
Public Cloud Status
Real-time updates of Public Cloud issues and outages
Public Cloud status is Operational
UK1
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
You're checking on Public Cloud - but is your own site converting?
Outages aren't the only thing that costs you visitors.
Get a visual audit that shows exactly where your site loses conversions.
Free, takes 2 minutes.
Active Incidents
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
Recently Resolved Incidents
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our Data & Analytics offering, which is causing temporary functionality issue in the FR region.
Here are some supplementary details :
Start time : 30/04/2026 08:18 UTC Impacted Service(s) : Builds of APP or API are temporarily unavailable. Customers Impact : Customers are temporarily unable to build API/APP. Root Cause : This incident is caused by a software issue. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
We will keep you updated on the progress and resolution.
We apologize for any inconvenience caused and appreciate your understanding.
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
We had an incident on Data & Analytics offer in GRA11 which has now been resolved.
Here are some supplementary details :
Start time : 28/04/2026 02:00 UTC End time : 28/04/2026 08:00 UTC Impacted Service(s) : Data Platform tools were temporarily unavailable. Customers Impact : Customers were temporarily unable to use Data Platform tools. Root Cause : A service disruption occurred due to an unexpected underlying infrastructure malfunction.
We thank you for your understanding and patience throughout this incident.
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our Object Storage S3 offer on the specific region.
Here are some supplementary details :
Start time : 28/04/2026 10:25 UTC Impacted Service(s) : You may experience issues accessing your Object Storage S3 service. Customers Impact : Customers may experience issues downloading or uploading their objects due to 500/503 errors. Root Cause : This incident is caused by a software issue. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
We will keep you updated on the progress and resolution.
We are currently investigating an incident affecting our Compute - Instance offering, which is causing temporary availability issue in the RBX10 region.
Here are some supplementary details :
Start time : 24/04/2026 14:40 UTC Impacted Service(s) : Some instances in the RBX10 region are unreachable. Customers Impact : Customers are temporarily unable to access instances located on the specified region. Ongoing Actions : Our teams are investigating to determine the origin of the incident and fix it.
We will keep you updated on the progress and resolution.
We apologize for any inconvenience caused and appreciate your understanding.
Public Cloud Outage Survival Guide
Public Cloud Components
Public Cloud AI & Machine Learning || AI Dashboard
Public Cloud AI & Machine Learning || AI Deploy
BHS
GRA
Public Cloud AI & Machine Learning || AI Endpoint
Public Cloud AI & Machine Learning || AI Notebooks
BHS
GRA
Public Cloud AI & Machine Learning || AI Training
BHS
GRA
Public Cloud Compute - Instance || BHS
BHS1
BHS3
BHS5
Public Cloud Compute - Instance || ERI
UK1
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || EU-SOUTH-MIL
GRA2
EU-SOUTH-MIL-A
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
EU-SOUTH-MIL-B
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA4
EU-SOUTH-MIL-C
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || EU-WEST-PAR
EU-WEST-PAR-A
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
EU-WEST-PAR-B
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
EU-WEST-PAR-C
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute-Instance || AP-SOUTH-MUM
Public Cloud Compute - Instance || GRA
GRA1
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA3
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA5
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA7
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA9
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
GRA11
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || India
AP-SOUTH-MUM-1
Public Cloud Compute - Instance || LIM
DE1
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || RBX
RBX-A
We are currently investigating an incident affecting our Compute - Instance offering, which is causing temporary availability issue in the RBX10 region.
Here are some supplementary details :
Start time : 24/04/2026 14:40 UTC Impacted Service(s) : Some instances in the RBX10 region are unreachable. Customers Impact : Customers are temporarily unable to access instances located on the specified region. Ongoing Actions : Our teams are investigating to determine the origin of the incident and fix it.
We will keep you updated on the progress and resolution.
We apologize for any inconvenience caused and appreciate your understanding.
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || SGP
SGP1
SGP2
Public Cloud Compute - Instance || SBG
SBG5
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
SBG7
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Compute - Instance || SYD
SYD1
AP-SOUTHEAST-SYD-2
Public Cloud Compute - Instance || USA
US-EAST-VA-1
US-WEST-OR-1
Public Cloud Compute - Instance || WAW
WAW1
We had an incident on our Public Cloud Network API offer in EU which has now been resolved.
Here are some supplementary details :
Start time : 30/04/2026 14:42 UTC End time : 30/04/2026 14:57 UTC Impacted Service(s) : The API for Public Cloud was temporarily unavailable. Customers Impact : Customers were temporarily unable to create, start, manage their Public Cloud instances. Root Cause : This incident was caused by a software issue.
We thank you for your understanding and patience throughout this incident.
Public Cloud Containers & Orchestration || Load Balancer
AP-SOUTH-MUM
BHS5
DE1
EU-WEST-PAR
GRA5
GRA7
GRA9
GRA11
RBX-A
SBG5
SGP1
SYD1
WAW1
UK1
US-EAST-VA
US-WEST-OR
Public Cloud Containers & Orchestration || Managed Kubernetes Service
AP-SOUTH-MUM
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
BHS5
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
EU-WEST-LIM
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
EU-SOUTH-MIL
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
EU-WEST-PAR
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
RBX
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
GRA5
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
GRA7
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
GRA9
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
GRA11
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
SBG5
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
SGP1
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
SYD1
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
WAW1
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
UK1
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
US-EAST-VA
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
US-WEST-OR
We are currently experiencing an ongoing security event affecting our Managed Kubernetes Service. The source of the issue has been identified.
Start time : 22/04/2026 08:15 UTC Impacted service(s) : Managed Kubernetes Service (MKS) worker nodes. Customer impact : A recently disclosed security vulnerability may allow a user within a container to gain elevated access on the underlying node. This issue is limited to individual clusters and does not impact other customers or the managed control plane. Customers running shared or multi-tenant workloads within the same cluster should consider this issue with higher priority. Other OVHcloud managed services (MPR, MRS) are patched transparently by OVHcloud, no customer action required. Root Cause : This incident is caused by a software issue. Workaround : A temporary mitigation is available to reduce the risk while we prepare a permanent fix. Instructions are available in our dedicated blog post: https://blog.ovhcloud.com/copy-fail-cve-2026-31431-how-to-rapidly-protect-ovhcloud-mks-clusters-from-the-linux-kernel-zero-day Please note that applying this mitigation is optional and remains under your responsibility. If the vulnerability has already been exploited on your cluster, this mitigation will not remediate any pre-existing compromise Ongoing actions : Our teams are actively working on a permanent fix. Updated versions are expected to be available later today.
We will share further details and update instructions as soon as they are ready. We will keep you informed of any progress.
Thank you for your understanding.
Public Cloud Containers & Orchestration || Managed Private Registry
AP-SOUTH-MUM
BHS
DE
EU-SOUTH-MIL
EU-WEST-PAR
GRA
VA
Public Cloud Containers & Orchestration || Managed Rancher Service
Public Cloud Containers & Orchestration || Workflow Management
BHS1
BHS3
BHS5
SYD3
DE1
GRA1
GRA3
GRA5
GRA7
GRA
GRA9
GRA11
RBX-A
SBG5
SBG7
PAR
SGP1
SGP2
SYD1
AP-SOUTHEAST-SYD-2
Public Cloud Databases || M3 Aggregator
UK1
WAW1
WAW2
US-EAST-VA
US-WEST-OR
Public Cloud Databases || Cassandra
AP-SOUTH-MUM
Public Cloud Databases || MongoDB
Public Cloud Databases || M3DB
BHS
DE
GRA
EU-WEST-PAR
SBG
SGP
UK
WAW
EU-SOUTH-MIL
RBX
AP-SOUTH-MUM
US-EAST-VA
US-WEST-OR
Public Cloud Databases || MySQL
BHS
DE
GRA
EU-SOUTH-MIL
AP-SOUTH-MUM
EU-WEST-PAR
RBX
SBG
SGP
US-EAST-VA
UK
US-WEST-OR
WAW
Public Cloud Databases || PostgreSQL
BHS
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
DE
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
SYD
GRA
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
EU-SOUTH-MIL
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
AP-SOUTH-MUM
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
EU-WEST-PAR
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
RBX
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
SBG
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
SGP
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
UK
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
US-EAST-VA
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
US-WEST-OR
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
WAW
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our PostgreSQL offer.
Here are some supplementary details : Start time : 16/03/2026 08:00 UTC Impacted Service(s) : Customers may experience issues when upgrading to PostgreSQL version 18, as the PostGIS extension is currently not functional on this version, potentially preventing the use of geospatial features. As a precaution, we strongly recommend postponing any upgrade to PostgreSQL version 18 and continuing to use PostgreSQL version 17, which remains compatible with PostGIS. Root Cause : This incident is caused by our provider. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
If you have any questions, please contact your usual point of contact or reach out to our support team.
We will keep you updated on the progress and resolution.
Public Cloud Databases || Valkey
BHS
Public Cloud Data & Analytics || Data Processing
GRA
DE
GRA
EU-SOUTH-MIL
AP-SOUTH-MUM
EU-WEST-PAR
RBX
SBG
SGP
US-EAST-VA
UK
US-WEST-OR
WAW
Public Cloud Data & Analytics || ClickHouse
EU-WEST-PAR
EU-SOUTH-MIL
AP-SOUTH-MUM
Public Cloud Data & Analytics || Data Platform
We had an incident on Data & Analytics offer in GRA11 which has now been resolved.
Here are some supplementary details :
Start time : 28/04/2026 02:00 UTC End time : 28/04/2026 08:00 UTC Impacted Service(s) : Data Platform tools were temporarily unavailable. Customers Impact : Customers were temporarily unable to use Data Platform tools. Root Cause : A service disruption occurred due to an unexpected underlying infrastructure malfunction.
We thank you for your understanding and patience throughout this incident.
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our Data & Analytics offering, which is causing temporary functionality issue in the FR region.
Here are some supplementary details :
Start time : 30/04/2026 08:18 UTC Impacted Service(s) : Builds of APP or API are temporarily unavailable. Customers Impact : Customers are temporarily unable to build API/APP. Root Cause : This incident is caused by a software issue. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
We will keep you updated on the progress and resolution.
We apologize for any inconvenience caused and appreciate your understanding.
Public Cloud Data & Analytics || Dashboards
BHS
DE
GRA
EU-WEST-PAR
SBG
SGP
UK
WAW
EU-SOUTH-MIL
AP-SOUTH-MUM
RBX
US-EAST-VA
US-WEST-OR
Public Cloud Data & Analytics || Kafka
BHS
DE
GRA
EU-SOUTH-MIL
AP-SOUTH-MUM
EU-WEST-PAR
RBX
SBG
SGP
UK
US-EAST-VA
AP-SOUTH-MUM-1
US-WEST-OR
MAD
WAW
Public Cloud Data & Analytics || Kafka Connect
BHS
Public Cloud Network || FailoverIP
DE
GRA
EU-WEST-PAR
EU-SOUTH-MIL
AP-SOUTH-MUM
RBX
SBG
SGP
UK
US-EAST-VA
US-WEST-OR
WAW
Public Cloud Data & Analytics || Kafka MirrorMaker
BHS
DE
GRA
EU-SOUTH-MIL
AP-SOUTH-MUM
EU-WEST-PAR
RBX
SBG
SGP
Public Cloud Network || Load Balancer
UK
WAW
US-EAST-VA
US-WEST-OR
Public Cloud Data & Analytics || OpenSearch
BHS
DE
GRA
EU-SOUTH-MIL
AP-SOUTH-MUM
EU-WEST-PAR
RBX
SBG
SGP
US-EAST-VA
UK
US-WEST-OR
WAW
Public Cloud Identity, Security & Operations || Authentication
Public Cloud Identity, Security & Operations || Barbican
AP-SOUTH-MUM
AP-SOUTHEAST-SYD-2
BHS5
DE1
EU-SOUTH-MIL
EU-WEST-PAR
GRA9
RBX-A
SBG7
SGP1
SYD1
UK1
US-WEST-OR
US-EAST-VA
WAW1
Public Cloud Management || Horizon
Public Cloud Identity, Security & Operations || Key Management Service
AP-SOUTHEAST-SGP
AP-SOUTHEAST-SYD
CA-EAST-TOR
CA-EAST-BHS
EU-CENTRAL-WAW
EU-SOUTH-MIL
EU-WEST-ERI
EU-WEST-GRA
EU-WEST-LIM
EU-WEST-PAR
EU-WEST-RBX
EU-WEST-SBG
Public Cloud Identity, Security & Operations || Logs Data Platform
BHS
GRA
Public Cloud LocalZones || AF-CENTRAL
AF-CENTRAL-LZ-ABJ
Public Cloud LocalZones || AF-NORTH
AF-NORTH-LZ-RBA
Public Cloud LocalZones || AP-SOUTH-MUM
Public Cloud LocalZones || EU-CENTRAL
EU-CENTRAL-LZ-BUH
EU-CENTRAL-LZ-PRG
EU-CENTRAL-LZ-SOF
Public Cloud LocalZones || EU-NORTH
EU-NORTH-LZ-CPH
AP-SOUTH-MUM-1
EU-NORTH-LZ-HEL
EU-NORTH-LZ-OSL
EU-NORTH-LZ-STO
Public Cloud LocalZones || EU-SOUTH
EU-SOUTH-LZ-LIS
EU-SOUTH-LZ-MAD
EU-SOUTH-LZ-MIL
Public Cloud LocalZones || EU-WEST
EU-WEST-LZ-AMS
EU-WEST-LZ-BRU
EU-WEST-LZ-DLN
EU-WEST-LZ-LUX
EU-WEST-LZ-MNC
EU-WEST-LZ-MRS
EU-WEST-LZ-VIE
EU-WEST-LZ-ZRH
Public Cloud LocalZones || US-CENTRAL
US-CENTRAL-LZ-SLC
US-CENTRAL-LZ-STL
Public Cloud LocalZones || US-EAST
US-EAST-LZ-ATL
US-EAST-LZ-BOS
US-EAST-LZ-CHI
US-EAST-LZ-DAL
US-EAST-LZ-MIA
US-EAST-LZ-NYC
Public Cloud LocalZones || US-WEST
US-WEST-LZ-DEN
US-WEST-LZ-LAX
US-WEST-LZ-PAO
US-WEST-LZ-PHX
US-WEST-LZ-SEA
Public Cloud Network || Floating IP
BHS1
BHS3
BHS5
DE1
GRA1
GRA3
GRA5
GRA7
GRA9
GRA11
AP-SOUTH-MUM-1
RBX-A
SBG5
SBG7
SGP1
SYD1
AP-SOUTHEAST-SYD-2
UK1
WAW1
US-EAST-VA-1
US-WEST-OR-1
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
Public Cloud Network || Gateway
BHS1
BHS3
BHS5
DE1
GRA1
GRA3
GRA5
GRA7
GRA9
GRA11
SBG5
SBG7
SGP1
SYD1
AP-SOUTHEAST-SYD-2
UK1
WAW1
Public Cloud UK
US-EAST-VA-1
US-WEST-OR-1
AP-SOUTH-MUM-1
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
RBX-A
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
Public Cloud Network || Load Balancer
BHS1
BHS3
BHS5
DE1
GRA1
GRA3
GRA5
GRA7
GRA9
GRA11
SBG5
SBG7
SGP1
SYD1
AP-SOUTHEAST-SYD-2
UK1
WAW1
US-EAST-VA-1
US-WEST-OR-1
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
AP-SOUTH-MUM-1
RBX-A
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
Public Cloud Network || Private network (vRack)
BHS1
BHS3
BHS5
DE1
GRA1
GRA3
GRA5
GRA7
GRA9
GRA11
RBX-A
SBG5
SBG7
SGP1
SGP2
SYD1
Public Cloud Compute - Instance || 3AZ
AP-SOUTHEAST-SYD-2
UK1
PAR
WAW1
US-EAST-VA-1
US-WEST-OR-1
RBX-A
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
AP-SOUTH-MUM-1
RBX-A
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
Public Cloud Network || Public network
BHS1
BHS3
BHS5
DE1
GRA1
GRA3
GRA5
GRA7
GRA9
GRA11
RBX-A
SBG1
SBG3
SBG5
SBG7
SGP1
SGP2
SYD1
AP-SOUTHEAST-SYD-2
UK1
WAW1
US-EAST-VA-1
US-WEST-OR-1
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
AP-SOUTH-MUM-1
RBX-A
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
Public Cloud Quantum || Emulators
BHS
GRA
Public Cloud Quantum || QPUs
BHS
GRA
Public Cloud Storage || Block storage
AP-SOUTHEAST-SYD-2
AP-SOUTH-MUM-1
BHS1
BHS3
SYD2
BHS5
DE1
EU-SOUTH-MIL-A
EU-SOUTH-MIL-B
EU-SOUTH-MIL-C
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
GRA1
GRA3
GRA5
GRA6
GRA7
GRA9
GRA11
RBX-A
SBG5
SBG7
SGP1
SYD1
UK1
US-EAST-VA-1
US-WEST-OR-1
WAW1
YNM1
Public Cloud Storage || Cloud Archive
DE
GRA
UK
WAW
BHS
SYD
SGP
US-EAST-VA
US-WEST-OR
Public Cloud BHS
Public Cloud Storage || Cold Archive
RBX-ARCHIVE
Public Cloud DE
Public Cloud Storage || Instance Backup
Public Cloud GRA
Public Cloud PAR
BHS1
BHS3
Public Cloud SBG
BHS5
Public Cloud UK
Public Cloud WAW
DE1
Public Cloud BHS
GRA1
GRA3
Public Cloud DE
Public Cloud GRA
GRA5
GRA7
Public Cloud PAR
GRA9
Public Cloud SBG
GRA11
Public Cloud UK
SBG5
Public Cloud WAW
SBG7
SGP1
SYD1
AP-SOUTHEAST-SYD-2
UK1
US-EAST-VA-1
US-WEST-OR-1
WAW1
AP-SOUTH-MUM-1
EU-WEST-PAR-A
EU-WEST-PAR-B
EU-WEST-PAR-C
RBX-A
Public Cloud Storage || Object storage
BHS
GRA
We are currently experiencing an ongoing incident. We have determined the origin of the issue affecting our Object Storage S3 offer on the specific region.
Here are some supplementary details :
Start time : 28/04/2026 10:25 UTC Impacted Service(s) : You may experience issues accessing your Object Storage S3 service. Customers Impact : Customers may experience issues downloading or uploading their objects due to 500/503 errors. Root Cause : This incident is caused by a software issue. Ongoing Actions : The incident has been identified and our teams are mobilised to restore service as quickly as possible.
We will keep you updated on the progress and resolution.