Feeds

Salesforce cheers one-month of uptime with outage

We're so grea . . . aw crap

High performance access to file storage

One day you're a company touting an ultra-reliable service. The next day you're apologizing for launching a denial of service attack against your own customers.

Such is life for Salesforce.com.

On Wednesday, Salesforce issued a statement saying, it "has delivered 99.999% planned uptime and availability on its service to its customers" in March. The online CRM vendor even handled a whopping 40m transaction in a single day.

"There is no finish line when it comes to system reliability and availability, and our efforts to improve performance never cease," said Marc Benioff, Salesforce.com's CEO, who was more than happy to pat himself on the back. "Our community of success demands the most reliable service that we can deliver, and our outstanding performance in March is evidence of our dedication to scaling ahead of their needs."

Customers today, however, were left wondering what kind of scaling needs Salesforce was addressing when its site crapped out, making it impossible for several customers to do their work. Clients worldwide were affected for at least an hour, and North American users saw Salesforce.com go down for about four hours. Salesforce blamed the issue on a cache server overload, which it tried to fix by restarting the cache servers. The plan didn't work and forced administrators to yank the cache servers altogether. That, in turn, led to a lingering slow down in service.

Rather than touting its server virility, Salesforce was left begging for forgiveness.

"We apologize for any inconvenience these issues may have caused," the company said on a new web site meant to alert customers to service woes.

Salesforce.com set up the web site last December after an embarrassing database meltdown left customers enraged.

You can bet Salesforce.com will think twice in the future about issuing such lofty praise for itself. Best to let the customers handle that kind of thing. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.