Last checked: a minute ago
Get notified about any outages, downtime or incidents for InfluxDB and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for InfluxDB.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
AWS: Sydney (Discontinued) | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Dedicated | Active |
API Reads | Active |
API Writes | Active |
Management API | Active |
Cloud Serverless: AWS, EU-Central | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: AWS, US-East-1 | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: AWS, US-West-2-1 | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: AWS, US-West-2-2 | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: Azure, East US | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: Azure, W. Europe | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Cloud Serverless: GCP | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Google Cloud: Belgium (Discontinued) | Active |
API Queries | Active |
API Writes | Active |
Compute | Active |
Other | Active |
Persistent Storage | Active |
Tasks | Active |
Web UI | Active |
Other Services | Active |
Auth0 User Authentication | Active |
Marketplace integrations | Active |
Web UI Authentication (Auth0) | Active |
View the latest incidents for InfluxDB and check for official updates:
Description: This incident has been resolved.
Status: Resolved
Impact: Critical | Started At: March 13, 2023, 4:22 p.m.
Description: We are continuing to monitor but there are no delays in writes or other issues at this time.
Status: Resolved
Impact: Minor | Started At: March 11, 2023, 1:16 a.m.
Description: We are continuing to monitor but there are no delays in writes or other issues at this time.
Status: Resolved
Impact: Minor | Started At: March 11, 2023, 1:16 a.m.
Description: # Incident RCA RCA - 503 errors in eu-central on March 7, 2023 # **Summary** We use Hashicorp’s Vault product to secure access to secrets within our clusters. Vault is configured in a highly available active-standby configuration, with one active instance and two standby instances \(the recommended HA configuration\). On March 7, 2023, 09:26 UTC we saw a high rate of errors on the write and read paths in eu-central, due to Vault becoming unreachable. We restarted Vault, and then restarted the query, write and storage pods in a controlled manner, and the cluster recovered. # **Cause of the Incident** The root cause was our Vault infrastructure becoming overloaded. We use Vault to securely handle authorization tokens and store customer secrets. The number of requests became too high for the Vault system to respond in a timely manner causing requests to fail. Because the write and read services rely on the secrets in Vault to be able to process customer data, these services started failing health checks and being restarted in an attempt to recover. Each restart increased the load on Vault further, creating a positive feedback loop that meant the system could not recover without intervention. # **Recovery** As we had learned in the incident of Feb 24, 2023, Vault can get overwhelmed when too many pods try to connect to Vault at the same time. The remedial action we took was to scale down the size of the worker pools for all customer-facing services in order to reduce the load on Vault to enable it to recover and then slowly increase them back to the previous levels in a controlled manner to avoid stressing the Vault system further. This enabled the cluster to return to normal operation. # **Future mitigations** 1. We are reviewing our Vault readiness check to determine why the active Vault instance did not failover to the standby, when it was no longer able to respond to incoming requests. 2. We are investigating strategies to avoid having so many components rely on Vault access to work correctly.
Status: Postmortem
Impact: None | Started At: March 7, 2023, 9:53 a.m.
Description: # Incident RCA Write and read outage in AWS: Frankfurt, EU-Central-1, AWS: Oregon, US-West-2-1 and AWS: Virginia, US-East-1 # Summary On Feb 24, 2023 at 19.30 UTC, we deployed a software change to multiple production clusters, which caused a significant percentage of writes and queries to fail in our larger clusters. The duration of the outage was different for each cluster as was the level of disruption \(percentage of writes and queries that failed during the incident\). The table below summarizes the time ranges during which the service was impacted in each cluster \(all in UTC time\). | Cluster | Write failure start | Write failure end | Query failure start | Query failure end | | --- | --- | --- | --- | --- | | prod01-us-west-2 | 19:38 | 22:17 | 19:36 | 22:20 | | prod01-eu-central-1 | 19:36 | 23:49 | 19:34 | 23:38 | | prod101-us-east-1 | 19:34 | 22:44 | 19:34 | 00:44 | # Cause of the Incident Our software is deployed via a CD pipeline to three staging clusters \(one per cloud provider\) where a suite of automated tests are run. If those tests pass, then it is deployed into an internal cluster where another round of testing occurs, and finally it is deployed to all of our production clusters in parallel. This is our standard software deployment methodology for our cloud service. On February 24, 2023, an engineer made a change to a health-check to ensure that our query and write pods can reach the vault within the cluster \(where credentials are managed\). In the past, it was possible for a query or write pod to get stuck, if it lost access to the vault. To address that problem, a health check was added so that if a pod could not reach the vault, the pod would stop/restart automatically. This health check was tested in all three staging clusters, and worked fine. The change was promoted to our internal cluster, which also worked fine. The change was then promoted to our production clusters. In the larger clusters, when the pods were restarted \(with the new health check in place\) too many pods made health-check calls to the vault in quick succession. These calls overwhelmed the vault, and it was unable to service all the requests. As the health check failed, the pods attempted to recover by restarting, which put an even heavier workload on the vault, from which it was unable to recover. # Recovery As soon as we detected the problem, and identified the offending software change, we rolled back to an earlier version of our production software, and redeployed that in all the production clusters. In our smaller clusters, this happened quickly, without any significant customer impact. In our three largest clusters \(the clusters listed above\), as the vault was deadlocked, we were unable to deploy the new software without manually restarting the vault instances, and then gradually restarting the services that depend on the vault. This is what caused it to take longer to recover in these clusters. # Future mitigations 1. We are re-implementing the offending health check so that we can detect a stuck pod without putting such a burden on the vault. 2. As the vault is a critical element of our service, we are adding an extra peer review step to all software changes that interact with the vault. 3. We are enhancing the vault configuration to have the vault more gracefully degrade when overloaded. 4. We are enhancing our runbooks so that we can more quickly intervene with manual steps if the regular deployment/rollback process fails, to reduce our overall time-to-recover when a cluster fails to recover normally.
Status: Postmortem
Impact: Critical | Started At: Feb. 24, 2023, 8 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.