News
Dec
19
[Core Network] Informational Notice 18th December 2018 - Barclays - Update 1
Posted by David Croft on 19 December 2018 11:31 AM
This issue was resolved at 20:00 last night by Barclays rerouting
their network traffic.

Customers should now be able to successfully access barclays.net.

Regards

David Croft

On Tue, 18 Dec 2018 at 16:31, David Croft <david.croft at comtec.com> wrote:
>
> A number of customers have reported an inability to access
> https://cashmanagement.barclays.net/ since the weekend
>
> We have conclusively proved that there is no issue on our network,
> even going as far as to packet capture at all of our border routers
> which has verified that absolutely no response is being received from
> 157.83.99.50 to the TCP SYN packets which initiate the connection.
>
> We have been in contact with Barclays's DDoS protection provider
> Akamai/Prolexic who, while unable to divulge the exact problem due to
> the nature of their business, have also absolutely confirmed that the
> issue is not on their network but with Barclays.
>
> We have reached out to Barclays through multiple channels in an
> attempt to reach an network engineer in the correct department to
> diagnose and fix this problem however as yet they have not been
> responsive.
>
> Regards
>
> David Croft
>
> --
> For urgent operational issues please always contact noc at comtec.com
> or 0845 899 1423 and not any named individual.
Read more »



Dec
18
[Core Network] Informational Notice 18th December 2018 - Barclays
Posted by David Croft on 18 December 2018 04:31 PM
A number of customers have reported an inability to access
https://cashmanagement.barclays.net/ since the weekend

We have conclusively proved that there is no issue on our network,
even going as far as to packet capture at all of our border routers
which has verified that absolutely no response is being received from
157.83.99.50 to the TCP SYN packets which initiate the connection.

We have been in contact with Barclays's DDoS protection provider
Akamai/Prolexic who, while unable to divulge the exact problem due to
the nature of their business, have also absolutely confirmed that the
issue is not on their network but with Barclays.

We have reached out to Barclays through multiple channels in an
attempt to reach an network engineer in the correct department to
diagnose and fix this problem however as yet they have not been
responsive.

Regards

David Croft
Read more »



Nov
18
[Shared Web Hosting] Final notice of withdrawal of PHP 5
Posted by David Croft on 18 November 2018 09:31 AM
This is an advisory notice to customers still running on PHP 5 versions.

Start date: Saturday, 29th December 2018
Start time: 00:00 GMT (UTC+0000)
End date: Sunday, 30th December 2018
End time: 23:59 GMT (UTC+0000)

Purpose:

As previously announced, all PHP 5 versions are end of life and PHP
5.6 will stop receiving security updates after 31st December 2018 [1].

All remaining websites on shared hosting running PHP 5.6 will be
upgraded to PHP 7 during this maintenance window.

Customers with dedicated servers will not be affected, although they
are strongly advised to upgrade as PHP 5.6 will receive no further
security support and we will be unable to support it.

Services affected:

Shared web hosting customers running PHP 5 versions.

Impact:

HIGH - Customer websites will be upgraded to PHP 7 and this will
entail a short outage of the website as well as potential ongoing
disruption if the software is not compatible with PHP 7.

As this contains a major software version upgrade, this e-mail serves
as 30 days notice of a change to the technical functionality of the
Service that does not diminish the Service under clause 2.5 of the
Master Services Agreement.

Action Required:

We recommend that customers verify in advance that their software is
compatible with PHP 7 and if necessary upgrade it [2].

Regards,

David

[1] https://secure.php.net/supported-versions.php
[2] https://secure.php.net/manual/en/migration70.php
Read more »



Nov
5
Christmas moratorium 2018-2019
Posted by David Croft on 05 November 2018 07:50 PM
Please be advised of the following Christmas moratorium scheduled on
our network.

Start date: Tuesday, 11th December 2018
End date: Friday, 4th January 2019

Purpose:

In line with industry best practice, we and our suppliers will be
instituting our annual change freeze between these dates in order to
protect customer services.

Services affected:

All.

Impact:

There will be an moratorium on changes across our network during this
period. Provision activities may be delayed and lead times will be
impacted if they fall within or after this window. Repair activities
will not be affected.

If we carry out any maintenance activity during this window, it will
be for emergency reasons and will be carried out to protect customer
service and the network from an uncontrolled loss of service.

Please ensure any new orders are submitted in good time to avoid being
affected by this window.

Please note that a few of our suppliers have extended moratoriums
greater than the above time period and our ability to deliver certain
orders may be impacted by this. Customers will be advised at the point
of order if this affects them.

Regards,

David Croft
Read more »



Oct
29
EMERGENCY Maintenance window 30th October 2018
Posted by David Croft on 29 October 2018 11:14 AM
Please be advised of the following maintenance window scheduled on our
core network:

Start date: Tuesday, 30th October 2018
Start time: 22:00 GMT (UTC+0000)
End time: 02:00 GMT (UTC+0000) Wednesday

Purpose:

The purpose of this work is to improve network reliability and
mitigate a known potential cause of network instability.

- Adjust IGP routing protocol parameters.
- Migrate one of the redundant route reflectors to a dedicated router.

Services affected:

Core network.

Impact:

LOW - No operational impact is expected during this window.

Please note: This maintenance window is being declared as EMERGENCY
without the normal notice period due to the need to urgently prevent
the occurrence of a known potential network instability.

Regards,

David Croft
Read more »



Oct
3
[Core Network] Service Alert 3rd October 2018 - Update 1
Posted by Daniel Brockwell on 03 October 2018 02:48 PM
This is an incident notification regarding an outage on our core network.

Date: Wednesday, 3rd October 2018
Start time: 11:38 BST
End time: 14:19 BST

Services affected:

Service degradation for services hosted out of Interxion LON1.

Report:

We were observing an intermittent fault and low light levels on a circuit serving our Interxion LON1 PoP.

Services terminated at or hosted out of this data centre were suffering packet loss as a result.

This issue has now been resolved and the circuit restored to service.

Regards,

Daniel Brockwell

Daniel Brockwell
Technical Engineer

Comtec

DO MORE TODAY. Our challenges: to be the best, to make a difference while pushing our limits.

E: dan.brockwell at comtec.com
T: 01737 228123| M: 07824 484434| F: 01737 228101
W: www.comtec.com


[http://www.comtec.com/wp-content/uploads/2014/10/comtec-email-logo.jpg]<http://www.comtec.com/>


[http://www.comtec.com/wp-content/uploads/2014/10/DCSAwardsLogo2017resize.jpg]<http://www.dcsawards.com> [http://www.comtec.com/wp-content/uploads/2014/10/Business-Green-2016-Shortlisted.jpg] <http://www.comtec.com>



Registered Office: Comtec House, Albert Road North, Reigate, Surrey RH2 9EL

CONFIDENTIALITY NOTICE
This email transmission (and/or the documents accompanying it) may contain confidential information belonging to the sender. The information is intended for the use of the individual or entity named. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone to arrange for the return of the documents. The contents of an attachment to this email may contain software viruses that could damage your own computer system. Whilst the sender has taken every reasonable precaution to minimise this risk, we cannot accept liability for any damage that you may sustain as a result of software viruses. You should carry out your own virus checks before opening any attachments to this email.
Read more »