Bogota (BOG)
We are investigating elevated errors to our Bogota (BOG) Point of Presence.
Our engineers have identified the contributing factor and are applying a fix to Bogota (BOG) Point of Presence (POP) .
Engineering has deployed a fix and have confirmed a gradual recovery to Bogota (BOG) Point of Presence (POP) . We will continue to monitor until we’ve confirmed that customer experience has been fully restored.
Engineering has confirmed that our Bogota (BOG) Point of Presence (POP) has been fully restored. Customers may have experienced elevated 5xx errors from 23:08 to 23:34 UTC.
This incident is resolved.
We're currently investigating performance impacts in Bogota (BOG), Buenos Aires (EZE), Lima (LIM), Sao Paulo (GRU).
All other locations and services are unaffected.
Our engineers have identified the contributing factor and are applying a fix to Bogota (BOG), Buenos Aires (EZE), Lima (LIM), Sao Paulo (GRU).
All other locations and services are unaffected.
Engineering has confirmed the impact to Bogota (BOG), Buenos Aires (EZE), Lima (LIM), Sao Paulo (GRU) has been mitigated.
Engineering has confirmed that Bogota (BOG), Buenos Aires (EZE), Lima (LIM), Sao Paulo (GRU) has been fully restored. Customers may have experienced increased latency and 5xx errors from 00:15 to 02:02 UTC.
This incident is resolved.
We're investigating possible performance impact affecting the Bogota (BOG) data center.
All other locations and services are unaffected
Engineering has confirmed the impact to Bogota (BOG) has been mitigated.
We're investigating elevated errors in Bogota (BOG).
All other locations and services are unaffected
A fix has been implemented and we are monitoring the results.
This incident has been resolved.
We're investigating elevated errors in Bogota (BOG).
All other locations and services are unaffected
This issue has been identified and a fix is being implemented.
A fix has been implemented and we are monitoring the results.
This incident has been resolved.
We're investigating elevated errors in South America.
All other locations and services are unaffected
Fastly Engineering has observed elevated errors across multiple Points of Presence (POPs) in the region of South America.
This has been identified as an issue with a third party service provider unrelated to Fastly's Edge Cloud Platform, and a fix is being implemented.
All other locations and services are unaffected.
Traffic in Lima(LIM) has been temporarily rerouted.
All other locations and services are unaffected.
Fastly Engineering has applied our standard acute incident response practices and restored our LIM POP.
Customer services have returned to pre-incident performance levels.
We will continue to monitor the third party service provider issue for recovery. All locations and other services remain unaffected.
This incident has been resolved.
We’re currently investigating performance issues with Compute@Edge configuration propagation. All other services are unaffected.
This issue has been identified and a fix is being implemented.
Our investigations have identified common network provider issues related to the performance impact for our Compute@Edge services and NGWAF@Edge updates and decision making. Existing rules are operational, but new data is parsed at a slower pace. Fastly Engineering is in the process of performing standard traffic engineering to restore Compute@Edge and NGWAF@Edge services to pre-incident levels.
A fix has been implemented and we are monitoring the results.
Fastly has performed traffic engineering to route around the global network provider currently experiencing impact. Our Compute@Edge and NGWAF@Edge services are performing at pre-incident levels.
This incident is resolved.
We're currently investigating potential impact to performance with our CDN services.
A fix has been implemented and we are monitoring the results.
Fastly is aware of an expected critical vulnerability the OpenSSL project is expected to disclose in the near future. We are studying the currently available information surrounding this vulnerability and do not currently believe that Fastly is vulnerable. We will continue to monitor as additional information is released and will provide our customers with more information as available.
Fastly has reviewed the initial notification from OpenSSL regarding CVE-2022-3786 and CVE-2022-3602. We have analyzed the versions of OpenSSL in use at Fastly, and verified that we do not use OpenSSL 3.x. Fastly and customer usage of Fastly services are not vulnerable to CVE-2022-3786 or CVE-2022-3602.
A fix has been implemented and we are monitoring the results.