Addressing all (vh) clients
Thank you for your patience in awaiting this postmortem of last weeks incident.
On the 7th April 2020 approximately 1:30 pm (13:00) we started seeing intermittent random spurts of traffic latency across our public network.
The issue was presenting as slow traffic pings for approximately 6-10 min at a time disrupting connections to Data Center traffic inbound / outbound.
At the time of the issue our team had presented a list of possible causes and started to action steps to troubleshoot each possibility.
As the day progressed the latency interruption became less disruptive as occurrences where spread further apart eventually stopping at approximately 9:30 pm (21:30).
Unfortunately we where unable to pinpoint the root cause of the issue at the time due to the inconsistent nature of the events but had setup additional monitoring and continuity plan in the event the issue returned.
5 days had passed without re-occurrence until Sunday April 12th approximately 5pm (17:00), with previous monitoring already in place and more preparation we where able to determine the root cause was a DDOS DNS amplified attack targeting a clients VM which had firewalls turned off at the time.
This DDOS attack caused a slowdown in network traffic and was outbound from (vh) public facing services.
To minimize further disruptions our team has performed and put in place the following:
If you have any questions on the postmortem please feel free to open a support ticket in the (vh) cp platform https://control.velocityhost.com.au and use "April 7th postmortem" in the subject field.
Enjoy the rest of the Easter long weekend and thanks again for your patience.
Kind Regards
(vh) Admin Team