Last checked: 8 minutes ago
Get notified about any outages, downtime or incidents for BigPanda and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for BigPanda.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Third Party | Active |
APIs | Active |
Tier 1 APIs: Automation & Event Processing | Active |
Tier 2 APIs: Supplemental | Active |
Tier 3 APIs: Tertiary | Active |
Console Functions | Active |
Administrator Screens | Active |
Automatic Incident Triage | Active |
Incident Actions | Active |
Incident Activity Feed | Active |
Incident Feed | Active |
Incident Feed Search | Active |
Integration Diagnostics / Troubleshooting | Active |
Login | Active |
Root Cause Changes | Active |
Unified Analytics | Active |
Unified Search | Active |
Inbound Integrations and Event Processing | Active |
Alert Enrichment | Active |
Alert Filtering & Maintenance Plans | Active |
Correlation | Active |
Data Consumption | Active |
Incident Enrichment & Environments Population | Active |
Outbound Collaboration | Active |
ETL Pipeline | Active |
Incident Sharing | Active |
Outbound Integrations | Active |
View the latest incidents for BigPanda and check for official updates:
Description: Our team has resolved the incident and services have returned to their normal operation. <b>Start time:</b> 09:43 UTC <b>End time:</b> 10:22 UTC <b>What was impacted?</b> • Incident Sharing - Users may have experienced latencies when sharing BigPanda Incidents to external systems <b>What was not impacted?</b> All other BigPanda functionality, including data ingest and processing, were not impacted, and Incident updates to users' consoles continued to arrive in a timely manner. We apologize for any inconvenience that this may have caused. Should you continue to experience any issues, please reach out to us via our in-app chat or at [email protected].
Status: Resolved
Impact: Minor | Started At: Jan. 26, 2022, 10:19 a.m.
Description: Our team has resolved the incident and services have returned to their normal operation. <b>Start time:</b> 4:43 PM UTC <b>End time:</b> 6:36 PM UTC <b>What was impacted?</b> • APIs • BigPanda Console • Pipeline We apologize for any inconvenience that this may have caused. Should you continue to experience any issues, please reach out to us via our in-app chat or at [email protected].
Status: Resolved
Impact: Minor | Started At: Jan. 9, 2022, 4:43 p.m.
Description: The issues with the Inbound Alerts API have been mitigated. Users may have seen an increased rate of 404 response code from several out of the box integrations. This was due to a change within the recent Maintenance Window. The team has subsequently rolled back the change, returning BigPanda back to service. Should you continue to experience any issues, please reach out to us via our in-app chat or at [email protected].
Status: Resolved
Impact: Minor | Started At: Dec. 19, 2021, 3:39 p.m.
Description: Our service provider has fixed the root cause of today's Incident, and all impacted services in the US-WEST-1 and US-WEST-2 regions have returned to normal operating levels. The following BigPanda functionality should now be operating within normal operational levels as well: • Incident Sharing • BigPanda Console We apologize for any inconvenience that this may have caused. Should you continue to experience any issues, please reach out to us via our in-app chat or at [email protected].
Status: Resolved
Impact: Minor | Started At: Dec. 15, 2021, 3:41 p.m.
Description: <big><b>UPDATE:</b></big> On January 20, 2022, BigPanda completed the upgrade to Apache Log4j version 2.17.1 to address the Medium Risk finding detailed in CVE-2021-44832 on December 28, 2021. The upgrade was completed in all BigPanda environments, and no customer data was impacted by this vulnerability. We will continue to monitor Log4j security announcements and respond if additional vulnerabilities are identified. <b>BigPanda’s Log4j Vulnerability Remediation History:</b> <i>• (CVE-2021-44228) Mitigate with Config Change completed 12-Dec-2021 • (CVE-2021-44228) Upgrade to v2.15 completed 14-Dec-2021 • (CVE-2021-45046) Upgrade to v2.16 completed 16-Dec-2021 • (CVE-2021-45105) Upgrade to v2.17 completed 21-Dec-2021 • (CVE-2021-44832) Upgrade to v2.17.1 completed 23-Jan-2022</i> <hr/>On December 20, 2021, BigPanda assessed the risk associated Apache Log4j vulnerability CVE-2021-45105 and determined the upgrade to version 2.17.0 could be completed safely in all BigPanda environments. BigPanda successfully completed the upgrade to Apache Log4j version 2.17.0 on December 21, 2021, to mitigate all known vulnerabilities in Log4j v2. We will continue to monitor for additional Log4j vulnerabilities and patches. <hr/>On December 12, 2021, BigPanda mitigated the initial risk from CVE-2021-44228 on by configuring the Log4j2 properties to prohibit the capability that the vulnerability depends upon. On December 14, 2021, BigPanda performed upgrades to v2.15. When v2.15 was found to be incomplete, BigPanda remediated CVE-2021-45046 on December 16, 2021, with final upgrades to v2.16. No customer data was impacted. <hr/>On Friday, December 10, 2021, the world became aware of a remote code execution vulnerability affecting Apache Log4j2. The zero-day, critical-severity exploit is also known as the “Log4Shell” vulnerability, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank">CVE-2021-44228</a>. It has an assigned CVSS severity score of 10. Apache Log4j2 is a Java-based logging framework widely used in commercial and open-source software products. The Log4Shell vulnerability exploit can be used by attackers to execute code on backend servers that log unescaped user input, putting these machines at risk by potentially installing malware, accessing customer data, and worse. As soon as BigPanda learned of this vulnerability, the R&D, Professional Services, Integrations, Security and Engineering teams promptly evaluated the assessed threat and risk to BigPanda and our customers, covering four pillars of our service: • BigPanda web app, core APIs, and infrastructure • Out-of-the-box (OOTB) Integrations • Custom Solutions & Integrations • Sub-processors The team analyzed code to identify any components affected, the risk exposure, whether the affected service was public facing or internal, the owner, and the plan for remediation. BigPanda’s web app & core APIs had three domain areas affected. Two of the areas were internal facing only and could not be accessed directly from the public internet. The third area identified is only called by the front-end web app and requires a customer access token or the API call fails. All vulnerabilities were successfully mitigated on December 12, 2021, by updating all mapped services and platform components, and configuring the log4j2 properties to prohibit the capability that the vulnerability depends upon. OOTB Integrations and Custom Solutions & Integrations were analyzed for the affected Log4j2 library for BigPanda Hosted and BigPanda OOTB on-premise Agent and SNMP Daemon. It has been determined we are not dependent on the Apache Log4j2 for logging in those solutions. Analysis identified Log4j2 as one plug-in used by an OOTB integration, but it does not use a CVE affected version. In short, the vulnerability does not affect BigPanda’s OOTB Integrations and Custom Solutions & Integrations. BigPanda’s security team is reaching out to all sub-processors to identify which sub-processors have been affected by the vulnerability, if there is any risk to BigPanda data, and confirmation the vulnerability has been remediated. With our thorough analysis and response, we are confident that BigPanda's core platform and integrations are fully patched against the Log4Shell vulnerability (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank">CVE-2021-44228</a>). Customers do not need to take any action.
Status: Resolved
Impact: None | Started At: Dec. 12, 2021, 6:37 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.