NeCTAR Research Cloud Support

What is the Research Cloud?

A computing resource for all Australian researchers where they can develop & deploy applications and collaborate in a uniform environment with controlled sharing of data. More details: about the Project (NeCTAR), the technology and the resources on offer.

 

Latest Updates

[Resolved] Heat Orchestration Service Unavailable

The heat orchestration service is currently unavailable, and should be restored soon. It should be restored   Service has now been restored.

Brief network interruption to monash-01 zone (resolved)

At approximately 9:50am EST all external access to instances hosted in the monash-01 zone of the Research Cloud was lost due to a routing configuration change. At 10:05am normal service was restored. Users would have lost access to instances during this 15 minute window, and these instances would have been unable to contact services outside of the monash-01 zone (though zone internal traffic was still functioning). We apologise for any inconvenience caused by this interruption.

Best regards,

R@CMon Ops.

[Resolved] UniMelb IDP down

This issue has been resolved

Issue

idp.unimelb.edu.au (The Identity Management Portal used to Authenticate to the NeCTAR dashboard for Unimelb users) is currently down.

Unimelb ITS are aware of the issue and are working on resolving it.

Affected NeCTAR services

   Unimelb login to dashboard.rc.nectar.org.au

   Unimelb login to support.rc.nectar.org.au

You will still be able to authenticate via Keystone to manage your VMs, i.e., API operations (command-line clients) are unaffected.

UniMelb IDP down

Issue

idp.unimelb.edu.au (The Identity Management Portal used to Authenticate to the NeCTAR dashboard for Unimelb users) is currently down.

Unimelb ITS are aware of the issue and are working on resolving it.

Affected NeCTAR services

   Unimelb login to dashboard.rc.nectar.org.au

   Unimelb login to support.rc.nectar.org.au

You will still be able to authenticate via Keystone to manage your VMs, i.e., API operations (command-line clients) are unaffected.

Network Issue at Monash AZ

NCI Availability Zone Maintenance Window (2015-07-08 09:00 - 2015-07-08 17:00 AEST)

Description:

NCI has scheduled an all day maintenance window to perform rolling
infrastructure upgrades. During these upgrades instances on each
affected host will be suspended, and once the host upgrade is complete
the instances will be resumed. Downtime for each instance is expected to
be no longer than 10 minutes, and all memory state will be retained
across this downtime.

Recommended Actions:

  • No action is required by the users.
  • An scheduled outage of Volume services in SA on 29/06/2015

    This is to inform you a scheduled outage (11.00 AM Mon 29/06/2015 - 12.00 PM Mon 29/06/2015) of Volume services in SA availability zone.

    DESCRIPTION: This outage is required to upgrade our Cinder volume services to Juno. We need to upgrade the underlying server from Ubuntu Precise to Trusty to install the Juno packages of cinder-volume, and a reboot of the server is required. So your volumes in SA, especially those have already been attached to and mounted in an instance, will be affected during the outage window. During the outage, volumes service in SA will not be available.

    RECOMMENDED ACTIONS: To avoid (I/O)errors of your applications reading or writing volumes, it is recommended that you umount your volumes before the outage, and then re-mount your volumes after the outage. For those volumes mounted as vda for root partition, you need to shutoff your instance before the outage and start/reboot your instance after the outage.

    Scheduled outage - Pawsey availability zone

    Please be aware there will be a scheduled outage in the Pawsey availability zone of the NeCTAR Research Cloud:

    Duration: 48 hours
    Start Time: 16:00 AWST Mon Jul 6th 2015
    End Time: 16:00 AWST Wed Jul 8th 2015

    [RESOVLED] CVE-2015-3456 aka VENOM

    All NeCTAR nodes have completed Patching and Reboots to addresss the security vulnerability of VENOM, CVE-2015-3456.

     Please contact support@rc.nectar.org.au if you have any furher issues.

    Our apologies for any inconvenience caused. 

    Kind regards,

    NeCTAR Research Cloud operations

     

    14/5/15 - CVE-2015-3456 aka VENOM

    Late yesterday (13-May-15) a serious vulnerability in QEMU (the base machine emulator and virtualiser used in many hypervisors including Linux KVM, as used by the Research Cloud) was announced. A successful exploit of this vulnerability could allow arbitrary code execution on the hypervisor, i.e., guest breakout.

    Pages