Is UiPath down?
Last checked 2m agoNo incidents right now.
Free · no credit card
Real-time UiPath status, recent outages, and incident history — pulled directly from UiPath's official status page at https://status.uipath.com every 5 minutes. Pingoru tracks 308 UiPath services and has captured 50 incidents in the last 90 days (98.48% uptime). Get email, Slack, Discord, or webhook alerts the moment UiPath reports a new incident — free for 5 monitors, no credit card.
Recent outages & incidents
Past 7 days- IXP
3 updates · show timeline
- investigating · Apr 28, 2026, 10:19 PM UTC
IXP data extractions are currently experiencing delays and intermittent failures in our US region. Our team is actively investigating the root cause.
- monitoring · Apr 28, 2026, 11:07 PM UTC
A mitigation has been implemented for the IXP data extraction issue, and processing speeds are returning to normal. We are continuing to monitor the system to ensure full stability.
- resolved · Apr 28, 2026, 11:36 PM UTC
This incident has been resolved. IXP data extractions are processing successfully at normal speeds.
Latest: This incident has been resolved. IXP data extractions are processing successfully at normal speeds.
-
- Automation Cloud
9 updates · show timeline
- investigating · Apr 28, 2026, 09:30 PM UTC
Some features may be temporarily unavailable during tenant updates. Our team is actively investigating
- identified · Apr 28, 2026, 09:59 PM UTC
The issue has been identified, and our team is actively working to resolve it
- identified · Apr 28, 2026, 11:03 PM UTC
The mitigation efforts are taking longer than initially anticipated, but the team is actively working to resolve the issue as quickly as possible.
- identified · Apr 29, 2026, 12:06 AM UTC
Our mitigation efforts are continuing as we work toward a full resolution
- identified · Apr 29, 2026, 12:59 AM UTC
A fix has been implemented, and we are actively monitoring the situation to ensure there are no further issues
- identified · Apr 29, 2026, 02:00 AM UTC
The deployed fix is still in progress, and we are closely monitoring the environment to observe its behavior and ensure it continues to remain stable.
- identified · Apr 29, 2026, 03:44 AM UTC
Deployment of the fix is progressing well. We are continuing to monitor the environment closely to ensure stable system behavior.
- identified · Apr 29, 2026, 05:39 AM UTC
Deployment of the fix is continuing to progress as expected. System behavior remains stable, and we are closely monitoring the environment. We expect this process to take a few more hours and will provide further updates as progress continues.
- resolved · Apr 29, 2026, 07:59 AM UTC
The issue has been resolved. The fix has been fully deployed and the environment is stable.
Latest: The issue has been resolved. The fix has been fully deployed and the environment is stable.
-
- Autopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for EveryoneAutopilot for Everyone
4 updates · show timeline
- investigating · Apr 27, 2026, 10:11 PM UTC
GPT 4.o mini model is not available and is currently being investigated.
- investigating · Apr 27, 2026, 10:19 PM UTC
GPT 4.o mini model is not available and is currently being investigated.
- monitoring · Apr 27, 2026, 10:53 PM UTC
The service is now showing signs of recovery and appears healthy. We are continuing to monitor the situation closely
- resolved · Apr 27, 2026, 11:21 PM UTC
Service has been fully restored to a healthy state, and the issue has been mitigated.
Latest: Service has been fully restored to a healthy state, and the issue has been mitigated.
-
- Cloud Robots - VMCloud Robots - VM
12 updates · show timeline
- identified · Apr 24, 2026, 04:14 PM UTC
The upstream Cloud provider has confirmed an outage impacting VMs for Cloud Robots VM in the US and Delayed US regions Impact: Users may be unable to start robots Next update: We are working with the provider to understand mitigation timelines.
- identified · Apr 24, 2026, 05:05 PM UTC
We are still awaiting further details from the cloud service provider. We are exploring failover options as well
- identified · Apr 24, 2026, 05:58 PM UTC
The cloud service provider has identified the issue and started applying a mitigation, we are continuing to follow up with them for more updates. We do not have an ETA for when the mitigation will be completed yet.
- monitoring · Apr 24, 2026, 06:10 PM UTC
The cloud service provider has applied mitigations and is starting to see improvements from their end. We are monitoring our services to ensure they are recovering as well.
- monitoring · Apr 24, 2026, 06:59 PM UTC
Some VMs have still not recovered, and the cloud service provider is still actively working on completing their mitigation efforts
- monitoring · Apr 24, 2026, 07:47 PM UTC
The cloud service provider is still actively working on completing their mitigation efforts
- monitoring · Apr 24, 2026, 08:23 PM UTC
We are seeing the remaining VMs recover, we will monitor to ensure there is no regression
- monitoring · Apr 24, 2026, 09:17 PM UTC
While we are not seeing any more impact on Cloud Robot VMs, we are continuing to follow the cloud provider's outage until it is fully resolved.
- monitoring · Apr 24, 2026, 10:10 PM UTC
We are continuing to follow the cloud provider's outage until it is fully resolved.
- monitoring · Apr 24, 2026, 11:12 PM UTC
We are continuing to follow the cloud provider's outage until it is fully resolved.
- resolved · Apr 25, 2026, 12:02 AM UTC
The issue has been resolved
- postmortem · Apr 28, 2026, 04:12 PM UTC
## Customer Impact Between approximately 3:00 pm UTC on April 24, 2026, and 12:04 am UTC on April 25, 2026, a subset of customers in the US Region experienced failures when starting, restarting, or provisioning cloud robots \(virtual machines\) through Automation Cloud. Impacted customers encountered errors such as "Partially initialized” or “Failed” status on machines. Existing virtual machines that were already running generally continued to operate, but attempts to provision new machines or restart stopped ones frequently failed. Some customers also experienced delays in job scheduling. The disruption lasted approximately nine hours. We sincerely apologize for the impact this incident had on your automation workflows. We understand that reliable cloud robot availability is critical to your operations, and we take this disruption seriously. ## Root cause The incident was caused by a widespread outage affecting the virtual machine service of our underlying cloud infrastructure provider in the US Region. The provider's outage began at 11:39 am UTC on April 24, 2026—several hours before customer-facing impact became apparent—when a recent deployment to their virtual machine platform introduced a fault that disrupted the ability to start, restart, or provision new virtual machines across multiple availability zones. The outage affected multiple infrastructure services beyond virtual machines, including networking, caching, and container orchestration components. At the time of initial investigation, multiple machines were found with a requested status of "running" but an actual status of "partially initialized," all having transitioned to this failed state within a narrow window around 3:00–3:30 pm UTC. Second, the provider's outage caused connectivity failures within portions of our service infrastructure in the US Region, which led to errors surfacing to the customer while interacting with the platform. ## Detection The incident was first detected at approximately 3:00 pm UTC on April 24, 2026, when the first customer report was received indicating that cloud robots could not be started. Automated monitoring surfaced error patterns including "partially initialized" shortly thereafter. By 3:52 pm UTC, the incident was formally declared and a response team was assembled. Because the failures were mostly limited to VM lifecycle operations, and not all running workloads, existing automated health checks did not trigger for all affected scenarios. There was a gap of approximately 15–20 minutes between the first customer report and full scope determination, as the initial impact was sporadic and became clear only after correlating customer reports with infrastructure telemetry. The team identified multiple machines in a failed state across multiple affected organizations. By 4:15 pm UTC, the scope was sufficiently understood, and a status page update was posted to inform customers of the identified issue. A high-priority support case was also opened with the cloud provider at this time. Notably, the provider's outage had begun at 11:39 am UTC, over three hours before customer-facing impact was detected. The delay between the provider's outage start and observable customer impact is being examined as part of our detection improvement efforts. ## Response Upon detection, our engineering team immediately began investigating the scope and root cause of the failures. By querying internal systems, the team identified that the issue was isolated to the US Region and primarily affected VM start and provisioning operations. The team correlated affected accounts and machines to determine the breadth of impact. Simultaneously, the team investigated broader service degradation and discovered that portions of our service infrastructure in the US Region were experiencing connectivity failures caused by the provider's outage. This caused some platform calls to time out, contributing to automation job scheduling delays. The team traced these failures to specific infrastructure hosts that had been impaired by the provider's outage. The following mitigation actions were taken: * **Service component relocation:** At approximately 6:20 pm UTC, affected service components were relocated from impaired infrastructure hosts to healthy ones. This was performed carefully, one component at a time, to minimize risk. After relocation, the platform service “hypervisor” responded again to calls successfully * **Cloud provider engagement:** A high-priority support case was opened with the cloud provider, and the team monitored their public status page for updates. The provider confirmed at approximately 5:40 pm UTC that they had begun reverting their faulty deployment. The team also submitted a detailed list of affected VM identifiers to the provider's support case to assist their investigation. * **VM recovery testing:** The team conducted targeted tests on affected VMs to verify restoration. Some VMs in certain availability zones remained impacted even after initial mitigations, as the provider's recovery progressed zone by zone. By 8:12 pm UTC, previously affected VMs were confirmed operational, even before the provider had updated their own status page. However, at approximately 10:05 pm UTC, the provider reported a regression in one availability zone and initiated a second corrective action expected to take up to three hours, extending the monitoring period. By April 25, 2026 at 12:04 am UTC, VM operations were consistently succeeding across all availability zones, and the incident was marked as resolved. Throughout the event, we maintained regular status page updates and communicated directly with impacted customers, including proactive outreach to verify that affected machines had returned to normal operation. ## Follow-up To reduce the risk and impact of similar incidents in the future, we are implementing several targeted improvements: 1. **Enhanced detection and alerting:** We are expanding our monitoring to include more granular checks on VM lifecycle operations, ensuring that failures in start, restart, or provisioning actions are surfaced immediately—even when running workloads are unaffected. This includes adding VM health monitoring capabilities that were not previously in place; correcting alert configurations that referenced incorrect regions during this incident, and exploring earlier detection of upstream provider outages before they manifest as customer-facing impact. We are also investigating ways to reduce the three-hour gap between the provider's outage onset and our initial detection of customer impact. 2. **Automated impact correlation:** We are developing automated tooling to rapidly identify affected accounts and machines based on error states, enabling faster scoping and customer notification. During this incident, impact assessment required manual queries, we are automating this process to significantly reduce response time. 3. **Regional failover readiness:** We are investing in infrastructure changes to support more flexible failover and workload migration for cloud robots, including the ability to provision new VMs in alternate regions when a primary region is impaired. Currently, cloud robot VMs are region-bound and no backup provisioning path exists in a secondary region. We are addressing this gap to provide greater resilience against single-region provider outages—a recurring pattern we have observed across similar past events. 4. **Customer guidance and communication:** We are updating our customer-facing documentation and in-product messaging to provide clear guidance on steps to take when VM operations fail due to underlying infrastructure outages. We are also improving our status page update cadence and clarity to keep customers better informed during extended incidents. This incident follows a pattern seen in similar past events, where external platform outages in a single region have disrupted automation services. We are applying lessons learned from those events—including the importance of rapid detection, clear customer communication, and resilient failover strategies—to drive systematic improvements. Our commitment is to continually strengthen our platform's reliability and transparency, so customers can trust Automation Cloud for their most critical workloads.
Latest: ## Customer Impact Between approximately 3:00 pm UTC on April 24, 2026, and 12:04 am UTC on April 25, 2026, a subset of customers in the US Region experienced failures when startin…
-
-
1 update · show timeline
- resolved · Apr 24, 2026, 11:15 AM UTC
Between 10:00 and 10:20 UTC on 24th of April 2026, several AI-dependent services in the US region were impacted — including Communications Mining, Computer Vision, IXP, Document Understanding, ScreenPlay, and Project Delegate. We understand that some customers were affected, and we will publish a Root Cause Analysis with action items to prevent recurrence.
Latest: Between 10:00 and 10:20 UTC on 24th of April 2026, several AI-dependent services in the US region were impacted — including Communications Mining, Computer Vision, IXP, Document Un…
-
See the full UiPath outage history
44 more incidents in the last 90 days, plus the full multi-year archive of per-service events and update timelines.
Sign up free to unlock full history10 free monitors · No credit card
Outage history
Past 30 days · 31 incidents- US - IXP - Delays with IXP extraction in US region ResolvedStarted Apr 28, 2026, 10:19 PM UTC · Resolved Apr 28, 2026, 11:36 PM UTC · 1h 16m
- Europe - Automation Cloud - Tenant is not showing up in the unit region ResolvedStarted Apr 28, 2026, 09:30 PM UTC · Resolved Apr 29, 2026, 07:59 AM UTC · 10h 28m
- Multiple Regions - Autopilot for Everyone ResolvedStarted Apr 27, 2026, 10:11 PM UTC · Resolved Apr 27, 2026, 11:21 PM UTC · 1h 9m
- US - Cloud Robots VM - 3rd party service provider outage ResolvedStarted Apr 24, 2026, 04:14 PM UTC · Resolved Apr 25, 2026, 12:02 AM UTC · 7h 48m
- Multiple service outage on US region ResolvedStarted Apr 24, 2026, 11:15 AM UTC · Resolved Apr 24, 2026, 11:15 AM UTC · —
- Canada - Orchestrator - Create Tenants are failing ResolvedStarted Apr 23, 2026, 05:15 PM UTC · Resolved Apr 23, 2026, 09:54 PM UTC · 4h 38m
- Multiple Regions - Multiple Services - Agent runtime errors ResolvedStarted Apr 23, 2026, 03:24 PM UTC · Resolved Apr 23, 2026, 11:36 PM UTC · 8h 11m
- Delayed US - IXP - Model unvailable ResolvedStarted Apr 22, 2026, 02:18 PM UTC · Resolved Apr 22, 2026, 03:22 PM UTC · 1h 4m
See UiPath in your Pingoru dashboard
Monitor UiPath alongside every other service your stack depends on — same alerts, same timeline, same calendar — all in one place.
Every status page, one dashboard
Add UiPath to your Pingoru monitors and it sits next to AWS, Stripe, GitHub, and every other vendor in your stack — a single dashboard for the live status of every cloud and SaaS provider you depend on. One subscription, one inbox, every incident.
Incident timeline, this provider or all of them
Every UiPath incident — when it started, when it resolved, which services were affected, how bad it was, how long it lasted — laid out in one feed you can scan in 30 seconds. Filter to just UiPath or see every provider at once.
Maintenance calendar
Scheduled UiPath maintenance windows land in the same calendar as every other vendor you depend on — see what's running now, what's coming up, and a calendar view. Plan around your vendors instead of being caught out by them.
Every UiPath status change, one inbox
Pingoru watches UiPath's official status page every 5 minutes and delivers incident, resolution, and maintenance events to your email, Slack, Discord, Teams, or webhook.
Only alert on the services you use
UiPath reports on 308 services. Subscribe to the ones you actually use — everything else stays silent.
Email + Slack + Discord + Teams
Signed webhooks on every plan. Route UiPath alerts wherever your team already lives — no per-integration billing, no tier-gating the channels that matter.
Maintenance, not surprises
Upcoming UiPath maintenance windows appear in your maintenance calendar days in advance. Plan deploys and rollouts around them instead of finding out during an incident.
Fine-grained alert control
Per-monitor switches for opened, updated, resolved, and maintenance events. Silence the noisy UiPath services without silencing the monitor entirely.
Invite your team
Premium includes 10 team seats. Everyone watching UiPath from the same account, with per-user notification preferences for any monitor.
Get notified on UiPath status changes
Pingoru watches UiPath's official status page and sends your team instant alerts when incidents open, change severity, or resolve. Route notifications to email, Slack, Discord, or a webhook — wherever your team already lives.
Start monitoring UiPath freeMonitor UiPath along with everything else
Pingoru tracks 6,000+ cloud and SaaS status pages in one dashboard. Add UiPath and every other provider you depend on — AWS, Stripe, GitHub, Cloudflare, OpenAI — and get a single view of the health of every service your app depends on.
Browse the full service directoryTrack UiPath uptime & incident history
See 90 days of UiPath uptime at a glance, with every past incident linked to its component and update timeline. Export the history as CSV or JSON for SLA reports, postmortems, or vendor evaluations — data your team actually needs, not marketing numbers.
See UiPath uptime historyFrequently asked questions
What is UiPath's uptime?
Has UiPath had outages in 2026?
When was the last UiPath outage?
How often does UiPath have outages?
Where is UiPath's status page?
Is UiPath down right now?
How does Pingoru know if UiPath is down?
Where can I get notified when UiPath has an outage?
UiPath's status page says the service is up, but I'm having issues — what's wrong?
Where does Pingoru get the official UiPath status?
What does "Up" mean?
Stop finding out from your users.
We watch UiPath's official status page every 5 minutes. The moment they report an incident, you get an email — often before the outage is widely noticed.
Monitor UiPath free →10 monitors free · email alerts · no credit card
Want the full picture first? See everything Pingoru does →