Last checked: 1 month ago
Get notified about any outages, downtime or incidents for CyberGrants and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for CyberGrants.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
APIs | Active |
CyberGrants | Active |
Insights | Active |
Sandbox | Active |
View the latest incidents for CyberGrants and check for official updates:
Description: This incident has been resolved.
Status: Resolved
Impact: Major | Started At: July 27, 2022, 1:51 p.m.
Description: ### What Occurred? At 10:35 PM Eastern on June 28, 2022, a planned maintenance event caused unplanned downtime, Components in the CyberGrants network infrastructure failed in a way that the vendor could not resolve in a reasonable time frame. To bring the CyberGrants site back online, we accelerated our plans to migrate some services to cloud services, which completed at 1:10 AM Eastern on June 29. ### Why Did This Occur \(Root Cause\)? Networking component firmware upgrades, with planning and participation by the vendor, were unsuccessful, making CyberGrants unavailable. ### How Will CyberGrants Prevent Further Occurrences? We have reverted the June 28 changes, and we will take more exhaustive precautions in any future maintenance on these devices. Many of the systems using the affected infrastructure have been migrated to cloud services.
Status: Postmortem
Impact: Minor | Started At: June 29, 2022, 2:37 a.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Critical | Started At: May 20, 2022, 9:18 p.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Critical | Started At: May 20, 2022, 9:18 p.m.
Description: **What Occurred?** On May 3rd, 2022 at 7:30a ET, CyberGrants experienced a total shutdown of all production systems due to the severing of all redundant supplies of power at their co-location Data Center \(Navisite\). Although power was restored within 1 hour, due to the abrupt loss of power, the CyberGrants Operations team had to assess the status of the critical network, storage, and server components, recover key configuration settings and ensure that no data corruption had occurred. **The primary Production system was fully operational at 2:50p ET. Why Did This Occur \(Root Cause\)?** The CyberGrants co-location Data Center \(Navisite\) is a tier-1 facility with fully redundant power. This power loss was caused by a Navisite employed service technician mistakenly hitting the Emergency Power Off \(EPO\) button for the site. This button is required by law for local Fire Marshalls to be able to cut all power to the site in the event of a fire. The EPO button is intentionally designed to sever not only the main power supplied to infrastructure but also the battery backup and generators as well. All EPO buttons within the Navisite Data Center are clearly marked and have two layers of physical protection. After power was restored, CyberGrants ability to quickly restore the failed systems was elongated by a number of factors including getting Operations personnel on-site at the Data Center, assessing the state of all systems, fixing component failures, verifying the integrity of the storage systems, and restarting servers for each tier \(DB, App, Web\). How Will CyberGrants Prevent Further Occurrences. **As a result of this incident CyberGrants is taking the following steps:** 1. Confirm plans and execution with Navisite on the remediations to be implemented as a result of this incident \(i.e., Staff Retraining, Adding additional audio, visual, and physical controls for the EPO buttons\). 2. Reviewing and updating CyberGrants operational procedures for recovering all failed systems in the event of power loss \(i.e., monitoring, network configurations, power loss health checks, run books, etc.\). 3. Scheduling planned sessions where operational procedures can be tested and verified. 4. Enhancing disaster recovery and business continuity capabilities is already part of our infrastructure evolution, including faster full site failover.
Status: Postmortem
Impact: Critical | Started At: May 3, 2022, 11:31 a.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.