As part of our commitment to transparency and support, Green House Data is sharing some statistics from the Network Operations Center. The NOC is home to our support team, the first responders to customer issues. The 2014 Support Report discovered several key statistics including a 12.8 minute average response time.
The data center is full of complex and intertwined roles. Each position is a part of the larger data center team. The team works to keep Green House Data running reliably, while developing our systems for future growth and implementing new products. Our team members work in a very dynamic setting which forces them to keep on their toes while applying a broad spectrum of knowledge.
We upgraded to vCloud Director v5.1 fairly recently and started receiving user tickets regarding a new issue with federation certificates. Users were sent automated e-mails reading as follows:
The federation certificate expiration is [DATE] [TIME]. An expired certificate may disable federation with the identity provider setup with your organization. The certificate can be regenerated from the Federation Settings page.
Federation certificates are set to expire after one year and warning e-mails go out a few weeks before they do. At the end of this one year cycle each certificate must be regenerated. Follow these steps to regenerate a federation certificate:
A disaster recovery plan is vital for your business. Though Green House Data offers managed backup and disaster recovery with a variety of software options, administrators can also set up replication tools directly from vSphere. This blog post will be a quick overview of how to install and configure replication within your virtual environment.
You may have seen recent headlines about NTP attacks, a new variation of Distributed Denial of Service Attacks (DDoS) that is driving massive attacks with up to 400 Gbps of traffic overwhelming servers. Victims have included Xbox Live, customers at CloudFlare, and hosting company OVH.
The new NTP attacks take advantage of Network Time Protocol, which is used to sync timestamps between servers and networks. Hackers amplify their attacks through NTP, by sending a small packet to the NTP server under the guise of the target IP. The NTP automatically replies to the spoofed IP with the last 600 IP addressed that connected. The specific command used is “monlist”, which replies with the list of IP addresses.