D2DO298: Spacelift Intelligence: Infrastructure Keeping Pace with AI-Enhanced Development (Sponsored)

On today’s sponsored episode, Ned Bellavance and Kyler Middleton welcome guest Marcin Wyszynski, Head of R&D at Spacelift to guide them through the potential future of IaC and how AI is changing the landscape of developer productivity, especially around infrastructure. They discuss two of Spacelift’s products, Spacelift Intent and Spacelift Intelligence. Spacelift Intent is an... Read more »

PP102: What’s Driving SASE Adoption?

Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »

Talking About Pulumi and Network Automation

Heard about Pulumi, but aren’t sure what it is? Maybe you know a little bit about Pulumi—like that it does infrastructure as code (IaC), but using general purpose programming languages—and you’re wondering where it fits in a larger automation framework? Or maybe you’re a network engineer just starting to dabble in network automation, and you’re wondering if this Pulumi thing is something you should check out. If any of these apply to you, then the latest Network Automagic podcast episode is right up your alley.

I recently had the opportunity to join Steinn Bjarnarson and Urs Baumann for an episode of Network Automagic. The focus of our discussion—although I will say we diverged a bit here and there—was on Pulumi, what it is, and whether it fits into a larger network automation framework. After all, if you can use general purpose programming languages like Python with Pulumi, why not just use Pulumi in a Python program that also does network automation stuff?

All in all, recording the podcast with Steinn and Urs was great fun, and I hope that the final product ends up being helpful for folks. There’s a variety of ways to listen in on the episode:

Continue reading

Sandboxing AI agents, 100x faster

Last September we introduced Code Mode, the idea that agents should perform tasks not by making tool calls, but instead by writing code that calls APIs. We've shown that simply converting an MCP server into a TypeScript API can cut token usage by 81%. We demonstrated that Code Mode can also operate behind an MCP server instead of in front of it, creating the new Cloudflare MCP server that exposes the entire Cloudflare API with just two tools and under 1,000 tokens.

But if an agent (or an MCP server) is going to execute code generated on-the-fly by AI to perform tasks, that code needs to run somewhere, and that somewhere needs to be secure. You can't just eval() AI-generated code directly in your app: a malicious user could trivially prompt the AI to inject vulnerabilities.

You need a sandbox: a place to execute code that is isolated from your application and from the rest of the world, except for the specific capabilities the code is meant to access.

Sandboxing is a hot topic in the AI industry. For this task, most people are reaching for containers. Using a Linux-based container, you can start up any sort of Continue reading

Worth Reading: Why We’ve Tried to Replace Developers Every Decade

The never-ending “we will replace developers” (or networking engineers) pipe dream didn’t start with the latest bout of AI hype (or SDN). As Stephan Schwab explains in his Why We’ve Tried to Replace Developers Every Decade article, it started with COBOL, the magic high-level programming language that businesspeople would use to write their own programs.

At least some of us know how well that ended. I was also unfortunate to be there for the 5GL hype, the forms-driven programming hype, the “everyone will solve every problem out there with Excel macros” (it does work for networking inventory, doesn’t it?), and a few others. So please excuse me if I remain a bit skeptical about the latest fad, even though I find it (like all the previous ones) very useful when used conservatively in limited domains.

Pura Segara Kidul: Jejak Spiritual dan Kearifan Budaya di Pesisir Selatan Bali

Sejarah dan Latar Belakang Pura Segara Kidul

Pura Segara Kidul berdiri sebagai simbol kuat hubungan manusia dan alam laut. Pura ini berkembang dari tradisi leluhur Bali. Masyarakat pesisir membangun pura sebagai bentuk penghormatan spiritual. Selain itu, pura ini terhubung erat dengan konsep Tri Hita Karana.

Pada awalnya, masyarakat memanfaatkan pura sebagai tempat memohon keselamatan. Oleh karena itu, para nelayan sering melakukan persembahyangan sebelum melaut. Seiring waktu, peran pura semakin luas. Bahkan, pura menjadi pusat kegiatan keagamaan penting. Dengan demikian, Pura Segara Kidul memiliki nilai sejarah dan spiritual tinggi.

Makna Spiritual dan Filosofi Sakral

Makna spiritual Pura Segara Kidul sangat mendalam. Pura ini melambangkan keseimbangan antara manusia dan kekuatan laut. Selain itu, pura juga mencerminkan rasa syukur terhadap anugerah alam. Karena itu, umat Hindu rutin menggelar upacara khusus.

Selanjutnya, masyarakat meyakini laut sebagai sumber kehidupan. Oleh sebab itu, pura mengajarkan sikap hormat terhadap alam. Bahkan, filosofi ini menanamkan kesadaran lingkungan. Dengan kata lain, Pura Continue reading

Fakta Ilmiah Awan: Struktur, Fungsi, dan Dinamika Atmosfer

Massa dan Komposisi Awan

Secara ilmiah, awan merupakan agregat tetesan air dan kristal es yang tersuspensi di atmosfer. Setiap tetesan memiliki diameter antara 10 hingga 50 mikrometer, namun jumlahnya bisa mencapai jutaan per meter kubik udara. Akibatnya, bobot satu awan cumulus rata-rata mencapai satu juta ton. Meskipun demikian, awan tetap melayang karena adanya gaya buoyancy yang dihasilkan oleh udara panas dan arus konveksi. Proses ini menyeimbangkan gaya gravitasi sehingga awan mampu tetap stabil di berbagai ketinggian.

Dinamika Pergerakan Awan

Pergerakan awan dikendalikan oleh angin atmosfer dan perbedaan tekanan. Di lapisan troposfer, angin dapat mencapai kecepatan lebih dari 200 km/jam pada ketinggian tertentu, terutama di jet stream. Awan cirrus, yang berada di ketinggian 6–12 km, bergerak lebih cepat dibanding awan rendah karena dipengaruhi oleh aliran angin kuat di lapisan atas. Selain itu, konveksi lokal dan sistem tekanan rendah juga memicu pergerakan horizontal dan vertikal awan, memengaruhi distribusi hujan serta pola cuaca regional.

Spektrum Warna Awan

Warna awan tergantung pada interaksi cahaya matahari dengan tetesan air atau kristal es. Secara ilmiah, awan putih terjadi karena Continue reading

The Why and What of the CIDR Report

For some time, I have been looking after a routing analysis report called the "". Here I'd like to explain the reasons for this report, and what is in the report and share some thoughts as to its usefulness today to the Internet routing community.

How to deploy Pi-Hole with Docker and stop ads on every device on your LAN

How do you block ads? Most people install various and sundry ad-blocking software on their computers or add browser extensions to handle the task.  Either way you go, blocking ads can help prevent your web browser from loading ads that could consume too many system resources or even inject malicious code into your system. I’ve had instances where a single ad bogged down my CPU so much that the computer came to a screeching halt. The only solution was a hard reboot. After that, I was on a quest to do whatever it took to avoid another such instance. At first, I thought about going the browser extension route, but I realized I’d have to install extensions on every browser I used on every desktop and laptop on my home network. That’s all fine and good if you only have a few machines connected to your LAN. But what if you have considerably more? You might want to consider an app like Pi-Hole.

Launching Cloudflare’s Gen 13 servers: trading cache for cores for 2x edge compute performance

Two years ago, Cloudflare deployed our 12th Generation server fleet, based on AMD EPYC™ Genoa-X processors with their massive 3D V-Cache. That cache-heavy architecture was a perfect match for our request handling layer, FL1 at the time. But as we evaluated next-generation hardware, we faced a dilemma — the CPUs offering the biggest throughput gains came with a significant cache reduction. Our legacy software stack wasn't optimized for this, and the potential throughput benefits were being capped by increasing latency.

This blog describes how the FL2 transition, our Rust-based rewrite of Cloudflare's core request handling layer, allowed us to prove Gen 13's full potential and unlock performance gains that would have been impossible on our previous stack. FL2 removes the dependency on the larger cache, allowing for performance to scale with cores while maintaining our SLAs. Today, we are proud to announce the launch of Cloudflare's Gen 13 based on AMD EPYC™ 5th Gen Turin-based servers running FL2, effectively capturing and scaling performance at the edge. 

What AMD EPYCTurin brings to the table

AMD's EPYC™ 5th Generation Turin-based processors deliver more than just a core count increase. The architecture delivers improvements across multiple dimensions of what Cloudflare Continue reading

Inside Gen 13: how we built our most powerful server yet

A few months ago, Cloudflare announced the transition to FL2, our Rust-based rewrite of Cloudflare's core request handling layer. This transition accelerates our ability to help build a better Internet for everyone. With the migration in the software stack, Cloudflare has refreshed our server hardware design with improved hardware capabilities and better efficiency to serve the evolving demands of our network and software stack. Gen 13 is designed with 192-core AMD EPYC™ Turin 9965 processor, 768 GB of DDR5-6400 memory, 24 TB of PCIe 5.0 NVMe storage, and dual 100 GbE port network interface card.

Gen 13 delivers:

  • Up to 2x throughput compared to Gen 12 while staying within latency SLA

  • Up to 50% improvement in performance / watt efficiency, reducing data center expansion costs

  • Up to 60% higher throughput per rack keeping rack power budget constant

  • 2x memory capacity, 1.5x storage capacity, 4x network bandwidth

  • Introduced PCIe encryption hardware support in addition to memory encryption

  • Improved support for thermally demanding powerful drop-in PCIe accelerators

This blog post covers the engineering rationale behind each major component selection: what we evaluated, what we chose, and why.

Generation

Gen 13 Compute

Previous Gen 12 Compute

Form Factor

2U1N, Single Continue reading

ASPA: The cryptographic upgrade for BGP path security

aspaThe Internet routing security story of the past decade has largely been about fixing route origins. RPKI Route Origin Validation (ROV) gave operators a cryptographic way to verify that the AS announcing a prefix was actually authorized to do so. That work has now reached majority coverage, with over half of all IPv4 and IPv6 routes now protected by Route Origin Authorizations (ROAs).

But origin validation only tells you where a route claims to start. It says nothing about the path it took to get to you. A route can have a perfectly valid origin and still arrive via a completely illegitimate chain of ASes, through a misconfigured transit network, a malicious route leak, or a manipulated AS_PATH. This gap is exactly what ASPA (Autonomous System Provider Authorization) is designed to close.

ASPA has moved from theory into early operational deployment, even though the core ASPA profile and verification work remain in IETF draft form as of March 2026. ARIN and RIPE NCC both support ASPA object creation in production. Major networks have begun deploying ASPA validation globally. Router implementations exist in BIRD and OpenBGPD. This article is intended to explain what ASPA is, how it works technically, what it Continue reading

netlab: Switch to Lab Directory After an SSH Session Loss

I work on a laptop that loves to power down when not used (the right thing to do), which often breaks the SSH session to my netlab server (not so good).

Reconnecting is trivial. Figuring out which lab I was working on and where it lives on the disk after a few hours? That’s the annoying part.

We solved most of that ages ago with the netlab status --all command. It shows all running labs1 and their directories, so you can quickly jump back to where you were. However, even that gets tedious the 100th time you have to do it.