In modern network environments, robust automation is crucial for handling large-scale configuration changes with minimal manual intervention. In this talk, we present a use case of a large scale provider change for one of the leading swiss retail companies, impacting hundreds of critical network serving points of sale. We discuss the challenges encountered when executing a fully automated end to end configuration and rollback process, updating and switching entire devices (routers, switches) with minimal personal oversight and risk for service downtime. We present a workflow solution designed to strengthen operational reliability. Key to our approach is the transition from direct CMDB access by network engineering scripts to a controlled, rule-based workflow with code isolation. This mechanism ensures that every script accesses only what is requested a priori and gets exclusive access on the network resource, and protects the network from erroneous or concurrent manipulations. The solution is designed to emulate the robustness of database transactions. By aligning our workflow execution with the ACID properties (Atomicity, Consistency, Isolation, and Durability), we provide strong guarantees that network changes are applied reliably and securely to mirror the trust that exists in well-known database systems.In this presentation, we explore the challenges of designing transaction-like behavior in a network context, and demonstrate how these principles contribute to a more stable and secure operational environment.