zebra.com

Zebra Workcloud Sync Status

Workcloud Sync Service Degradation

Incident Report for Zebra Workcloud Sync

Postmortem

Here is the Incident Report we received from Google cloud regarding the service degradation.Outage

Summary

Google Cloud, Google Workspace and Google Security Operations products experienced increased 503 errors in external API requests, impacting customers.

We deeply apologize for the impact this outage has had. Google Cloud customers and their users trust their businesses to Google, and we will do better. We apologize for the impact this has had not only on our customers’ businesses and their users but also on the trust of our systems. We are committed to making improvements to help avoid outages like this moving forward.

What happened?

Google and Google Cloud APIs are served through our Google API management and control planes. Distributed regionally, these management and control planes are responsible for ensuring each API request that comes in is authorized, has the policy and appropriate checks (like quota) to meet their endpoints. The core binary that is part of this policy check system is known as Service Control. Service Control is a regional service that has a regional datastore that it reads quota and policy information from. This datastore metadata gets replicated almost instantly globally to manage quota policies for Google Cloud and our customers.

On May 29, 2025, a new feature was added to Service Control for additional quota policy checks. This code change and binary release went through our region by region rollout, but the code path that failed was never exercised during this rollout due to needing a policy change that would trigger the code. As a safety precaution, this code change came with a red-button to turn off that particular policy serving path. The issue with this change was that it did not have appropriate error handling nor was it feature flag protected. Without the appropriate error handling, the null pointer caused the binary to crash. Feature flags are used to gradually enable the feature region by region per project, starting with internal projects, to enable us to catch issues. If this had been flag protected, the issue would have been caught in staging.

On June 12, 2025 at ~10:45am PDT, a policy change was inserted into the regional Spanner tables that Service Control uses for policies. Given the global nature of quota management, this metadata was replicated globally within seconds. This policy data contained unintended blank fields. Service Control, then regionally exercised quota checks on policies in each regional datastore. This pulled in blank fields for this respective policy change and exercised the code path that hit the null pointer causing the binaries to go into a crash loop. This occurred globally given each regional deployment.

Within 2 minutes, our Site Reliability Engineering team was triaging the incident. Within 10 minutes, the root cause was identified and the red-button (to disable the serving path) was being put in place. The red-button was ready to roll out ~25 minutes from the start of the incident. Within 40 minutes of the incident, the red-button rollout was completed, and we started seeing recovery across regions, starting with the smaller ones first.

Within some of our larger regions, such as us-central-1, as Service Control tasks restarted, it created a herd effect on the underlying infrastructure it depends on (i.e. that Spanner table), overloading the infrastructure. Service Control did not have the appropriate randomized exponential backoff implemented to avoid this. It took up to ~2h 40 mins to fully resolve in us-central-1 as we throttled task creation to minimize the impact on the underlying infrastructure and routed traffic to multi-regional databases to reduce the load. At that point, Service Control and API serving was fully recovered across all regions. Corresponding Google and Google Cloud products started recovering with some taking longer depending upon their architecture.

What is our immediate path forward?

Immediately upon recovery, we froze all changes to the Service Control stack and manual policy pushes until we can completely remediate the system.

How did we communicate?

We posted our first incident report to Cloud Service Health about ~1h after the start of the crashes, due to the Cloud Service Health infrastructure being down due to this outage. For some customers, the monitoring infrastructure they had running on Google Cloud was also failing, leaving them without a signal of the incident or an understanding of the impact to their business and/or infrastructure. We will address this going forward.

What’s our approach moving forward?

Beyond freezing the system as mentioned above, we will prioritize and safely complete the following:

  • We will modularize Service Control’s architecture, so the functionality is isolated and fails open. Thus, if a corresponding check fails, Service Control can still serve API requests.
  • We will audit all systems that consume globally replicated data. Regardless of the business need for near instantaneous consistency of the data globally (i.e. quota management settings are global), data replication needs to be propagated incrementally with sufficient time to validate and detect issues.
  • We will enforce all changes to critical binaries to be feature flag protected and disabled by default.
  • We will improve our static analysis and testing practices to correctly handle errors and if need be fail open.
  • We will audit and ensure our systems employ randomized exponential backoff.
  • We will improve our external communications, both automated and human, so our customers get the information they need asap to react to issues, manage their systems and help their customers.

  • • We'll ensure our monitoring and communication infrastructure remains operational to serve customers even when Google Cloud and our primary monitoring products are down, ensuring business continuity.

Posted Jun 16, 2025 - 14:45 UTC

Resolved

all services are now up and stable. Google has confirmed all services are fully recovered. We will continue to collaborate with Google to obtain a complete Root Cause Analysis (RCA) for this outage and will keep you updated with any significant findings.

Thank you for your patience and understanding during this time. If you have any further questions or concerns, please do not hesitate to reach out to our support team.
Posted Jun 12, 2025 - 21:08 UTC

Monitoring

All services have been successfully recovered. We will continue to closely monitor the systems, including Google services, to ensure ongoing stability and performance.. If you experience any further issues, please do not hesitate to reach out to our support team.
Posted Jun 12, 2025 - 20:48 UTC

Update

we have received confirmation from Google engineers that the underlying dependency issues have been resolved in all locations except us-central1. At this time, we do not have an estimated time for full service recovery. We are committed to keeping you informed and will provide the next update by Thursday, June 12, 2025, at 5:00 PM EST with the latest details.
Posted Jun 12, 2025 - 20:22 UTC

Identified

We are informing you of an unforeseen issue affecting our services due to current outages within the google services. Our team is actively working with Google services to resolve the problem and restore full functionality as quickly as possible.

We understand the importance of our services to your operations and sincerely apologize for any inconvenience this may cause. We are committed to keeping you updated on our progress and will notify you as soon as the issue is resolved.
Posted Jun 12, 2025 - 20:01 UTC
This incident affected: Chat (US-Central1), Push to Talk (PTT) (US-Central1, US-East1, US-West1), To-Dos (US-Central1), Login (US-Central1), Location (US-Central1), Calls(Audio/Video) (US-Central1, US-East1, US-West1), and Forums (US-Central1).