Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Sentry 25.6.2

We will update Sentry to version 25.6.2.

Start maintenance window: 07/07/2025 23:00
Stop maintenance window: 08/07/2025 02:00

Imaginary 20250701_092737

We will update Imaginary to version 20250701_092737.

Start maintenance window: 07/07/2025 23:00
Stop maintenance window: 08/07/2025 02:00

Managed Server Version 9: PHP

We will update the following packages to the latest version.

  • ops-php81/unknown 8.1.33-ops-78815 amd64 [upgradable from: 8.1.32-ops-73463]
  • ops-php82/unknown 8.2.29-ops-78814 amd64 [upgradable from: 8.2.28-ops-73462]
  • ops-php83/unknown 8.3.23-ops-78922 amd64 [upgradable from: 8.3.22-ops-77209]
  • ops-php83/unknown 8.3.23-ops-78922 amd64 [upgradable from: 8.3.23-ops-78800]
  • ops-php84/unknown 8.4.10-ops-78920 amd64 [upgradable from: 8.4.8-ops-77184]

Start maintenance window: 07/07/2025 23:00 Stop maintenance window: 08/07/2025 02:00

Managed Server Version 8: PHP

We will update the following packages to the latest version.

  • ops-php81/unknown 8.1.33-ops-78816 amd64 [upgradable from: 8.1.32-ops-73467]
  • ops-php82/unknown 8.2.29-ops-78812 amd64 [upgradable from: 8.2.28-ops-73466]
  • ops-php83/unknown 8.3.23-ops-78911 amd64 [upgradable from: 8.3.22-ops-77189]
  • ops-php84/unknown 8.4.10-ops-78978 amd64 [upgradable from: 8.4.1-ops-73464]

Start maintenance window: 07/07/2025 23:00 Stop maintenance window: 08/07/2025 02:00

Managed Server 9: Debian Updates

We will update the following packages to the latest version.

  • docker-ce/bookworm 5:28.3.1-1~debian.12~bookworm amd64 [upgradable from: 5:28.3.0-1~debian.12~bookworm]
  • docker-ce-cli/bookworm 5:28.3.1-1~debian.12~bookworm amd64 [upgradable from: 5:28.3.0-1~debian.12~bookworm]
  • docker-ce-rootless-extras/bookworm 5:28.3.1-1~debian.12~bookworm amd64 [upgradable from: 5:28.3.0-1~debian.12~bookworm]
  • docker-compose-plugin/bookworm 2.38.1-1~debian.12~bookworm amd64 [upgradable from: 2.37.3-1~debian.12~bookworm]

Start maintenance window: 07/07/2025 23:00 Stop maintenance window: 08/07/2025 02:00

Managed Server 8: Debian Updates

We will update the following packages to the latest version.

  • docker-ce/bullseye 5:28.3.1-1~debian.11~bullseye amd64 [upgradable from: 5:28.3.0-1~debian.11~bullseye]
  • docker-ce-cli/bullseye 5:28.3.1-1~debian.11~bullseye amd64 [upgradable from: 5:28.3.0-1~debian.11~bullseye]
  • docker-ce-rootless-extras/bullseye 5:28.3.1-1~debian.11~bullseye amd64 [upgradable from: 5:28.3.0-1~debian.11~bullseye]
  • docker-compose-plugin/bullseye 2.38.1-1~debian.11~bullseye amd64 [upgradable from: 2.37.3-1~debian.11~bullseye]

Start maintenance window: 07/07/2025 23:00 Stop maintenance window: 08/07/2025 02:00

Cluster Maintenance

We will update soft- and firmware throughout our cluster. During the update, a higher disk i/o latency is to be expected.

Start maintenance window: 07/07/2025 23:00
Stop maintenance window: 08/07/2025 02:00

Past Incidents

Monday 13th December 2021

Cluster Maintenance, scheduled 3 years ago

We are performing maintenance on our Nutanix cluster. During this time, there may be higher disk i/o.

Start maintenance window: 13/12/2021 23:00
Stop maintenance window: 14/12/2021 06:00

Update GitLab 14.4.4, scheduled 3 years ago

We will update GitLab to version 14.4.4.

Start maintenance window: 13/12/2021 23:00
Stop maintenance window: 14/12/2021 02:00

Update Elasticsearch & Kibana 7.16.1, scheduled 3 years ago

We will update Elasticsearch and Kibana to version 7.16.1.

Start maintenance window: 13/12/2021 14:20
Stop maintenance window: 13/12/2021 14:45

Managed Server Version 7: Web Application Firewall: Additional Rules to mitigate CVE-2021-44228 (Log4j)

Our web application firewall does already detect all known exploits targeting arbitrary GET and POST parameters (CRS rule 932130). However, the rule did not inspect HTTP headers such as the user-agent and referrer yet.

To mitigate attacks against this vulnerability, we

  • added the User-Agent and Referer headers to the targets of the CRS rule 932130
  • added another, targeted rule against the usage of jndi strings

Even though the web application firewall does protect your applications from this issue unless manually disabled, make sure to take the required steps to mitigate the problem at its source, as outlined by Log4j here.

Reference #1093

Managed Server Version 8: Web Application Firewall: Additional Rules to mitigate CVE-2021-44228 (Log4j)

Our web application firewall does already detect all known exploits targeting arbitrary GET and POST parameters (CRS rule 932130). However, the rule did not inspect HTTP headers such as the user-agent and referrer yet.

To mitigate attacks against this vulnerability, we

  • added the User-Agent and Referer headers to the targets of the CRS rule 932130
  • added another, targeted rule against the usage of jndi strings

Even though the web application firewall does protect your applications from this issue unless manually disabled, make sure to take the required steps to mitigate the problem at its source, as outlined by Log4j here.

Reference #1093

Managed Server Version 6: Web Application Firewall: Additional Rules to mitigate CVE-2021-44228 (Log4j)

Our web application firewall does already detect all known exploits targeting arbitrary GET and POST parameters (CRS rule 932130). However, the rule did not inspect HTTP headers such as the user-agent and referrer yet.

To mitigate attacks against this vulnerability, we

  • added the User-Agent and Referer headers to the targets of the CRS rule 932130
  • added another, targeted rule against the usage of jndi strings

Even though the web application firewall does protect your applications from this issue unless manually disabled, make sure to take the required steps to mitigate the problem at its source, as outlined by Log4j here.

Reference #1093

Sunday 12th December 2021

No incidents reported

Saturday 11th December 2021

No incidents reported

Friday 10th December 2021

No incidents reported

Thursday 9th December 2021

No incidents reported

Wednesday 8th December 2021

No incidents reported

Tuesday 7th December 2021

No incidents reported