Last checked: 2 minutes ago
Get notified about any outages, downtime or incidents for Limble and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for Limble.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Limble CMMS API | Active |
Limble CMMS Authentication Service | Active |
Limble CMMS Authentication Service Backend | Active |
Limble CMMS Marketing Website | Active |
Limble CMMS Web Application | Active |
Limble Fuse | Active |
Limble Fuse System | Active |
View the latest incidents for Limble and check for official updates:
Description: This incident is now resolved.
Status: Resolved
Impact: Critical | Started At: Nov. 12, 2024, 8:11 p.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Minor | Started At: June 17, 2024, 3:33 p.m.
Description: Issue Resolved
Status: Resolved
Impact: Major | Started At: May 20, 2024, noon
Description: Customers are reporting a blank screen when logging in.
Status: Resolved
Impact: None | Started At: May 16, 2024, 10 a.m.
Description: **Date:** May 14, 2024 **Status:** Resolved **Summary** On May 14, 2024, our service experienced a downtime event due to multiple frontend versions being served concurrently. This incident was caused by a discrepancy in our build process that led to different JavaScript chunks being deployed despite using the same Git commit. Immediate actions were taken to redeploy the code and resolve the issue, and measures have been implemented to prevent recurrence. **Impact** The downtime affected all users attempting to access our site, resulting in an inability to load the app. This incident primarily impacted customers on the main version of the app, while those on Canary were unaffected. **Root Causes** The incident was triggered by a container restart that resulted in different JavaScript chunks being served. Our build process, though using the same Git commit, produced non-idempotent results, causing one of our webApp containers to serve incorrect chunks. **Resolution and Improvements** Immediate actions included redeploying the rollback branch, ensuring all containers served the correct chunks, and implementing a fix to skip build/push for the container image if the SHA tag already exists. Additionally, the following improvements are planned: * **Logging Enhancements** * **Container Health Checks** * **Immutable Tags** * **Build Process Update** * **Nginx Configuration** **Description of Events** * **6:04 AM MST:** Incident detected * **6:15 AM MST:** Investigation and communication initiated. * **6:46 AM MST:** Redeployment initiated using rollback branch. * **6:51 AM MST:** Successful redeployment and app loading restored. * **7:50 AM MST:** Incident resolved
Status: Postmortem
Impact: Critical | Started At: May 14, 2024, 12:21 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.