Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Mailcow important changes for update from legacy to master

We will update Mailcow from legacy to the newest master version, which contains the following breaking changes:

  1. Login With the update, the login screens for users, domain administrators, and administrators are now separate:

Users log in as usual at the following URL: https://mail.example.com/

Domain administrators now use https://mail.example.com/domainadmin

Administrators use https://mail.example.com/admin

The SOGo web interface is now only accessible via the user login at https://mail.example.com/; after a standard direct redirect to SOGo, the Mailcow settings are still accessible via the link (wrench icon, top right). The Login URL for Roundcube User does not change.

  1. Two-factor authentication (2FA) Users/mail accounts that have 2FA enabled must now use app passwords to log in via mail protocols such as SMTP/IMAP, etc., for example when using a local email client or the Roundcube web interface. Each user can create these after logging into their Mailcow account under "App Passwords".

Take a close look at the changes, update your documentation accordingly, and feel free to contact us at any time if you have any questions or concerns.

Start maintenance window: 29/09/2025 23:00
Stop maintenance window: 30/09/2025 02:00

Past Incidents

Monday 21st October 2024

Elasticsearch 8.15.3, scheduled 10 months ago

We will update Elasticsearch to version 8.15.3.

Start maintenance window: 21/10/2024 23:00
Stop maintenance window: 22/10/2024 02:00

Kibana 8.15.3, scheduled 10 months ago

We will update Kibana to version 8.15.3.

Start maintenance window: 21/10/2024 23:00
Stop maintenance window: 22/10/2024 02:00

OnlyOffice 8.2.0, scheduled 10 months ago

We will update OnlyOffice to version 8.2.0.

Start maintenance window: 21/10/2024 23:00
Stop maintenance window: 22/10/2024 02:00

Imaginary 20241017_085101, scheduled 10 months ago

We will update Imaginary to version 20241017_085101.

Start maintenance window: 21/10/2024 23:00
Stop maintenance window: 22/10/2024 02:00

GitLab Runner 17.5.1, scheduled 10 months ago

We will update GitLab Runner to version 17.5.1.

Start maintenance window: 21/10/2024 23:00
Stop maintenance window: 22/10/2024 02:00

Thursday 17th October 2024

No incidents reported

Wednesday 16th October 2024

No incidents reported

Tuesday 15th October 2024

Cockpit: Disallow users from changing their billing interval

This is a bugfix

  • Disallow users to change their billing interval
  • Admins can still edit the billing

Related to #1112

Monday 14th October 2024

Managed Server Version 8: Debian Updates, scheduled 10 months ago

We will update the following packages to the latest version.

  • blackfire/any 2:2.28.13 amd64 [upgradable from: 2:2.28.12]
  • comerr-dev/oldstable-security 2.1-1.46.2-2+deb11u1 amd64 [upgradable from: 2.1-1.46.2-2]
  • e2fsprogs/oldstable-security 1.46.2-2+deb11u1 amd64 [upgradable from: 1.46.2-2]
  • libcom-err2/oldstable-security 1.46.2-2+deb11u1 amd64 [upgradable from: 1.46.2-2]
  • libext2fs2/oldstable-security 1.46.2-2+deb11u1 amd64 [upgradable from: 1.46.2-2]
  • libgsf-1-114/oldstable-security 1.14.47-1+deb11u1 amd64 [upgradable from: 1.14.47-1]
  • libgsf-1-common/oldstable-security 1.14.47-1+deb11u1 all [upgradable from: 1.14.47-1]
  • libss2/oldstable-security 1.46.2-2+deb11u1 amd64 [upgradable from: 1.46.2-2]
  • logsave/oldstable-security 1.46.2-2+deb11u1 amd64 [upgradable from: 1.46.2-2]

Start maintenance window: 14/10/2024 23:00
Stop maintenance window: 15/10/2024 02:00

Update Collabora 24.04.8.2.1, scheduled 10 months ago

We will update Collabora to version 24.04.8.2.1.

Start maintenance window: 14/10/2024 23:00
Stop maintenance window: 15/10/2024 02:00

Cockpit: Custom SSL Certificates: Enhanced Certificate/Key Validation

When adding a custom SSL certificate and key to a website, we checked its syntax only by now. If an invalid certificate or key was configured, or a certificate did not match the added key, the configuration was saved. Even if this change was not applied to the server due to the broken configuration, we encountered a case where this led to the web server not being available anymore.

To prevent possible similar problems, we now fully validate each SSL certificate and key, and also compare their fingerprints to make sure they are matching each other.

You still have to manually include and check potential intermediate certificates, as outlined here. If you are not proficient with this topic, we are happy to guide you through the process and will also order and install custom certificates on your behalf.

Reference: #1032

Sunday 13th October 2024

No incidents reported

Saturday 12th October 2024

No incidents reported

Friday 11th October 2024

No incidents reported