Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
GitLab Fleet Scaling: Migrate to Debian 13 as Base Image

The underlying VM on which GitLab CI/CD jobs are executed will be migrated to Debian 13.
This has no effect on the Docker image in which the respective job is executed, which is normally already debian:stable.

Reference: #67

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Sentry 25.9.0

We will update Sentry to version 25.9.0.

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Update Imaginary 20250918_093027

We will update Imaginary to version 20250918_093027.

Reference: #31

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Elasticsearch 8.19.4

We will update Elasticsearch to version 8.19.4.

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Kibana 8.19.4

We will update Kibana to version 8.19.4.

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Managed Server 10: Debian Updates

We will update the following packages to the latest version.

  • base-files/stable 13.8+deb13u1 amd64 [upgradable from: 13.8]
  • imagemagick-7-common/stable-security 8:7.1.1.43+dfsg1-1+deb13u2 all [upgradable from: 8:7.1.1.43+dfsg1-1+deb13u1]
  • init/stable 1.69~deb13u1 amd64 [upgradable from: 1.68]
  • init-system-helpers/stable 1.69~deb13u1 all [upgradable from: 1.68]
  • libcjson1/stable-security 1.7.18-3.1+deb13u1 amd64 [upgradable from: 1.7.18-3.1]
  • libcups2t64/stable-security 2.4.10-3+deb13u1 amd64 [upgradable from: 2.4.10-3]
  • libglib2.0-0t64/stable 2.84.4-3~deb13u1 amd64 [upgradable from: 2.84.3-1]
  • libglib2.0-data/stable 2.84.4-3~deb13u1 all [upgradable from: 2.84.3-1]
  • libmagickcore-7.q16-10/stable-security 8:7.1.1.43+dfsg1-1+deb13u2 amd64 [upgradable from: 8:7.1.1.43+dfsg1-1+deb13u1]
  • libmagickwand-7.q16-10/stable-security 8:7.1.1.43+dfsg1-1+deb13u2 amd64 [upgradable from: 8:7.1.1.43+dfsg1-1+deb13u1]
  • libmariadb3/stable 1:11.8.3-0+deb13u1 amd64 [upgradable from: 1:11.8.2-1]
  • libnss-systemd/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • libpam-systemd/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • libpcre2-8-0/stable 10.46-1~deb13u1 amd64 [upgradable from: 10.45-1]
  • libpq5/stable 17.6-0+deb13u1 amd64 [upgradable from: 17.5-1]
  • libsystemd0/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • libsystemd-shared/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • libudev1/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • linux-image-amd64/stable 6.12.43-1 amd64 [upgradable from: 6.12.41-1]
  • mariadb-common/stable 1:11.8.3-0+deb13u1 all [upgradable from: 1:11.8.2-1]
  • postfix/stable 3.10.4-1~deb13u1 amd64 [upgradable from: 3.10.3-2]
  • postgresql-17/stable 17.6-0+deb13u1 amd64 [upgradable from: 17.5-1]
  • postgresql-client-17/stable 17.6-0+deb13u1 amd64 [upgradable from: 17.5-1]
  • qemu-guest-agent/stable 1:10.0.3+ds-0+deb13u1 amd64 [upgradable from: 1:10.0.2+ds-2+deb13u1]
  • systemd/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • systemd-sysv/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • systemd-timesyncd/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]
  • tzdata/stable 2025b-4+deb13u1 all [upgradable from: 2025b-4]
  • udev/stable-updates 257.8-1~deb13u2 amd64 [upgradable from: 257.8-1~deb13u1]

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Managed Server 9: Debian Updates

We will update the following packages to the latest version.

  • chromium-common/oldstable-security 140.0.7339.127-1~deb12u1 amd64 [upgradable from: 139.0.7258.154-1~deb12u1]
  • chromium/oldstable-security 140.0.7339.127-1~deb12u1 amd64 [upgradable from: 139.0.7258.154-1~deb12u1]
  • chromium-sandbox/oldstable-security 140.0.7339.127-1~deb12u1 amd64 [upgradable from: 139.0.7258.154-1~deb12u1]
  • imagemagick-6-common/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 all [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • imagemagick-6.q16/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • imagemagick/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • libcjson1/oldstable-security 1.7.15-1+deb12u4 amd64 [upgradable from: 1.7.15-1+deb12u3]
  • libcups2/oldstable-security 2.4.2-3+deb12u9 amd64 [upgradable from: 2.4.2-3+deb12u8]
  • libmagickcore-6.q16-6-extra/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • libmagickcore-6.q16-6/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • libmagickwand-6.q16-6/oldstable-security 8:6.9.11.60+dfsg-1.6+deb12u4 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.6+deb12u3]
  • libpq5/oldstable 15.14-0+deb12u1 amd64 [upgradable from: 15.13-0+deb12u1]
  • librte-eal23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-ethdev23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-kvargs23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-mbuf23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-mempool23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-meter23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-net23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-ring23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • librte-telemetry23/oldstable 22.11.9-1~deb12u1 amd64 [upgradable from: 22.11.8-1~deb12u1]
  • libsqlite3-0/oldstable 3.40.1-2+deb12u2 amd64 [upgradable from: 3.40.1-2+deb12u1]
  • linux-image-amd64/oldstable 6.1.148-1 amd64 [upgradable from: 6.1.147-1]
  • linux-libc-dev/oldstable 6.1.148-1 amd64 [upgradable from: 6.1.147-1]
  • ruby-rubygems/oldstable 3.3.15-2+deb12u1 all [upgradable from: 3.3.15-2]
  • tzdata/oldstable 2025b-0+deb12u2 all [upgradable from: 2025b-0+deb12u1]
  • zsh/oldstable 5.9-4+b7 amd64 [upgradable from: 5.9-4+b6]

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Managed Server 8: Debian Updates

We will update the following packages to the latest version.

  • blackfire/any 2:2.29.1 amd64 [upgradable from: 2:2.29.0]
  • imagemagick-6-common/oldoldstable-security 8:6.9.11.60+dfsg-1.3+deb11u6 all [upgradable from: 8:6.9.11.60+dfsg-1.3+deb11u5]
  • libcups2/oldoldstable-security 2.3.3op2-3+deb11u10 amd64 [upgradable from: 2.3.3op2-3+deb11u9]
  • libmagickcore-6.q16-6-extra/oldoldstable-security 8:6.9.11.60+dfsg-1.3+deb11u6 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.3+deb11u5]
  • libmagickcore-6.q16-6/oldoldstable-security 8:6.9.11.60+dfsg-1.3+deb11u6 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.3+deb11u5]
  • libmagickwand-6.q16-6/oldoldstable-security 8:6.9.11.60+dfsg-1.3+deb11u6 amd64 [upgradable from: 8:6.9.11.60+dfsg-1.3+deb11u5]

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

GitLab 18.3.2

We will update GitLab to version 18.3.2.

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Update GitLab Runner 18.4.0

We will update GitLab Runner to version v18.4.0.

Reference: #69

Start maintenance window: 22/09/2025 23:00
Stop maintenance window: 23/09/2025 02:00

Mailcow important changes for update from legacy to master

We will update Mailcow from legacy to the newest master version, which contains the following breaking changes:

  1. Login With the update, the login screens for users, domain administrators, and administrators are now separate:

Users log in as usual at the following URL: https://mail.example.com/

Domain administrators now use https://mail.example.com/domainadmin

Administrators use https://mail.example.com/admin

The SOGo web interface is now only accessible via the user login at https://mail.example.com/; after a standard direct redirect to SOGo, the Mailcow settings are still accessible via the link (wrench icon, top right). The Login URL for Roundcube User does not change.

  1. Two-factor authentication (2FA) Users/mail accounts that have 2FA enabled must now use app passwords to log in via mail protocols such as SMTP/IMAP, etc., for example when using a local email client or the Roundcube web interface. Each user can create these after logging into their Mailcow account under "App Passwords".

Take a close look at the changes, update your documentation accordingly, and feel free to contact us at any time if you have any questions or concerns.

Start maintenance window: 29/09/2025 23:00
Stop maintenance window: 30/09/2025 02:00

Past Incidents

Monday 21st January 2019

DNSSEC-Validation, scheduled 6 years ago

On Monday 21.01.2019 we will switch on DNSSEC validation on our DNS resolvers. We do not expect any problems. However, if you need to resolve a DNSSEC signed domain, please make sure that the DNSSEC validation is fine.

Tuesday 15th January 2019

Mailserver Update, scheduled 6 years ago

We perform software updates on our mail servers. We expect a downtime of ~5 minutes.

Start maintenance window: 15/01/2019 00:00
Stop maintenance window: 15/01/2019 01:30

New features / Changes:

  • [Web] Apple mobileconfig enhancements
  • [ClamAV] Include signatures from Sanesecurity
  • [SOGo] Fix Reminder Mails
  • [Web] Various minor fixes
  • [Web] Update languages (cs, en)
  • [Compose] Update to Redis 5
  • [Compose] New images for ClamAV, Watchdog, SOGo, Postfix and PHP-FPM
  • [PHP-FPM] Update PHP and libs

Wednesday 9th January 2019

No incidents reported

Tuesday 8th January 2019

Managed Server Version 5: Website Module: Add Additional SQL Injection Rules

Since a few weeks, we see more and more SQL injection attacks with a certain request pattern. While those requests do not led to any security problems, they are usually fired in rapid sucession, which can led to overloaded or slow systems.

Over the holidays, we developed and tested new WAF rules to block this particular requests. As we see the same pattern on many servers and do not expect any problem with those new rules after our testing, we will rollout them to all systems as of now.

Closes #494

Monday 7th January 2019

Update Discourse 2.1.6, scheduled 6 years ago

We will update Discourse to Version 2.1.6.

Due to the built-in Docker manager, no downtime is required.

Sunday 6th January 2019

No incidents reported

Saturday 5th January 2019

No incidents reported

Friday 4th January 2019

No incidents reported

Thursday 3rd January 2019

No incidents reported