Qantas website suffers bookings glitch

 

No response to social media complaints.

Australian airline Qantas has lost at least five hours of online bookings overnight and several hours this morning after an unacknowledged outage.

The qantas.com web site remained online but attempts to book flights or log in to frequent flyer accounts resulted in server errors from around 6pm until 11pm last night and for several hours this morning.

“The server encountered an internal error or misconfiguration and was unable to complete your request,” the site said.

Customers - well known IT identities among them - took to Qantas’ Facebook and Twitter accounts to vent their frustrations. Many noted they had attempted to book by first checking in as Frequent Flyers.

None of the airline’s @QFcustomercare or @QantasAirways Twitter accounts or its Facebook page acknowledged the outage.

A Qantas media representative told iTnews the airline was "aware of intermittent website booking issues" and said engineers would work to resolve the problem.

"Customers experiencing website booking difficulties can call 131313 to make bookings during this time," the representative said.

Qantas uses the Amadeus online bookings engine, but bookings for other global Amadeus customers appeared to be transacting as normal during the outage. Qantas uses Oracle's Siebel system to manage its Frequent Flyer program.

Copyright © iTnews.com.au . All rights reserved.


Qantas website suffers bookings glitch
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 709

Vote