Akamai EAA Maintenance Status
Real-time updates of Akamai EAA Maintenance issues and outages
Akamai EAA Maintenance status is Operational
Active Incidents
No active incidents
Recently Resolved Incidents
No recent incidents
Akamai EAA Maintenance Outage Survival Guide
Akamai EAA Maintenance Components
Akamai EAA Maintenance Cloud Zones
Amsterdam
Chennai
Chicago
Dallas
Hong Kong
Frankfurt
Jakarta
London
Los Angeles
Madrid
Miami
Milan
Mumbai
Osaka
Paris
Sao Paulo
Seattle
Seoul
Singapore
Stockholm
Sydney
Tokyo
US East
US West
Washington DC
Akamai EAA Maintenance Dedicated Cloud Zones
Chennai - #343
Los Angeles - #343
Paris - #343
US East - #343
Washington - #343
Dallas - #894
Los Angeles - #894
Osaka - #1708
Tokyo - #1708
Chennai - #1896
Frankfurt - #1896
Hong Kong - #1896
Singapore - #1896
Washington - #1896
Beijing - #2586
Dallas - #2586
Frankfurt - #2586
Los Angeles - #2586
Seattle - #2586
Milan - #2963
Paris - #2963
Osaka - #3787
Tokyo - #3787
Tokyo - #4700
Amsterdam - #6036
Paris - #6036
N. Virginia - #6044
Washington - #6044
Amsterdam - #6596
Akamai EAA Maintenance Management
API Services
Configuration
Reporting
Akamai EAA Maintenance Alternatives
IPVanish Server Status
REST API
We have encountered some issues in ourREST API services. We are investigating it. Identifier: Domain: canada, 0a472b2a
Main Dashboard
We have encountered some issues in ourMain Dashboard services. We are investigating it. Identifier: Domain: canada, 0a472b2a
Cloudflare Sites and Services
Billing
We are currently observing and working to resolve the following Billing issues:
Failed Plan Modifications: There are intermittent issues with subscription upgrades, downgrades, and cancellations. This may result in billing charges being applied without the subscription level being updated. In these cases you may contact Cloudflare Support.
Unpaid Invoices Preventing Plan Modifications: If you encounter an error message when attempting to modify your plan, the most common cause is an unpaid invoice. In these cases, check if you have an unpaid invoice before contacting Support.
Missing Invoices: Some unpaid invoices are not visible. These unpaid invoices will still prevent account modifications. In these cases you may contact Cloudflare Support.
Missing Pay Now Buttons: For each unpaid invoice there should be a corresponding “Pay Now” button. If that button is not there you can click on the payment link directly within the invoice.
Expired Payment Links: After 120 days the payment links will expire, so if you have no “Pay Now” button and the link within the invoice is expired, you will need to contact to Support
Duplicate Payments: You may notice multiple invoices and charges on your bank and PayPal statements that appear to be duplicates. In most cases these are valid, unique charges for previously unpaid months where we were unable to collect your payments. You should not contact support about these cases.
Due to ongoing billing issues, we are experiencing high demand—please avoid opening duplicate tickets and wait for our response.
United States - AMER
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
Australia - APAC
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE