Welcome to Joyent Cloud Customer Support

Stay updated with announcements, get answers from the community and share your feature suggestions with us.
You can also submit a request or send us an email at support@joyent.com.

 

Joyent Support

Ryan Jul 2 Announcements / Incidents & Notifications

joyent.com experienced an outage lasting approximately 5 minutes during an update to the site at 18:40 UTC, Thursday, July 2nd. Changes were reverted and the site is back online at this time. 

Ryan Jul 2 Announcements / Incidents & Notifications

We will be performing maintenance on our internal load balancers on Tuesday, 7-July-2015 at 4:15 pm PDT (23:15 UTC). We do not expect any customer impact during this maintenance, but Joyent-owned public websites (such as joyent.com and my.joyent.com) may experience a brief outage. 

We will update once this maintenance has been completed. 

Elizabeth Jul 1 Announcements / Incidents & Notifications

This issue is now resolved.

End Time: 02:18 UTC

Start Time: 12:43 UTC

Incident Details: We are currently experiencing an issue with our Billing system, and are actively working on resolving the issue. Your ability to update and/or review current billing information will be limited during this time. We will update this notice as soon as the issue has been resolved.

Your patience on this is much appreciated.

Elizabeth Jun 29 Announcements / Incidents & Notifications

FINAL UPDATE: This maintenance has been completed in all data centers, in accordance with the updated schedule shown below.

UPDATE: Due to unexpected delays in the maintenance to our AMS-1 data center, the times for the rest of the maintenance windows have been updated to reflect new times below. Apologies for this inconvenience.

We have scheduled API service updates in all of our data centers for this upcoming Wednesday, 1-July-2015. The expected duration of impact is approximately 20 minutes per data center, and the scheduled start times for each data center are outlined as follows:

  • EU-AMS-1: 13:00 PDT 1-July-2015 (20:00 UTC 1-July-2015

  • US-EAST-3: 13:20 PDT 1-July-2015 (20:20 UTC 1-July-2015)

  • US-EAST-2: 14:00 PDT 1-July-2015 (21:00 UTC 1-July-2015)

  • US-EAST-1: 14:20 PDT 1-July-2015 (21:20 UTC 1-July-2015)

  • US-SW-1: 14:40 PDT 1-July-2015 (21:40 UTC 1-July-2015)

  • US-WEST-1: 15:00 PDT 1-July-2015 (22:00 UTC 1-July-2015)

Your ability to manage your instances via the API or through my.joyent.com will be limited during this time. Already running instances will not be impacted. We appreciate your patience and understanding, and will update this notice as soon as the maintenance is completed.

If you have any questions or concerns, please contact our Support team by raising a ticket at https://help.joyent.com or by email to support@joyent.com.

 

Sean G. Jun 12 Announcements / Announcements

Introduction

This advisory describes the scope of the following recently-announced OpenSSL vulnerabilities, including Logjam:

  • CVE-2015-4000 (Logjam)
  • CVE-2015-1788
  • CVE-2015-1789
  • CVE-2015-1790
  • CVE-2015-1792
  • CVE-2015-1791
  • CVE-2014-8176

Described in the sections below are actions being taken by Joyent, and actions recommended for customers to take:

  • We made this advisory public on 18-June-2015.
  • This advisory is meant to be used in addition to our 20-March-2015 article regarding previously-announced OpenSSL vulnerabilities.

1) Upgrading your own OpenSSL version 1.0.1 or 1.0.2

Should customers choose to address the CVEs listed above by upgrading OpenSSL on their own, they are advised to upgrade to either Version 1.0.1o (if currently using 1.0.1) or Version 1.0.2c (if currently using 1.0.2).

Joyent customers can address all of the listed CVEs by reinstalling OpenSSL with the following command:
pkgin -y up && pkgin -y in openssl 

2) Joyent-delivered software

The CVEs listed in this advisory have been addressed in the most-currently-released versions of Joyent's software and package repositories:

  • pkgin respository 2014Q4 (openssl-1.0.1o)

  • pkgin repository 2015Q1 (openssl-1.0.2c)

  • SmartDataCenter (SDC) platform images released after 10-June-2015

3) Linux users

For any necessary remedial actions, please check the notices applicable to the Linux Distro you are using:

 Debian: https://www.debian.org/security/2015/dsa-3287

 Centos/Red Hat/Fedora: https://rhn.redhat.com/errata

 Ubuntu: http://www.ubuntu.com/usn/usn-2639-1/

4) Further questions

Please be assured that the Joyent HTTPS endpoints for Manta, CloudAPI and the Customer Portal at https://my.joyent.com are not vulnerable.

As recommended in previous articles, Joyent customers who are using third-party operating systems are advised to contact their respective service providers for further information and instructions.

If you have followed the instructions above and further questions arise regarding mitigation of these OpenSSL vulnerabilities (in Joyent products and services): Please contact Joyent Support by submitting a request at the Support portal or by emailing support@joyent.com.

 

Overview | Recent