Completed -
The scheduled maintenance has been completed.
May 10, 06:00 EDT
Scheduled -
We will be performing scheduled maintenance on api.aptible.com and auth.aptible.com on May 10th between 5pm and 6pm EDT. During this window, there may be brief periods of degraded availability for the Aptible API and authentication services. Running applications and databases will not be affected. Users may experience brief interruptions when logging in or making API requests during this time. We expect total downtime to be minimal and well within the maintenance window. We will send updates as maintenance progresses.
May 4, 17:37 EDT
Resolved -
An upstream AWS issue affected infrastructure in a single Availability Zone in us-east-1. During the event, we blocked provisioning into the affected zone and monitored AWS’s recovery efforts.
AWS has since recovered enough of the affected availability zone for the impacted Aptible infrastructure to recover. We have also completed recovery of any Aptible-managed resources that required follow-up action on our side.
Any customers with directly affected resources have been notified of resolution. We are continuing normal platform monitoring, but we are marking this incident as resolved on our end.
May 8, 23:35 EDT
Monitoring -
We have unblocked operations from the specified region as we have seen successful provisioning and maintenance of new instance in that availability zone. Instances that were affected have not yet seen recovery, and the upstream AWS alert indicates they may still take hours of recovery.
May 8, 10:02 EDT
Identified -
We have blocked operations from provisioning into the specified availability zone
May 7, 21:39 EDT
Investigating -
Due to an underlying issue in AWS we are experiencing instability in a certain availability zone in us-east-1. We are investigating this issue and will follow up with recommendations shortly
May 7, 21:05 EDT
Resolved -
This incident has been resolved.
May 8, 11:35 EDT
Monitoring -
Aptible is aware of “Dirty Frag,” a recently disclosed Linux kernel vulnerability that may allow local privilege escalation under certain conditions [0].
We have taken action across the Aptible platform to protect all customer workloads against this vulnerability. No customer action is required at this time.
We will continue to monitor upstream kernel, distribution, and security vendor guidance related to this vulnerability and will take any additional action if needed.
Resolved -
Aptible is aware of CVE-2026-31431, also known as “Copy Fail,” a recently disclosed Linux kernel vulnerability that may allow local privilege escalation under certain conditions [0].
We have taken action across the Aptible platform to protect all customer workloads against this vulnerability. No customer action is required at this time.
We will continue to monitor upstream kernel, distribution, and security vendor guidance related to this CVE and will take any additional action if needed.