Status Updates

UM System wide outages can be found on the UM IT System Status website.

Current Outages

Currently there are no outages.

Upcoming Outages

There are no upcoming outages.

Past Outages (Last 72 Hours)

 Internal Applications Oracle Production Server Outage (2/8/2016 2:00:00 AM - 2/8/2016 2:30:00 AM)

Mandatory Windows Updates are automatically being installed at this time to kc-isia-oraprd1.

Current and Upcoming Change Management Notices

 Cleanup of old computer objects in AD (10/22/2015 12:00:00 PM)

A cleanup of old computer objects in AD will be performed.

Any non-Mac computer object that has not had a password change in 10 months, which indicates the machine has not talked to Active Directory for at least 9 months, will be removed.

For computers that are lost, stolen, or otherwise locked away longer than 9 months, we can recover the bitlocker contents of these computers when they return to campus with a special recovery key.

 Roll out of Splunk agent to Windows servers at boot time (12/17/2015 8:00:00 AM)

Windows servers at UMKC current log to an old Symantec log collection system. Starting on the 17th, servers at boot time will uninstall the old agent used to collect these logs, and will install a new agent to send logs to our Splunk log collection system. Most Windows server systems will reboot on Monday December 21st at 2am to install patches, and will switch over at that time to the new logging agent. This is currently being testing on IS Security servers.

 Storage Array Maintenance (12/21/2015 7:00:00 AM)

We will be performing maintenance on our storage arrays. This could result in reduced performance during the process. Our DR array will be worked on first, followed by the production array.

 Update to Microsoft encryption cipher suite order (12/21/2015 8:00:00 AM)

Microsoft released some additional encryption cipher suites for Windows. Since we manually manage the cipher suite order list, we must manually add these to campus machines.

In order to facilitate this addition, a change will be made to client computers to allow the new cipher suites.

The cipher suites are briefly described at:

This will be put in for new bootups after Monday morning December 21st.

This has been initially tested, and no side-effects have been seen.

This will enhance the cipher list for Windows clients and Windows servers.

 vCenter Patching (12/23/2015 7:00:00 AM)

We will be applying patches to our vCenter instance. VMs will be unaffected, but no changes to existing VMs will be possible during the upgrade process.

 Java 8u65 Campus Update (1/8/2016 10:00:00 PM)

Java 8u65 will be replacing previous versions of Java on all faculty, staff, and lab computers.

 Campus edge firewall firmware upgrade (1/9/2016 10:00:00 PM)

The firmware on the campus edge firewall will be upgraded to a new feature set and update version. This is a rolling upgrade, with two expected 20-second Internet outages as the live unit reboots, and during fail-back to live. (secondary unit will be rebooted first to avoid more outages) There is a risk that the upgrade will have complications resulting in a longer outage.

 Office 365 student email - minor change to "Clutter" folders (1/17/2016 12:49:00 PM)

Microsoft added a new “Clutter” feature to 0365 email last fall to help users focus on the most important messages in their inbox. The “Clutter” feature moves lower priority messages into a new Clutter folder. Because email in the Clutter folder was sometimes overlooked, a change will be implemented on January 17th, so that all email sent from University accounts will remain in the Inbox.

 Firefox 38.5.0 ESR Campus Update (1/17/2016 7:00:00 PM)

Firefox 38.5.0 ESR will be replacing previous versions of Firefox on all faculty, staff, and lab computers.

 Panopto Desktop Recorder Deployment (2/8/2016 10:00:00 PM)

The Panopto Desktop Recorder will be deployed to all faculty and staff PCs with Tegrity currently installed. This will help with the transition from Tegrity to Panopto later this semester.

 Set IPv6 enabled servers to use persistent IPv6 addresses (2/19/2016 8:00:00 AM)

A bootup script change will be made, so that IPv6 enabled Windows servers keep the same IPv6 address for the life of the installed OS on their particular virtual machine or physical machine. The specific change is to run these two commands at bootup time:

netsh interface ipv6 set global randomizeidentifiers=disabled
netsh interface ipv6 set privacy state=disabled

which disables two IPv6 privacy functions that can randomize the IPv6 address per day and at each bootup.

This will ensure that campus edge firewall rules will correctly point to the same IPv6 address between subsequent reboots.

This will be made active in group policy on February the 19th, for any reboots that day or later. The campus wide patch installation day is February 22nd, so most Windows servers would pickup the change on that day after installing patches.

This will be activated on IS Security servers now, with actual activation next week when patches are released to pre-deployment testing, or sooner if a particular IS Security server needs a reboot.

This should have no significant impact other than stabilizing IPv6 addresses for Windows servers.