Cloudflare
Configuration file size limits causing cascading service failures
9A configuration change caused a file to double in size, exceeding Bot Management's upper limit, resulting in HTTP 5XX errors that cascaded across dependent services (Workers KV, Access, Turnstile, Dashboard) into an internet-wide outage.
Slow configuration change propagation and delayed error detection
8Bad configurations take extended time (90 minutes) to propagate across distributed infrastructure, resulting in intermittent errors before sustained failure, making rapid detection and rollback difficult.
Cloudflare as single point of failure for dependent services
8Centralizing infrastructure dependencies on Cloudflare creates brittleness and risk. When Cloudflare experiences outages, all dependent SaaS services and proxied sites fail simultaneously, making the platform a critical single point of failure.
Cloudflare abuse reporting process is ineffective and non-compliant with NIS2/DSA
8Cloudflare's abuse desk uses form-only reporting with high evidentiary bars, automated denials, and opaque outcomes. The process places burden of proof on reporters and cannot handle bulk incident submissions efficiently. Despite thousands of reports from trusted flaggers, Cloudflare rarely discloses action taken, creating potential regulatory non-compliance with NIS2 and Digital Services Act.
Dramatic cost scaling for large websites on serverless platforms
7While serverless platforms work well for small websites, costs increase dramatically for large websites, making the economics untenable at scale.
Products launched before enterprise-readiness
7Cloudflare frequently releases products with incomplete features and UI limitations that hinder adoption of newer capabilities. Enterprise customers report having to work around missing functionality that was promised at launch.
Point solution ecosystem becomes unmanageable at scale
7Organizations piecing together multiple legacy CDNs, VPNs, and security point solutions face unmanageable complexity at scale. Older solutions lack automation and poor integration, resulting in unnecessary manual management effort.
Quality engineering cannot keep pace with production changes
7Cloudflare experiences recent outages due to quality engineering lagging behind production engineering velocity. This is concerning for an infrastructure provider where stability should be paramount.
Invisible dependencies problem in distributed architecture
7Cloudflare's architecture suffers from unvisible dependency chains several levels deep. Engineers focus on immediate dependencies but fail to map three or four levels of transitive dependencies, making cascading failures difficult to anticipate.
Lacking advanced analytics and API security in Cloudflare
7Cloudflare's built-in capabilities for critical data metrics and API security are insufficient, forcing teams to pipe data into third-party services like Datadog and build custom application logic for security concerns.
Inadequate documentation for Cloudflare developer products
6Cloudflare's developer platform and products lack sufficient documentation, making it difficult for developers to understand and implement features effectively.
Limited DevOps integration and developer platform capabilities in Cloudflare
6Cloudflare lacks sufficient DevOps integration and developer platform capabilities compared to competitors, making it less attractive for development teams seeking comprehensive developer tooling.
Lack of bulk management UI for multi-tenant operations
6Managing Cloudflare across many domains or clients is cumbersome due to missing bulk update functionality in the UI. Users are forced to rely on APIs or manual scripts, creating friction for agencies and multi-tenant deployments.
DNS firewall capabilities fail to materialize
6Cloudflare promises DNS firewall features that don't fully materialize in practice, forcing users who attempt migrations to pull back and maintain legacy solutions instead.
API gaps force manual UI operations for common tasks
5Cloudflare's API is incomplete for routine administrative tasks. Common operations like assigning co-hosts can only be done via UI, not programmatically, defeating infrastructure-as-code practices.
Cloudflare configuration complexity and SSL certificate setup
5Users struggle with the complexity of Cloudflare's configuration, particularly with setting up SSL certificates correctly, requiring navigation of an extensive feature set.
Confusing Cloudflare pricing structure for small businesses
4Small businesses struggle with Cloudflare's pricing structure, finding it difficult to balance cost against functionality and security requirements without comprehensive guidance.
Lack of shareable API key permission templates
2Cloudflare dashboard does not provide an easy way to create and share API token permission codes (hashes) that specify exact permissions needed, making it difficult for developers and blog writers to communicate security requirements.