Update - Another quick update on Meltdown and Spectre - we have rolled out images for Ubuntu, Debian and CentOS 7 which include updated kernels relevant to the vulnerabilites. We are still waiting on an updated CentOS 6 image but for other distributions, any new provisions will be updated out of the box. It is also worth noting that our testing has shown that within our infrastructure individual Linux virtual servers are not vulnerable to the Meltdown exploit. With our Windows images, Server 2012 and 2016 are in final internal testing with a view to being rolled out on Monday next week at which time we will also post more details about the impact of these patches.

For existing managed servers, we'll be in contact with customers directly on Tuesday next week with regard to our maintenance plans. We'll do our best to schedule these maintenances for off-peak times however the impact of these vulnerabilities means we may need to act quickly to ensure security for our customers.

Unmanaged customers: we recommend that you update as soon as you can, based on your OS vendor's recommendations. We've noted problems with the latest (at the time of writing) CentOS 6 kernels and don't recommend upgrading to it just yet, but outside of that we're not aware of any issues with the updates currently available. We will be preparing some knowledge base articles outlining the steps you need to take to be secure based on what we've learned over the last two weeks and hope to have those available for you early next week.

We will continue to update our status page with detail as more news becomes available.
Jan 19, 17:26 NZDT
Update - It’s time for another update about Meltdown and Spectre. Like almost every cloud service provider we have been learning more about these vulnerabilities every day as more information comes to light and more patches are made available.

One of the unique aspects of Meltdown and Spectre is that different hardware, virtualisation software, and guest operating systems are vulnerable in different ways. That means there’s no silver bullet across our entire fleet or product range.

That being said, we are currently testing updated images for Ubuntu, Debian, CentOS, CoreOS and Windows. Our goal is to release these early/mid next week once we’re confident in their stability and understand any potential performance impact they may have. From there we’ll be looking at if and when we need to apply these updates to managed servers.

If your server is unmanaged but a patch is available you can update to the latest kernel or OS version when ready by following the vendors documentation. Please do note that we cannot vouch for the stability or potential performance impact of any of these patches.

Patching customer servers is only part of the picture though. The underlying hardware nodes also need patching which is where our hardware and virtualisation vendors come in. In most cases we are still waiting on patches, but we are using this time to investigate our options to ensure our infrastructure is safe and secure in as timely fashion as possible while having minimal impact to reliability and performance.

We’ll post another update as soon as we have more news.
Jan 12, 16:18 NZDT
Update - Some key upstream vendors are still working on patches for these flaws and we're continuing to work with them. We expect to have more news later this week.
Jan 9, 10:43 NZDT
Investigating - Due to two severe vulnerabilities released today that impact almost all computers and cloud providers there will be some short notice critical maintenance that will require downtime in the coming days. We are currently investigating patches and as soon as we have them verified and tested we will confirm the exact timing of the outage windows on this site and via email. At this stage we believe this very likely affects all customers, but we believe our Dedicated and Private Cloud customers to be at a much lower risk.

– https://meltdownattack.com/
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754

We will provide updates as we learn more.
Jan 4, 12:18 NZDT
API   Operational
Cloud Containers   Operational
Control Panel   Operational
IPv6 Network   Operational
DNS Operational
Name Server 1   Operational
Name Server 2   Operational
Name Server 3   Operational
Mail Operational
IMAP   Operational
POP3   Operational
Webmail   Operational
Website   Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Past Incidents
Jan 21, 2018

No incidents reported today.

Jan 20, 2018

No incidents reported.

Jan 18, 2018

No incidents reported.

Jan 17, 2018
Completed - The scheduled maintenance has been completed. Please contact support if you are experiencing any problems.
Jan 17, 07:17 NZDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 17, 07:00 NZDT
Scheduled - This is one of our regular maintenance windows where we release updates to our core systems including the Control Panel (CP) and our API. Customer impact is usually extremely low during these windows but you may not be able to access CP for a small period of time.
Jan 16, 17:21 NZDT
Jan 16, 2018

No incidents reported.

Jan 15, 2018

No incidents reported.

Jan 14, 2018

No incidents reported.

Jan 13, 2018

No incidents reported.

Jan 11, 2018

No incidents reported.

Jan 10, 2018
Completed - The scheduled maintenance has been completed. Please contact support if you are experiencing any problems.
Jan 10, 01:01 NZDT
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 10, 00:00 NZDT
Scheduled - Due to the instability of a hardware node (NZ-AKL1-V021D1) we need to complete some urgent migrations to move virtual servers to a new node. Customers who are impacted by this have been notified via email and we will post updates during the maintenance window here.
Jan 9, 14:30 NZDT
Jan 9, 2018
Postmortem - Read details
Jan 11, 16:01 NZDT
Resolved - We believe all customers impacted by this outage are back online. We will be conducting emergency maintenance to prevent further impact from this node and will be directly contacting impacting customers. We will also post a full post-mortem in due course for these outages.
Jan 9, 11:37 NZDT
Identified - Engineers have brought the node back online and are currently bringing customer servers back up. Engineers will now investigate steps to prevent further customer impact until the node is stable again.
Jan 9, 10:58 NZDT
Investigating - We have experienced an unscheduled outage on the same node as earlier this week - NZ-AKL1-V021D1 - in the Auckland City datacenter that is impacting a few customers. Our engineers are investigating this at the moment and we will update when we know more.
Jan 9, 10:44 NZDT
Jan 8, 2018
Resolved - This node has been stable since engineers resolved the outage this morning. We'll still be keeping an eye on it and will post a full post-mortem in due course.
Jan 8, 11:38 NZDT
Monitoring - Engineers have now restored this node and things look to be back up and running. We'll be keeping a close eye on it and if you are one of the impact customers and are still experiencing trouble please get in touch via support@sitehost.co.nz
Jan 8, 08:54 NZDT
Identified - Engineers have now identified the issue and are currently working on a fix, we hope to have the node restored soon.
Jan 8, 07:52 NZDT
Investigating - We have experienced an unscheduled outage on one of our nodes - NZ-AKL1-V021D1 - in the Auckland City datacenter that is impacting a few customers. Our engineers are investigating this at the moment and we will update when we know more.
Jan 8, 07:23 NZDT
Jan 7, 2018

No incidents reported.