Company Logo

Is there an RadarFirst outage?

RadarFirst status: Systems Active

Last checked: 40 seconds ago

Get notified about any outages, downtime or incidents for RadarFirst and 1800+ other cloud vendors. Monitor 10 companies, for free.

Subscribe for updates

RadarFirst outages and incidents

Outage and incident data over the last 30 days for RadarFirst.

There have been 0 outages or incidents for RadarFirst in the last 30 days.

Severity Breakdown:

Tired of searching for status updates?

Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!

Sign Up Now

Components and Services Monitored for RadarFirst

Outlogger tracks the status of these components for Xero:

www.radarfirst.com Active
api.radarfirst.com Active
app.radarfirst.com Active
AWS ec2-us-west-2 Active
AWS rds-us-west-2 Active
Component Status
Active
www.radarfirst.com Active
Active
api.radarfirst.com Active
app.radarfirst.com Active
Active
AWS ec2-us-west-2 Active
AWS rds-us-west-2 Active

Latest RadarFirst outages and incidents.

View the latest incidents for RadarFirst and check for official updates:

Updates:

  • Time: Feb. 5, 2019, 10:35 p.m.
    Status: Resolved
    Update: There was a brief gap this morning with our corporate website hosted on HubSpot as a new SSL certificate was being deployed and the existing SSL certificate was being revoked. During this gap, users would see in their web browser that the website was not secured with an active SSL certificate. We have since rectified the situation and have deployed the new active SSL certificate. We apologize for any inconvenience or concern this may have caused.

Updates:

  • Time: Feb. 7, 2019, 12:53 a.m.
    Status: Postmortem
    Update: RADAR immediately asked for a root cause on i\).. how the issue was caused and ii\) why it took so long to fix. HubSpot responded with the following: HubSpot spent some time investigating the flow of events for RADAR's particular case. HubSpot uses JIRA to track engineering issues \(filed by customer support\). HubSpot recently rolled out a new "Customer Urgency" system to flag relevant and painful issues to the owning engineering leads of a particular area of the product. In this scenario, a JIRA ticket was actually **never** filed. Rather, a series of Slack messages were sent trying to find the correct people/teams to look into RADAR's urgent issue. This is actually against HubSpot’s own internal protocol and is likely one of the driving reasons why the issue took so long to get to the correct people. For obvious reasons, individual messaging is less than ideal, as conversations on progress and the issue itself were siloed in 1:1 conversations, so as people went in an out of meetings, etc. the full picture was lost and not put in front of the right people. If the JIRA ticket had been created with appropriate details and urgency, it likely would have been addressed much quicker, as everyone internally would have had visibility to the scope and details of the issue, and the engineering owners of the issue would have been flagged to address the critical issue. In addition, when the request to update the TLS settings for RADAR was selected for work, the operational team did not verify that RADAR had a custom domain and this information was required to be added to the certificate and wasn’t. HubSpot will be ensuring feedback is given to the involved parties, as well as make sure our "critical" protocol internal instructions properly reflect the correct protocol to ensure this support flow does not occur again.
  • Time: Feb. 7, 2019, 12:45 a.m.
    Status: Resolved
    Update: After requesting that HubSpot tighten their TLS protocol and cipher suites to be more secure, HubSpot misconfigured the settings causing an error page to appear in the client's web browser stating "your connection is not private" and directing visitors to exit using the "Back to safety" button, or to click on the "Advanced" button and proceed to RADAR's corporate website with the warning that it is unsafe. After 4 hours of troubleshooting, HubSpot fixed their mistake and reconfigure TLS 1.2 correctly. We sat down with HubSpot to have a retrospective and root cause discussion regard this incident and how they were to prevent this in the future. We apologize for the inconvenience this may have caused.

Updates:

  • Time: Feb. 7, 2019, 12:53 a.m.
    Status: Postmortem
    Update: RADAR immediately asked for a root cause on i\).. how the issue was caused and ii\) why it took so long to fix. HubSpot responded with the following: HubSpot spent some time investigating the flow of events for RADAR's particular case. HubSpot uses JIRA to track engineering issues \(filed by customer support\). HubSpot recently rolled out a new "Customer Urgency" system to flag relevant and painful issues to the owning engineering leads of a particular area of the product. In this scenario, a JIRA ticket was actually **never** filed. Rather, a series of Slack messages were sent trying to find the correct people/teams to look into RADAR's urgent issue. This is actually against HubSpot’s own internal protocol and is likely one of the driving reasons why the issue took so long to get to the correct people. For obvious reasons, individual messaging is less than ideal, as conversations on progress and the issue itself were siloed in 1:1 conversations, so as people went in an out of meetings, etc. the full picture was lost and not put in front of the right people. If the JIRA ticket had been created with appropriate details and urgency, it likely would have been addressed much quicker, as everyone internally would have had visibility to the scope and details of the issue, and the engineering owners of the issue would have been flagged to address the critical issue. In addition, when the request to update the TLS settings for RADAR was selected for work, the operational team did not verify that RADAR had a custom domain and this information was required to be added to the certificate and wasn’t. HubSpot will be ensuring feedback is given to the involved parties, as well as make sure our "critical" protocol internal instructions properly reflect the correct protocol to ensure this support flow does not occur again.
  • Time: Feb. 7, 2019, 12:45 a.m.
    Status: Resolved
    Update: After requesting that HubSpot tighten their TLS protocol and cipher suites to be more secure, HubSpot misconfigured the settings causing an error page to appear in the client's web browser stating "your connection is not private" and directing visitors to exit using the "Back to safety" button, or to click on the "Advanced" button and proceed to RADAR's corporate website with the warning that it is unsafe. After 4 hours of troubleshooting, HubSpot fixed their mistake and reconfigure TLS 1.2 correctly. We sat down with HubSpot to have a retrospective and root cause discussion regard this incident and how they were to prevent this in the future. We apologize for the inconvenience this may have caused.

Updates:

  • Time: Dec. 14, 2018, 6:28 p.m.
    Status: Resolved
    Update: We had an unhealthy API instance, that wasn't detected by our Amazon EC2 health checks. The issue was intermittent because some requests were hitting one of the healthy API instances. We removed the unhealthy instance manually from the autoscaling group and it has since been replaced with a healthy instance. All services are back to full function. Ticket RADDEV-13610.

Updates:

  • Time: Oct. 2, 2018, 5:36 p.m.
    Status: Resolved
    Update: On June 14th starting at 5:10am customers started to experience 500 level errors when creating or updating incidents. During this time, users could still view incidents, report on incidents and perform other work with other parts of the application including the law library; no other functionality was impacted except the ability to create or update existing incidents. Customer support was contacted approximately at 5:30am and after troubleshooting escalated to operations team around 6:35am. Operations team determined it was caused by a known, but obscure issue, with Postgres 9.6.1. RADAR was put into maintenance mode at 7:50am and the database was patched. RADAR was placed back online at 8:06am with full services restored.

Check the status of similar companies and alternatives to RadarFirst

KnowBe4
KnowBe4

Systems Active

Intapp
Intapp

Systems Active

Aderant
Aderant

Systems Active

Springbrook
Springbrook

Systems Active

Sumsub
Sumsub

Systems Active

AgentSync
AgentSync

Systems Active

MyCase - Public
MyCase - Public

Systems Active

Litify
Litify

Systems Active

Evotix
Evotix

Systems Active

Penneo A/S
Penneo A/S

Systems Active

Casetext
Casetext

Systems Active

FOSSA
FOSSA

Systems Active

Frequently Asked Questions - RadarFirst

Is there a RadarFirst outage?
The current status of RadarFirst is: Systems Active
Where can I find the official status page of RadarFirst?
The official status page for RadarFirst is here
How can I get notified if RadarFirst is down or experiencing an outage?
To get notified of any status changes to RadarFirst, simply sign up to OutLogger's free monitoring service. OutLogger checks the official status of RadarFirst every few minutes and will notify you of any changes. You can veiw the status of all your cloud vendors in one dashboard. Sign up here
What does RadarFirst do?
Governance, risk and compliance (GRC) software trusted to reduce risk and simplify obligation decisioning.