The Cloud Pod is in Tears Trying to Understand Azure Tiers
Welcome to episode 321 of The Cloud Pod, where the forecast is always cloudy! Justin, Ryan, and Matt are all on hand to bring you the latest in cloud and AI news, including increased metrics data (because who doesn’t love more data), some issues over at Cloudflare, and even bigger issues at Builder.ai – plus so much more.
Let’s get started!
Titles we almost went with this week
Lost in Translation: Google Helps IPv6 Find Its Way to IPv4BigQuery’s Soft Landing for Hard ProblemsCloudWatch Gets a Two-Week Memory UpgradeVM Glow-Up: From Gen1 Zero to Gen2 HeroAzure Gets Contextual: API Management Learns to Speak AIThe Cloud Pod: Now Broadcasting from 20,000 Leagues Under the SeaLoRA LoRA on the Wall, Who’s the Finest Model of Them AllAzure Says MFA or the Highway for Resource ManagementTwo-Factor or Two-Furious: Azure’s Security UltimatumAgent 007: License to BuildCUD You Believe It? Google’s Discounts Get More FlexibleWAF’s New Deal: Free Logs with Every Million Requests ServedSOC It To Me: Google’s AI Security Workshop TourMFA mandatory in Azure, now you too can hate/hate MS AuthenticatorAWS AMIs no longer the Tribbles of cloud computingECS Exec; Justin’s prediction from 2018 finally comes trueGeneral News
00:56 FinOps Weekly Summit 2025
Victor Garcia reached out and asked us to share the news about the FinOps Weekly Summit coming up on October 23rd, 2025. A lot of great speakers; if you’re in the FinOps space, we recommend it. Want to register? You can do that here. 01:53 Ignite Registration Opens
San Francisco, Moscone CenterNovember 18–21, 2025Need to convince your manager to pay for you to go? Find that letter here. 02:45 Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1
Some issues over at Cloudflare recently…Fina CA issued 12 unauthorized TLS certificates for Cloudflare’s 1.1.1.1 DNS resolver IP address between February 2024 and August 2025, violating domain control validation requirements and potentially allowing man-in-the-middle attacks on DNS-over-TLS and DNS-over-HTTPS connections.The incident highlights vulnerabilities in the Certificate Authority trust model where any trusted CA can issue certificates for any domain or IP without proper validation, though exploitation would require the attacker to have the private key, interce