Last checked: 5 minutes ago
Get notified about any outages, downtime or incidents for Files.com and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for Files.com.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Australia Region | Active |
Background Jobs, including Sync and Webhooks | Active |
Canada Region | Active |
Core Services / API | Active |
EU (Germany) Region | Active |
Files Tools | Active |
FTP/FTPS | Active |
Japan Region | Active |
Remote Server Integrations (Sync and Mount) | Active |
SFTP | Active |
Singapore Region | Active |
UK Region | Active |
USA Region | Active |
WebDAV | Active |
Web Interface | Active |
View the latest incidents for Files.com and check for official updates:
Description: On May 1st, 2024, at 5:23 AM PST, [Files.com](http://Files.com) correlated multiple customer tickets indicating _‘SFTP Connection failures with the ExaVault SFTP host key and host name’_, which resulted in an incident being declared. The Incident Management Team \(IMT\) convened and immediately began investigation. The _‘Intermittent connection failures, followed by a brief outage of all services for sites using the ExaVault Host Key without a Custom Domain’_ issues were resolved on May 1st, 2024, at 5:51 AM PST, returning the platform to full functionality. [Files.com](http://Files.com) released a resolution posting to the [Status Page](https://status.files.com/) on May 1st, 2024, at 5:51 AM PST stating: _‘ExaVault is a service that was acquired by_ [_Files.com_](http://Files.com)_. A small percentage of former ExaVault customers are still using the ExaVault host key after their migration to_ [_Files.com_](http://Files.com)_. If your site was not migrated from ExaVault, or if you no longer use the ExaVault host key, this incident did not affect you._ _We have resolved an incident that caused intermittent connection failures, followed by a brief outage of all_ [_Files.com_](http://Files.com) _core and auxiliary services in all regions for sites that use the ExaVault Host Key without a Custom Domain._ _Sites with a Custom Domain and those that use the default_ [_Files.com_](http://Files.com) _Host Key were not affected by this outage._ _From 6:30PM Pacific Time on 4/30 until 5:35AM Pacific Time on 5/1, connection attempts failed intermittently on affected sites. From 5:35AM to 5:51AM, services were entirely down for the affected sites._ _All services were restored and operational at 5:51AM._ _We will follow up with an Incident Report within ten \(10\) business days including the root cause and steps taken to address the root cause. If you need additional support, please do not hesitate to contact our Customer Support team by email or phone. Thanks for your support while we resolved this issue.’_ [Files.com](http://Files.com) acquired ExaVault, another MFT service, in 2022. Although all former ExaVault customers have been migrated to the mainline [Files.com](http://Files.com) platform, we do still support and maintain connectivity options which use legacy former ExaVault SFTP Host Key. This allows former ExaVault customers to continue their connections which were established using that host key. We recently deployed a change to expand our support for the ExaVault host key from beyond just our USA region service to all 7 of our global [Files.com](http://Files.com) service regions. This was done at customer request and to improve performance for non-US based customers. As part of this deployment, we replaced several customer-facing systems and we updated our automatic DNS management system to use regional “latency-based” routing for the ExaVault Host Key domain. Unfortunately, a configuration issue occurred which resulted in incorrect DNS records being published to DNS, but only for customers configured to use the ExaVault SFTP Host Key. This resulted in some IPs being returned by DNS no longer representing valid, active servers. This resulted in intermittent connection failures for customers using the ExaVault Host Key. After becoming aware of this problem, we immediately moved to correct the DNS using manual intervention. This caused a short but complete outage of the ExaVault Host Key domain as we removed the automated entry and repopulated it with the correct IP addresses. We subsequently identified the automated DNS configuration issue and resolved it, moving the DNS back into automation. While this sort of change is rare, we regret the impact on our customers and we are committed to perfecting our processes. We have already implemented new monitoring to alert us to cross check all IPs that are published to DNS against other internal resources which list active servers. We’ve also improved logging to make the requested public IP address more visible to customers and our Customer Support team. Additionally, we have started a project to improve visibility into the DNS management logs, so that similar future bugs will be readily apparent. We greatly appreciate your patience and understanding as we resolved this issue. If you need additional assistance or continue to experience issues, please contact our Customer Support team.
Status: Postmortem
Impact: Critical | Started At: May 1, 2024, 12:48 p.m.
Description: We have identified a coding error that caused Automations and manual bulk file move/copy/delete jobs to fail to fully complete in certain situations. This coding error was caused by a race condition in the code that manages our orchestration layer for parallelized file operations. The race condition was in our production environment from 2:22 PM PST on April 13 through 2:18 PM PST on April 16, when we deployed a fix. This issue was more pronounced in larger jobs. The logging output from the jobs is correct. We understand how important it is for your automated jobs to run on time and complete as expected, and we are absolutely committed to ensuring reliability on our platform. We sincerely apologize for any impact that this error had on your operations. We have the capability to re-submit the affected Automation Runs and File Migrations for processing again. We elected not to do this by default because of the potential for unexpected outcomes, but we are happy to manually re-submit your jobs if you would like us to. Please get in touch with our support team, and we can perform this task for you, as well as answer any other questions you may have.
Status: Resolved
Impact: Major | Started At: April 16, 2024, 9:30 p.m.
Description: We have identified a coding error that caused Automations and manual bulk file move/copy/delete jobs to fail to fully complete in certain situations. This coding error was caused by a race condition in the code that manages our orchestration layer for parallelized file operations. The race condition was in our production environment from 2:22 PM PST on April 13 through 2:18 PM PST on April 16, when we deployed a fix. This issue was more pronounced in larger jobs. The logging output from the jobs is correct. We understand how important it is for your automated jobs to run on time and complete as expected, and we are absolutely committed to ensuring reliability on our platform. We sincerely apologize for any impact that this error had on your operations. We have the capability to re-submit the affected Automation Runs and File Migrations for processing again. We elected not to do this by default because of the potential for unexpected outcomes, but we are happy to manually re-submit your jobs if you would like us to. Please get in touch with our support team, and we can perform this task for you, as well as answer any other questions you may have.
Status: Resolved
Impact: Major | Started At: April 16, 2024, 9:30 p.m.
Description: From 9:17am through 9:19pm EST, users on sites with the "SSL/TLS Required" setting set on a sitewide level, but overridden on a per-user basis were unable to log in via insecure FTP (i.e. FTP without SSL/TLS). This was due to a configuration error in a security update that was rolled out on Sunday morning EST.
Status: Resolved
Impact: None | Started At: April 14, 2024, 10:30 p.m.
Description: From 9:17am through 9:19pm EST, users on sites with the "SSL/TLS Required" setting set on a sitewide level, but overridden on a per-user basis were unable to log in via insecure FTP (i.e. FTP without SSL/TLS). This was due to a configuration error in a security update that was rolled out on Sunday morning EST.
Status: Resolved
Impact: None | Started At: April 14, 2024, 10:30 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.