February 2022

[downtime] CS Storage Maintenance, Wednesday, February 23, 2022,

Date: Wednesday, February 23, 2022 (13:00-14:00)

Who is affected:
Users of CS Department Storage Systems

What is happening:
During this window, one node in our storage cluster will be taken offline
to replace a failing DIMM.

Why is it happening:
Proactive monitoring has noted a DIMM that is nearing failure, so a
replacement has been arranged.

Some minor performance effects may occur due to the offline node. No outage
is anticipated, but maintenance always carries the risk of unexpected
problems, which is the reason for this notice.

We will post updates to the status page: http://www.csstaff.org
as necessary.

If this downtime will cause you undue hardship, please contact
csstaff@cs.princeton.edu immediately, so we can discuss options to reduce
any negative impact. Your patience is appreciated.

Sincerely,
CS Staff
_______________________________________________
downtime mailing list
downtime@lists.cs.princeton.edu
https://lists.cs.princeton.edu/mailman/listinfo/downtime

[downtime] CS Storage Maintenance, Wednesday, February 23, 2022, Read More »

[downtime] Emergency CS Email Upgrades, TODAY Monday, February 7,

Date: TODAY Monday, February 7, 2022 (10:00-13:00)

Who is affected:
All users of CS Department Email Services

What is happening:
Patches will be applied to the CS email servers to mitigate a serious
zero-day vulnerability that was released over the weekend. During this
patching, email services should continue as normal, though you may notice
brief outages while services are restarted.

If your mail client with a \”remembered\” password suddenly prompts you for a
password, this may be a sign that you\’ve been disconnected due to a service
restart. The best approach is usually to cancel the password prompt and
wait a minute or two before restarting your email client. This should
preserve the \”remembered\” password, which should work after the service
restarts.

Why is it happening:
A serious zero-day vulnerability in our mail services was released over the
weekend. Leaving this vulnerability unpatched could lead to account
compromises by malicious emails.

As a reminder, you should always be cautious with unexpected emails,
particularly with attachments or links included. This particular
vulnerability requires that email recipients click on links in malicious
messages in order to effect the compromise.

We will post updates to the status page: http://www.csstaff.org
as necessary.

If this downtime will cause you undue hardship, please contact
csstaff@cs.princeton.edu immediately, so we can discuss options to reduce
any negative impact. Your patience is appreciated.

Sincerely,
CS Staff
_______________________________________________
downtime mailing list
downtime@lists.cs.princeton.edu
https://lists.cs.princeton.edu/mailman/listinfo/downtime

[downtime] Emergency CS Email Upgrades, TODAY Monday, February 7, Read More »

Scroll to Top