All Systems Operational

Updated a few seconds ago

Jetstream2 Research and Education Cloud JS2 Docs are here: https://docs.jetstream-cloud.org/

Primary Cloud

Operational

Exosphere User Interface

Operational

ASU Regional Cloud

Operational

Cornell Regional Cloud

Operational

Hawaii Regional Cloud

Operational

TACC Regional Cloud

Operational

Docs Site

Operational

Website

Operational

Jetstream2 Support

Operational

0

Upcoming Maintenances

3

Incidents Last 30 Days

1

Maintenances Last 30 Days

External Services

History (Last 7 days)

Incident Status

Operational


Components

Primary Cloud, Exosphere User Interface, ASU Regional Cloud, Cornell Regional Cloud, Hawaii Regional Cloud, TACC Regional Cloud, Docs Site, Website, Jetstream2 Support


Locations

Primary Data Center, ASU Data Center, Cornell Data Center, Hawaii Data Center, TACC Data Center




July 1, 2025 4:02PM EDT
July 1, 2025 8:02PM UTC
[Resolved] Jetstream2 staff have completed system remediations for the IU region related to the following vulnerability: https://security-tracker.debian.org/tracker/CVE-2025-6019 Users of Jetstream2 at satellite regions can expect further communication from regional Jetstream2 support. ***Jetstream2 community members should run package updates and reboot their instances (see: https://docs.jetstream-cloud.org/faq/security/?h=update#do-i-need-to-patchupdate-my-vms).*** The following commands can be used to update your instance depending on which Linux distribution your instance uses: Rocky Linux: sudo dnf update Ubuntu: sudo apt-get update ; sudo apt-get upgrade To ensure your instance is up to date and secure, please reboot your instance after running these commands. Please reach out to us at help@jetstream-cloud.org if you have any questions or concerns about the current remediation.

June 18, 2025 7:55PM EDT
June 18, 2025 11:55PM UTC
[Identified] Jetstream2 staff will be applying patches to remediate systems in response to vulnerabilities that may allow attackers root privileges on systems running major Linux distributions. See the following reference: https://security-tracker.debian.org/tracker/CVE-2025-6019 While Jetstream2 staff are making every effort to minimize disruptions, during this time, users can expect intermittent outages until further notice while Jetstream2 staff remediate systems. ***Jetstream2 community members should run package updates and reboot their instances (see: https://docs.jetstream-cloud.org/faq/security/?h=update#do-i-need-to-patchupdate-my-vms).*** Please reach out to us at help@jetstream-cloud.org if you have any questions or concerns about the current remediation.