Last checked: 4 minutes ago
Get notified about any outages, downtime or incidents for ChargeOver and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for ChargeOver.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Developer Docs | Active |
Email Sending | Active |
Integrations | Active |
Main Application | Active |
Payment Processing | Active |
Public Website | Active |
Search | Active |
View the latest incidents for ChargeOver and check for official updates:
Description: This has been resolved.
Status: Resolved
Impact: Minor | Started At: June 28, 2021, 4:31 p.m.
Description: ChargeOver primarily uses the MariaDB database for data storage. The MariaDB process crashed on our primary database server at 11:09 CST. The process crashed with the following error message which is still being investigated: `InnoDB: Failing assertion: templ->clust_rec_field_no != ULINT_UNDEFINED` ChargeOver staff were immediately notified, and we began to investigate the issue. The database was automatically restarted immediately, and the database began to run automated data integrity checks to ensure that no data was lost, and no data was corrupted before beginning to service requests again. Although we had the ability to fail-over to a secondary database server, a decision was made to let the process complete, as the estimated downtime was very short. This automated data integrity check took much longer than originally expected. Our estimated time to recovery was less than an hour, and instead the database server took approximately 3 hours to do integrity checks and restart safely. The data integrity checks took from 11:09 CST to 14:49 CST. After the data checks were complete, our team ran through our recovery checklist, and started the database server. Service was restored in a degraded state at 15:01 CST, and fully operational at 15:15 CST. We recognize that there are many things to be learned from this lesson, and are working towards putting pieces in place to be able to avoid the long check times and revise our fail-over processes in the future to better account for possible long check times. Please make sure to subscribe to updates at [https://status.ChargeOver.com](https://status.ChargeOver.com) to be notified of service disruptions in the future.
Status: Postmortem
Impact: Critical | Started At: Sept. 9, 2020, 4:15 p.m.
Description: First Data has informed us that the problem is resolved. First Data has not provided a root cause or any other information about the issue at this time.
Status: Resolved
Impact: None | Started At: Sept. 2, 2020, 5:09 p.m.
Description: **What Happened / Customer Impact** Our certificate authority issued ChargeOver a TLS/SSL certificate with a CA chain certificate which expired before our actual TLS/SSL certificate did. This caused automatic invoice generation and payment processing to be delayed for some customers. **Technical Details** ChargeOver secures internal and external connections with TLS/SSL certificates. The company ChargeOver purchases certificates from issued us an SSL/TLS certificate with a chain file which expired before our actual certificate. So even though our SSL/TLS certificate was valid and _not_ expired, a certificate in the chain needed to validate the certificate expired on May 30th. Most web browsers were unaffected, so access to the [ChargeOver.com](http://ChargeOver.com) website and app were unaffected. However, common libraries and tools like cURL and wget began rejecting connections due to the expired chain certificate. ChargeOver's scheduled invoice generation and scheduled payment processes depend on the cURL library, and so the system was unable to trigger invoice generation and payment processing for some accounts scheduled to generate invoices after the certificate had expired. Our monitoring picked up the issue, and alerted our engineering team. ChargeOver then removed the expired certificate from the chain, and invoices and payments began processing normally again. This caused a delay of invoice/payment processing of between 30 minutes and 4 hours for some ChargeOver accounts. **Ongoing Efforts** We are working on some additional validation to ensure that our CA cannot issue us certificates with a certificate chain that expires prior to the certificate we are being issued.
Status: Postmortem
Impact: Minor | Started At: May 30, 2020, 6:09 p.m.
Description: Some ChargeOver accounts were unavailable for less than 2 minutes due to an internal routing issue. The routing issue was related to an infrastructure-related upgrade deployment. Engineering identified the issue immediately after the deploy, and the issue was resolved in under 2 minutes. Engineering has taken steps to ensure that this class of errors can no longer occur on future routing-system upgrades.
Status: Resolved
Impact: None | Started At: April 3, 2020, 2 a.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.