Company Logo

Is there an Firstup outage?

Firstup status: Systems Active

Last checked: 7 minutes ago

Get notified about any outages, downtime or incidents for Firstup and 1800+ other cloud vendors. Monitor 10 companies, for free.

Subscribe for updates

Firstup outages and incidents

Outage and incident data over the last 30 days for Firstup.

There have been 0 outages or incidents for Firstup in the last 30 days.

Severity Breakdown:

Tired of searching for status updates?

Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!

Sign Up Now

Components and Services Monitored for Firstup

Outlogger tracks the status of these components for Xero:

Identity Access Management Active
Image Transformation API Active
SendGrid API v3 Active
Zoom Zoom Virtual Agent Active
Connect Active
Integrations Active
Partner API Active
User Sync Active
EU Firstup Platform Active
US Firstup Platform Active
Classic Studio Active
Creator Studio Active
Insights Active
Microapps Active
Mobile Experience Active
Web Experience Active
Component Status
Active
Identity Access Management Active
Image Transformation API Active
SendGrid API v3 Active
Zoom Zoom Virtual Agent Active
Active
Connect Active
Integrations Active
Partner API Active
User Sync Active
Active
EU Firstup Platform Active
US Firstup Platform Active
Active
Classic Studio Active
Creator Studio Active
Insights Active
Microapps Active
Mobile Experience Active
Web Experience Active

Latest Firstup outages and incidents.

View the latest incidents for Firstup and check for official updates:

Updates:

  • Time: May 17, 2024, 11:54 p.m.
    Status: Postmortem
    Update: **Summary:** On May 2nd, 2024, at 10:39 AM EDT, a system monitor alerted us of a potential issue where the disk space on a service used to pass messages between backend workers was approaching critical “free disk space limits”. As we started looking at the event condition, customer reports of various Studio functions experiencing issues started coming in, including but not limited to the following conditions: * Unable to send test campaigns * Processing error messages * Test campaign emails are not being delivered * White screens * Studio loading issues A platform incident was declared at 12:41 PM EDT, and the incident response team was engaged to diagnose the reported issues. ‌ **Impact:** The impact was determined to affect all Studio users who attempted to connect to Studio or initiate new Studio activities. ‌ **Root Cause:** The incident response team identified that one of the queues in the impacted service was backed up, in effect utilizing too much memory, which led to the out-of-memory condition. As a result, new Studio service requests could not establish connections to this service. The inability to establish connections to the service presented itself as the aforementioned customer-reported issues. ​ **Mitigation:** To restore Studio services, the backed-up queue was purged at around 1:00 PM EDT to free up memory, which increased the available disk space for the service. This allowed for other queues to continue processing, as well as new Studio service requests to gain a connection to the service, and process successfully. For any affected transactions that were stuck during the purge, such as scheduled campaigns that did not publish, these were manually published. No customer data was lost from purging the queue. ​ **Recurrence Prevention:** To prevent a recurrence of this incident, we have since deployed a hotfix to the code that checks if the queue size is over a certain limit before queueing more messages, to prevent this exact out-of-memory failure scenario.
  • Time: May 17, 2024, 11:54 p.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: May 2, 2024, 5:05 p.m.
    Status: Monitoring
    Update: This service degradation has been mitigated, and are working to identify the root cause. Studio and its functions are now available. Please note that there may be some slight delays in campaign deliveries as tasks catch up within our databases.
  • Time: May 2, 2024, 4:50 p.m.
    Status: Investigating
    Update: We are currently investigating reports of various Studio functionalities not performing as expected. We will provide you with another update in 30 minutes.

Updates:

  • Time: May 28, 2024, 4:28 p.m.
    Status: Postmortem
    Update: **Summary:** On April 30th, 2024, starting at 8:18 AM EDT, we began to receive reports that User Sync files were failing to process, and the following error message was returned: * Failed to decrypt uploaded file. Please ensure that the correct encryption key and format is used. * The encryption key expected to be used is \[Key Fingerprint\]. A platform incident was declared at 10:23 AM EDT and was fully mitigated by 10:59 AM EDT. **Scope and Impact:** The scope of this incident was isolated to only customers who encrypt their User Sync file before uploading it. The impact of this incident was restricted to customers who had uploaded an encrypted User Sync file between 10:03 PM EDT on April 29th, 2024, and 10:59 AM EDT on April 30th, 2024. **Root Cause:** The incident response team identified that this incident resulted from a regression to a software release on April 29th, 2024. It was identified that the OS image used to deploy the upgrade lacked crucial packages for decryption. **Mitigation:** At 10:59 AM EDT, the released upgrade was rolled back to its previous version which contained the decryption packages, to allow normal decryption of encrypted User Sync files. We also identified and reprocessed any encrypted customer User Sync files that had failed to process within the duration of the incident. **Recurrence Prevention:** A technical team post-mortem meeting reviewed that the zip-based deployment of the OS had no controls over updating or re-deploying the upgrade. We therefore transitioned to an image-based deployment which allowed for greater control over the OS image and the necessary dependencies. The upgrade was later redeployed on May 6th, 2024, using the OS image that included the necessary decryption packages. We also: * Added additional monitoring and alerting for the health of external-registration \(User Sync files processing\). * Updated regression test packs to include testing user sync with encrypted files.
  • Time: May 2, 2024, 3:53 p.m.
    Status: Resolved
    Update: We have observed that PGP-encrypted user sync files continue to process successfully. This platform service disruption is now resolved, and an RCA will be provided once a full incident postmortem has been completed.
  • Time: April 30, 2024, 4:14 p.m.
    Status: Monitoring
    Update: All impacted user sync files have now been reprocessed successfully. Please note that only PGP-encrypted user sync files were in the scope of this incident. Additional details will be provided once a postmortem of the incident has been completed. This incident is now considered resolved. We will be placing the impacted systems under monitoring for now.
  • Time: April 30, 2024, 3:10 p.m.
    Status: Monitoring
    Update: A fix for this issue has been deployed, and user sync files are now processing successfully. We will be re-running any previously failed user sync files, and confirm once completed.
  • Time: April 30, 2024, 2:59 p.m.
    Status: Identified
    Update: We have identified the cause of this service disruption, and are working to fix it. Another update in 1 hour.
  • Time: April 30, 2024, 2:32 p.m.
    Status: Investigating
    Update: We are currently investigating reports where user sync files are failing due to PGP encrypted files failing to be processed. We will provide you with an update within 1 hour.

Updates:

  • Time: May 28, 2024, 4:28 p.m.
    Status: Postmortem
    Update: **Summary:** On April 30th, 2024, starting at 8:18 AM EDT, we began to receive reports that User Sync files were failing to process, and the following error message was returned: * Failed to decrypt uploaded file. Please ensure that the correct encryption key and format is used. * The encryption key expected to be used is \[Key Fingerprint\]. A platform incident was declared at 10:23 AM EDT and was fully mitigated by 10:59 AM EDT. **Scope and Impact:** The scope of this incident was isolated to only customers who encrypt their User Sync file before uploading it. The impact of this incident was restricted to customers who had uploaded an encrypted User Sync file between 10:03 PM EDT on April 29th, 2024, and 10:59 AM EDT on April 30th, 2024. **Root Cause:** The incident response team identified that this incident resulted from a regression to a software release on April 29th, 2024. It was identified that the OS image used to deploy the upgrade lacked crucial packages for decryption. **Mitigation:** At 10:59 AM EDT, the released upgrade was rolled back to its previous version which contained the decryption packages, to allow normal decryption of encrypted User Sync files. We also identified and reprocessed any encrypted customer User Sync files that had failed to process within the duration of the incident. **Recurrence Prevention:** A technical team post-mortem meeting reviewed that the zip-based deployment of the OS had no controls over updating or re-deploying the upgrade. We therefore transitioned to an image-based deployment which allowed for greater control over the OS image and the necessary dependencies. The upgrade was later redeployed on May 6th, 2024, using the OS image that included the necessary decryption packages. We also: * Added additional monitoring and alerting for the health of external-registration \(User Sync files processing\). * Updated regression test packs to include testing user sync with encrypted files.
  • Time: May 2, 2024, 3:53 p.m.
    Status: Resolved
    Update: We have observed that PGP-encrypted user sync files continue to process successfully. This platform service disruption is now resolved, and an RCA will be provided once a full incident postmortem has been completed.
  • Time: April 30, 2024, 4:14 p.m.
    Status: Monitoring
    Update: All impacted user sync files have now been reprocessed successfully. Please note that only PGP-encrypted user sync files were in the scope of this incident. Additional details will be provided once a postmortem of the incident has been completed. This incident is now considered resolved. We will be placing the impacted systems under monitoring for now.
  • Time: April 30, 2024, 3:10 p.m.
    Status: Monitoring
    Update: A fix for this issue has been deployed, and user sync files are now processing successfully. We will be re-running any previously failed user sync files, and confirm once completed.
  • Time: April 30, 2024, 2:59 p.m.
    Status: Identified
    Update: We have identified the cause of this service disruption, and are working to fix it. Another update in 1 hour.
  • Time: April 30, 2024, 2:32 p.m.
    Status: Investigating
    Update: We are currently investigating reports where user sync files are failing due to PGP encrypted files failing to be processed. We will provide you with an update within 1 hour.

Updates:

  • Time: June 7, 2024, 7:56 p.m.
    Status: Postmortem
    Update: ## Summary: On February 8th, 2024, beginning at approximately 1:56 PM EST \(18:56 UTC\), we started receiving reports of Studio not performing as expected. The symptoms observed by some Studio users included: ·       A “failed to fetch” or a “504 Gateway Timeout” error message.  ·       Unusually slow performance. A recurrence of this incident was also observed on April 24th, 2024. ## Impact: Studio users who were actively trying to navigate through and use any Studio functions during the duration of these incidents were impacted by the service disruption. ## Root Cause: It was identified that Studio services were failing to establish a TCP connection to the Identity and Access Management service \(IAM\) due to a backup of TCP connection requests. The backup of TCP connection requests resulted from other “already failed” connection requests that were not dropped because they kept retrying to establish a connection for an extended period. ## Mitigation: On both days, the immediate problem was mitigated by restarting the backend services that had failed TCP connection attempts, in effect purging the connection request queue of stale connections and allowing new connections to be established with the IAM service. ## Remediation Steps: Our engineering team is working on reducing the time-to-live duration of all TCP connection requests to the IAM service from the default 60 seconds to 10 seconds. This will allow for failed connections to be dropped sooner and reduce the backup of connection requests to IAM. In addition, we have also implemented dashboards to track TCP connection failures, as well as set alerting thresholds on failed TCP connections to help us get ahead of a potential platform service disruption.
  • Time: May 2, 2024, 3:49 p.m.
    Status: Resolved
    Update: Studio has remained fully accessible following the bouncing of the affected services. This platform service degradation is now considered resolved, and a RCA analysis will be provided once a full incident postmortem has been completed.
  • Time: April 24, 2024, 11:48 p.m.
    Status: Investigating
    Update: We have bounced the impacted services to mitigate this performance degradation. Studio is now accessible, as we work to identify the root cause of this incident. We will provide you with another update as soon as more information is made available.
  • Time: April 24, 2024, 10:57 p.m.
    Status: Investigating
    Update: We are currently investigating reports of intermittent 5xx errors while accessing Studio. We will provide you with an update within 1 hour.

Updates:

  • Time: June 7, 2024, 7:56 p.m.
    Status: Postmortem
    Update: ## Summary: On February 8th, 2024, beginning at approximately 1:56 PM EST \(18:56 UTC\), we started receiving reports of Studio not performing as expected. The symptoms observed by some Studio users included: ·       A “failed to fetch” or a “504 Gateway Timeout” error message.  ·       Unusually slow performance. A recurrence of this incident was also observed on April 24th, 2024. ## Impact: Studio users who were actively trying to navigate through and use any Studio functions during the duration of these incidents were impacted by the service disruption. ## Root Cause: It was identified that Studio services were failing to establish a TCP connection to the Identity and Access Management service \(IAM\) due to a backup of TCP connection requests. The backup of TCP connection requests resulted from other “already failed” connection requests that were not dropped because they kept retrying to establish a connection for an extended period. ## Mitigation: On both days, the immediate problem was mitigated by restarting the backend services that had failed TCP connection attempts, in effect purging the connection request queue of stale connections and allowing new connections to be established with the IAM service. ## Remediation Steps: Our engineering team is working on reducing the time-to-live duration of all TCP connection requests to the IAM service from the default 60 seconds to 10 seconds. This will allow for failed connections to be dropped sooner and reduce the backup of connection requests to IAM. In addition, we have also implemented dashboards to track TCP connection failures, as well as set alerting thresholds on failed TCP connections to help us get ahead of a potential platform service disruption.
  • Time: May 2, 2024, 3:49 p.m.
    Status: Resolved
    Update: Studio has remained fully accessible following the bouncing of the affected services. This platform service degradation is now considered resolved, and a RCA analysis will be provided once a full incident postmortem has been completed.
  • Time: April 24, 2024, 11:48 p.m.
    Status: Investigating
    Update: We have bounced the impacted services to mitigate this performance degradation. Studio is now accessible, as we work to identify the root cause of this incident. We will provide you with another update as soon as more information is made available.
  • Time: April 24, 2024, 10:57 p.m.
    Status: Investigating
    Update: We are currently investigating reports of intermittent 5xx errors while accessing Studio. We will provide you with an update within 1 hour.

Check the status of similar companies and alternatives to Firstup

Gainsight
Gainsight

Systems Active

Glia
Glia

Systems Active

Gorgias
Gorgias

Systems Active

observeai
observeai

Systems Active

Playvox
Playvox

Systems Active

Help Scout
Help Scout

Systems Active

Experience
Experience

Systems Active

Totango
Totango

Systems Active

emnify
emnify

Systems Active

Spiceworks
Spiceworks

Systems Active

Aloware
Aloware

Systems Active

Close
Close

Systems Active

Frequently Asked Questions - Firstup

Is there a Firstup outage?
The current status of Firstup is: Systems Active
Where can I find the official status page of Firstup?
The official status page for Firstup is here
How can I get notified if Firstup is down or experiencing an outage?
To get notified of any status changes to Firstup, simply sign up to OutLogger's free monitoring service. OutLogger checks the official status of Firstup every few minutes and will notify you of any changes. You can veiw the status of all your cloud vendors in one dashboard. Sign up here