All Systems Operational

NZIX Operational
90 days ago
99.99 % uptime
Today
AKL-IX ? Operational
90 days ago
99.99 % uptime
Today
CHC-IX ? Operational
90 days ago
100.0 % uptime
Today
WLG-IX ? Operational
90 days ago
100.0 % uptime
Today
Phone System ? Operational
90 days ago
100.0 % uptime
Today
Member Portal ? Operational
90 days ago
100.0 % uptime
Today
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.

Scheduled Maintenance

[MAINTENANCE] National | Route Server 2 | BGP Daemon Upgrade Oct 23, 2025 00:00-04:00 NZDT

NZIX engineers will be progressively upgrading the BGP software on each exchange’s Route Server 2 to resolve an unsupported capability (RFC 9234) that recently caused a malformed update to propagate to peers. This work is being scheduled with shorter notice due to its severity and the redundancy provided by Route Server 1.

Start: 23/Oct/2025 00:00 (NZDT)
End: 23/Oct/2025 04:00 (NZDT)
Window: 4 hours
Expected downtime: Up to 30 minutes per exchange

Members with peering services should expect their BGP session toward route server 2 (RS2) to go down per exchange. Please ensure you are connected to Route Server 1 (RS1) on your relevant exchange to avoid impact. Session status can be confirmed via https://lg.ix.nz and for convenience each route server address is listed here.

AKL-IX
RS1: rs1.akl.ix.nz / 43.243.21.1 / 2001:7fa:11:6:0:1db6:0:1
RS2: rs2.akl.ix.nz / 43.243.21.254 / 2001:7fa:11:6:0:1db6:0:2

CHC-IX
RS1: rs1.chc.ix.nz / 103.94.93.1 / 2001:dee:8000:2:0:1db6:0:1
RS2: rs2.chc.ix.nz / 103.94.93.254 / 2001:dee:8000:2:0:1db6:0:2

WLG-IX
RS1: rs1.wlg.ix.nz / 103.94.95.1 / 2001:dee:8000:3:0:1db6:0:1
RS2: rs2.wlg.ix.nz / 103.94.95.254 / 2001:dee:8000:3:0:1db6:0:2

The work is expected to take about 2 hours. However, 4 hours has been booked in the unlikely event of an emergency.

If you have any questions or concerns regarding this notice, please contact us on +64 9888 9221 or noc@ix.nz.

Posted on Oct 13, 2025 - 19:06 NZDT

[MAINTENANCE] CHC-IX | Hardware Upgrade Oct 28, 2025 23:00 - Oct 29, 2025 02:00 NZDT

NZIX engineers will be conducting maintenance on CHC-IX which includes migrating to new hardware to support 100G member connectivity as well as moving to EVPN VXLAN.

Due to the nature of the maintenance, CHC-IX will be offline during the window.

Expected Downtime: Up to 1-hour

Member ports at each site will be drained of peering traffic using BCP214-compliant filters, migrated to the new hardware and restored once the exchange is back online and verified healthy.

NZIX has spare hardware on standby in the unlikely event a device requires replacing, and rollback procedures are in place for any unexpected behaviour, thus a 3 hour window has been set.

If you have any queries regarding this notice, please contact noc@ix.nz or +64 9888 9221.

Posted on Oct 16, 2025 - 19:18 NZDT
Oct 21, 2025

No incidents reported today.

Oct 20, 2025

No incidents reported.

Oct 19, 2025

No incidents reported.

Oct 18, 2025

No incidents reported.

Oct 17, 2025

No incidents reported.

Oct 16, 2025

No incidents reported.

Oct 15, 2025

No incidents reported.

Oct 14, 2025

No incidents reported.

Oct 13, 2025

No incidents reported.

Oct 12, 2025

No incidents reported.

Oct 11, 2025

No incidents reported.

Oct 10, 2025

No incidents reported.

Oct 9, 2025

No incidents reported.

Oct 8, 2025
Resolved - This incident is resolved for now. A new notice will come out for route server maintenance to resolve this permanently by adding RFC 9234 role capability.
Oct 8, 17:05 NZDT
Monitoring - The offending malformed route is filtered upstream so no further impact is expected, we will place this on monitoring for now whilst work is underway to schedule emergency upgrades to the route servers to avoid this in the future.

The root cause appears to be a malformed OTC BGP update attribute typically 4-bytes but in this case was 1024 on the prefix 2402:2de0::/32, our route server software reflected this back to peers as expected and routers tore down their session due to it. The permanent fix for this is upgrading bird the BGP software on the route servers to not propagate these malformed attributes.

Oct 8, 11:00 NZDT
Investigating - We are currently investigating an issue that caused a flap on v6 sessions toward the route servers.
Oct 8, 10:35 NZDT
Oct 7, 2025

No incidents reported.