[NCUC E-team] Fwd: [GANDI] Important - Maintenance on your server(s)

Brenden Kuerbis bkuerbis at internetgovernance.org
Wed Dec 14 16:02:31 CET 2016


FYI.

---------------------------------------
Brenden Kuerbis
Internet Governance Project
http://internetgovernance.org

---------- Forwarded message ----------
From: <hosting-en at support.gandi.net>
Date: Wed, Dec 14, 2016 at 5:19 AM
Subject: [GANDI] Important - Maintenance on your server(s)
To: bkuerbis at internetgovernance.org


Dear Gandi customer,

On Wednesday December 21, 2016, a critical maintenance impacting our
IaaS platform will be performed. During this maintenance we will be
stopping and restarting certain servers currently being used by our
customers. The purpose of this operation is to update our system
following the announcement of the forthcoming publication of a security
vulnerability in the Xen virtualization software used on our platform.
As such, besides eliminating future attack vectors, this update will
also bring about performance improvements, including the possibility of
deploying future security updates, in most cases, without having to
resort to a stop/start of affected VMs.

You are receiving this notification because one or more of your servers,
listed below, will be impacted by this maintenance event:

- ncuc1

On Wednesday December 21, 2016, between 10:00 and 13:00 UTC (i.e. 3:00
AM and 6:00 AM PST), we will be automatically upgrading all affected
servers. We will be doing our best to keep downtime as minimal as
possible during this period. However, some servers may experience
downtime of an hour or more.

Once the update is complete, we will send you an email notifying you of
this fact and requesting that you verify that all services hosted on the
impacted servers are functioning correctly.

Please feel free to reference our recent post regarding this
maintenance[1] for more details and of course don't hesitate to contact
our Customer care team[2] if you have any problems or if you have any
questions regarding this maintenance.

Thanks for your cooperation.

Sincerely,
Gandi.net
[1] https://www.gandi.net/news/en/2016-12-14/10104-xen_
vulnerability_identified/
[2] https://www.gandi.net/support/contact/mail/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ncuc.org/pipermail/e-team/attachments/20161214/46925727/attachment.html>


More information about the E-team mailing list