All our servers and company laptops went down at pretty much the same time. Laptops have been bootlooping to blue screen of death. It’s all very exciting, personally, as someone not responsible for fixing it.

Apparently caused by a bad CrowdStrike update.

Edit: now being told we (who almost all generally work from home) need to come into the office Monday as they can only apply the fix in-person. We’ll see if that changes over the weekend…

  • dan@upvote.au
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    2 months ago

    . they have to go into every data center and manually fix all the computer servers

    Do they not have IPMI/BMC for the servers? Usually you can access KVM over IP and remotely power-off/power-on/reboot servers without having to physically be there. KVM over IP shows the video output of the system so you can use it to enter the UEFI, boot in safe/recovery mode, etc.

    I’ve got IPMI on my home server and I’m just some random guy on the internet, so I’d be surprised if a data center didn’t.

      • dan@upvote.au
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        I feel sorry for sys admins that have to administer servers in a remote data center and don’t have KVM over IP.

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Sometimes there are options that are reasonable for individual users that don’t scale well to enterprise environments.

      Also, the effectively gives attackers a secondary attack surface in addition to the normal remote access technologies that require the machine to be up and running to work.

      • dan@upvote.au
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        I don’t know many individual users that use IPMI. I only really see it used by hosting (and other) companies in data centers.

        Also, the effectively gives attackers a secondary attack surface

        IPMI is usually locked down and only accessible on a management VLAN, and also often IP locked, plus the system itself would have a password.