Kolkata (CCU)
We are investigating elevated errors to our Chennai (MAA), Mumbai (BOM), New Delhi (DEL) Points of Presence (POPs).
All other products and services are unaffected by this incident.
Our engineers have identified the contributing factor and are applying a fix to our Chennai (MAA), Mumbai (BOM), New Delhi (DEL) POPs.
All other locations and services are unaffected.
Our engineers have identified the contributing factor and are continuing to apply the mitigation strategy to our Chennai (MAA), Mumbai (BOM), New Delhi (DEL) POPs.
All other locations and services are unaffected.
Engineering has confirmed the impact to our Chennai (MAA), Mumbai (BOM), New Delhi (DEL) POPs has been mitigated.
Engineering has confirmed that our Chennai (MAA), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) POPs have been fully restored. Customers may have experienced elevated errors and latency from 05:00 to 07:28 UTC.
This incident is resolved.
Affected customers may have experienced impact to varying degrees and to a shorter duration than as set forth above.
To offer feedback on our status page, click "Give Feedback"
Status Post, Created Date/Time: 2024-12-19 06:02:08 UTC
Note: Our Customer Escalation Management team will update the start date and time of the initial "investigating" status post upon the resolution of this incident. This update is meant to provide our customers and their end users with a potential impact window. The date and time mentioned in the message above indicates when the status post was requested by our Acute Incident Response team.
We are investigating elevated errors to our Chennai (MAA), Hyderabad (HYD), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) Points of Presence (POPs).
All other products and services are unaffected by this incident.
Our engineers are continuing to investigate elevated errors to our Chennai (MAA), Hyderabad (HYD), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) POPs.
Our engineers have identified the contributing factor and are applying a fix to our Chennai (MAA), Hyderabad (HYD), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) POPs.
All other locations and services are unaffected.
Engineering has confirmed the impact to our Chennai (MAA), Hyderabad (HYD), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) POPs has been mitigated.
Engineering has confirmed that Chennai (MAA), Hyderabad (HYD), Kolkata (CCU), Mumbai (BOM), New Delhi (DEL) POPs have been fully restored. Customers may have experienced intermittent errors from 05:51 to 10:03 UTC.
This incident is resolved.
To offer feedback on our status page, click "Give Feedback"
Status Post, Created Date/Time: 2024-10-09 09:36:33 UTC
Note: Our Customer Escalation Management team will update the start date and time of the initial "investigating" status post upon the resolution of this incident. This update is meant to provide our customers and their end users with a potential impact window. The date and time mentioned in the message above indicates when the status post was requested by our Acute Incident Response team.
We are investigating elevated errors to our Platform delivery services.
Our engineers are continuing to investigate the impact to our Platform delivery services.
Our engineers have identified the contributing factor and are applying a fix to our Platform delivery services.
Our engineers have identified the contributing factor and are continuing to apply the mitigation strategy to our Platform delivery services.
Engineering has deployed a fix and have confirmed a gradual recovery to our Platform delivery service. We will continue to monitor until we’ve confirmed that customer experience has been fully restored.
Engineering has confirmed that our Platform delivery services have been fully restored. Customers may have experienced elevated errors and latency. In addition, Compute customers may have also experienced delayed configuration deployments from the 5th of September at 19:48 to the 6th of September at 00:48 UTC.
This incident is resolved.
Affected customers may have experienced impact to varying degrees and to a shorter duration than as set forth above.
To offer feedback on our status page, click "Give Feedback"
We are investigating elevated errors to our Kolkata (CCU), New Delhi (DEL) Point of Presence (POP).
Our engineers have identified the contributing factor and are applying a fix to our Kolkata (CCU), New Delhi (DEL) Point of Presence (POP).
All other locations and services are unaffected.
Engineering has confirmed the impact to Kolkata (CCU), New Delhi (DEL) Point of Presence (POP) has been mitigated.
Engineering has confirmed that our Kolkata (CCU) and New Delhi (DEL) Points of Presence (POP) has been fully restored. Customers may have experienced 5xx errors and latency from 6:06 to 6:40 UTC.
This incident is resolved.
To offer feedback on our status page, click "Give Feedback"
On Tuesday, the 29th of April 2024 from 12:40 UTC to the 29th of April 01:03 UTC, our engineers observed an unplanned event that contained impact across the Chennai (MAA), Kolkata (CCU), Delhi (DEL), and Hyderabad (HYD) Points of Presence (POPs) with a common transit provider.
This event is resolved, and there is no remaining impact.
On Tuesday, the 23rd of April 2024 from 11:30 UTC to the 24th of April 01:36 UTC, our engineers observed an unplanned event that contained impact across the Chennai (MAA), Mumbai (BOM), Kolkata (CCU), Delhi (DEL), and Hyderabad (HYD) Points of Presence (POPs) with a common transit provider.
This event is resolved, and there is no remaining impact.
Traffic in Kolkata (CCU) has been temporarily rerouted.
All other locations and services are unaffected.
A fix has been implemented and we are monitoring the results.
This incident has been resolved.
We're currently investigating potential impact to performance with our CDN services.
A fix has been implemented and we are monitoring the results.
This incident has been resolved.
Fastly is aware of an expected critical vulnerability the OpenSSL project is expected to disclose in the near future. We are studying the currently available information surrounding this vulnerability and do not currently believe that Fastly is vulnerable. We will continue to monitor as additional information is released and will provide our customers with more information as available.
Fastly has reviewed the initial notification from OpenSSL regarding CVE-2022-3786 and CVE-2022-3602. We have analyzed the versions of OpenSSL in use at Fastly, and verified that we do not use OpenSSL 3.x. Fastly and customer usage of Fastly services are not vulnerable to CVE-2022-3786 or CVE-2022-3602.
We're currently investigating potential impact to performance with our CDN services.
The issue has been identified and a fix is being implemented.
A fix has been implemented and we are monitoring the results.
This incident has been resolved.