Traffic spikes come in three flavours: anticipated (product launches, marketing campaigns), organic (viral content, press coverage), and hostile (DDoS attacks). Each requires a different response, but all of them will overwhelm hosting that can’t scale.
Traditional hosting
A hard ceiling. When your server’s CPU, memory, or connection limit is reached, additional requests are either queued (causing slow responses) or rejected (causing errors). The site doesn’t gracefully degrade — it falls off a cliff.
Auto-scaling adds resources dynamically when demand increases. But the speed of scaling matters enormously. Cloud-based auto-scaling that takes 2-3 minutes to provision new instances is too slow for a flash sale that brings 10× traffic in 30 seconds. Pre-provisioned burst capacity responds immediately.
DDoS attacks
Require a fundamentally different response than legitimate traffic spikes. While legitimate traffic should be served, DDoS traffic should be filtered and dropped as close to the network edge as possible — ideally before it reaches your server at all.
WP Pro Host uses a layered approach: CDN-level DDoS mitigation filters hostile traffic at the edge, pre-provisioned burst capacity handles immediate legitimate spikes, and dynamic scaling adds sustained capacity for prolonged traffic increases. All plans include traffic spike protection at no additional cost.
Frequently Asked Questions
What causes WordPress to go down during traffic spikes?
WordPress sites go down when PHP workers are exhausted. Each concurrent visitor requires a PHP worker — when all workers are occupied, new requests queue. As the queue grows beyond server capacity, requests are dropped with 503 errors. On shared hosting with 2–4 PHP workers, even moderate spikes of 20–30 concurrent visitors can trigger this. Sites also fail when database connection pools are exhausted or memory limits are hit.
What is the difference between auto-scaling and pre-provisioned capacity?
Auto-scaling dynamically adds resources when demand increases, but provisioning new cloud instances typically takes 2–3 minutes. A flash sale that sends 10× traffic in 30 seconds overwhelms the site before auto-scaling responds. Pre-provisioned burst capacity has dedicated resources already available — it responds in milliseconds because no provisioning delay is involved. For anticipated events, pre-provisioned capacity on a well-resourced server is the more reliable approach.
How do I prepare a WordPress site for a traffic spike?
Pre-warm your page cache by crawling key URLs before the event, confirm PHP worker allocation matches expected peak concurrency, ensure Redis handles WooCommerce session storage, set monitoring alerts at 70% capacity, and load-test checkout flows at 150–200% of expected peak traffic. Remove plugins running background jobs that could compete with visitor requests during the event.
How is DDoS traffic different from legitimate traffic spikes?
Legitimate traffic has natural browsing patterns — varying page requests, realistic inter-request timing, and identifiable referrers. DDoS traffic is characterised by high request rates from unusual geographic distributions and patterns designed to exhaust server resources. DDoS requires filtering at the network edge (CDN-level mitigation); serving it through the application layer will overwhelm any server regardless of its capacity.
What hosting configuration handles WordPress traffic spikes best?
A CDN with edge-level DDoS protection to absorb static asset requests and filter hostile traffic, server-level full-page caching to serve cached content without consuming PHP workers, Redis object caching to reduce database load for dynamic requests, 16+ PHP workers for high-traffic sites, and dedicated CPU and RAM that cannot be consumed by neighbouring sites.