Netlify just sent me a $104K bill for a simple static site

Understanding Unexpected Billing Surprises with Netlify: A Case Study

In the evolving world of web development, serverless platforms like Netlify have become popular choices for deploying static sites efficiently and with ease. However, recent experiences highlight the importance of understanding platform limitations, potential vulnerabilities, and the need for proactive cost management. This article explores a real-world scenario where a developer received an unexpected and astronomically high bill from Netlify, shedding light on vulnerabilities and best practices for safeguarding your online presence.

The Unexpected Billing Shock

A developer, managing a straightforward static website hosted on Netlify for over four years, was recently confronted with an alarming email: an overdue bill of $104,500. Initially suspected to be a prank or scam, verification through the platformโ€™s dashboard confirmed the figure was legitimate. The associated metrics indicated a staggering bandwidth consumption of approximately 190 terabytes within just four days.

This magnitude of traffic, translating to around 60.7 terabytes on a single peak day, is highly unusual for a modest site typically visited by a few hundred users daily. Historically, the siteโ€™s bandwidth consumption remained under 10 GB per month, making such a spike suspicious.

Root Cause: DDoS Attack and Unauthorized Usage

Upon reaching out to Netlifyโ€™s support team, the developer was informed that the surge in bandwidth originated from specific user agents, suggesting a Distributed Denial of Service (DDoS) attack. Netlify acknowledged that such attacks can occur and typically impose a surcharge; normally, they charge approximately $55 per 100 GB of bandwidth exceeded.

In this case, with the abnormal traffic, the calculations indicated an attack focused on a large media fileโ€”a 3.44MB audio file stored on the site. While hosting such a sizable file directly on a static site isnโ€™t best practice, it shouldnโ€™t inherently lead to such a vast bandwidth spike, highlighting vulnerabilities in platform protections.

Cost Management and Platform Limitations

Confronted with a potential $104,000 bill, the support team offered a discount, reducing the amount to about $5,000โ€”still a significant and unexpected expense. This situation prompted questions about the platformโ€™s safeguards against malicious traffic, such as automatic alerts, spending limits, or DDoS mitigation features. The absence of warnings or triggers meant the developer only discovered the issue post-factum, leading to understandable frustration and concern over platform safety measures.

Lessons Learned and Best Practices

This incident underscores several important considerations for developers and website owners:

1.


Leave a Reply

Your email address will not be published. Required fields are marked *