In the first VXLAN lab, we covered the very basics. Now it’s time for a few essential concepts (before introducing the EVPN control plane or integrated routing and bridging):
Updated: We have obtained new information in the wake of publishing our story. …
AWS Graviton5 Strikes A Different Balance For Server CPUs was written by Timothy Prickett Morgan at The Next Platform.
Note: This post was updated to clarify the relationship of the internal WAF tool with the incident on Dec. 5.
On December 5, 2025, at 08:47 UTC (all times in this blog are UTC), a portion of Cloudflare’s network began experiencing significant failures. The incident was resolved at 09:12 (~25 minutes total impact), when all services were fully restored.
A subset of customers were impacted, accounting for approximately 28% of all HTTP traffic served by Cloudflare. Several factors needed to combine for an individual customer to be affected as described below.
The issue was not caused, directly or indirectly, by a cyber attack on Cloudflare’s systems or malicious activity of any kind. Instead, it was triggered by changes being made to our body parsing logic while attempting to detect and mitigate an industry-wide vulnerability disclosed this week in React Server Components.
Any outage of our systems is unacceptable, and we know we have let the Internet down again following the incident on November 18. We will be publishing details next week about the work we are doing to stop these types of incidents from occurring.
The graph below shows HTTP 500 errors served by our network during the Continue reading
Sean Goedecke published an excellent set of recommendations for good technical writing, including:
Based on some emails I received in the past (and the lack of response to the lengthy emails I sent), we should apply the same rules to emails (and all other forms of technical communication).
Daftar Pustaka
Dunia musik modern diwarnai oleh sosok yang berbeda. Ia adalah Lizzo, seorang penyanyi, rapper, dan flutis berbakat. Namun, ia lebih dari sekadar seorang musisi. Lizzo adalah gerakan. Ia membawa pesan cinta diri dan body positivity ke panggung global. Dengan suara yang kuat dan kepribadian yang membara, ia menginspirasi jutaan orang.
Lahir dengan nama Melissa Viviane Jefferson, ia memulai perjalanannya di Detroit. Kemudian, ia dibesarkan di Houston, Texas. Di sanalah bakat bermusiknya mulai diasah. Ia belajar bermain flute klasik. Awalnya, ia tidak membayangkan akan menjadi bintang pop. Namun, takdir membawanya ke jalan yang luar biasa. Kini, ia menjadi salah satu ikon paling berpengaruh di generasinya.
Karier Lizzo tidak dibangun dalam semalam. Ia melewati banyak tantangan. Setelah kuliah, ia pindah ke Minneapolis untuk mengejar mimpinya. Di sana, ia membentuk beberapa grup musik. Ia juga merilis album pertamanya secara independen pada tahun 2013. Album itu berjudul “Lizzobangers”. Meskipun belum sukses besar, karyanya mulai mendapat perhatian.
Selanjutnya, ia pindah ke Los Angeles. Perpindahan ini menjadi titik balik dalam karirnya. Ia merilis dua Continue reading
It was only a matter of time before Marvell was going to make another silicon photonics acquisition, and the $2.5 billion sale of its automotive Ethernet business to Infineon for $2.5 billion has given the company this past summer netted out to about half of the $3.25 billion that the company is shelling out to get its hands on Celestial AI, one of the several upstarts that hopes to hook compute engines, memory, and switches together using on-chip optical engines and light pipes. …
With Celestial AI Buy, Marvell Scales Up The Datacenter And Itself was written by Timothy Prickett Morgan at The Next Platform.
The AI model makers of the world have been waiting for more than a year to get their hands on the Trainium3 XPUs, which have been designed explicitly for both training and inference and which present a credible alternative to Nvidia’s “Blackwell” B200 and B300 GPUs as well as Google’s “Trillium” TPU v6e and “Ironwood” TPU v7p accelerators. …
With Trainium4, AWS Will Crank Up Everything But The Clocks was written by Timothy Prickett Morgan at The Next Platform.
In June, after a year and a half of poking and prodding, the US Department of Justice finally gave the OK for the $14 billion acquisition of Juniper Networks by Hewlett Packard Enterprise. …
HPE Gets The Lead Out On Juniper-Aruba Networking Integration was written by Jeffrey Burt at The Next Platform.
Cloudflare has deployed a new protection to address a vulnerability in React Server Components (RSC). All Cloudflare customers are automatically protected, including those on free and paid plans, as long as their React application traffic is proxied through the Cloudflare Web Application Firewall (WAF).
Cloudflare Workers are inherently immune to this exploit. React-based applications and frameworks deployed on Workers are not affected by this vulnerability.
We strongly recommend that customers immediately update their systems to the most recent version of React, despite our WAF being designed to detect and prevent this exploit.
Cloudflare has been alerted by its security partners to a Remote Code Execution (RCE) vulnerability impacting Next.js, React Router, and other React frameworks (security advisory CVE-2025-55182, rated CVSS 10.0). Specifically, React version 19.0, 19.1, and 19.2, and Next.js from version 15 through 16 were found to insecurely deserialize malicious requests, leading to RCE.
In response, Cloudflare has deployed new rules across its network, with the default action set to Block. These new protections are included in both the Cloudflare Free Managed Ruleset (available to all Free customers) and the standard Cloudflare Managed Ruleset (available to all paying Continue reading
Welcome to the 23rd edition of Cloudflare’s Quarterly DDoS Threat Report. This report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the third quarter of 2025.
The third quarter of 2025 was overshadowed by the Aisuru botnet with a massive army of an estimated 1–4 million infected hosts globally. Aisuru unleashed hyper-volumetric DDoS attacks routinely exceeding 1 terabit per second (Tbps) and 1 billion packets per second (Bpps). The number of these attacks surged 54% quarter-over-quarter (QoQ), averaging 14 hyper-volumetric attacks daily. The scale was unprecedented, with attacks peaking at 29.7 Tbps and 14.1 Bpps.
Other than Aisuru, additional key insights in this report include:
DDoS attack traffic against AI companies surged by as much as 347% MoM in September 2025, as public concern and regulatory review of AI increases.
Escalating EU-China trade tensions over rare earth minerals and EV tariffs coincide with a significant increase in DDoS attacks against the Mining, Minerals & Metals industry as well as the Automotive industry in 2025 Q3.
Overall, in the third quarter of 2025, Cloudflare’s autonomous Continue reading
What could be better than watching 0x02 Jeffs discuss networking? How about having Petr Lapukhov of the RFC 7938 fame as a guest discussing AI/ML Data Center Design?
Note: Petr disappeared into the information black hole called Facebook over a decade ago, so I wondered how they allowed him to chat on a podcast for hours. It turns out he moved to NVIDIA, which might influence the podcast content a bit, but I’m pretty sure Petr is still Petr ;)

Platform teams are tasked with keeping clusters secure and observable while navigating a skills gap. At KubeCon + CloudNativeCon North America, The New Stack spoke with Ratan Tipirneni, President and CEO of Tigera, about the future of Kubernetes security, AI-driven operations, and emerging trends in enterprise networking. The highlights from that discussion are summarized below.
Portions of this article are adapted from a recorded interview between The New Stack’s Heather Joslin and Tigera CEO Ratan Tipirneni. You can watch the full conversation on The New Stack’s YouTube channel. Watch the full interview here
Tipirneni emphasizes the importance of controlling risk in Kubernetes clusters. “You want to be able to microsegment your workloads so that if you do come under an attack, you can actually limit the blast radius,” he says.
Egress traffic is another area of concern. According to Tipirneni, identifying what leaves the cluster is critical for security and compliance. Platform engineers are often navigating complex configurations without decades of Continue reading