TLS Provisioning

Network Services Domain Management TLS Encryption TLS Provisioning Origin Connect
 
07 October 2025, 00:30 UTC

Fastly Engineers detected a performance impacting event affecting our certificate authorization system for Fastly-managed certificates.

All other data centers and services were unaffected. The issue has been resolved and we are monitoring performance closely.

Fastly Network Services Security Domain Management Customer Services Next-Gen WAF (NGWAF) TLS Encryption TLS Provisioning Origin Connect General Updates
 
06 August 2025, 22:25 UTC

On the 18th of July, 2025, Fastly was made aware of a new HTTP/1.1 desync attack vector. Our security response engineers immediately initiated a thorough internal investigation, which determined that the Fastly platform is not vulnerable to this attack vector.

On the 21st of July, to validate our findings, we collaborated with the third-party researcher who discovered the attack vector. In this process, we confirmed that no Fastly-hosted endpoints were flagged as vulnerable during their research. The researcher noted that "Fastly seems to be relatively robust against desync attacks."

For additional due diligence, our Engineering teams also reviewed a preview of the full whitepaper on 28th of July, which further confirmed our conclusions.

You can read more about their research here: [ The Desync Endgame Begins by James Kettle from PortSwigger Research

Fastly Network Services Compute Observability Domain Management Alerts Fastly Compute Customer Services Edge Observer Domain Inspector Fastly Application Historical Stats Web Delivery Log Explorer & Insights Origin Inspector Real-time Log Streaming Third Party Service Provider Real-time Analytics API & Configuration Management Fastly Web Pages Image Optimization TLS Provisioning Support Systems Notification Center KV Store Billing System API Services Configuration Management Services Support Chat System https://docs.fastly.com/ https://developer.fastly.com
 
12 June 2025, 17:55 UTC

We are seeing increased errors across multiple Fastly services that utilize a common third party service provider, unrelated to Fastly's Edge Cloud Network.

Fastly has launched acute incident response practices to investigate into this issue further in an effort to reduce the impact to our customers. 

 
12 June 2025, 19:08 UTC

As our engineers determine the scope of impact our Customer Escalation Management team will be updating the impacted components on this status post. 

 
12 June 2025, 19:19 UTC

We're aware of an ongoing Google Cloud incident, detailed on their status page, which is affecting several Fastly services. Customers may be experiencing increased latency due to impact to our KV Store.

Specifically, those trying to access their control plane via manage.fastly.com might notice that several key Observability features are not loading, including Billing, Historical Stats, Log Explorer & Insights, Origin Inspector, Real-Time Log Streaming, and Real-time Analytics. You may also find it difficult to engage with API endpoints. Additionally, customers might see elevated errors when accessing Fastly webpages and documented resources.

Our engineers are working to restore these services as a high priority and we will provide more information shortly.

You can monitor the Google Cloud incident here:

Google Cloud Status Page

 
12 June 2025, 19:35 UTC

We've confirmed that customers won't receive status post notifications through their Support Slack channels during this incident.

However, we want to assure you that your ability to request a support case through our Support Slack services remains unaffected. You can still open new support cases as needed.

 
12 June 2025, 20:17 UTC

Google Cloud has communicated that they have successfully deployed mitigations to the majority of their services. We are now observing a gradual recovery of Fastly services.

We will continue to monitor this situation with the highest priority until all Fastly and customer services are fully restored.

We have continued to monitor the Google Cloud Status Page for the latest information by the third party service provider.



 
13 June 2025, 16:30 UTC

Incident Update: Full Recovery and Root Cause Identified

Current Status: Resolved

We're confirming that all services impacted during yesterday's incident have fully recovered. Our teams continuously monitored the situation and verified the stability of all affected systems.

Root Cause Analysis

Our investigation has confirmed that the increased errors and latency across our KV Store, control plane, and certain Observability features were a direct result of the Google Cloud disruption on the 12th of June 2025.

Google has publicly shared a post-mortem regarding the incident. It includes specific information about the root cause—an invalid automated quota update to their API management system—along with their mitigation strategies and steps they're taking for future prevention.

Next Steps

For a comprehensive understanding of the incident's origin, mitigation, and Google's preventative measures, we encourage customers to review the official Google Cloud Status Page. This provides a full breakdown from their perspective.

Additionally, our Product and Engineering teams will thoroughly review all Google Cloud Platform (GCP) reports to determine mitigation strategies and ensure they are adopted as part of our long-term preventive measures to ensure our systems are more resilient to third-party outages of this kind in the future.

We appreciate your patience and understanding as we worked through this third-party event. Our focus remains on providing reliable and high-performance services.

Network Services Domain Management TLS Provisioning
 
02 June 2025, 17:25 UTC

Our Engineers identified a incident that would have impacted new or renewal requests for Certainly TLS certifications to fail shortly after our customers made the request from 14:37 to 17:10 UTC.

Requests from customers made during the affected timeframe would have not been successful and would require a follow-up request. 

Our ability to deliver network and security services to existing TLS certifications was not impacted during this incident.


20 February 2024, 16:40 UTC
Compute TLS Provisioning
 
20 February 2024, 16:40 UTC

We are investigating elevated errors to our TLS Provisioning. 

 
20 February 2024, 17:28 UTC

Our engineers have identified the contributing factor and are applying a fix to TLS Provisioning.

 
20 February 2024, 17:33 UTC

Engineering has confirmed the impact to TLS Provisioning has been mitigated.

 
20 February 2024, 17:46 UTC

Engineering has confirmed that TLS Provisioning has been fully restored. Customers may have experienced delays updating certificates during deployment from15:57 to 17:35 UTC.

This incident is resolved.

Compute TLS Provisioning
 
23 January 2024, 17:00 UTC

A planned maintenance is scheduled for our Control Plane, which will impact TLS Provisioning services during the maintenance window for our customers.

  • Anticipated Start Date/Time: 01/23/2024 @ 17:00 UTC
  • Estimated Complete Date/Time: 01/23/2024 @ 18:00 UTC 
  • Estimated Duration: 60 minutes

Description of Planned Maintenance:

On the 23rd of January 2024, engineers will perform planned maintenance for our TLS configurations. 

Customer Impact Assessment:

Customers who attempt to renew or obtain new TLS certificates through our Fastly Application (manage.fastly.com) or through API Services (api.fastly.com) during this planned maintenance (~ 60 minutes) may receive an error message.

Once this planned maintenance is completed, operations will resume without any additional deviation from standard practices.

Customers with any questions or concerns may engage with our Support team through https://support.fastly.com.

 
23 January 2024, 18:00 UTC

The scheduled maintenance has been completed.

22 February 2023, 18:24 UTC
Compute TLS Provisioning
 
22 February 2023, 18:24 UTC

We're currently investigating performance issues with our TLS provisioning system.

All other services are unaffected.

 
22 February 2023, 18:26 UTC

A fix has been implemented and we are monitoring the results.

 
22 February 2023, 18:44 UTC

This incident has been resolved.

01 February 2023, 19:22 UTC
Network Services Domain Management TLS Provisioning
 
01 February 2023, 19:22 UTC

We're currently investigating performance issues with our TLS provisioning system.

All other services are unaffected.

 
01 February 2023, 19:53 UTC

A fix has been implemented and we are monitoring the results.

 
01 February 2023, 20:20 UTC

This incident has been resolved.

14 August 2022, 01:51 UTC
TLS Provisioning
 
14 August 2022, 01:51 UTC
We're currently investigating performance issues with our TLS provisioning system in the APAC region. All other services are unaffected.
 
14 August 2022, 01:51 UTC
We are continuing to investigate this issue.
 
14 August 2022, 02:18 UTC
The issue has been identified and a fix is being implemented.
 
14 August 2022, 02:48 UTC
A fix has been implemented and we are monitoring the results.
 
14 August 2022, 02:53 UTC
This incident has been resolved.
13 May 2022, 19:17 UTC
TLS Provisioning
 
13 May 2022, 19:17 UTC
We're currently investigating performance issues with our TLS Edge Provisioning system. All other services are unaffected.
 
13 May 2022, 19:56 UTC
A fix has been implemented and we are monitoring the results.
 
13 May 2022, 20:07 UTC
This incident has been resolved.