The aforementioned outage is resolved. A disk problem took out our virtual server master around 4 AM, which took out a handful of virtual servers. In trying to resolve that, at around 8 AM we ended up taking out the rest of the virtual machines hosted in that cluster due to dependencies. We’ve fixed the underlying problem and are going to implement some improvements in our monitoring to catch when this happens again. Sorry for the inconvenience. Please report any issues to firstname.lastname@example.org.
We’re currently working on resolving a critical outage affecting many MCS and CELS systems. No ETA as to a return as we have yet to identify the actual cause. Any outages in MCS/CELS services you experience this morning are coming from this outage. More updates as we have them.
Please see the below announcement from CIS regarding the rollout of “eduroam” to the lab’s wireless networks.
Please note, if you connect to the eduroam wireless network, you will be on a visitor network (i.e., no access to inside.anl.gov or other internal sites) the same as if you joined the Argonne-guest network. However, the connection will not require a registration page and it will be over an encrypted wireless session, improving security. Visitors with eduroam access (as outlined below) should be encouraged to use this option.
WHAT ARE WE DOING?
· CIS will be adding eduroam federated and secure Wireless LAN services to the Unified Argonne Wireless LAN. (Eduroam will NOT be available in APS at this time.) For more information about eduroam visit https://www.eduroam.us/introduction.
WHY ARE WE DOING IT?
· To make it easier for visitors of participating eduroam WiFi service institutions, to use WiFi while at Argonne and without obtaining guest credentials from the Service Desk. Also, eduroam provides Argonne Employees WiFi access while visiting an eduroam participating institution in the same manner and by appending your Argonne username with @anl.gov.
WHEN WILL THIS OCCUR?
· Will be available Monday, August 31 2015
HOW VISITORS CAN CONNECT?
· Visitors (from participating eduroam institutions) to Argonne can connect to the eduroam SSID and authenticate by using their institutions user account (Example: username). OR, Argonne Employee’s who are traveling to a participating institution can connect to the eduroam SSID and use their Argonne login username appending the end with @anl.gov (for example: username) and Argonne password.
WHAT IS THE EFFECT ON USERS?
· None. This is happening during Maintenance Weekend.
FOR MORE INFORMATION
· For more information about eduroam visit https://www.eduroam.us/introduction
· Browse to the eduroam End-User Configuration guide https://www.eduroam.us/node/100
· If Argonne Employee’s have any questions while visiting another institution, contact the Argonne Service Desk "Report A Problem" or call 252-9999 option 2.
· Visitors from other institutions should contact their own organizations if they need assistance connecting to eduroam while at Argonne.
Please see the below announcement from CIS on upcoming work at the end of the month. By the looks of it, the only outages you should expect over that weekend would be some business systems being unavailable. E-mail will be unaffected.
WHAT ARE WE DOING?
Argonne’s quarterly IT maintenance weekend is scheduled for Friday, August 28th, thru Sunday, August 30th. Expect that any laboratory network and core IT services may be effected during the weekend. Our planned activities for the weekend include the following:
· Argonne business systems and web applications may be unavailable throughout the duration of the maintenance weekend.
· Expect short (<1min) network outages Saturday, August 29th from 9am – 12pm for the following locations:
o 200 E wing
o 203 D wing library
o 203 R wing first floor – partial
NOTE: Should telephones be impacted during any maintenance weekend, emergencies can always be reported by calling 630-252-1911 from a cell phone.
· Expect short wireless network outages throughout the weekend.
Services Not Affected:
o Email Service
o VOIP Phones
o PA System
o Pager System
WHY ARE WE DOING IT?
CIS recognizes that the reliability and performance of Laboratory Information Technology resources is essential to our ability to carry out our scientific mission. Like the rest of our laboratory infrastructure, these systems require periodic maintenance, replacement and upgrades.
WHEN WILL THIS OCCUR?
August 28th, 2015, 5:00 p.m. thru August 30th, 2015, ~5:00 p.m.
We expect the business systems and web application verification to be complete by Sunday at 3p.m. in which an “all clear” message will be sent.
WHAT IS THE EFFECT ON YOU?
Unless there is an unforeseen issue with the maintenance activities, you should not be affected outside of the maintenance window.
FOR MORE INFORMATION
In the case of unforeseen issues regarding sending email to help you can also use the alternate address argonne.
Report issues with core services after the maintenance is complete (Monday morning- Aug 31) to the Argonne Service Desk at ext. 2-9999 option 2.
Please see the below announcement from ANL Cybersecurity. As noted, it’s recommended you disable automatic MMS retrieval on your device if you use Android. Depending on your MMS application, the instructions for doing this may vary. I’ve included instructions for two Google messaging apps. Check the settings in your SMS/MMS app if it’s not one of these.
For “Messenger” from Google (https://play.google.com/store/apps/details?id=com.google.android.apps.messaging&hl=en): Click the “overflow menu” (three dots, top right corner), choose “Settings”, choose “Advanced”. Under “MMS” uncheck “Auto-retrieve”.
For “Hangouts” from Google (https://play.google.com/store/apps/details?id=com.google.android.talk&hl=en): Click the “Hamburger menu” (three horizontal lines, top left corner), choose “Settings”, choose “SMS”. If SMS is enabled, scroll to Advanced and uncheck “Auto retrieve MMS”.
Dear IT Admins:
A vulnerability has been discovered that can affect Android versions 2.2 through 5.1, about 95% of all Android devices in use. It is located within the Stagefright media library, which is used to render Multimedia Message Service (MMS) content, such as images or videos. By default, most Android devices automatically retrieve MMS messages. Thus, an attacker can perform malicious acts (enable microphone, copy files, turn on camera, etc.) without any action on the part of the recipient. This vulnerability can also be exploited through other means, such as visiting malicious websites.
Google has created patches to address this vulnerability, and most Android devices receive updates through phone manufacturers and cell service providers (Samsung, HTC, ATT, T-Mobile, etc.). When this security patch becomes available, please update your devices. In the meantime, you can reduce your exposure to this vulnerability by disabling auto-retrieval of MMS messages.
The Cyber Security Program Office recommends that all Laboratory employees take steps to protect the data on their mobile devices by practicing safe computing:
· Require a PIN to gain access to the device.
· Enable automatic updates to receive timely software patches.
· Install software from reputable sources.
· Be cautious of strange text and e-mail messages.
If you have any question about Stagefight or best mobile devices security practices, please contact the Cyber Security Program Office at email@example.com or ext. 2-3456.
The previously announced networking issue has been resolved for the time being, however, we do not yet have a root cause. We don’t expect another outage at the moment, but we’re keeping an eye on things in case they go down again.
As part of us trying to make our hostnames make a little more sense, we’ve moved Jira from xjira.mcs.anl.gov to jira.cels.anl.gov (this aligns with the collab.cels.anl.gov). The old URL should redirect seamlessly. If you notice any issues, please report them to firstname.lastname@example.org.