Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Update GitLab Runner Docker 18.2.1

We will update GitLab Runner Docker to version 18.2.1.

Reference: #57

Start maintenance window: 04/08/2025 23:00
Stop maintenance window: 05/08/2025 02:00

GitLab Runner 18.2.1

We will update GitLab Runner to version 18.2.1.

Start maintenance window: 04/08/2025 23:00
Stop maintenance window: 05/08/2025 02:00

Elasticsearch 8.19.0

We will update Elasticsearch to version 8.19.0.

Start maintenance window: 04/08/2025 23:00
Stop maintenance window: 05/08/2025 02:00

Kibana 8.19.0

We will update Kibana to version 8.19.0.

Start maintenance window: 04/08/2025 23:00
Stop maintenance window: 05/08/2025 02:00

Mailcow important changes for update from legacy to master

We will update Mailcow from legacy to the newest master version, which contains the following breaking changes:

  1. Login With the update, the login screens for users, domain administrators, and administrators are now separate:

Users log in as usual at the following URL: https://mail.example.com/

Domain administrators now use https://mail.example.com/domainadmin

Administrators use https://mail.example.com/admin

The SOGo web interface is now only accessible via the user login at https://mail.example.com/; after a standard direct redirect to SOGo, the Mailcow settings are still accessible via the link (wrench icon, top right). The Login URL for Roundcube User does not change.

  1. Two-factor authentication (2FA) Users/mail accounts that have 2FA enabled must now use app passwords to log in via mail protocols such as SMTP/IMAP, etc., for example when using a local email client or the Roundcube web interface. Each user can create these after logging into their Mailcow account under "App Passwords".

Take a close look at the changes, update your documentation accordingly, and feel free to contact us at any time if you have any questions or concerns.

Start maintenance window: 29/09/2025 23:00
Stop maintenance window: 30/09/2025 02:00

Past Incidents

Friday 17th November 2017

No incidents reported

Thursday 16th November 2017

No incidents reported

Wednesday 15th November 2017

Debian Updates, scheduled 7 years ago

Package : graphicsmagick
Version : 1.3.16-1.1+deb7u15
CVE ID : CVE-2017-13134 CVE-2017-16547
Debian Bug : 881524

Security vulnerabilities have been identified in graphicsmagick, a collection of image processing utilities and libraries.

CVE-2017-13134

Graphicsmagick was vulnerable to a heap-based buffer over-read and
denial of service via a crafted SFW file.

CVE-2017-16547

Graphicsmagick was vulnerable to a remote denial of service
(application crash) or possible unspecified other impact via a
crafted file resulting from a defective memory allocation.

Tuesday 14th November 2017

No incidents reported

Monday 13th November 2017

No incidents reported

Sunday 12th November 2017

No incidents reported

Saturday 11th November 2017

No incidents reported