Update - Metric Alert for sb-fcs-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 19, 2025 - 22:37 CEST
Investigating - Metric Alert for sb-fcs-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 19, 2025 - 08:37 CEST
Update -

What happened?


Between 08:55 UTC and 09:40 UTC on 19 September 2025, a platform issue resulted in an impact to the Azure Resource Manager (ARM) service in the West Europe region. Impacted customers experienced failures when performing service management operations (such as create, delete, update, scaling, start, stop) for resources hosted in this region.




What do we know so far?


We determined this service event was caused by a transient issue in an internal component responsible for initiating API requests to our backend dependencies. This component encountered intermittent failures that interrupted the communication flow, resulting in API call timeouts and subsequent failure of service request processing. As a result, service operations could not be completed manifesting in impact mentioned above.




How did we respond?


  • 08:55 UTC on 19 September 2025 - Customer impact began.
  • 09:10 UTC on 19 September 2025 - Service monitoring detected a spike in failure rate and triggered an alert notifying us about service functionality disruption.
  • 09:20 UTC on 19 September 2025 - Transient issue within an internal component was identified as a contributing cause to this service event.
  • 09:25 UTC on 19 September 2025 - Auto-mitigation workstream was initiated by Azure platform, service recovery was monitored while the service self-healed.
  • 09:40 UTC on 19 September 2025 - Service restored, and customer impact confirmed fully mitigated.



What Happens Next?


  • Our team will be completing an internal retrospective to understand the incident in more detail. Once that is completed, generally within 14 days, we will publish a Post Incident Review (PIR) to all impacted customers.
  • To get notified when that happens, and/or to stay informed about future Azure service issues, make sure that you configure and maintain Azure Service Health alerts – these can trigger emails, SMS, push notifications, webhooks, and more: https://aka.ms/ash-alerts .
  • For more information on Post Incident Reviews, refer to https://aka.ms/AzurePIRs .
  • The impact times above represent the full incident duration, so are not specific to any individual customer. Actual impact to service availability may vary between customers and resources – for guidance on implementing monitoring to understand granular impact: https://aka.ms/AzPIR/Monitoring .
  • Finally, for broader guidance on preparing for cloud incidents, refer to https://aka.ms/incidentreadiness .


Sep 19, 2025 - 14:12 CEST
Investigating -

What happened?


Between 08:55 UTC and 09:25 UTC on 19 September 2025, a platform issue resulted in an impact to the Azure Resource Manager in West Europe region. Customers may have experienced receiving error notifications when performing service management operations - such as create, delete, update, scaling, start, stop - for resources hosted in this region.


 


This issue is now mitigated. An update with more information will be provided shortly.


Sep 19, 2025 - 12:48 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 14:05 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 14:05 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 14:05 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 14:01 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:51 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:51 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:51 CEST
Investigating - Metric Alert for fd-ds-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:51 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:31 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:31 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 13:31 CEST
Update - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:33 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:16 CEST
Update - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:33 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:16 CEST
Update - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:33 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:16 CEST
Update - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:33 CEST
Investigating - Metric Alert for fd-global-prod-001 - Service Availability is less than or equal to 95%
Sep 19, 2025 - 12:16 CEST
Update -

What happened?


Between 12:05 UTC and 21:33 UTC on 15 September 2025, a platform issue impacted Azure Front Door (Standard, Premium, and Classic SKUs) and Azure CDN Standard from Microsoft. During this time, customers accessing services in the East US region may have experienced 504 (Gateway Timeout) errors. The impact was limited to two Points of Presence (PoPs) in East US and affected only cache-miss traffic.




What do we know so far?


Our investigation determined that the incident was caused by elevated CPU utilization in two Azure Front Door (AFD) environment. This condition led to intermittent 504 (Gateway Timeout) errors affecting cache-miss traffic. Customer retries were usually successful. The issue was identified through service monitoring and impacted approximately 0.25% of overall cache-miss requests in the affected environments. The elevated CPU load was traced to an increase in cumulative traffic, which overloaded the processing capacity of these environments.




How did we respond?


  • 12:05 UTC on 15 September 2025 – Customer impact began.
  • 12:07 UTC on 15 September 2025 – Issue was detected via service monitoring upon observing gradual increase in request failures. An incident was created, and the service team was notified.
  • 16:00 UTC on 15 September 2025 – Service team identified that the issue was caused by an increased load and high CPU usage on two Azure Front Door environments, leading to intermittent 504 (Gateway timeout) errors for customer traffic, impacting cache-miss requests.
  • 17:19 UTC on 15 September 2025 – Additional capacity was provisioned to address overloaded environments. This reduced the frequency of error rates, but lower volume error rates were still observed from our telemetry.
  • 20:12 UTC on 15 September 2025 - Additional throughput optimization was rolled out to further reduce system load.
  • 21:33 UTC on 15 September 2025 – Service(s) restored, and customer impact mitigated, and verified by service telemetry.

What happens next?


  • Our team will be completing an internal retrospective to understand the incident in more detail. Once that is completed, generally within 14 days, we will publish a Post Incident Review (PIR) to all impacted customers.
  • To get notified if a PIR is published, and/or to stay informed about future Azure service issues, make sure that you configure and maintain Azure Service Health alerts – these can trigger emails, SMS, push notifications, webhooks, and more: https://aka.ms/ash-alerts  
  • For more information on Post Incident Reviews, refer to https://aka.ms/AzurePIRs  
  • The impact times above represent the full incident duration, so are not specific to any individual customer. Actual impact to service availability may vary between customers and resources – for guidance on implementing monitoring to understand granular impact: https://aka.ms/AzPIR/Monitoring  
  • Finally, for broader guidance on preparing for cloud incidents, refer to https://aka.ms/incidentreadiness



Sep 16, 2025 - 01:28 CEST
Investigating -

What happened? 


Between 12:05 UTC and 21:33 UTC on 15 September 2025, a platform issue resulted in an impact to the Azure Front Door (Standard, Premium or Classic SKU) or Azure CDN Standard by Microsoft, who may have experienced 504 HTTP status response code errors when using the services in East US region. The impact is limited to 2 points of presence in East US area and occurs for caching traffic.


This issue is now mitigated. An update with more information will be provided shortly.




Sep 16, 2025 - 00:34 CEST
Update - Metric Alert for BI-SRV2-HQ - the service availability is less than or equal to 95%
Sep 15, 2025 - 00:15 CEST
Investigating - Metric Alert for BI-SRV2-HQ - the service availability is less than or equal to 95%
Sep 15, 2025 - 00:08 CEST
Update -

What happened?


Between 03:00 UTC on 19 August 2025 and 10:00 UTC on 9 September 2025, customers using the Azure App Service in Public Azure may have experienced intermittent service disruptions due to a platform issue. This resulted in intermittent 502 or 503 HTTP status codes or elevated latency affecting application workloads.




What went wrong, and why?


A recent Azure App Service release introduced a bug in an application responsible for customer app startup. This bug prevented automatic retries for certain requests needed to retrieve site startup content. The issue remained undetected until an Azure OS rollout caused some infrastructure VMs to be only partially provisioned. As a result, the application failed to retry startup requests directed to these affected VMs. Other applications successfully retried requests automatically, avoiding impact, which contributed to a delay in identifying the cause.




How did we respond?


  • 03:00 UTC on 19 August 2025 - Initial customer impact began. Short-lived (< 10 minute) spike
  • 21:00 UTC on 8 September 2025 - Azure OS rollout reached its final set of regions, resulting in significantly greater impact due to the previously mentioned VM provisioning failures.
  • 01:30 UTC on 9 September 2025 - Automated monitoring tools detected degraded availability affecting the partner team.
  • 03:00 UTC on 9 September 2025 - Mitigation efforts began for VMs that failed to provision. While most were successfully resolved through automation, a subset of permanently stuck VMs required manual intervention.
  • 10:00 UTC on 09 September 2025 - Availability to final underlying VM(s) restored, and customer impact mitigated.



What happens next?


  • This Mitigation Statement is the final communication for this incident. For details about which Azure incidents qualify for which Post Incident Reviews (PIRs), refer to https://aka.ms/AzurePIRs
  • The impact times above represent the full incident duration, so are not specific to any individual customer. Actual impact to service availability may vary between customers and resources – for guidance on implementing monitoring to understand granular impact: https://aka.ms/AzPIR/Monitoring
  • To stay informed about future Azure service issues, make sure that you configure and maintain Azure Service Health alerts – these can trigger emails, SMS, push notifications, webhooks, and more: https://aka.ms/ash-alerts
  • For broader guidance on preparing for cloud incidents, refer to https://aka.ms/incidentreadiness


Sep 12, 2025 - 19:46 CEST
Investigating -

What happened?


Between 03:00 UTC on 19 August 2025 and 10:00 UTC on 9 September 2025, customers using the Windows Azure App Service in Public Azure may have experienced intermittent service disruptions due to a platform issue. This resulted in occasional 502 or 503 HTTP status codes or elevated latency affecting application workloads.


This issue is now mitigated. An update with more information will be provided shortly.


Sep 12, 2025 - 19:19 CEST
Update - Metric Alert for licenseservice-sync - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 12, 2025 - 11:44 CEST
Investigating - Metric Alert for licenseservice-sync - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 10, 2025 - 12:44 CEST
Update -

What happened?


Between 03:47 UTC and 04:50 UTC 12 September 2025, a platform issue resulted in an impact to the Azure Monitor service. Impacted customers experienced delays in viewing the most recent platform metrics, delayed or missed alert activations, and incorrect auto-scale rule evaluations based on impacted metrics.




What do we know so far?


We determined that a backend processing delay in the Azure Monitor pipeline caused a lag in metric ingestion and alert evaluation. This delay was triggered by multiple service nodes entering a degraded state. This resulted in publication delays for the subset of metrics being processed by the impacted nodes, which triggered an automated pause in alert evaluation to prevent false alerts.




What do we know so far?


  • 03:47 UTC on 12 September 2025– Customer impact began due to a platform issue affecting Azure Monitor.
  • 04:04 UTC on 12 September 2025– Service monitoring detected delayed metric ingestion and alerting anomalies.
  • 04:45 UTC on 12 September 2025– A mitigation workstream was initiated. The root cause was traced to multiple service nodes entering a degraded state, which triggered delays in metric publication and paused alert evaluations to prevent false alerts. Alerting-related impact was mitigated, though some customers may have continued to see delayed data.
  • 04:50 UTC on 12 September 2025– The mitigation involved taking affected nodes out of rotation. Service was fully restored. 

What happens next?


  • Our team will be completing an internal retrospective to understand the incident in more detail. Once that is completed, generally within 14 days, we will publish a Post Incident Review (PIR) to all impacted customers.
  • To get notified if a PIR is published, and/or to stay informed about future Azure service issues, make sure that you configure and maintain Azure Service Health alerts – these can trigger emails, SMS, push notifications, webhooks, and more: https://aka.ms/ash-alerts
  • For more information on Post Incident Reviews, refer to https://aka.ms/AzurePIRs
  • The impact times above represent the full incident duration, so are not specific to any individual customer. Actual impact to service availability may vary between customers and resources – for guidance on implementing monitoring to understand granular impact: https://aka.ms/AzPIR/Monitoring
  • Finally, for broader guidance on preparing for cloud incidents, refer to https://aka.ms/incidentreadiness


Sep 12, 2025 - 08:38 CEST
Update -

Impact Statement: Starting at 03:47 UTC on 12 September 2025, you may have been identified as a customer using Azure Monitor who may experience a delay in seeing most recent data for Azure Monitor platform metrics. You may also observe delayed or missed alert activation and incorrect auto-scale rule evaluation on impacted metrics as a result of this delay.


This impact is now mitigated; more information will be provided shortly.










Sep 12, 2025 - 08:06 CEST
Investigating -

Impact Statement: Starting at 03:47 UTC on 12 September 2025, you may have been identified as a customer using Azure Monitor who may experience a delay in seeing most recent data for Azure Monitor platform metrics. You may also observe delayed or missed alert activation and incorrect auto-scale rule evaluation on impacted metrics as a result of this delay.




Current Status: We detected this issue via our automated service monitoring upon identifying an outage impacting Azure Monitor metrics queries. We are aware of this issue and are actively investigating the underlying cause. The next update will be provided within 60 minutes, or as events warrant.


Sep 12, 2025 - 07:34 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 10, 2025 - 16:05 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 10, 2025 - 14:05 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 10, 2025 - 12:05 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 10, 2025 - 12:05 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 08, 2025 - 17:23 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 08, 2025 - 17:05 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 03, 2025 - 15:46 CEST
Investigating - Metric Alert for sb-idp-prod-euw-001 - the maximum Count of dead-lettered messages in a Queue/Topic is greater than equal to 10.
Sep 03, 2025 - 01:47 CEST
Graphisoft ID Degraded Performance
90 days ago
100.0 % uptime
Today
Graphisoft License Delivery Degraded Performance
90 days ago
100.0 % uptime
Today
Graphisoft Store Operational
90 days ago
100.0 % uptime
Today
Graphisoft Legacy Store Degraded Performance
90 days ago
100.0 % uptime
Today
Graphisoft Legacy Webshop Degraded Performance
90 days ago
100.0 % uptime
Today
GSPOS Operational
90 days ago
100.0 % uptime
Today
Graphisoft BIM Components Operational
90 days ago
100.0 % uptime
Today
Graphisoft BIMx Transfer Operational
90 days ago
100.0 % uptime
Today
Graphisoft DevOps Components Operational
90 days ago
100.0 % uptime
Today
Microsoft Incidents Operational
90 days ago
100.0 % uptime
Today
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Sep 20, 2025

No incidents reported today.

Sep 19, 2025

Unresolved incidents: Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert for fd-ds-prod-001 - Service Availability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Microsoft Incident - Azure Resource Manager - Mitigated - Azure Resource Manager experiencing service management operations failures in West Europe, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - fd-global-prod-001 - ServiceAvailability95, Metric Alert - sb-fcs-prod-euw-001 - CountOfDeadLettered10.

Sep 18, 2025

No incidents reported.

Sep 17, 2025

No incidents reported.

Sep 16, 2025

Unresolved incident: Microsoft Incident - Azure Frontdoor - Mitigated – Azure Front Door traffic experienced 504 errors.

Sep 15, 2025

Unresolved incident: Metric Alert - BI-SRV-HQ - ServiceAvailability95.

Sep 14, 2025

No incidents reported.

Sep 13, 2025

No incidents reported.

Sep 12, 2025

Unresolved incidents: Microsoft Incident - App Service - PIR - App Service impacting service, Microsoft Incident - Azure Monitor - Mitigated - Azure Monitor experiencing delayed metrics and alerts, Metric Alert - licenseservice-sync - CountOfDeadLettered10.

Sep 11, 2025

No incidents reported.

Sep 10, 2025

Unresolved incidents: Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10, Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10, Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10, Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10.

Sep 9, 2025

No incidents reported.

Sep 8, 2025

Unresolved incidents: Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10, Metric Alert - sb-idp-prod-euw-001 - CountOfDeadLettered10.

Sep 7, 2025

No incidents reported.

Sep 6, 2025

No incidents reported.