Hi,
Briefly:
At around 2153Z today we started receiving alerts for basically
"everything" flapping up and down due to between 20 and 30% packet
loss. In short, this was due to a distributed denial of service
attack aimed at another customer of our colo provider. Around 2240Z
they deployed some mitigation and hopefully we don't see any more
issues.
TL;DR:
I'd only got as far as determining that it affected "everything"
before it stopped again shortly before 2200. It then started up
again around 2215 and I was able to see that it also affected our
colo provider.
I was able to make contact and they started investigating around
2215. There wasn't anything for me to do at this point except watch.
It was a large UDP DDoS, random source and destination ports.
At about 2240 they put in some mitigation. The degree to which you
were affected during this time will vary based on how your legit
traffic reached us (or didn't reach us).
Cheers,
Andy
--
https://bitfolk.com/ -- No-nonsense VPS hosting
Hi,
I've added a warning to the Xen Shell "install" command that new
installs of 32-bit guests are now deprecated, and pointing you to:
https://tools.bitfolk.com/wiki/64-bit_guests
Those of you with existing 32-bit guests, which I know is many of
you, should be okay for a few years yet. Even after the Xen
hypervisor officially ditches support for 32-bit guests we will
ensure they are still bootable. But I would encourage you to choose
64-bit at your next install or operating system upgrade for an
easier life.
Cheers,
Andy
--
https://bitfolk.com/ -- No-nonsense VPS hosting