Incident Guide

Is AWS Down? How to Check Amazon Web Services Status in 2026

Amazon Web Services powers an estimated 30% of the internet. When AWS goes down — even partially — the impact cascades across thousands of applications and services that depend on it. If you're seeing errors in your application and suspect an AWS issue, here's how to diagnose it quickly.

The Fastest Way to Check If AWS Is Down

Start with the official AWS status dashboard:

health.aws.amazon.com/health/status

This is AWS's real-time service health page. It shows current status across all AWS services and regions. Look for:

  • Orange or red indicators next to service names — these indicate degraded or disrupted service
  • Region filters — AWS outages are usually regional. A US-East-1 outage doesn't necessarily affect EU-West-1
  • Timestamp on updates — Check when the status was last updated to ensure you're seeing current information

The legacy status page at status.aws.amazon.com is still accessible but AWS now directs users to the Personal Health Dashboard for more detailed service-specific views.

AWS Personal Health Dashboard

If you have an AWS account, the Personal Health Dashboard at console.aws.amazon.com/health/home shows incidents affecting your specific resources, not just global service status. This is more useful than the public status page because:

  • It filters to the regions and services you're actually using
  • It shows upcoming maintenance that could affect your workloads
  • You can configure EventBridge rules to trigger alerts when AWS posts health events for your services

Third-Party AWS Status Sources

AWS's own status page has a history of lagging behind actual incidents — updates sometimes appear 30-60 minutes after engineers are already aware of issues. For faster detection:

  • Downdetector — User-reported outages often surface here before the AWS status page updates. Useful for confirming you're not alone.
  • Twitter/X — @AWSSupport and #AWSOutage — AWS's support account posts updates, and the engineering community surfaces issues fast on X.
  • Hacker News — Major AWS outages consistently generate top-page HN threads within 30 minutes. Search "aws" on news.ycombinator.com.
  • ezmon.com — Monitors AWS service endpoints from multiple probe locations to detect regional availability issues. Set up an alert for your specific AWS region.

Diagnosing an AWS Issue: Step-by-Step

Not every error in your AWS-backed application is an AWS outage. Follow this diagnostic flow before assuming AWS is the problem:

Step 1: Check Your Own Infrastructure First

Before looking at AWS status, verify:

  • Can you access the AWS console? If yes, AWS's control plane is up.
  • Is the issue affecting all users or just some? (Could be a CDN issue, not AWS)
  • Did anything deploy in the last hour? (Code changes cause more outages than AWS does)

Step 2: Identify the Specific Service and Region

AWS outages are almost always service-and-region-specific. The most common affected services during incidents:

  • EC2 — Compute instance issues (usually in a specific availability zone)
  • RDS — Database availability
  • S3 — Object storage (globally distributed but can have regional issues)
  • Lambda — Serverless execution
  • CloudFront — CDN (can affect global content delivery)
  • Route 53 — DNS (rare but catastrophic when it fails)
  • IAM / STS — Authentication (can block all AWS API calls)

Check the AWS Health Dashboard filtering to your specific region (e.g., us-east-1, eu-west-2, ap-southeast-1).

Step 3: Test Directly

Use AWS CLI to test basic connectivity:

# Test S3 in a specific region
aws s3 ls s3://your-bucket --region us-east-1

# Test EC2 metadata (from within an EC2 instance)
curl http://169.254.169.254/latest/meta-data/

# Test DynamoDB
aws dynamodb list-tables --region us-east-1

Errors like RequestExpired or ServiceUnavailable point to AWS-side issues. NetworkError or ConnectionRefused may be local network issues.

Step 4: Check AWS Support

If you have AWS Business Support or Enterprise Support:

  • Open a support case immediately — "infrastructure event" tickets get priority routing
  • Include your resource IDs, region, and error messages
  • Check the AWS Support Center for any active incident communications for your account

AWS's Most Common Outage Patterns

Understanding how AWS outages typically unfold helps you respond faster:

Availability Zone vs. Regional vs. Global

Most AWS incidents are scoped to a single Availability Zone (AZ) — one datacenter cluster within a region. If you've deployed across multiple AZs (which AWS recommends), an AZ failure may cause degraded performance but not a complete outage.

True regional outages (affecting all AZs in us-east-1, for example) are rarer but more impactful. AWS's largest incidents — the 2021 us-east-1 outage that took down Ring, McDonald's, Delta, and much of the internet — were regional in scope.

Global incidents affecting multiple regions simultaneously are extremely rare in AWS's history.

Control Plane vs. Data Plane

A critical but underappreciated distinction:

  • Data plane: Running resources (EC2 instances running, S3 data accessible)
  • Control plane: Management APIs (launching new EC2 instances, modifying security groups)

During incidents, AWS often degrades the control plane first while the data plane remains healthy. If you can't launch new EC2 instances but existing instances are running fine, you're seeing a control plane issue. Your existing workload may be unaffected — don't panic-reboot things.

How to Get AWS Outage Alerts Automatically

Waiting to discover AWS issues through user complaints is not a strategy. Set up automated detection:

Option 1: AWS Health EventBridge

AWS can send health events to EventBridge, which can trigger SNS notifications or Lambda functions:

# CloudFormation snippet: EventBridge rule for AWS health events
AWSHealthAlerts:
  Type: AWS::Events::Rule
  Properties:
    EventPattern:
      source: ["aws.health"]
      detail-type: ["AWS Health Event"]
    State: ENABLED
    Targets:
      - Arn: !Ref AlertSNSTopic
        Id: HealthAlertTarget

Option 2: External Uptime Monitoring

External monitoring from outside AWS can detect issues that internal monitoring misses (since your monitoring infrastructure may also be affected). ezmon.com monitors AWS service endpoints and your application endpoints from independent probe nodes in multiple regions.

Configure endpoint checks for your critical AWS-backed URLs. When probes from multiple regions agree your endpoint is unreachable, you get paged before your users start complaining.

Option 3: AWS Chatbot for Slack Integration

AWS Chatbot can pipe Personal Health Dashboard notifications directly to a Slack channel. Set up in the AWS Console under Chatbot — it takes about 10 minutes and ensures your team sees AWS health alerts in the same place they're already communicating during incidents.

What to Do During an AWS Outage

Don't Make It Worse

The instinct to "fix" things during an outage often makes the situation worse:

  • Don't restart instances that are running — you may lose your place in a queue for recovery
  • Don't redeploy to a degraded region — wait for the incident to clear
  • Don't flood the AWS API with retry loops — you'll hit rate limits and delay recovery

Communicate Proactively

While you're waiting for AWS to recover:

  • Update your status page immediately — even "we are aware of an issue and investigating" is better than silence
  • Post to your company Slack/Teams channel with what you know
  • If customers are affected, send an email or notification — don't wait for full resolution

Document the Timeline

Start logging timestamps as soon as you suspect an AWS issue: when you first noticed the problem, when you confirmed AWS status, when services degraded, when they recovered. This becomes the basis for your incident postmortem and customer communication.

Historical Context: AWS's Reliability Record

Despite being the world's largest cloud provider, AWS is not immune to significant outages. Notable incidents from AWS's public history include the December 2021 us-east-1 outage (which affected Amazon.com, Netflix, Disney+, Ring, and thousands of other services), and multiple S3 and EC2 incidents across regions in preceding years.

AWS publishes detailed post-incident analyses for major events through its Post Event Summary program. These are worth reading — they explain root causes, contributing factors, and the engineering changes AWS made in response.

AWS's SLA commitments vary by service — typically 99.9% to 99.99% per service, per region. Those nines add up: 99.9% allows 8.7 hours of downtime per year. For workloads that can't tolerate that risk, multi-region architecture is the only real mitigation — you can't rely on any single cloud provider's uptime guarantees for five-nines reliability.

awsamazonoutagestatuscloudincident response