Last checked: 4 minutes ago
Get notified about any outages, downtime or incidents for JumpCloud and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for JumpCloud.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Active Directory Integration | Active |
Admin Console | Active |
Agent | Active |
Android EMM | Active |
Commands | Active |
Directory Insights | Active |
General Access API | Active |
G Suite Integration | Active |
JumpCloud GO | Active |
JumpCloud University | Active |
LDAP | Active |
MDM | Active |
Mobile Admin App: iOS and Android | Active |
Multi-Tenant Portal (MTP) | Active |
Office 365 Integration | Active |
Password Manager | Active |
Payment and Billing | Active |
Policy Management | Active |
RADIUS | Active |
Remote Assist | Active |
SCIM | Active |
Software Management | Active |
SSO | Active |
SSO | Maintenance |
System Insights | Active |
TOTP / MFA / JumpCloud Protect | Active |
User Console | Active |
User Import from CSV | Active |
Workday Import | Active |
www.jumpcloud.com | Active |
Cloudflare | Active |
Cloudflare CDN/Cache | Active |
Cloudflare Cloudflare Firewall | Active |
Security | Active |
Security Advisories | Active |
Security Notifications | Active |
Support Services | Active |
Email Support | Active |
jumpcloud.com/support | Active |
Premium Chat Support | Active |
Premium Phone Support | Active |
View the latest incidents for JumpCloud and check for official updates:
Description: An intermittent connectivity issue with JumpCloud's Console Service for administrator and user login at https://console.jumpcloud.com has been addressed by our CDN vendor. All operations have returned to normal, and the issue is currently considered resolved.
Status: Resolved
Impact: Minor | Started At: Sept. 16, 2024, 6:07 a.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Minor | Started At: Sept. 11, 2024, 2:40 p.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Minor | Started At: Aug. 24, 2024, 3:16 p.m.
Description: ### **JumpCloud Incident Report** **Date**: 2024-08-23 **Date of Incident**: 2024-08-20 **Description**: RCA for JumpCloud Push Notifications **Summary:** On August 20th, at 3:46 AM Mountain Time, the APNs certificate attached to the AWS SNS Platform Application for Apple expired, causing Apple devices to fail to receive or acknowledge push notifications. Additionally, new device registrations began failing. Already registered devices could authenticate using the TOTP code in the JumpCloud Protect app. The on-call team was paged, and the engineer started investigating. An internal incident was called at 4:31 AM, and responders from different teams began triaging MFA failures. The team identified the errors from SNS and escalated for additional support at 4:53 AM. At 5:25 AM, the team attempted a manual rotation of the certificate in SNS, but due to access restrictions, IaC configuration was needed. This discovery and limitation delayed the overall recovery window. By 5:59 AM, the Notification Service had uptaken the new APNs certificate, and a rolling restart was initiated. The APNs certificate was updated in the AWS SNS Platform Application by 6:10 AM, and push notifications began working again. **Root Cause:** The root cause of the incident was the expiration of the APNs certificate. This led to the failure of Apple devices to receive or acknowledge push notifications and the failure of new device registrations. **Corrective and Preventative Actions:** **Immediate Corrective Actions:** * Manual rotation of the expired APNs certificate in the JumpCloud Notification Service. * Update of the APNs certificate in AWS SNS Platform Application. **Preventative Actions:** * Implement monitoring to alert the team well in advance of certificate expiration dates for SNS Platform Applications. * Review all critical certificates to ensure monitoring coverage. * Automate the certificate renewal process where possible to reduce the risk of human error. * Conduct training sessions for the team on handling certificate expirations and renewals.
Status: Postmortem
Impact: Minor | Started At: Aug. 20, 2024, 11:04 a.m.
Description: This incident has been resolved and this function available for use.
Status: Resolved
Impact: Minor | Started At: Aug. 16, 2024, 5:30 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.