Kong status is Partially Degraded Service

Tue 31
Wed 1
Thu 2
Fri 3
Sat 4
Sun 5
Mon 6
now

Kong Konnect Cloud

Tue 31
Wed 1
Thu 2
Fri 3
Sat 4
Sun 5
Mon 6
now
Last updated 1 minute ago from official status page. Learn more

You're checking on Kong - but is your own site converting?

Outages aren't the only thing that costs you visitors. Get a visual audit that shows exactly where your site loses conversions. Free, takes 2 minutes.

Audit Your Website Free →

Active Incidents

Major outage in Konnect Middle East region due to loss of mutliple availability zones
Started 1 Mar 2026 20:07:33 (1 month ago), still ongoing
Major Incident
Monitoring
Kong Konnect Cloud

We are seeing increased 5xx in the ME Region. Our engineers are currently investigating the issue.

Recently Resolved Incidents

Interacting with PATs in a degraded state
Started 1 Apr 2026 19:18:14 (6 days ago), resolved 1 Apr 2026 20:17:50 (6 days ago)
Incident without Impact
Resolved
Kong Konnect Cloud

Creating, Reading, & Deleting PATs through the API & UI is degraded. This does not impact authentication with PATs.

Some Dataplanes Incorrectly Reporting Out of Sync
Started 1 Apr 2026 06:30:00 (6 days ago), resolved 1 Apr 2026 06:30:00 (6 days ago)
Incident without Impact
Resolved
Kong Konnect Cloud

On 4/2/2026. Konnect introduced a change as part of our 'secure by default' initiatives for the upcoming 3.14 release, which caused expected_hash syncing issues for some customers' data planes.

For background, when a data plane connects to the Konnect control plane, the configuration is produced for that specific version of the Kong gateway. A configuration hash is calculated based off of the produced config, and stored as the expected config hash. When configuration changes occur, the control plane calculates the new configuration, broadcasts it to the connected data planes, and updates to the new expected hash.

The issue here was the preparation of the control plane for supporting SHA256 to store credential hashes. When this change was introduced, it resulted in a minor structural difference in the produced configuration, but no actual change to the configurations occurred. This led to the same configuration yielding a different hash before and after the deploy.

The way this could get a data plane to report 'out of sync' was the following:

  • A data plane is connected and in sync with DP hash and Expected Config Hash a111111a
  • The data plane is disconnected/reconnected, and since it is still in sync with DP hash and Expected Config Hash a111111a, a new config is not calculated
  • The change to embed SHA256 support in the control plane is deployed
  • A new data plane connects with no config loaded, and reports an empty config to the Control Plane
  • The control plane generates the slightly altered config, and ends up with a new config hash, which updates the expected config hash to b22222b
  • Since no configuration change occurred, the data planes already connected and on 1aaaaaa1 would not have been pushed a change event, and would still be running the same configuration as b222222b but the hash would not match, causing the DPs to appear out of sync

Note: Once any change to the control plane configuration occurred, a new config event would have been delivered, and all previous data planes would have been updated to the hash based on the new structure. Additionally, if an impacted data plane were to disconnect and reconnect, they also would have been brought into sync with the new hash. The issue was the system failing to consider the new hash as an 'event' since it did not change configured proxy behavior.

To address this in the short term, the Konnect engineering team has ensured structural changes like this which result in a config hash will trigger a configuration change event, even when no config has changed.

To address this in the long term, Konnect is moving to a config version tracking methodology that will not be impacted by structural, non-behavioral changes as the hash is.

Kong Outage Survival Guide

A step-by-step guide to help you survive a Kong outage
NaN%

    Kong Components

    Tue 31
    Wed 1
    Thu 2
    Fri 3
    Sat 4
    Sun 5
    Mon 6
    now

    Kong Konnect Cloud

    Tue 31
    Wed 1
    Thu 2
    Fri 3
    Sat 4
    Sun 5
    Mon 6
    now
    Major outage in Konnect Middle East region due to loss of mutliple availability zones
    Started 1 Mar 2026 20:07:33 (1 month ago), still ongoing
    Major Incident
    Monitoring
    Kong Konnect Cloud

    We are seeing increased 5xx in the ME Region. Our engineers are currently investigating the issue.

    Interacting with PATs in a degraded state
    Started 1 Apr 2026 19:18:14 (6 days ago), resolved 1 Apr 2026 20:17:50 (6 days ago)
    Incident without Impact
    Resolved
    Kong Konnect Cloud

    Creating, Reading, & Deleting PATs through the API & UI is degraded. This does not impact authentication with PATs.

    Some Dataplanes Incorrectly Reporting Out of Sync
    Started 1 Apr 2026 06:30:00 (6 days ago), resolved 1 Apr 2026 06:30:00 (6 days ago)
    Incident without Impact
    Resolved
    Kong Konnect Cloud

    On 4/2/2026. Konnect introduced a change as part of our 'secure by default' initiatives for the upcoming 3.14 release, which caused expected_hash syncing issues for some customers' data planes.

    For background, when a data plane connects to the Konnect control plane, the configuration is produced for that specific version of the Kong gateway. A configuration hash is calculated based off of the produced config, and stored as the expected config hash. When configuration changes occur, the control plane calculates the new configuration, broadcasts it to the connected data planes, and updates to the new expected hash.

    The issue here was the preparation of the control plane for supporting SHA256 to store credential hashes. When this change was introduced, it resulted in a minor structural difference in the produced configuration, but no actual change to the configurations occurred. This led to the same configuration yielding a different hash before and after the deploy.

    The way this could get a data plane to report 'out of sync' was the following:

    • A data plane is connected and in sync with DP hash and Expected Config Hash a111111a
    • The data plane is disconnected/reconnected, and since it is still in sync with DP hash and Expected Config Hash a111111a, a new config is not calculated
    • The change to embed SHA256 support in the control plane is deployed
    • A new data plane connects with no config loaded, and reports an empty config to the Control Plane
    • The control plane generates the slightly altered config, and ends up with a new config hash, which updates the expected config hash to b22222b
    • Since no configuration change occurred, the data planes already connected and on 1aaaaaa1 would not have been pushed a change event, and would still be running the same configuration as b222222b but the hash would not match, causing the DPs to appear out of sync

    Note: Once any change to the control plane configuration occurred, a new config event would have been delivered, and all previous data planes would have been updated to the hash based on the new structure. Additionally, if an impacted data plane were to disconnect and reconnect, they also would have been brought into sync with the new hash. The issue was the system failing to consider the new hash as an 'event' since it did not change configured proxy behavior.

    To address this in the short term, the Konnect engineering team has ensured structural changes like this which result in a config hash will trigger a configuration change event, even when no config has changed.

    To address this in the long term, Konnect is moving to a config version tracking methodology that will not be impacted by structural, non-behavioral changes as the hash is.

    Kong Insomnia

    Tue 31
    Wed 1
    Thu 2
    Fri 3
    Sat 4
    Sun 5
    Mon 6
    now

    Kong Support Portal

    Tue 31
    Wed 1
    Thu 2
    Fri 3
    Sat 4
    Sun 5
    Mon 6
    now
    Stay ahead of Kong outages
    Sign up to create a custom dashboard to monitor the services you rely on. 3,000+ services supported.