Company Logo

Is there an Guard outage?

Guard status: Systems Active

Last checked: 2 minutes ago

Get notified about any outages, downtime or incidents for Guard and 1800+ other cloud vendors. Monitor 10 companies, for free.

Subscribe for updates

Guard outages and incidents

Outage and incident data over the last 30 days for Guard.

There have been 1 outages or incidents for Guard in the last 30 days.

Severity Breakdown:

Tired of searching for status updates?

Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!

Sign Up Now

Components and Services Monitored for Guard

Outlogger tracks the status of these components for Xero:

Account Management Active
API tokens Active
Audit Logs Active
Domain Claims Active
SAML-based SSO Active
Signup Active
User Provisioning Active
Data Classification Active
Data Security Policies Active
Guard Detect Active
Component Status
Account Management Active
API tokens Active
Audit Logs Active
Domain Claims Active
SAML-based SSO Active
Signup Active
User Provisioning Active
Active
Data Classification Active
Data Security Policies Active
Guard Detect Active

Latest Guard outages and incidents.

View the latest incidents for Guard and check for official updates:

Updates:

  • Time: Feb. 12, 2021, 3:13 a.m.
    Status: Resolved
    Update: Impact on User Management Syncs has been mitigated.
  • Time: Feb. 12, 2021, 3:13 a.m.
    Status: Resolved
    Update: Impact on User Management Syncs has been mitigated.
  • Time: Feb. 12, 2021, 2:28 a.m.
    Status: Investigating
    Update: We continue investigating issues with syncing User Management changes to products. We will provide more details in an hour.
  • Time: Feb. 12, 2021, 2:28 a.m.
    Status: Investigating
    Update: We continue investigating issues with syncing User Management changes to products. We will provide more details in an hour.
  • Time: Feb. 12, 2021, 2:18 a.m.
    Status: Investigating
    Update: We are investigating issues in syncing User Management changes to the product. We will provide more details within the next hour.
  • Time: Feb. 12, 2021, 2:18 a.m.
    Status: Investigating
    Update: We are investigating issues in syncing User Management changes to the product. We will provide more details within the next hour.

Updates:

  • Time: Feb. 25, 2021, 11:39 p.m.
    Status: Postmortem
    Update: ### **SUMMARY** From Feb 10th, 2021, at 3:15 AM UTC to Feb 11th at 12:23 AM UTC, a subset of Atlassian customers using Trello, Jira, Opsgenie, Access, and Confluence products were unable to login. The event was caused by a faulty change in Atlassian Access that was deployed to production. The changes included Atlassian Access verifying domains and claiming accounts associated with organizations, even though those organizations did not initiate the domain verifications or account claims. However this did not have any impact on customer privacy. This impacted customers in all regions. When a scheduled job executed, the faulty change was activated and the incident was triggered. The incident was detected after 118 minutes by customer support and mitigated by rolling back the faulty change and by progressively setting affected domains and accounts to a good state. The total time to resolution was about 21 hours and 8 minutes. The impact on the products affected is listed below. ### **IMPACT** The product specific impact is between Feb 10th, 2021, 3:15 AM UTC and Feb 11th, 12:23 AM UTC ### **Atlassian Access**  * Some [domains were verified and user accounts of the domains were claimed](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts) without admin consent. The accounts associated with these domains became managed accounts, but this did not have any impact on customer privacy. * The users of such accounts received an email stating that their account was now being managed by their organization. ### **Confluence, Trello, Jira, Opsgenie** * A subset of users were unable to login to the products during this time. ### **ROOT CAUSE** The issue was caused by a faulty background job in Atlassian Access, which was periodically executed to verify domain ownership, verify domains, and claim accounts for the domain. This resulted in some end-user accounts being locked out. As a result, the products called out above did not allow login to those end users, and the users received login failure messages. The faulty change was in one of the key services of our system which had an impact on downstream systems including products mentioned above. Determining a good state took longer than anticipated. ### **REMEDIAL ACTIONS PLAN & NEXT STEPS** We know that outages impact your productivity. We deploy our changes progressively \(by cloud region\) to avoid broad impact. However, in this case our detection of the domain verification and accounts claim did not work as expected. Moving forward, to minimize the impact of breaking changes to our environments, we will implement preventative measures such as the ones listed below. **Prevention and Detection** * While we have very good coverage on testing of the affected service with the faulty change, additional use cases are being identified and tests are being added. These additional tests would help us verify the changes at various stages of deployment. * We are improving our process of deployment of the affected service to increase confidence in our deployments by taking some steps such as: * Progressive rollouts to production. * Increased level of scrutiny on changes to be deployed to sensitive services. **Restoration Time** * We are improving our end-to-end processes for recovering from such incidents and to reduce the outage/degradation time by: * Introducing runbooks for identifying impact quickly and restoring the data to a good state. * Investigating the architecture between our Access and Identity systems to identify quick recovery opportunities. * We will be conducting a review of our architecture to identify any opportunities for faster recovery under such circumstances. We have identified multiple improvement actions across the affected products to improve resiliency on failures. At the time of writing, we are in the process of implementing some of these. We apologize to customers who were impacted during this incident; we are taking immediate steps to improve the reliability of the domain verification and accounts claim services. Thanks, Atlassian Customer Support
  • Time: Feb. 11, 2021, 3:26 p.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: Feb. 11, 2021, 4:29 a.m.
    Status: Identified
    Update: This issue has been resolved and verified against the affected Orgs.
  • Time: Feb. 11, 2021, 4:11 a.m.
    Status: Identified
    Update: We have taken all the steps required to resolve the incident. We are completing the verification of the resolution on all affected Orgs to mark the incident as resolved.
  • Time: Feb. 10, 2021, 11:37 p.m.
    Status: Identified
    Update: We continue to work on resolving the issue. Currently, we have restored some of the organizations and are in the process of restoring the remaining Organizations to a good state. The work underway includes some Organizations whose SAML configuration may not be working for SSO. The team is working on corrective actions and we expect to fully recover shortly. Additional updates will be posted when available.
  • Time: Feb. 10, 2021, 9:12 p.m.
    Status: Identified
    Update: We continue to work on resolving the unclaimed domain issues against the organizations that should otherwise have claimed domains. This includes domain claims that are marked as "superseded". Team has identified the root cause and have performed corrective actions against a handful of organizations' claimed domains reverting back to the last valid state. Same team is working on corrective actions for the other impacted organizations and expect full recovery shortly. Additional updates will be posted when available.
  • Time: Feb. 10, 2021, 7:33 p.m.
    Status: Investigating
    Update: We are currently investigating an issue where a subset of domains (and thus organisations) that were impacted by the earlier incident are still facing issues with their prior domain claims not being shown and resulting users may be locked out of associated products. Atlassian has identified that this outage is caused by the incident and is not a security related issue and there is no data loss or any of the associated accounts have been compromised. We are actively working to resolve this outage. We will post more information here in the next 2 hours

Updates:

  • Time: Feb. 25, 2021, 11:39 p.m.
    Status: Postmortem
    Update: ### **SUMMARY** From Feb 10th, 2021, at 3:15 AM UTC to Feb 11th at 12:23 AM UTC, a subset of Atlassian customers using Trello, Jira, Opsgenie, Access, and Confluence products were unable to login. The event was caused by a faulty change in Atlassian Access that was deployed to production. The changes included Atlassian Access verifying domains and claiming accounts associated with organizations, even though those organizations did not initiate the domain verifications or account claims. However this did not have any impact on customer privacy. This impacted customers in all regions. When a scheduled job executed, the faulty change was activated and the incident was triggered. The incident was detected after 118 minutes by customer support and mitigated by rolling back the faulty change and by progressively setting affected domains and accounts to a good state. The total time to resolution was about 21 hours and 8 minutes. The impact on the products affected is listed below. ### **IMPACT** The product specific impact is between Feb 10th, 2021, 3:15 AM UTC and Feb 11th, 12:23 AM UTC ### **Atlassian Access**  * Some [domains were verified and user accounts of the domains were claimed](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts) without admin consent. The accounts associated with these domains became managed accounts, but this did not have any impact on customer privacy. * The users of such accounts received an email stating that their account was now being managed by their organization. ### **Confluence, Trello, Jira, Opsgenie** * A subset of users were unable to login to the products during this time. ### **ROOT CAUSE** The issue was caused by a faulty background job in Atlassian Access, which was periodically executed to verify domain ownership, verify domains, and claim accounts for the domain. This resulted in some end-user accounts being locked out. As a result, the products called out above did not allow login to those end users, and the users received login failure messages. The faulty change was in one of the key services of our system which had an impact on downstream systems including products mentioned above. Determining a good state took longer than anticipated. ### **REMEDIAL ACTIONS PLAN & NEXT STEPS** We know that outages impact your productivity. We deploy our changes progressively \(by cloud region\) to avoid broad impact. However, in this case our detection of the domain verification and accounts claim did not work as expected. Moving forward, to minimize the impact of breaking changes to our environments, we will implement preventative measures such as the ones listed below. **Prevention and Detection** * While we have very good coverage on testing of the affected service with the faulty change, additional use cases are being identified and tests are being added. These additional tests would help us verify the changes at various stages of deployment. * We are improving our process of deployment of the affected service to increase confidence in our deployments by taking some steps such as: * Progressive rollouts to production. * Increased level of scrutiny on changes to be deployed to sensitive services. **Restoration Time** * We are improving our end-to-end processes for recovering from such incidents and to reduce the outage/degradation time by: * Introducing runbooks for identifying impact quickly and restoring the data to a good state. * Investigating the architecture between our Access and Identity systems to identify quick recovery opportunities. * We will be conducting a review of our architecture to identify any opportunities for faster recovery under such circumstances. We have identified multiple improvement actions across the affected products to improve resiliency on failures. At the time of writing, we are in the process of implementing some of these. We apologize to customers who were impacted during this incident; we are taking immediate steps to improve the reliability of the domain verification and accounts claim services. Thanks, Atlassian Customer Support
  • Time: Feb. 11, 2021, 3:26 p.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: Feb. 11, 2021, 4:29 a.m.
    Status: Identified
    Update: This issue has been resolved and verified against the affected Orgs.
  • Time: Feb. 11, 2021, 4:11 a.m.
    Status: Identified
    Update: We have taken all the steps required to resolve the incident. We are completing the verification of the resolution on all affected Orgs to mark the incident as resolved.
  • Time: Feb. 10, 2021, 11:37 p.m.
    Status: Identified
    Update: We continue to work on resolving the issue. Currently, we have restored some of the organizations and are in the process of restoring the remaining Organizations to a good state. The work underway includes some Organizations whose SAML configuration may not be working for SSO. The team is working on corrective actions and we expect to fully recover shortly. Additional updates will be posted when available.
  • Time: Feb. 10, 2021, 9:12 p.m.
    Status: Identified
    Update: We continue to work on resolving the unclaimed domain issues against the organizations that should otherwise have claimed domains. This includes domain claims that are marked as "superseded". Team has identified the root cause and have performed corrective actions against a handful of organizations' claimed domains reverting back to the last valid state. Same team is working on corrective actions for the other impacted organizations and expect full recovery shortly. Additional updates will be posted when available.
  • Time: Feb. 10, 2021, 7:33 p.m.
    Status: Investigating
    Update: We are currently investigating an issue where a subset of domains (and thus organisations) that were impacted by the earlier incident are still facing issues with their prior domain claims not being shown and resulting users may be locked out of associated products. Atlassian has identified that this outage is caused by the incident and is not a security related issue and there is no data loss or any of the associated accounts have been compromised. We are actively working to resolve this outage. We will post more information here in the next 2 hours

Updates:

  • Time: Feb. 25, 2021, 11:38 p.m.
    Status: Postmortem
    Update: ### **SUMMARY** From Feb 10th, 2021, at 3:15 AM UTC to Feb 11th at 12:23 AM UTC, a subset of Atlassian customers using Trello, Jira, Opsgenie, Access, and Confluence products were unable to login. The event was caused by a faulty change in Atlassian Access that was deployed to production. The changes included Atlassian Access verifying domains and claiming accounts associated with organizations, even though those organizations did not initiate the domain verifications or account claims. However this did not have any impact on customer privacy. This impacted customers in all regions. When a scheduled job executed, the faulty change was activated and the incident was triggered. The incident was detected after 118 minutes by customer support and mitigated by rolling back the faulty change and by progressively setting affected domains and accounts to a good state. The total time to resolution was about 21 hours and 8 minutes. The impact on the products affected is listed below. ### **IMPACT** The product specific impact is between Feb 10th, 2021, 3:15 AM UTC and Feb 11th, 12:23 AM UTC ### **Atlassian Access**  * Some [domains were verified and user accounts of the domains were claimed](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts) without admin consent. The accounts associated with these domains became managed accounts, but this did not have any impact on customer privacy. * The users of such accounts received an email stating that their account was now being managed by their organization. ### **Confluence, Trello, Jira, Opsgenie** * A subset of users were unable to login to the products during this time. ### **ROOT CAUSE** The issue was caused by a faulty background job in Atlassian Access, which was periodically executed to verify domain ownership, verify domains, and claim accounts for the domain. This resulted in some end-user accounts being locked out. As a result, the products called out above did not allow login to those end users, and the users received login failure messages. The faulty change was in one of the key services of our system which had an impact on downstream systems including products mentioned above. Determining a good state took longer than anticipated. ### **REMEDIAL ACTIONS PLAN & NEXT STEPS** We know that outages impact your productivity. We deploy our changes progressively \(by cloud region\) to avoid broad impact. However, in this case our detection of the domain verification and accounts claim did not work as expected. Moving forward, to minimize the impact of breaking changes to our environments, we will implement preventative measures such as the ones listed below. **Prevention and Detection** * While we have very good coverage on testing of the affected service with the faulty change, additional use cases are being identified and tests are being added. These additional tests would help us verify the changes at various stages of deployment. * We are improving our process of deployment of the affected service to increase confidence in our deployments by taking some steps such as: * Progressive rollouts to production. * Increased level of scrutiny on changes to be deployed to sensitive services. **Restoration Time** * We are improving our end-to-end processes for recovering from such incidents and to reduce the outage/degradation time by: * Introducing runbooks for identifying impact quickly and restoring the data to a good state. * Investigating the architecture between our Access and Identity systems to identify quick recovery opportunities. * We will be conducting a review of our architecture to identify any opportunities for faster recovery under such circumstances. We have identified multiple improvement actions across the affected products to improve resiliency on failures. At the time of writing, we are in the process of implementing some of these. We apologize to customers who were impacted during this incident; we are taking immediate steps to improve the reliability of the domain verification and accounts claim services. Thanks, Atlassian Customer Support
  • Time: Feb. 10, 2021, 1:39 p.m.
    Status: Resolved
    Update: Between 9 Feb 2021 18:25 UTC to 10 Feb 2021 13:00 UTC, a subset of customers were experiencing issues with Single Sign On and a false Managed Account email notification for their account access to Confluence, Jira Core, Jira Service Management, Jira Software, Opsgenie, Trello, and Atlassian Bitbucket. The issue has been resolved and the service is operating normally. No data has been lost or compromised
  • Time: Feb. 10, 2021, 1:05 p.m.
    Status: Identified
    Update: We have identified an incident that has caused a trigger of false email notifications to a small number of customers, stating an update has been initiated by the customer admin. A subset of these customers has also been locked out of their accounts as a result of the incident. Atlassian has identified that this outage and a related email sent is caused by the incident and is not a security-related issue. We are actively working to resolve this outage and will post more information here in the next 2 hours.
  • Time: Feb. 10, 2021, 5:59 a.m.
    Status: Investigating
    Update: We are currently investigating an issue where accounts of some domains were incorrectly claimed within an Atlassian Organisation. This also caused a bulk update of users via email with a subject “Your organization now manages your account”.

Updates:

  • Time: Feb. 25, 2021, 11:38 p.m.
    Status: Postmortem
    Update: ### **SUMMARY** From Feb 10th, 2021, at 3:15 AM UTC to Feb 11th at 12:23 AM UTC, a subset of Atlassian customers using Trello, Jira, Opsgenie, Access, and Confluence products were unable to login. The event was caused by a faulty change in Atlassian Access that was deployed to production. The changes included Atlassian Access verifying domains and claiming accounts associated with organizations, even though those organizations did not initiate the domain verifications or account claims. However this did not have any impact on customer privacy. This impacted customers in all regions. When a scheduled job executed, the faulty change was activated and the incident was triggered. The incident was detected after 118 minutes by customer support and mitigated by rolling back the faulty change and by progressively setting affected domains and accounts to a good state. The total time to resolution was about 21 hours and 8 minutes. The impact on the products affected is listed below. ### **IMPACT** The product specific impact is between Feb 10th, 2021, 3:15 AM UTC and Feb 11th, 12:23 AM UTC ### **Atlassian Access**  * Some [domains were verified and user accounts of the domains were claimed](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts) without admin consent. The accounts associated with these domains became managed accounts, but this did not have any impact on customer privacy. * The users of such accounts received an email stating that their account was now being managed by their organization. ### **Confluence, Trello, Jira, Opsgenie** * A subset of users were unable to login to the products during this time. ### **ROOT CAUSE** The issue was caused by a faulty background job in Atlassian Access, which was periodically executed to verify domain ownership, verify domains, and claim accounts for the domain. This resulted in some end-user accounts being locked out. As a result, the products called out above did not allow login to those end users, and the users received login failure messages. The faulty change was in one of the key services of our system which had an impact on downstream systems including products mentioned above. Determining a good state took longer than anticipated. ### **REMEDIAL ACTIONS PLAN & NEXT STEPS** We know that outages impact your productivity. We deploy our changes progressively \(by cloud region\) to avoid broad impact. However, in this case our detection of the domain verification and accounts claim did not work as expected. Moving forward, to minimize the impact of breaking changes to our environments, we will implement preventative measures such as the ones listed below. **Prevention and Detection** * While we have very good coverage on testing of the affected service with the faulty change, additional use cases are being identified and tests are being added. These additional tests would help us verify the changes at various stages of deployment. * We are improving our process of deployment of the affected service to increase confidence in our deployments by taking some steps such as: * Progressive rollouts to production. * Increased level of scrutiny on changes to be deployed to sensitive services. **Restoration Time** * We are improving our end-to-end processes for recovering from such incidents and to reduce the outage/degradation time by: * Introducing runbooks for identifying impact quickly and restoring the data to a good state. * Investigating the architecture between our Access and Identity systems to identify quick recovery opportunities. * We will be conducting a review of our architecture to identify any opportunities for faster recovery under such circumstances. We have identified multiple improvement actions across the affected products to improve resiliency on failures. At the time of writing, we are in the process of implementing some of these. We apologize to customers who were impacted during this incident; we are taking immediate steps to improve the reliability of the domain verification and accounts claim services. Thanks, Atlassian Customer Support
  • Time: Feb. 10, 2021, 1:39 p.m.
    Status: Resolved
    Update: Between 9 Feb 2021 18:25 UTC to 10 Feb 2021 13:00 UTC, a subset of customers were experiencing issues with Single Sign On and a false Managed Account email notification for their account access to Confluence, Jira Core, Jira Service Management, Jira Software, Opsgenie, Trello, and Atlassian Bitbucket. The issue has been resolved and the service is operating normally. No data has been lost or compromised
  • Time: Feb. 10, 2021, 1:05 p.m.
    Status: Identified
    Update: We have identified an incident that has caused a trigger of false email notifications to a small number of customers, stating an update has been initiated by the customer admin. A subset of these customers has also been locked out of their accounts as a result of the incident. Atlassian has identified that this outage and a related email sent is caused by the incident and is not a security-related issue. We are actively working to resolve this outage and will post more information here in the next 2 hours.
  • Time: Feb. 10, 2021, 5:59 a.m.
    Status: Investigating
    Update: We are currently investigating an issue where accounts of some domains were incorrectly claimed within an Atlassian Organisation. This also caused a bulk update of users via email with a subject “Your organization now manages your account”.

Check the status of similar companies and alternatives to Guard

Qualys
Qualys

Systems Active

Ping Identity
Ping Identity

Systems Active

Veracode
Veracode

Systems Active

OPSWAT
OPSWAT

Issues Detected

Sonatype
Sonatype

Systems Active

Aqua Security
Aqua Security

Systems Active

appviewx
appviewx

Systems Active

Signifyd
Signifyd

Systems Active

Alert Logic
Alert Logic

Systems Active

Red Canary
Red Canary

Systems Active

Frequently Asked Questions - Guard

Is there a Guard outage?
The current status of Guard is: Systems Active
Where can I find the official status page of Guard?
The official status page for Guard is here
How can I get notified if Guard is down or experiencing an outage?
To get notified of any status changes to Guard, simply sign up to OutLogger's free monitoring service. OutLogger checks the official status of Guard every few minutes and will notify you of any changes. You can veiw the status of all your cloud vendors in one dashboard. Sign up here
What does Guard do?
Atlassian Access provides centralized administration and enterprise-grade security for all Atlassian cloud products.