Is Google Cloud Functions down?
Current Google Cloud Functions status is UP

We checked the official Google Cloud Functions Status Page 3 min. 58 sec. ago. Learn more
Having a problem? Help Allie Gator keep this page accurate!

Report an Issue

Get notified when it's back up with dashboards and notifications

Recent Google Cloud Functions Outages and Issues

Follow the recent outages and downtime for Google Cloud Functions in the table below.

Start Time

Type

Length

Message

Details

November 09, 2023 01:30 UTC

WARN

less than a minute

Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

See more
Start Time

November 09, 2023 01:30 UTC

Type WARN
Affected Components

Europe (regions) - Cloud Run

Asia Pacific (regions) - Cloud Run

Europe (regions) - Google App Engine

Asia Pacific (regions) - Google App Engine

Europe (regions) - Google Cloud Functions

Asia Pacific (regions) - Google Cloud Functions

Europe (regions) - Secret Manager

Asia Pacific (regions) - Secret Manager

europe-west1 - Cloud Run

europe-west1 - Google App Engine

europe-west1 - Google Cloud Functions

australia-southeast1 - Cloud Run

australia-southeast1 - Google App Engine

australia-southeast1 - Google Cloud Functions

australia-southeast1 - Secret Manager

europe-west1 - Secret Manager

Message

Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

Details

Summary: Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate
Description: There is no impact to cluster functionality or performance. The only impact is extra logs in Cloud Logging.
gke-metadata-server is a GKE-managed system workload that is part of the GKE Workload Identity feature. Versions 0.4.272 to 0.4.280 of gke-metadata-server contain an incorrect configuration that results in a high rate of debug logs that contain the string "Unable to sync sandbox". These logs are then ingested into Cloud Logging, consuming Cloud Logging ingestion quota, and causing excess billable usage when exceeding the free monthly allotment.
A rollout containing a fix to no longer ingest the excess logs to Cloud Logging is about 25% complete.
We will provide an update by Friday, 2023-11-10 14:00 US/Pacific.
Diagnosis: Customers can determine whether their cluster is impacted by inspecting the gke-metadata-server daemonset with kubectl get daemonset -n kube-system -l k8s-app=gke-metadata-server -o yaml and looking at the components.gke.io/component-version annotation in .spec.template.metadata.annotations. If the value is a version between 0.4.272 and 0.4.280 (inclusive), then the cluster is currently affected.
Workaround:
- Customers using GKE Rapid Channel can upgrade their cluster control plane to 1.28.2-gke.1157000 and above, or 1.27.7-gke.1038000 and above.
- Customers on GKE Regular Channel, GKE Stable Channel, or who are not using release channels do not have a workaround at this time.

November 09, 2023 01:30 UTC

WARN

ongoing

Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

See more
Start Time

November 09, 2023 01:30 UTC

Type WARN
Affected Components

Europe (regions) - Cloud Run

Asia Pacific (regions) - Cloud Run

Europe (regions) - Google App Engine

Asia Pacific (regions) - Google App Engine

Europe (regions) - Google Cloud Functions

Asia Pacific (regions) - Google Cloud Functions

Europe (regions) - Secret Manager

Asia Pacific (regions) - Secret Manager

europe-west1 - Cloud Run

europe-west1 - Google App Engine

europe-west1 - Google Cloud Functions

australia-southeast1 - Cloud Run

australia-southeast1 - Google App Engine

australia-southeast1 - Google Cloud Functions

australia-southeast1 - Secret Manager

europe-west1 - Secret Manager

Message

Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

Details

Summary: Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate
Description: There is no impact to cluster functionality or performance. The only impact is extra logs in Cloud Logging.
gke-metadata-server is a GKE-managed system workload that is part of the GKE Workload Identity feature. Versions 0.4.272 to 0.4.280 of gke-metadata-server contain an incorrect configuration that results in a high rate of debug logs that contain the string "Unable to sync sandbox". These logs are then ingested into Cloud Logging, consuming Cloud Logging ingestion quota, and causing excess billable usage when exceeding the free monthly allotment.
A rollout containing a fix to no longer ingest the excess logs to Cloud Logging is about 25% complete.
We will provide an update by Friday, 2023-11-10 14:00 US/Pacific.
Diagnosis: Customers can determine whether their cluster is impacted by inspecting the gke-metadata-server daemonset with kubectl get daemonset -n kube-system -l k8s-app=gke-metadata-server -o yaml and looking at the components.gke.io/component-version annotation in .spec.template.metadata.annotations. If the value is a version between 0.4.272 and 0.4.280 (inclusive), then the cluster is currently affected.
Workaround:
- Customers using GKE Rapid Channel can upgrade their cluster control plane to 1.28.2-gke.1157000 and above, or 1.27.7-gke.1038000 and above.
- Customers on GKE Regular Channel, GKE Stable Channel, or who are not using release channels do not have a workaround at this time.

November 08, 2023 23:55 UTC

WARN

less than a minute

Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run. and Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

See more
Start Time

November 08, 2023 23:55 UTC

Type WARN
Affected Components

Europe (regions) - Cloud Run

Asia Pacific (regions) - Cloud Run

Europe (regions) - Google App Engine

Asia Pacific (regions) - Google App Engine

Europe (regions) - Google Cloud Functions

Asia Pacific (regions) - Google Cloud Functions

Europe (regions) - Secret Manager

Asia Pacific (regions) - Secret Manager

europe-west1 - Cloud Run

europe-west1 - Google App Engine

europe-west1 - Google Cloud Functions

australia-southeast1 - Cloud Run

australia-southeast1 - Google App Engine

australia-southeast1 - Secret Manager

australia-southeast1 - Google Cloud Functions

europe-west1 - Secret Manager

Message

Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run. and Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

Details

Summary: Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run.
Description: Mitigation work is currently underway by our engineering team.
We do not have an ETA for mitigation at this point.
We will provide more information by Wednesday, 2023-11-08 16:40 US/Pacific.
Diagnosis: Requests to Secret Manager might time out for App Engine and Cloud Run customers.
Workaround: Some customers reported that removing the secret manager calls and "hard coded" the secrets is a workaround.
Summary: Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate
Description: There is no impact to cluster functionality or performance. The only impact is extra logs in Cloud Logging.
gke-metadata-server is a GKE-managed system workload that is part of the GKE Workload Identity feature. Versions 0.4.272 to 0.4.280 of gke-metadata-server contain an incorrect configuration that results in a high rate of debug logs that contain the string "Unable to sync sandbox". These logs are then ingested into Cloud Logging, consuming Cloud Logging ingestion quota, and causing excess billable usage when exceeding the free monthly allotment.
A rollout containing a fix to no longer ingest the excess logs to Cloud Logging is about 25% complete.
We will provide an update by Friday, 2023-11-10 14:00 US/Pacific.
Diagnosis: Customers can determine whether their cluster is impacted by inspecting the gke-metadata-server daemonset with kubectl get daemonset -n kube-system -l k8s-app=gke-metadata-server -o yaml and looking at the components.gke.io/component-version annotation in .spec.template.metadata.annotations. If the value is a version between 0.4.272 and 0.4.280 (inclusive), then the cluster is currently affected.
Workaround:
- Customers using GKE Rapid Channel can upgrade their cluster control plane to 1.28.2-gke.1157000 and above, or 1.27.7-gke.1038000 and above.
- Customers on GKE Regular Channel, GKE Stable Channel, or who are not using release channels do not have a workaround at this time.

November 08, 2023 23:55 UTC

WARN

about 2 hours

Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run. and Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

See more
Start Time

November 08, 2023 23:55 UTC

Type WARN
Affected Components

Europe (regions) - Cloud Run

Asia Pacific (regions) - Cloud Run

Europe (regions) - Google App Engine

Asia Pacific (regions) - Google App Engine

Europe (regions) - Google Cloud Functions

Asia Pacific (regions) - Google Cloud Functions

Europe (regions) - Secret Manager

Asia Pacific (regions) - Secret Manager

europe-west1 - Cloud Run

europe-west1 - Google App Engine

europe-west1 - Google Cloud Functions

australia-southeast1 - Cloud Run

australia-southeast1 - Google App Engine

australia-southeast1 - Secret Manager

australia-southeast1 - Google Cloud Functions

europe-west1 - Secret Manager

Message

Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run. and Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate

Details

Summary: Customer experiencing a requests to Secret Manager timeout for App Engine and Cloud Run.
Description: Mitigation work is currently underway by our engineering team.
We do not have an ETA for mitigation at this point.
We will provide more information by Wednesday, 2023-11-08 16:40 US/Pacific.
Diagnosis: Requests to Secret Manager might time out for App Engine and Cloud Run customers.
Workaround: Some customers reported that removing the secret manager calls and "hard coded" the secrets is a workaround.
Summary: Google Kubernetes Engine customers with Workload Identity enabled may see high application logging rate
Description: There is no impact to cluster functionality or performance. The only impact is extra logs in Cloud Logging.
gke-metadata-server is a GKE-managed system workload that is part of the GKE Workload Identity feature. Versions 0.4.272 to 0.4.280 of gke-metadata-server contain an incorrect configuration that results in a high rate of debug logs that contain the string "Unable to sync sandbox". These logs are then ingested into Cloud Logging, consuming Cloud Logging ingestion quota, and causing excess billable usage when exceeding the free monthly allotment.
A rollout containing a fix to no longer ingest the excess logs to Cloud Logging is about 25% complete.
We will provide an update by Friday, 2023-11-10 14:00 US/Pacific.
Diagnosis: Customers can determine whether their cluster is impacted by inspecting the gke-metadata-server daemonset with kubectl get daemonset -n kube-system -l k8s-app=gke-metadata-server -o yaml and looking at the components.gke.io/component-version annotation in .spec.template.metadata.annotations. If the value is a version between 0.4.272 and 0.4.280 (inclusive), then the cluster is currently affected.
Workaround:
- Customers using GKE Rapid Channel can upgrade their cluster control plane to 1.28.2-gke.1157000 and above, or 1.27.7-gke.1038000 and above.
- Customers on GKE Regular Channel, GKE Stable Channel, or who are not using release channels do not have a workaround at this time.

August 08, 2023 15:15 UTC

WARN

less than a minute

Chronicle customers in all regions using the SENTINEL_EDR default parser (product source: "SentinelOne EDR") may have incorrect process enrichment results.

See more
Start Time

August 08, 2023 15:15 UTC

Type WARN
Affected Components

Americas (regions) - Google App Engine

Asia Pacific (regions) - Google App Engine

Americas (regions) - Google Cloud Functions

Asia Pacific (regions) - Google Cloud Functions

us-west3 - Google App Engine

us-west4 - Google App Engine

us-west3 - Google Cloud Functions

us-west4 - Google Cloud Functions

asia-east1 - Google App Engine

asia-east1 - Google Cloud Functions

Message

Chronicle customers in all regions using the SENTINEL_EDR default parser (product source: "SentinelOne EDR") may have incorrect process enrichment results.

Details

Summary: Chronicle customers in all regions using the SENTINEL_EDR default parser (product source: "SentinelOne EDR") may have incorrect process enrichment results.
Description: As communicated previously, we have segmented our repair of this incident into two phases:
a) Stopping erroneous enrichments (Completed on 2 August 2023)
b) Repairing historically impacted events that used these erroneous enrichments. (Revised ETA - 18 August 2023)
We will provide an update by Friday, 2023-08-18 10:30 US/Pacific with current details.
Diagnosis: Fields set by process aliasing for SENTINEL_EDR (including UDM principal.process, src.process, and target.process) may be incorrect.
Workaround: None at this time.

2024-04-11 05:52:59 UTC UTC

STATUS

? minutes

Sign in to view more status history.

See more

2024-04-11 05:52:59 UTC UTC

STATUS

? minutes

Sign in to view more status history.

See more

2024-04-11 05:52:59 UTC UTC

STATUS

? minutes

Sign in to view more status history.

See more

2024-04-11 05:52:59 UTC UTC

STATUS

? minutes

Sign in to view more status history.

See more

2024-04-11 05:52:59 UTC UTC

STATUS

? minutes

Sign in to view more status history.

See more

Sign Up for More Google Cloud Functions History

StatusGator has over 7 years of Google Cloud Functions status history.

No outages or status changes in the last 24 hours

Google Cloud Functions status, last 24 hours:

6:00 AM
12:00 PM
6:00 PM
12:00 AM
6:00 AM
6:00 AM
6:00 PM
6:00 AM
  • Up: 24 hours

  • Warn: 0 minutes

  • Down: 0 minutes

Google Cloud Functions Outage and Status History

We've been monitoring Google Cloud Functions outages since August 22, 2016.
Here's the history of service outages we've observed from the Google Cloud Functions Status Page:

April 2024

March 2024

February 2024

  • Up

  • Warn

  • Down

Instant enriched data from
3,580 status pages

About Our Google Cloud Functions Status Page Integration

Google Cloud Functions is a Cloud Infrastructure solution that StatusGator has been monitoring since August 2016. Over the past over 7 years, we have collected data on on more than 2,205 outages that affected Google Cloud Functions users. When Google Cloud Functions publishes downtime on their status page, they do so across 6,262 components and 66 groups using 3 different statuses: up, warn, and down which we use to provide granular uptime metrics and notifications.

More than 2,100 StatusGator users monitor Google Cloud Functions to get notified when it's down or has an outage. This makes it one of the most popular cloud infrastructure services monitored on our platform. We've sent more than 401,300 notifications to our users about Google Cloud Functions incidents, providing transparency and peace of mind. You can get alerts by signing up for a free StatusGator account.

If Google Cloud Functions is having system outages or experiencing other critical issues, red down notifications appear on the status page. In most cases, it means that core functions are not working properly, or there is some other serious customer-impacting event underway.

Warn notifications are used when Google Cloud Functions is undergoing a non-critical issue like minor service issues, performance degradation, non-core bugs, capacity issues, or problems affecting a small number of users.

Google Cloud Functions does not post separate notifications for planned maintenance work so we are unable to send notifications when maintenance windows begin. If you need Google Cloud Functions maintenance notifications, please email us.

Google Cloud Functions does not publish a feed of proactive maintenance events on their status page at this time. If they do, be sure to let us know and we'll aggregate Google Cloud Functions maintenance events into your unified calendar.

When Google Cloud Functions posts issues on their status page, we collect the main headline message and include that brief information or overview in notifications to StatusGator subscribers.

When Google Cloud Functions has outages or other service-impacting events on their status page, we pull down the detailed informational updates and include them in notifications. These messages often include the current details about how the problem is being mitigated, or when the next update will occur.

Because Google Cloud Functions has several components, each with their individual statuses, StatusGator can differentiate the status of each component in our notifications to you. This means, you can filter your status page notifications based on the services, regions, or components you utilize. This is an essential feature for complex services with many components or services spread out across many regions.

Frequently Asked Questions

Can’t find your question? Email us to arrange a time to discuss. We’d love to chat!

Google Cloud Functions Down?

Are you experiencing issues with Google Cloud Functions? Sign up to receive notifications when Google Cloud Functions publishes outages.

Google Cloud Functions Down or not working? Never be taken by surprise again.

StatusGator tells you when your cloud services have problems or their statuses change. We monitor the official status pages of more than 3,580 cloud services in real-time, aggregate the data, and send you alerts via email, Slack, Teams, SMS, and more.

Looking for recent downtime and outages of Google Cloud Functions?

Sign up for StatusGator and see all historical information about Google Cloud Functions outages and performance issues. Get free, instant notifications when Google Cloud Functions goes down.