Cloudflare Down Again – and DownDetector Is Also Down

Meta “downdetector” jokes and skepticism

  • Thread plays heavily with recursive “downdetectorsdowndetector…” domains; one analysis finds at least one such site just fakes statuses with random / hardcoded “up” values.
  • Others in the chain appear to be real, serving embedded HTML or JSON from a backend.
  • Several commenters criticize reliance on Downdetector by media, calling it “slop,” while others note it’s still occasionally useful.
  • Jokes about “downdetectors all the way down,” quorum-based down detectors, and CAP theorem limitations.

Outage scope and visible effects

  • Multiple services reported as impacted: LinkedIn, Shopify, Crunchyroll, Claude, and Downdetector itself.
  • People mention losing ~30 minutes of work, but note that multiplied across users this becomes substantial.
  • Some highlight that self-hosted services not fronted by Cloudflare stayed up, though many “self-hosted” setups actually sit behind Cloudflare.

Root cause, tech stack, and practice critiques

  • Status page says a WAF parsing change to mitigate a React Server Components vulnerability took the network down; a prior hotfix existed but a “proper fix” pushed that morning failed.
  • Commenters question why this was not a canary / phased rollout, given high-value customers (e.g., large e-commerce, LLM providers) were all hit at once.
  • Debate over blaming React/RSC/JS/Rust vs. acknowledging complex system interactions and deployment processes.
  • Prior Rust-related outage (panic via unwrap) is cited both as evidence Rust isn’t a magic bullet and as an example of programmer error rather than language failure.

Centralization and Cloudflare dependency

  • Many see this as evidence the web is over-centralized; some argue small sites shouldn’t hide behind Cloudflare unless they truly need DDoS protection.
  • Others point out Cloudflare’s popularity stems from free plans, IPv6 fronting, and easy exposure of local services, not just DDoS.
  • A longer analysis frames Cloudflare dominance as billing psychology: flat-rate “insurance” vs. hyperscalers’ usage-based network pricing.
  • Suggested stance: tiny projects and truly attack-prone giants may reasonably use Cloudflare; mid-sized SaaS and businesses could often rely on their cloud provider’s native protections and reduce moving parts.

Operations, staffing, and redundancy

  • Arguments that more outages follow cost-cutting and loss of experienced staff; others say outages also happened under the “old guard.”
  • Strong criticism of Friday / pre-weekend deployments and “fail fast” culture when rollbacks and tests are imperfect.
  • Ideas for resilience include multiple nameserver providers and self-hosted backups, but several note this quickly adds complexity; for many, occasional downtime may be more pragmatic.