[Closed] Packet loss in Amsterdam 2 datacenter

Update 12:30 UTC: Reason for outage was a large scale Distributed Denial of Service (DDoS) attack on the network. While we were not the target of the attack, our upstream provider’s networks were saturated by the attack and our connectivity was negatively affected. The attack has now been brought under control with a DDoS filtering service. We are continuing to monitor the situation but so far connectivity looks to be stable again.

Update 12:12 UTC: The network is now stable again. We do not yet have a reason for outage. We will continue to monitor the situation and will follow up with network operations to find out exactly what went wrong and what preventative measures are available to reduce the likelihood of a recurrence. Please contact support@anu.net if you are still experiencing any difficulties accessing your services.

Update 11:47 UTC: Engineers have identified the fault and are working on a fix. Still no firm ETA available.

As of 11:13 UTC we are experiencing sporadic packet loss of 20-60% on our IP transit connectivity in our Amsterdam 2 datacenter. Network operations team has been activated and is responding to the incident but no further details are available just yet.

Services affected include Hosted Email as well as web hosting accounts and virtual machines hosted out of our Amsterdam 2 datacenter.

We will update this post as soon as we have further information or an ETA on a resolution.

[Resolved] Issues with ams1-c5-1 Direct Admin shared hosting server

There is an ongoing issue with the ams1-c5-1 Direct Admin shared hosting server. This started at approximately 2AM UK time (2020-06-06) and is ongoing as of 1:30PM UK time (2020-06-06).

This will affect websites, DNS service and email accounts hosted on this server.

The server has been online for long periods of time during this window but has had intermittent periods of prolonged downtime.

It appears to be a range of different denial of service attacks targeting web, DNS and other services.

We have been working throughout this period to try to mitigate the effects of these attacks.

We are very sorry for the inconvenience caused during this period and will continue to post updates.

UPDATE 2020-06-06 14:40 (UK TIME): We believe we have identified the root cause of these attacks – a compromised website hosted on the server. Things are stable now – we will check again a bit later and post one further update before closing this off. Once again, very sorry for any inconvenience caused.

Please contact support@anu.net if you have any queries.

[Complete] ams2-c6-1 Maintenance

We need to perform routine maintenance on our ams2-c6-1 Direct Admin server.

Impacted services: All website, email and DNS services hosted on ams2-c6-1.

You will be unable to access any website or DirectAdmin.

You will be unable to download new mail, reply to existing emails or send new emails. Unless you are using SpamTitan spam filtering, new mail should be held by the sender’s mail server and they should try to deliver it again later. There may be a short delay as how often delivery is retried is determined by the sender’s mail server.

DNS is replicated off-site so DNS queries will continue to resolve during this period but DNS record changes will not be possible.

Estimated start time: 4th April 2020, 21:00 UK (BST)
Estimated time of completion: 4th April 2020, 22:00 UK (BST)

UPDATE 4th April 2020 21:00 UK: This scheduled maintenance is now in progress.

UPDATE 4th April 2020 21:15 UK: This scheduled maintenance is now complete.

Please contact support@anu.net if you have any queries relating to this maintenance.