All Systems Operational

Updated a few seconds ago

Scheduled Maintenance

WAN platform maintenancePlanned Maintenance

Schedule

April 7, 2026 22:00 - April 8, 2026 04:00 CEST
April 7, 2026 20:00 - April 8, 2026 02:00 UTC

Components

Cloud Connect, Cloud VPN, DBaaS, Mail Relay, Kubernetes, OpenStack, Virtuozzo PaaS, Application Monitoring, The Vault

Locations

STO1 - Stockholm South, STO2 - Stockholm West, STO3 - Stockholm North, VGO1 - Västra Götaland

Description

We will perform maintenance on our WAN platform. This maintenance should not affect the platform but there is an increased risk of disturbances.

Schedule

April 8, 2026 09:00 - 17:00 CEST
April 8, 2026 07:00 - 15:00 UTC

Components

Cloud Connect, Cloud VPN, DBaaS, Mail Relay, Kubernetes, OpenStack, Virtuozzo PaaS, Application Monitoring, The Vault

Locations

STO1 - Stockholm South, STO2 - Stockholm West, STO3 - Stockholm North, VGO1 - Västra Götaland

Description

Expansion of STO1 capacity require migration to new patch panels. We don't expect any disturbances.

Schedule

April 9, 2026 18:00 - 20:00 CEST
April 9, 2026 16:00 - 18:00 UTC

Components

Virtuozzo PaaS

Locations

STO1 - Stockholm South

Description

Maintenance of Virtuozzo hardnode. Restart planned of 1 physical hardnode, estimated downtime is sub 20 minutes. During the restart all environments hosted will be unavailable. Impacted customers will receive individual information of environment(s) that are hosted or have dependancys on this hardnode.

0

Active Incidents

0

Active Maintenances

3

Upcoming Maintenances

Cloud Connect




Operational

Cloud VPN




Operational

DBaaS




Operational

Mail Relay




Operational

Kubernetes




Operational

OpenStack




Operational

Virtuozzo PaaS




Operational

Application Monitoring




Operational

The Vault




Operational

External Services

History (Last 7 days)

Description

For a better and more secure user experience we will require all users in OpenStack IaaS to authenticate against the Elastx identity provider (IdP). Multi Factor Authentication (MFA) is required and you can use either TOTP or hardware keys in combination with a password. This is also a preparation for the launch of the Elastx Cloud Console (ECC). With the Elastx IdP you will have one account to access all ECP services. We have postponed the migration one week, from 2026-03-23 to 2026-03-30. If you do not already have an Elastx IdP account one will be created for you automatically at 2026-03-30. At this time we will no longer support OpenStack user accounts with Keystone Credentials. The ability to manage users in the OpenStack web UI will also be replaced with user management in Elastx Cloud Console. If you want to enable idp for your user account before this date please contact our support. All programmatic integrations with OpenStack IaaS must be done with “application credentials” or “ec2 credentials”. If you are currently using a user account with Keystone Credentials (username and password), that integration will fail after all users are migrated to IdP authentication with MFA. This includes integrations with Swift Object storage which is the most common service to integrate with. Here is a guide on how to create application credentials, https://docs.elastx.cloud/docs/openstack-iaas/guides/application_credentials/ Here is a guide on how to create ec2 credentials, https://docs.elastx.cloud/docs/openstack-iaas/guides/ec2_credentials/ This change will take effect starting March 30, 2026. If you have any general questions or would like to sign-up please contact us at hello@elastx.se. Any technical questions please register a support ticket at https://support.elastx.se.


Components

OpenStack


Locations

STO1 - Stockholm South, STO2 - Stockholm West, STO3 - Stockholm North


Schedule

March 30, 2026 09:00 - March 30, 2026 16:00 CEST
March 30, 2026 07:00 - March 30, 2026 14:00 UTC



March 30, 2026 09:00 CEST
March 30, 2026 07:00 UTC
UPDATE

Scheduled maintenance is starting.

March 30, 2026 16:00 CEST
March 30, 2026 14:00 UTC
UPDATE

Scheduled maintenance is complete.