I am running another "hobbit software" (just discovered the term) for the past 12 years, and I 100% agree with Pēteri and everything he said in this blog post!
Another piece of feedback: the link doesn’t look like a link any more. It wasn’t great before, but the verbiage made it adequately clear. But now it’s terrible, because the wording doesn’t suggest an action, and it doesn’t look like a link or a button. You should either restore its underline and lean into “link”, or give a background colour or (generally better) gradient and lean into “button”. But when it’s just a border, it doesn’t look like a button, especially when there’s a tick after it. And change the wording again.
Thanks for this feedback, I actually changed this because some of my clients complained of the opposite, that the link was a bit too "dim" and didn't look like the the obvious Call To Action in the email. But it's all very debatable I agree and I may change this again in the future.
I could but I don't want to, it's even more of a dark pattern and looks way too "spammish" IMO. I don't want my users to find this in their email and think that I'm trying to trick their system. Also I wouldn't be suprised if some antispam tries to detect this as a spam criteria.
Hi, Adrien here author of this article (and of updown.io).
That is true and I actually hesited to write the article for this reason, because it could make the spammer life easier. But after seing some of the legacy and nonsense in here I though it's still worth it so people at least understand what they are using.
Sorry about this, I still don't have any answer or explanation from Vultr or CloudFlare at this point. Most likely cause IMO is that CloudFlare (accidentally?) blocked one or many big ranges of IPs belonging to Vultr (and maybe some other providers as people seems to say Vultr was not the only impacted). I noticed during the incident this morning for example that I could ping CloudFlare IPv6 (ICMP) but not connect through TCP (port 443). So this sounds more like a firewall than a routing issue from what I could see.
Quick update here: Vultr is still ignoring us, and Cloudflare said to one of my clients: "some IPv6 traffic from Vultr was being dropped by a DDoS mitigation system as we were receiving malicious traffic from Vultr. The issue has since been resolved, and updown should be reporting availability correctly now."
So this confirms what I suggested above, I suppose they choose not to respond with an HTML page here because it would generate too much traffic, and maybe it was a lower level TCP attack.
This also probably explains why Vultr doesn't want to answer me if they were "responsible" for the DDoS attack that got them blocked.
That's a bit weird, normally when cloudflare blocks things you get an error page not a timeout, hopefully you hear something tomorrow when everyone is back at work. Appreciate you looking into this :)
In my case (updown.io), I use a "scheduler" process (one per machine) which runs the following loop: every 5 seconds it fetches the checks that needs to execute in the next 5 seconds, ordered by time of run ascending. Then it iterates through them one by one, wait with a small sleep until the precise running time, and then push the job into a background job queue (sidekiq / redis in my case). This allows for a very precise timing of execution even if there is hundreds jobs per seconds, and a good distribution over time (instead of firing 100 jobs every seconds in spikes, it can schedule one every 10ms for example)
I run https://updown.io since 2012, a website monitoring service I created. I'm working about 5-10 hours per week on it. It makes about $6,000 per month and is still growing linearly. I also keep a full-time job alongside for now as an engineering manager. The key for me is to take time, make something useful, delight your clients, and don't try to become uber or airbnb.
I am a customer, I run a bunch of personal sites and hobby projects. updown.io is wonderfully cheap, the pay as you go model is perfect for my monitoring needs. I have no need for the stats, just the monitoring which it does well.
I'm curious too. Tracking your own website makes sense but there're definitely better ways if that's your own website. Why do people want to track other website regularly?
I think you're giving too much weight to what's in their example image. I use a competitor's free tier to monitor my own stuff. Using a SaaS is better for several reasons:
1. Don't have to install / maintain anything.
2. Who monitors the monitoring?
3. Monitoring from inside my network doesn't always fully approximate end-user availability.
That's pretty much it, my customers are people who have websites and want to be the first to know when there's an issue on it so they can fix it, in which case a SaaS solution is usually better than some internal tools because it eliminates setup/maintenance, keeps working when all your infrastructure is down and monitors everything (including internet link). Some other clients monitor website they do not own when they depend on it, for example as a vendor I could monitor Amazon if I sell products on it to be aware of any issue, or if I'm a digital customer engagement platform (what my full-time job does) I can monitor services I interact with like facebook API, twitter API, etc.
Probably half of the time (~2-3h per week) is spent answering questions/requests from clients or helping them diagnose downtime. I try to improve the product to make sure my clients don't need me so that when they do I can help them properly.
The problem is not actually downtime, because DNS handles that automatically if at least one nameserver is up. The problem is nameservers returning incorrect results. But yeah, .io has quite frequent problems.