe host here</a>.</p><p>What you may be wondering is: what are the countries in Europe that route the African traffic? We are using an anycast network ; when a user fetch a website on Cloudflare, the packets will take the shortest path seen by the router to reach its destination. In telecommunications, the shortest path does necessarily mean geographical proximity. The selection metric of a path usually involve cost and performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wwTGcYdBEqmvmFeYow5dt/f3622ad794411413071b1ad34b5390bc/closest-routing-3-01.png" />
            
            </figure><p>An anycast address will have the same metric everywhere on our side. This mean a service provider having links to London and Paris will see our IP addresses originating from London datacenter and Paris datacenter. The choice between the two will only be depending on metrics set by the provider: will it cost more to reach London?</p><p>Cloudflare has a significant number of points of presence to be able to show small metric differences. Due to the density of its network in Europe, it is common to have datacenters one hop away from each others (London and Paris, Paris and Amsterdam). Our analysis of the next-hop will show a provider’s preference.</p><p>In the case of Africa, a provider can rent capacity on submarine cable to a city, for instance Lisbon, Paris, London. Ideally, the provider wants to maximize the resources it can obtain without adding more hops (costlier).</p><p>Paris, London, Amsterdam and Frankfurt have a lot of content providers and interconnections options, the differences are going to be on the content. One major bias will be the language: France will have more francophone content hosted in Parisian datacenters, it also helps running operations to if both parties speak French.</p><p>As an example case: if Paris is chosen, for the content that can only be found in London, another provider will carry the packets to London from Paris, adding one hop to the path, reducing preference. We will see the landing point in Paris.</p><p>Why isn’t the provider getting a link to London? On thing to know is any Internet link has a flat rate price plus a variable rate based on consumption.</p><p>Bandwidth within major European cities is among the cheapest in the world. The flat rate for submarine capacity is high, as a result, the quantity of content that is available from London for cheaper than Paris has to make up the difference.</p><p>If you are interested to know more about the costs of bandwidth around the world, check out this <a href="/bandwidth-costs-around-the-world/">article</a> by Nitin Rao.</p><p>The following map represents the most common Cloudflare datacenter reached for each country. The countries filled with color are where Cloudflare datacenters are. The border color indicates the destination country.</p><p>As aforementioned, we can notice most of the French-speaking countries will tend to go towards our datacenter in Paris. South Africa remains well connected with its neighbors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SfdVHYvFBqpNVqYZ3F6QW/035de0673a98e5dd4e35a17969d7c60f/netmap-future-01-02.png" />
            
            </figure>
    <div>
      <h3>Where is the content hosted?</h3>
      <a href="#where-is-the-content-hosted">
        
      </a>
    </div>
    <p>Previously, we mentioned there are some content providers in South Africa and Djibouti. We took a look at the popular news and banking websites.</p><p>Over the top 200 origins of the websites (Alexa ranking) for African countries in 2017, only 42 were attached to an African country and only 10 among those were serving non-education/government content (news websites, banks).They were located mostly in South Africa and Zimbabwe.</p><p>We also took a look at our 10 millions zones behind Cloudflare. The ones that are using Afrinic IPs are hosted in the following countries:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gh1DPSs6B9fTN7JfklFtP/f6f0bba7751fe345015e6e7be32dacf4/Where-are-Afrinic-IPs-used-for-content-hosted-_.png" />
            
            </figure>
    <div>
      <h3>What about IPv6?</h3>
      <a href="#what-about-ipv6">
        
      </a>
    </div>
    <p>Only four countries out of sixty four are using IPv6 in a measurable way. Egypt (1%), Kenya (2%), Gabon (2%) and Zimbabwe (9%). In each of these countries we found that only one provider that deployed IPv6 at any significant scale. Since the beginning of the year, IPv6 usage in Egypt has doubled. In Gabon, a major provider rolled IPv6 at the end of December 2017.</p><p>As Mathieu Paonessa from <a href="https://www.gva.africa">Group Vivendi Afrique</a> told us, “Gabon went from 0% to 2% IPv6 in only 9 months, following the opening of our CanalBox Gabon FTTH service.”</p><p>The timeline is similar with a small ISP in Kenya and has been increasing steadily. We can maybe hope they double their IPv6 usage by the end of 2018.</p><p>Compared to the rest of the world, Belgium is still ahead with 37%, followed by India at 35%. Most European countries are above 10%. USA is 22% and Canada is 15%.</p><p>One explanation for the small number of deployments is the size of the remaining IPv4 pool of addresses.</p><p>As of July 2018, there were 36,245 /24 available (approximately 9.2 millions IPs). The total Afrinic size is 6 /8 (approximately 100 millions IPs). 9% are left.</p><p>The following graphs shows the allocations and usage of each /24 in the Afrinic allocations.</p><p>This is the Hilbert graph of <a href="https://www.afrinic.net/en/services/statistics/ipv4-exhaustion">Afrinic IPv4 exhaustion</a>. It was inspired by <a href="https://blog.benjojo.co.uk/post/scan-ping-the-internet-hilbert-curve">Ben Cartwright-Cox’s blog post</a> and used <a href="https://github.com/robertdavidgraham/masscan">masscan</a> and <a href="https://github.com/measurement-factory/ipv4-heatmap">ipv4-heatmap</a>.</p><p>Prefix</p><p>Announced (yellow) vs Available (green) vs Reserved (red)</p><p>Response to ICMP (blue = low reply, red = all reply)</p><p>41.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RmAbftnAhUS7Mkc2LdJc5/2867ce9df1d1f6858ad384f658e1b593/map41-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lTX5rXx3Lzthnk8MN0vv5/a4253031f10ce0e955208574ff728afa/map41.png" />
            
            </figure><p>102.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qn1py5OClbadrNJ9zuEHF/2dd4153354b7593f90177848fa267a86/map102-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zw4wHCAQVSufm1HZ0VSJl/0ef86e9ffd79ab50249a13a045efc1dc/map102.png" />
            
            </figure><p>105.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tDy8t1ylwXWbIzfFyKbhT/20632f4194c652f9aab5fcfee0f7b650/map105-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N3f0eGuSJxzhStBg7vcoI/5b45cf0cd1362b747518361ebe5c405a/map105.png" />
            
            </figure><p>154.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eOQcOyGR64yPlkzdvv4uW/072a870d72befee3b8c0f65f23f805ad/map154-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wnzCiX7ZaIVTaPcRVnCvB/cdd9480357bc2570af9486ef327ff1e4/map154.png" />
            
            </figure><p>196.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YJf8gZQ6GztPd1gOoJf42/b4e28952b1a126a89490db832b091156/map196-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZaKdYdPaUcApijNKYIML/7966e4adbc26e47dcddb568d5edfbcdd/map196.png" />
            
            </figure><p>197.0.0.0/8</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5r15KVHHw01taG7bS1jJhV/9877114d17894a412f0034dbee05fff3/map197-bgp.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hojDXIusm5n3P93CdSnUN/6714b46930f34c2144c6ecedeaf4087b/map197.png" />
            
            </figure><p>We notice that even if allocated, some blocks remain dark. 102.0.0.0/8 remains the range with the most IP space left in the world.</p>
    <div>
      <h3>More deployments coming soon</h3>
      <a href="#more-deployments-coming-soon">
        
      </a>
    </div>
    <p>Africa is the largest continent on earth, yet it is very lagging behind on Internet connectivity and traffic levels. Historically it's been entirely relying on its European interconnections. However we predict that its traffic will outgrow EU and US by 2027. This will be enabled by the fast deployment of local content, IPv6, and alternative submarine cables.</p><p>We are working on deploying even more points of presence in Africa and increasing our current capacity in the existing ones. Fifteen new locations in the African continent are part of our global expansion plans. These include: Algeria (Algiers), Cameroon (Yaoundé), Congo (Kinshasa), Côte d’Ivoire (Abidjan), Egypt (Alexandria), Ghana (Accra), Kenya (Nairobi), La Réunion (Sainte-Marie), Madagascar (Antananarivo), Morocco (Casablanca), Nigeria (Lagos), Tanzania (Dar es Salaam), Tunisia (Tunis), Uganda (Kampala), and Zimbabwe (Harare)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OFs5KlBhxHz98W558L6nv/07bf1d99b7457379ccaeb37f3dca8480/netmap-future-01-03.png" />
            
            </figure><p><i>Header image </i><a href="https://www.flickr.com/photos/south-african-tourism/2418525776/in/photostream/"><i>source</i></a></p> ]]></content:encoded>
            <category><![CDATA[Africa]]></category>
            <category><![CDATA[South Africa]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Fun]]></category>
            <guid isPermaLink="false">4Ii5SgXYvasO1QOA7m31Vz</guid>
            <dc:creator>Louis Poinsignon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Rate Limiting: Live Demo]]></title>
            <link>https://blog.cloudflare.com/traffic-control-live-demo/</link>
            <pubDate>Fri, 30 Sep 2016 19:56:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare helps customers control their own traffic at the edge. One of two products that we introduced to empower customers to do so is Cloudflare Rate Limiting. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare helps customers control their own traffic at the edge. One of two <a href="/cloudflare-traffic/">products that we introduced</a> to empower customers to do so is <a href="https://www.cloudflare.com/traffic-control/">Cloudflare Rate Limiting</a>*.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NtFQrwczwJFS6c5ko0bUk/08f0544ed11c6d802aa08ad234d79a71/speed-limit-10.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/brhefele/6553028503/">image</a> by <a href="https://www.flickr.com/photos/brhefele/">Brian Hefele</a></p><p>Rate Limiting allows a customer to rate limit, shape or block traffic based on the rate of requests per client IP address, cookie, authentication token, or other attributes of the request. Traffic can be controlled on a per-URI (with wildcards for greater flexibility) basis giving pinpoint control over a website, application, or API.</p><p>Cloudflare has been <a href="https://en.wikipedia.org/wiki/Eating_your_own_dog_food">dogfooding</a> Rate Limiting to add more granular controls against Layer 7 DOS and brute-force attacks. For example, we've experienced attacks on cloudflare.com from more than 4,000 IP addresses sending 600,000+ requests in 5 minutes to the same URL but with random parameters. These types of attacks send large volumes of HTTP requests intended to bring down our site or to crack login passwords.</p><p>Rate Limiting protects websites and APIs from similar types of bad traffic. By leveraging our massive network, we are able to process and enforce rate limiting near the client, shielding the customer's application from unnecessary load.</p><p>To make this more concrete, let's look at a live demonstration rule for cloudflare.com. Multiple rules may be used and combined to great effect -- this is just a limited example.</p><p>Read on, and then test it yourself.</p>
    <div>
      <h3>Creating the rule</h3>
      <a href="#creating-the-rule">
        
      </a>
    </div>
    <p>Imagine an endpoint that is resource intensive. To maintain availability, we want to protect it from high-volume request rates - like those from an aggressive bot or attacker.</p><p><b>URL</b> <code>*.cloudflare.com/rate-limit-test</code></p><p>Rate Limiting allows for * wildcards to give more flexibility. An API with multiple endpoints might use a pattern of <code>api.example.com/v2/*</code></p><p>With that pattern, all resources under <code>/v2</code> would be protected by the same rule.</p><p><b>Threshold</b>We set this demonstration rule to 10 requests per minute, which is too sensitive for a real web application, but allows a curious user refreshing their browser ten times to see Rate Limiting in action.</p><p><b>Action</b>We set this value to <code>block</code> which means that once an IP addresses triggers a rule, all traffic from that IP address will be blocked at the edge and served with a default 429 HTTP error code.</p><p>Other possible choices include <code>simulate</code> which means no action taken, but analytics would indicate which requests would have been mitigated to help customers evaluate the potential impact of a given rule.</p><p><b>Timeout</b></p><p>This is the duration of the mitigation once the rule has been triggered. In this example, an offending IP address will be blocked for 1 minute.</p><p><b>Response body type</b></p><p>This type was set to <code>HTML</code> in the demo so that Rate Limiting returns a web page to mitigated requests. For an API endpoint, the response body type could return JSON.</p><p><b>Response body</b></p><p>The response body can be anything you want. Refresh the link below 10 times very quickly to see our choice for this demonstration rule.</p><p><a href="https://www.cloudflare.com/rate-limit-test"><b>https://www.cloudflare.com/rate-limit-test</b></a></p>
    <div>
      <h3>Other possible configurations</h3>
      <a href="#other-possible-configurations">
        
      </a>
    </div>
    <p>We could have specified a <b>Method</b>. If we only cared to rate limit POST requests, we could adjust the rule to do so. This rule could be used for a login page where high frequency of POSTs by the same IP is potentially suspicious.</p><p>We also could have specified a <b>Response Code</b>. If we only wanted to rate limit IPs which were consistently failing to authenticate, we could create the rule to trigger only after a certain threshold of 403’s have been served. Once an IP is flagged, perhaps because it was pounding a login endpoint with incorrect credentials, that client IP could be blocked from hitting either that endpoint or the whole site.</p><p>We will expand the matching criteria, such as adding headers or cookies. We will also extend the mitigation options to include CAPTCHA or other challenges. This will give our users even more flexibility and power to protect their websites and API endpoints.</p>
    <div>
      <h3>Early Access</h3>
      <a href="#early-access">
        
      </a>
    </div>
    <p>We'd love to have you try Rate Limiting. Read more and <a href="https://www.cloudflare.com/traffic-control">sign up for Early Access</a>.</p><p>**Note: This post was updated 4/13/17 to reflect the current product name. All references to Traffic Control have been changed to Rate Limiting.*</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Rate Limiting]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mitigation]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5jRNF30iNz47tFcZ7hvNoY</guid>
            <dc:creator>Timothy Fong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Traffic Manager: The Details]]></title>
            <link>https://blog.cloudflare.com/cloudflare-traffic-manager-the-details/</link>
            <pubDate>Thu, 29 Sep 2016 16:47:47 GMT</pubDate>
            <description><![CDATA[ Cloudflare's investment into building a large global network protects our customers from DDoS attacks, secures them with our Web Application Firewall and Universal SSL, as well as improving performance through our CDN and the many network-level optimizations we're constantly iterating on. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare's investment into building a large global network protects our customers from DDoS attacks, secures them with our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a> and Universal SSL, as well as improving performance through our CDN and the many network-level optimizations we're constantly iterating on.</p><p>Building on these products, we just introduced <a href="/cloudflare-traffic">Cloudflare Traffic</a>. To explain the benefits, we'll dive into the nitty-gritty details of how the monitoring and load-balancing features of Traffic Manager can be configured, and how we use it within our own website to reduce visitor latency, and improve redundancy across continents. We'll do a similar post on Traffic Control soon.</p><p>We're also kicking off the Early Access program for Traffic Manager, with details at the end of this post.</p>
    <div>
      <h3>The Details</h3>
      <a href="#the-details">
        
      </a>
    </div>
    <p>One of our primary goals when building Traffic Manager was to make it available to everyone: from those with just two servers in a single region, to those with 400 scattered across the globe (and everything in between). We also wanted to solve some of the key limitations of existing products: slow failover times (measured in minutes), and a lack of granular decision making when failing over.</p><ul><li><p>We can failover within seconds for proxied ("orange clouded") records. Connecting clients don't need to wait for recursive DNS caches to expire, or trust that they respect sub-60s TTLs, and we can therefore respond to changes in the availability of your origin servers as quickly as needed.</p></li><li><p>At <a href="/amsterdam-to-zhuzhou-cloudflare-global-network/">100 data centers</a> (and growing!) we can assess the availability of your origins and make fine-grained failover decisions at a per-data center level. A network path failure to your origin in London should not impact how we route traffic in New York!</p></li><li><p>Traffic Manager is built on Cloudflare's existing Anycast DNS infrastructure, benefiting from our resilient DDoS protection and our experience in making DNS fast. DNS failures can deeply impact the availability of your infrastructure: by leveraging Cloudflare's highly available network, you can relax.</p></li></ul><p>Existing solutions are often challenged with these requirements. On-premise load balancers are vulnerable to local network conditions, hard to scale out as you grow regionally, and at risk of expensive hardware failure. Existing cloud-based solutions have smaller network footprints (increasing latency) and a lack of effective DDoS mitigation, which we see as critical to running high-availability infrastructure.</p>
    <div>
      <h3>Flexible Configuration</h3>
      <a href="#flexible-configuration">
        
      </a>
    </div>
    <p>Traffic Manager is designed to be flexible, and we want to share some of the many supported use cases.</p><p>We had three primary scenarios in mind: load balancing, failover, and geo-steering. Underpinning these choices is our health checking functionality, which allows you to define what a healthy origin means to you. We can probe your origin web servers from every Cloudflare data center (or selected regions) over HTTP(S), check for status codes you define as healthy, parse the response body for specific text, and timeout as you see fit. We'll also send you email notifications as we detect availability changes, so you're able to pin down exactly when we saw that server fail.</p><p>Round robin configuration (“active-active”) load balancing, where load is distributed across all healthy servers. When a server is identified as unavailable through health checks, we'll seamlessly avoid routing traffic to it until it's available again.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WnwBeEToUrmFSfhX4dkkF/8982488f1584960755053dd6e785afaa/load-balancing.png" />
            
            </figure><p>Failover configuration ("primary-secondary"), where we route traffic to a specific server or pool of servers, and failover completely to a secondary server or pool when the primary is identified as unavailable. Being able to failover between your own datacenter, AWS regions, or even across major cloud providers are all supported (and easy to configure).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uhZ3ZaZGNhERaHK3qKHmc/819d6ebefa107b7367386e28811c08cb/failover.png" />
            
            </figure><p>Geo-steering configuration, which directs traffic to the nearest origin based on region. For example: European clients to your Berlin datacenter, East Coast US clients to your New York datacenter, and Oceanic clients to your Singaporean datacenter (as a simple example!).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QY8KaiGiibuxHqBm1hE3J/fe835fef0d39144a0f19b09cf2ad559f/geo-steering.png" />
            
            </figure><p>Of course, all of these approaches can be combined: you can load-balance across multiple locations in a specific region, failing over to the next-nearest datacenter should the first (or second) fail. You can also fine-tune what you consider to be a failure mode: given a pool of five servers, you might be able to sustain two unhealthy ones, but a third failure might be the trigger to steer traffic to your next data center.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71KUuY2XVsVN1MmyPkRgoe/5e60e1b644708fc59afe9dd3cc75a2f2/overview-map.png" />
            
            </figure>
    <div>
      <h3>How We're Using It</h3>
      <a href="#how-were-using-it">
        
      </a>
    </div>
    <p>In fact, we're currently combining the above ourselves: the new Cloudflare website combines both failover and geo-steering configurations so we can serve one half of the world from Europe, and the other half from the US.</p><p>We've associated each origin web server with their respective regions, and Traffic Manager then automatically directs neighboring regions to those origins without further configuration - e.g. users in Africa are steered to our EU origin, and similarly, users in Asia Pacific and South America are automatically geo-steered to our US origin.</p><p>When we add more origins globally, it will be a minor configuration change—with no interruption to traffic—to make that happen.</p><p>When our EU origin is taken out of production for maintenance or marked unhealthy, users on that side of the world are automatically steered to the healthy US origin, without us having to interfere manually.</p><p>Our own website is critical to our business, and we know our customers feel the same way about their own web properties. We trust Traffic Manager to keep our website available despite what the Internet might throw at us!</p>
    <div>
      <h3>Early Access</h3>
      <a href="#early-access">
        
      </a>
    </div>
    <p>Starting right now, we are accepting participants in our Early Access program, before we bring this service to all Cloudflare customers. Early Access requires some additional technical savvy, at first, and a willingness to share your feedback with us. For the duration of the Early Access program, Traffic Manager is free to use, with no charges. When introduced generally later this year, Traffic Manager will be available to all customers on all plans, with usage-based charges.</p><p>Fit the criteria? Fill out the <a href="https://www.cloudflare.com/traffic-manager/">Early Access form</a> and we'll reach out with the details. We're keen to show off what Traffic Manager can do.</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">3aEnctZp0JbA3csr3Hz6PO</guid>
            <dc:creator>Matt Silverlock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Control your traffic at the edge with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/cloudflare-traffic/</link>
            <pubDate>Thu, 29 Sep 2016 14:04:00 GMT</pubDate>
            <description><![CDATA[ Today, we're introducing two new Cloudflare Traffic products to give customers control over how Cloudflare’s edge network handles their traffic, allowing them to shape and direct it for their specific needs. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we're introducing two new Cloudflare Traffic products to give customers control over how Cloudflare’s edge network handles their traffic, allowing them to shape and direct it for their specific needs.</p><p>More than 10 trillion requests flow through Cloudflare every month. More than 4 million customers and 10% of internet requests benefit from our global network. Cloudflare's virtual backbone gives every packet <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">improved performance</a>, security, and reliability.</p><p>That's the macro picture.</p><p>What's more interesting is keeping each individual customer globally available. While every customer benefits from the network effect of Cloudflare, each customer is (appropriately) focused on <i>their</i> application uptime, security and performance.</p>
    <div>
      <h3>Rate Limiting*</h3>
      <a href="#rate-limiting">
        
      </a>
    </div>
    <p>Cloudflare’s new <a href="https://www.cloudflare.com/traffic-control/">Rate Limiting</a> allows a customer to rate limit, shape or block traffic based on the number of requests per second per IP, cookie, or authentication token. Traffic can be controlled on a per-URI (with wildcards for greater flexibility) basis giving pinpoint control over a website, application, or API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/z0czXftPrSgtKMQSA6caM/e5886353b3ae53ea88fa6ee63b041acf/traffic-control-graph.png" />
            
            </figure><p>Customers seek reliability and availability in the face of popularity or unexpected traffic such as slow brute force attacks on a <a href="https://www.cloudflare.com/learning/security/how-to-improve-wordpress-security/">WordPress site</a>, Denial of Service against dynamic pages, or the stampede of requests that comes with success. We are the leader at stopping significant <a href="https://www.cloudflare.com/ddos/">DDoS attacks</a> and offer a comprehensive <a href="https://www.cloudflare.com/waf/">WAF</a> to target specific application-level attacks.</p><p>Now we are adding the capability to give each customer fine-grained control over the traffic that reaches their origin servers.</p><p>Even well-engineered applications have a resource limit. Any dynamic endpoint either has a hard system limit or an economic limit on the number of servers you can afford. Those expensive endpoints need additional protection against floods of traffic, including legitimate visitors. You can provision for the worst case...but when you find a new Pokémon Go on your hands, the best case hurts, too.</p><p>To shield origins from attack and preserve uptime, Cloudflare Rate Limiting lets you throttle, block, and otherwise control the flow of traffic to maintain availability, limit economic impact and preserve performance. All of which can be done with thoughtful configuration, testing rules to measure their impact, and applying changes globally within seconds.</p><p>That solves several problems. Rate Limiting protects APIs as well as web pages. Different version of your APIs can not only have different rate limit triggers, but they can return custom JSON responses or response codes if, for instance, you want to obfuscate the standard 429 HTTP error code.</p><p>Static pages are easy to cache at Cloudflare's edge, so high traffic on a home page is welcome. But a competitor scraping your search results is different, and may cause economic pain in server resources in addition to disrupting business as usual. So Rate Limiting lets you define specific URLs with lower limits and different policies.</p><p>Similarly, rules designed to protect a login endpoint enables real users to still access your application while defending yourself from brute-force attacks designed to break into your system or simply exhaust your resources. Rate Limiting gives customers this power, in part, by distinguishing between POSTs versus GETs and identifying authentication failures through the server response code.</p><p>From rate limiting within your applications to replacing hardware capabilities at the top of your rack, Rate Limiting solves a problem that otherwise requires several tools and custom development to solve. In the future, Rate Limiting will become even more intelligent, automatically enabling caching on your marketing site on a product launch, queueing customers on Black Friday to ensure your <a href="https://www.cloudflare.com/ecommerce/">e-commerce system</a> handles the demand, and helping to maximize the return on your IT investments by protecting them from damaging spikes and traffic patterns.</p>
    <div>
      <h3>Traffic Manager</h3>
      <a href="#traffic-manager">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BMtHV6Vr8mhIuoeGSvGFC/5323ce9a39fbd9586a5b8772ee75717e/traffic-manager-failover.png" />
            
            </figure><p>For many customers, gone are the days of running a single server for their web application. Two scenarios are common: a single datacenter or cloud provider running multiple load-balanced servers, and replication of that infrastructure across multiple geographies.</p><p>Customers have moved to load balanced infrastructure to provide reliability, handle traffic spikes, and handle traffic locally in different regions of the world.</p><p>The beauty of the single server approach was that it was simple to manage: all traffic from everywhere on the Internet hit the same server. Unfortunately, that doesn’t scale to today’s Internet and so controls are needed to handle load balancing across servers and locations.</p><p>Cloudflare’s new <a href="https://www.cloudflare.com/traffic-manager/">Traffic Manager</a> enables a customer to keep their application running during a failure or better handle unexpected spikes in traffic by load balancing across multiple servers, datacenters, and geographies.</p><p>Traffic Manager has four major features: health checks, load balancing, failover and geo-steering.</p><p>Health checks automatically test the availability of individual origin servers so that Traffic Manager has a real-time view of the health of your origin servers. This information is used for failover and load balancing.</p><p>Load balancing automatically shares traffic across a collection of origin servers; if an origin server fails a health check it is automatically removed and load is shared across the remaining servers. For more complex environments an entire collection of origin servers can be removed from receiving traffic if the number of failed servers in the collection falls below some safe threshold.</p><p>Geo-steering allows a customer to configure traffic delivery to specific origin server groups based on the physical location of the visitor.</p><p>Health checks, load balancing, failover, and geo-steering work together to give customers fine grained control over their traffic.</p><p>Cloudflare Traffic Manager checks the health of applications from <a href="/amsterdam-to-zhuzhou-cloudflare-global-network/">100+ locations</a> around the world, taking automatic action to route around failure, based on policies crafted by each customer.</p><p>Fiber cut in Malaysia? Host not responding for customers in Minneapolis? Checking from every location on a network with <a href="http://bgp.he.net/report/exchanges#_participants">more public internet exchanges than any other company</a> means you get localized, specific decision making. When a problem crops up on the network path to one of our customers' servers, we'll route that traffic instantly to another healthy, available server -- without changing the policy for other, healthy routes.</p><p>Sometimes, it's not the network. With Traffic Manager, you may load balance across individual hosts and across multiple hosts. Application down on AWS? Send those visitors to your Rackspace-hosted application in seconds. Failover from a cloud provider to your own datacenter, and back again as soon as your primary location is healthy again.</p><p>Other times, customers run different instances to account for the speed of light, and be as close as possible to their customers -- much as Cloudflare does. With Traffic Manager, you can route visitors to your site to the nearest host, based on their region. Choose to send visitors in Munich to your datacenter in Amsterdam, and visitors from Kansas City to your St. Louis datacenter. These policies can be combined, so if your European datacenter is down, then and only then send that traffic to your United States datacenter.</p><p>Many of our customers put significant investment into the availability of their infrastructure. Traffic Manager extends that investment across Cloudflare's ever-growing global network.</p>
    <div>
      <h3>Early Access</h3>
      <a href="#early-access">
        
      </a>
    </div>
    <p>CloudFlare Traffic is now available in Early Access for all customers, and will be available publicly before the end of the year. Read more about <a href="https://www.cloudflare.com/traffic-manager">Traffic Manager</a> and <a href="https://www.cloudflare.com/traffic-control">Rate Limiting</a> and request access in your Cloudflare dashboard, in the Traffic app.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/pNVbDcRjNrafnHVaZNfbm/53fb6fba32137af1fd2aa1e6d65132b5/traffic-app-in-cloudflare-dashboard-1.png" />
            
            </figure><p>**Note: This post was updated 4/13/17 to reflect the current product name. All references to Traffic Control have been changed to Rate Limiting.*</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Rate Limiting]]></category>
            <category><![CDATA[API]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">7tyAnRN4dGdrJNn2xiHPKs</guid>
            <dc:creator>John Roberts</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Post Mortem on this Morning's Incident]]></title>
            <link>https://blog.cloudflare.com/a-post-mortem-on-this-mornings-incident/</link>
            <pubDate>Tue, 21 Jun 2016 06:03:30 GMT</pubDate>
            <description><![CDATA[ We would like to share more details with our customers and readers on the internet outages that occurred this morning and earlier in the week, and what we are doing to prevent these from happening again. ]]></description>
            <content:encoded><![CDATA[ <p>We would like to share more details with our customers and readers on the internet outages that occurred this morning and earlier in the week, and what we are doing to prevent these from happening again.</p>
    <div>
      <h3>June 17 incident</h3>
      <a href="#june-17-incident">
        
      </a>
    </div>
    <p>On June 17, at 08:32 UTC, our systems detected a significant packet loss between multiple destinations on one of our major transit provider backbone networks, <a href="http://www.teliacarrier.com">Telia Carrier</a>.In the timeframe where the incident was being analysed by our engineers, the loss became intermittent and finally disappeared.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rEfi2Ivn585mb9vkdDIr2/d17ee4d712e40f77a6e70ab27fc9996e/Screenshot-2016-06-20-14-16-27.png" />
            
            </figure><p><i>Packet loss on Telia Carrier (AS1299)</i></p>
    <div>
      <h3>Today’s incident</h3>
      <a href="#todays-incident">
        
      </a>
    </div>
    <p>Today, Jun 20, at 12:10 UTC, our systems again detected massive packet loss on one of our major transit provider backbone networks: Telia Carrier.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oh5nRVKJXMRIQPqKCguNE/5e6d09d61d915c795eaafc816e487779/Screenshot-2016-06-20-13-07-33.png" />
            
            </figure><p><i>Packet loss on Telia Carrier (AS1299)</i></p><p>Typically, transit providers are very reliable and transport all of our packets from one point of the globe to the other without loss - that’s what we pay them for. In this case, our packets (and that of other Telia customers), were being dropped.</p><p>While Internet users usually take it for granted that they can reach any destination in the world from their homes and businesses, the reality is harsher than that. Our planet is big, and the Internet pipes are not always reliable. Fortunately, the Internet is mostly built on the <a href="https://en.wikipedia.org/wiki/Transmission_Control_Protocol">TCP protocol</a> which allows lost packets to be retransmitted. That is especially useful on lossy links. In most cases, you won’t notice these packets being lost and retransmitted, however, when the loss is too significant, as was the case this morning, your browser can’t do much.</p><p>Our systems caught the problem instantly and recorded it. Here is an animated map of the packet loss being detected during the event:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5t6Age3Kz1x46V9DhMR6VK/2ce8890115631935d749a75ca4a43d0a/telia-outage-6-20-2016--1-.gif" />
            
            </figure><p><i>CloudFlare detects packet loss (denoted by thickness)</i></p><p>Because transit providers are usually reliable, they tend to fix their problems rather quickly. In this case, that did not happen and we had to take our ports down with Telia at 12:30 UTC. Because we are interconnected with most Tier 1 providers, we are able to shift traffic away from one problematic provider and let others, who are performing better, take care of transporting our packets.</p>
    <div>
      <h3>Impact on our customers</h3>
      <a href="#impact-on-our-customers">
        
      </a>
    </div>
    <p>We saw a big increase in our 522s errors. A 522 HTTP error indicates that our servers are unable to reach the origin servers of our customers. You can see the spike and the breakdown here:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UWZh0zq7omcnrnrm3zOdI/f8eb778a679ad8129834a2fa4053fe13/Screen-Shot-2016-06-20-at-15-36-32.png" />
            
            </figure><p><i>Spike in 522 errors across PoPs (in reaching origin servers)</i></p>
    <div>
      <h3>On our communication</h3>
      <a href="#on-our-communication">
        
      </a>
    </div>
    <p>Communicating in this kind of incident is crucial and difficult at the same time. Our customers understandably expect prompt, accurate information and want the impact to stop as soon as possible. In today’s incident, we identified weaknesses in our communication: the scope of the incident was incorrectly identified in Europe only, and our response time was not adequate. We want to reassure you that we are taking all the steps to improve our communication, including implementation of automated detection and mitigation systems that can react much more quickly than any human operator. We already have such systems in place for our smaller data centers and are actively testing their accuracy and efficacy before turning them on for larger PoPs.</p><p>Taking down an important transit provider globally is not an easy decision, and many cautious steps are to be taken before doing it. The Internet and its associated protocols are a community based on mutual trust. Any weak link in the chain will cause the entire chain to fail and requires collaboration and cooperation from all parties to make it successful.</p><p>We know how important it is to communicate on our status page. We heard from our customers and took the necessary steps to improve on our communication. Our support team is working on improvements in how we update our status page and reviewing the content for accuracy as well as transparency.</p>
    <div>
      <h3>Building a resilient network</h3>
      <a href="#building-a-resilient-network">
        
      </a>
    </div>
    <p>Even as CloudFlare has grown to become critical Internet infrastructure sitting in front of four million Internet-facing applications, investing in greater resiliency continues to be a work-in-progress. This is achieved through a combination of greater interconnection, automated mitigation, and increased failover capacity.</p><p>We fill our cache from the public Internet using multiple transit providers (such as Telia), and deliver traffic to local eyeball networks using transit providers and multiple peering relationships. To the extent possible, we maintain buffer capacity with our providers to allow them to bear the impact of potential failures on multiple other networks. Spreading out traffic across providers allows for diversity and reduces the impact of potential outages from our upstream providers. Even so, today’s incident impacted a significant fraction of traffic that relied on the Telia backbone.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/46TEFOaWNqhcniJqK8W80J/83a0cd7620a024c0bc3aa9151057b4df/Screenshot-2016-06-20-22-28-05.png" />
            
            </figure><p>_Traffic switching from one provider to the other after we reroute_</p><p>Where possible, we try to failover traffic to a redundant provider or data center while keeping traffic within the same country.</p><p>BGP is the protocol used to route packets between autonomous networks on the Internet. While it is doing a great job at keeping interconnections alive, it has no mechanism built in to detect packet loss and performance issues on a path.</p><p>We have been working on building a mechanism (which augments BGP) to proactively detect packet loss and move traffic away from providers experiencing packet loss. Because this system is currently activated only for our most remote and smallest locations, it didn't trigger in this morning’s incident. We plan to extend the capability in the next 2 weeks to switch from a manual reaction to an automatic one in all our POPs. For example, in this screenshot, you can see our POP in Johannesburg being automatically removed from our network because of problems detected when connecting to origin servers:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5k9ZgDYRcM1DDlK8Pl9Mpa/a55d73164c5bab3ab0c5b46d366feef7/Screenshot-2016-06-20-13-50-03.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35qNsGHp1t145O9KH3uimH/f7409776a680dad20c0adc733781e036/Screenshot-2016-06-20-14-09-57.png" />
            
            </figure><p><i>Johannesburg PoP gracefully fails over to nearest PoP</i></p>
    <div>
      <h3>Summary</h3>
      <a href="#summary">
        
      </a>
    </div>
    <p>We understand how critical our infrastructure is for our customers’ businesses, and so we will continue to move towards completely automated systems to deal with this type of incident. Our goal is to minimize disruptions and outages for our customers regardless of the origin of the issue.</p> ]]></content:encoded>
            <category><![CDATA[Post Mortem]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">daxS35A8ZzqAB5LsXbt8H</guid>
            <dc:creator>Jérôme Fleury</dc:creator>
        </item>
    </channel>
</rss>