Last checked: 8 minutes ago
Get notified about any outages, downtime or incidents for Delinea and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for Delinea.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|
View the latest incidents for Delinea and check for official updates:
Description: **Title**_:_ Secret Server Cloud \(SSC\) Issues in East US starting on April 3rd, 2024. **Impact:** Beginning on April 3rd, 2024, at approximately 7:52:40 PM ET, SSC customers would have started experiencing issues accessing their systems. **Issue:** On April 3rd, 2024, at approximately 7:52:40 PM ET, Azure SQL Databases in East US started experiencing issues. New connections to databases in this region may have resulted in an error or timeout. Existing connections remained available to accept new requests, however if those connections were terminated and re-established, they may have failed. Microsoft suspects that a potential deployment on their frontend gateways caused SQL database availability issues impacting customer connectivity. Microsoft worked to mitigate the issue by stopping the active rollout of their deployment. **Resolution:** At approximately 7:54 PM our monitoring systems started alerting regarding an issue. After initial triage, we estimated that roughly 25% of US based SSC customers were experiencing issues. At approximately 8:26 PM ET, SC failover was initiated. However, due to an issue with the automated tool to perform failover, we began to manually perform failover, which increased our response and resolution time. At approximately 10:36 PM ET the failover had completed, and all SSC systems were operational. Our engineers monitored the Azure incident and waited for it to be fully resolved before closing the incident on our side. At approximately 11:29 PM ET on April 3rd, 2024, the Azure team declared the incident mitigated. At approximately 3:56 AM ET on April 4th, 2024, a rollback to restore functionality in the primary East US region for SSC was completed. **Action Items:** 1\. Investigate issues with tooling that facilitates automated failover. **To address this and prevent future occurrences:** IN PROGRESS – Improve failover automation tooling and capabilities. **Incident Start Time:** _April 3rd, 2024, 07:52:40 PM ET_ **Incident End Time:** _April 3rd, 2024, 11:29 PM ET_
Status: Postmortem
Impact: Major | Started At: April 4, 2024, 12:30 a.m.
Description: **Impact:** Beginning on 3/22/24 at approx. 11:30 PM UTC, installed Secret Server SDKs may have been unable to retrieve Secret credentials. **Issue:** A change to enhance security for IP Addresses introduced an issue where the IP Address was not correctly retrieved for calls from the Secret Server SDK. This blocked the SDK from authenticating in order to retrieve credentials due to internal ongoing security vetting of calls from the SDK. SDKs with a pre-existing valid token would continue to function correctly until their token expired and they needed to re-authenticate to get a new token. **Resolution:** The issue was resolved by rolling back the update. By 10:49 PM UTC on 3/23/24 the issue was resolved. **Action Items:** **To address this and prevent future occurrences:** Add automation tests to cover installation of the Secret Server SDK and retrieval of credentials using it. Add missing unit tests to cover the specific code area that was responsible for the issue. Add additional monitoring for anomalous changes in the authentication endpoint to provide back-end visibility of SDK calls.
Status: Postmortem
Impact: Major | Started At: March 22, 2024, 11:30 p.m.
Description: **Impact:** Beginning on 3/22/24 at approx. 11:30 PM UTC, installed Secret Server SDKs may have been unable to retrieve Secret credentials. **Issue:** A change to enhance security for IP Addresses introduced an issue where the IP Address was not correctly retrieved for calls from the Secret Server SDK. This blocked the SDK from authenticating in order to retrieve credentials due to internal ongoing security vetting of calls from the SDK. SDKs with a pre-existing valid token would continue to function correctly until their token expired and they needed to re-authenticate to get a new token. **Resolution:** The issue was resolved by rolling back the update. By 10:49 PM UTC on 3/23/24 the issue was resolved. **Action Items:** **To address this and prevent future occurrences:** Add automation tests to cover installation of the Secret Server SDK and retrieval of credentials using it. Add missing unit tests to cover the specific code area that was responsible for the issue. Add additional monitoring for anomalous changes in the authentication endpoint to provide back-end visibility of SDK calls.
Status: Postmortem
Impact: Major | Started At: March 22, 2024, 11:30 p.m.
Description: **Title**: A subset of customers were briefly affected by a SQL health issue. **Impact:** Beginning at approximately 18:30 UTC on 2/28/2024 a single Azure SQL server had an intermittent outage that affected some databases on the server. The issue was fully resolved by 18:50 UTC. **Issue:** An Azure SQL Server had a brief outage which caused some connections to databases on that server to be rejected until it recovered. Due to the small number of databases affected, an alert was not initially triggered, by the time Azure raised any health alerts and those were acknowledged the database server had recovered. **Resolution:** The Azure SQL database recovered with no intervention.
Status: Postmortem
Impact: None | Started At: Feb. 28, 2024, 6:30 p.m.
Description: **Title**: A subset of customers were briefly affected by a SQL health issue. **Impact:** Beginning at approximately 18:30 UTC on 2/28/2024 a single Azure SQL server had an intermittent outage that affected some databases on the server. The issue was fully resolved by 18:50 UTC. **Issue:** An Azure SQL Server had a brief outage which caused some connections to databases on that server to be rejected until it recovered. Due to the small number of databases affected, an alert was not initially triggered, by the time Azure raised any health alerts and those were acknowledged the database server had recovered. **Resolution:** The Azure SQL database recovered with no intervention.
Status: Postmortem
Impact: None | Started At: Feb. 28, 2024, 6:30 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.