HostExcellence: Mail and MySQL Server Urgent Maintenance – Resolved

Our system administrators have identified an issue with one of our mail arrays related to a hardware failure of one storage member in the SAN.

A drive failure occurred on a member of the dmail02 storage group.  The member attempted to initiate a RAID rebuild, which was unsuccessful and the storage member removed itself from the storage group.  RAID refers to “redundant array of independent disks”, a technology  that allows us to achieve high levels of storage reliability from our server drives. It does this by arranging the devices into an array. Simplified, this means they act like one large hard drive, but if one drive dies, there is enough data stored on the rest to recreate the lost data once the broken hard drive is replaced with a new one.

The server had to be taken offline and solutions are currently being investigated.  For all email messages that are being sent to email addresses on these servers, that mail is being queued and will be delivered once services are resumed.

 

Read the original post here


WebHostsStatus.com info on HostExcellence

HostExcellence: Mail and MySQL Server Urgent Maintenance

Our system administrators have identified an issue with one of our mail arrays related to a hardware failure of one storage member in the SAN.

A drive failure occurred on a member of the dmail02 storage group.  The member attempted to initiate a RAID rebuild, which was unsuccessful and the storage member removed itself from the storage group.  RAID refers to “redundant array of independent disks”, a technology  that allows us to achieve high levels of storage reliability from our server drives. It does this by arranging the devices into an array. Simplified, this means they act like one large hard drive, but if one drive dies, there is enough data stored on the rest to recreate the lost data once the broken hard drive is replaced with a new one.

The server had to be taken offline and solutions are currently being investigated.

Mail Servers Affected:

mail11, mail12, mail22, mail31, mail32, mail33, mail41, mail42, mail43, mail37, mail51, mail52, mail1201, mail1204, mail1205, mail1206, mail1207, mail1208, mail1209, mail1210, mail1211, mail1212, mail1214, mail1215, mail1216, mail1301, mail1303, mail1304, mail1305, mail1306, mail1307, mail1308, mail1309, mail1310, mail1311, mail1312, mail1313, mail1314, mail1315, mail1316, mail1317, mail1318, mail1319, mail1320, mail1401, mail1402, mail1403, mail1404, mail1405, mail1406, mail1407, mail1408, mail1409, mail1410, mail1412, mail1413, mail1414, mail1415, mail1416, mail1418, mail1419, mail1420, mail1422, mail1423, mail1425

Database Servers Affected:
mysql1201, mysql1202, mysql1203, mysql1204, mysql1206, mysql1207, mysql1208, mysql1209, mysql1210, mysql1211, mysql1212, mysql1213, mysql1214, mysql1215, mysql1216, mysql1217, mysql1219, mysql1220, mysql1301, mysql1302, mysql1303, mysql1304, mysql1305, mysql1306, mysql1307, mysql1308, mysql1309, mysql1310, mysql1401, mysql1402, mysql1403, mysql1404, mysql1405, mysql1406, mysql1407, mysql1408, mysql1409, mysql1410, mysql1411, mysql1412, mysql1413, mysql1414, mysql1415, mysql1416, mysql1417, mysql1418, mysql1419, mysql1420, mysql1421, mysql1422, mysql1424, mysql1425, pgsql1201, pgsql1202, pgsql1301, pgsql1302, pgsql1401

 

Read the original post here


WebHostsStatus.com info on HostExcellence

ixwebhosting: Mail and MySQL Server Urgent Maintenance – Resolved

Our system administrators have identified an issue with one of our mail arrays related to a hardware failure of one storage member in the SAN.

A drive failure occurred on a member of the dmail02 storage group.  The member attempted to initiate a RAID rebuild, which was unsuccessful and the storage member removed itself from the storage group.  RAID refers to “redundant array of independent disks”, a technology  that allows us to achieve high levels of storage reliability from our server drives. It does this by arranging the devices into an array. Simplified, this means they act like one large hard drive, but if one drive dies, there is enough data stored on the rest to recreate the lost data once the broken hard drive is replaced with a new one.

The server had to be taken offline and solutions are currently being investigated.  For all email messages that are being sent to email addresses on these servers, that mail is being queued and will be delivered once services are resumed.

 

Original post


WebHostsStatus.com info on ixwebhosting

ixwebhosting: Mail and MySQL Server Urgent Maintenance

Our system administrators have identified an issue with one of our mail arrays related to a hardware failure of one storage member in the SAN.

A drive failure occurred on a member of the dmail02 storage group.  The member attempted to initiate a RAID rebuild, which was unsuccessful and the storage member removed itself from the storage group.  RAID refers to “redundant array of independent disks”, a technology  that allows us to achieve high levels of storage reliability from our server drives. It does this by arranging the devices into an array. Simplified, this means they act like one large hard drive, but if one drive dies, there is enough data stored on the rest to recreate the lost data once the broken hard drive is replaced with a new one.

The server had to be taken offline and solutions are currently being investigated.

Mail Servers Affected:

mail11, mail12, mail22, mail31, mail32, mail33, mail41, mail42, mail43, mail37, mail51, mail52, mail1201, mail1204, mail1205, mail1206, mail1207, mail1208, mail1209, mail1210, mail1211, mail 1212, mail1214, mail1215, mail1216, mail1301, mail1303, mail1304, mail1305, mail1306, mail1307, mail1308, mail1309, mail1310, mail1311, mail1312, mail1313, mail1314, mail1315, mail1316, mail1317, mail1318, mail1319, mail1320, mail1401, mail1402, mail1403, mail1404, mail1405, mail1406, mail1407, mail1408, mail1409, mail1410, mail1412, mail1413, mail1414, mail1415, mail1416, mail1418, mail1419, mail1420, mail1422, mail1423, mail1425

Database Servers Affected:
mysql1201, mysql1202, mysql1203, mysql1204, mysql1206, mysql1207, mysql1208, mysql1209, mysql1210, mysql1211, mysql1212, mysql1213, mysql1214, mysql1215, mysql1216, mysql1217, mysql1219, mysql1220, mysql1301, mysql1302, mysql1303, mysql1304, mysql1305, mysql1306, mysql1307, mysql1308, mysql1309, mysql1310, mysql1401, mysql1402, mysql1403, mysql1404, mysql1405, mysql1406, mysql1407, mysql1408, mysql1409, mysql1410, mysql1411, mysql1412, mysql1413, mysql1414, mysql1415, mysql1416, mysql1417, mysql1418, mysql1419, mysql1420, mysql1421, mysql1422, mysql1424, mysql1425, pgsql1201, pgsql1202, pgsql1301, pgsql1302, pgsql1401

 

Original post


WebHostsStatus.com info on ixwebhosting

HostExcellence: DDoS (Distributed Denial of Service) attack – Resolved

Our system administrators detected a Distributed Denial of Service attack (DDoS), launched against the nameservers for CP12.

A DDoS is is an attempt to make a computer resource unavailable to its intended users. The way the attack is carried out varies as much as who is attacked and why. One common method of attack involves saturating the target (victim) machine with external communications requests. This creates so many false connections to the server, real attempts to connect cannot be completed. Because so many domains share an IP, it is not possible to determine which site the attack is directed at. In many cases, a temporary block is sufficient until the DOS attack passes, however, if the attack continues, the shared IP could remain blocked for an extended period of time.

In order to mitigate the attack and prevent larger service impact, system administrators have temporarily filtered all connections to those nameservers. Customers who do not have their DNS already cached will not be able to browse their sites.

Read the original post here


WebHostsStatus.com info on HostExcellence

HostExcellence: DDoS (Distributed Denial of Service) attack

Our system administrators detected a Distributed Denial of Service attack (DDoS), launched against the nameservers for CP12.

A DDoS is is an attempt to make a computer resource unavailable to its intended users. The way the attack is carried out varies as much as who is attacked and why. One common method of attack involves saturating the target (victim) machine with external communications requests. This creates so many false connections to the server, real attempts to connect cannot be completed. Because so many domains share an IP, it is not possible to determine which site the attack is directed at. In many cases, a temporary block is sufficient until the DOS attack passes, however, if the attack continues, the shared IP could remain blocked for an extended period of time.

In order to mitigate the attack and prevent larger service impact, system administrators have temporarily filtered all connections to those nameservers. Customers who do not have their DNS already cached will not be able to browse their sites.

Read the original post here


WebHostsStatus.com info on HostExcellence

ixwebhosting: DDoS (Distributed Denial of Service) attack – Resolved

Our system administrators detected a Distributed Denial of Service attack (DDoS), launched against the nameservers for CP12.

A DDoS is is an attempt to make a computer resource unavailable to its intended users. The way the attack is carried out varies as much as who is attacked and why. One common method of attack involves saturating the target (victim) machine with external communications requests. This creates so many false connections to the server, real attempts to connect cannot be completed. Because so many domains share an IP, it is not possible to determine which site the attack is directed at. In many cases, a temporary block is sufficient until the DOS attack passes, however, if the attack continues, the shared IP could remain blocked for an extended period of time.

In order to mitigate the attack and prevent larger service impact, system administrators have temporarily filtered all connections to those nameservers. Customers who do not have their DNS already cached will not be able to browse their sites.

Original post


WebHostsStatus.com info on ixwebhosting

ixwebhosting: DDoS (Distributed Denial of Service) attack

Our system administrators detected a Distributed Denial of Service attack (DDoS), launched against the nameservers for CP12.

A DDoS is is an attempt to make a computer resource unavailable to its intended users. The way the attack is carried out varies as much as who is attacked and why. One common method of attack involves saturating the target (victim) machine with external communications requests. This creates so many false connections to the server, real attempts to connect cannot be completed. Because so many domains share an IP, it is not possible to determine which site the attack is directed at. In many cases, a temporary block is sufficient until the DOS attack passes, however, if the attack continues, the shared IP could remain blocked for an extended period of time.

In order to mitigate the attack and prevent larger service impact, system administrators have temporarily filtered all connections to those nameservers. Customers who do not have their DNS already cached will not be able to browse their sites.

Original post


WebHostsStatus.com info on ixwebhosting

HostExcellence: Windows VPS Maintenance – April 29, 2016

On April 29th, 2016 at 11PM EDT we will be performing maintenance on our Windows VPS Node “WVZ7″  during which we will be replacing the CPU for this node.  The maintenance is expected to last for one hour.  During this time all customer servers on this node will be offline.

Read the original post here


WebHostsStatus.com info on HostExcellence

ixwebhosting: Windows VPS Maintenance – April 29, 2016

On April 29th, 2016 at 11PM EDT we will be performing maintenance on our Windows VPS Node “WVZ7″  during which we will be replacing the CPU for this node.  The maintenance is expected to last for one hour.  During this time all customer servers on this node will be offline.

Original post


WebHostsStatus.com info on ixwebhosting