Green Cloud Defense
Update - VMware has provided a hotfix for Horizon DaaS 8 tenants that has been successfully tested by Green Cloud Defense. This hotfix is in replacement for the temporary workarounds that were put in place on December 12th. In order to implement this hotfix, the tenant appliances services will need to be restarted for each appliance. We will be beginning that activity between midnight and 6:00 am EST tonight. Any DaaS users in ATL or HOU that are connected when the services are restarted may disconnect but should be able to reconnect within a few minutes. If you have any questions please support@greenclouddefense.com.
Dec 21, 17:43 EST
Update - The VMware remediation steps have been completed across all NSX-V manager components including the Atlanta datacenter. We will continue updating this advisory as relevant information is made available and maintenance is completed. If you have any questions, please email support@greenclouddefense.com.
Dec 17, 04:04 EST
Update - The VMware remediation steps have been completed across all NSX-V manager components outside of the Atlanta datacenter. Green Cloud Defense is continuing to work with VMware to complete the required changes and will be temporarily suspending administrative access through vCloud in Atlanta starting at 6:00pm EST. There is no expected impact to NSX Edge Gateways during this process, but administrative tasks and console access via vCloud will be temporarily unavailable during the maintenance. We will continue updating this advisory as relevant information is made available and maintenance is completed. If you have any questions, please email support@greenclouddefense.com.
Dec 16, 16:59 EST
Update - VMware has updated the VMSA-2021-0028 advisory to include NSX-V manager components and released temporary remediation steps. This advisory does not affect customer Edge Gateways themselves but the backend components that manage the firewalls. The internal NSX-V manager components are protected by our SIEM, EDR, and Continuous Risk Scanning platforms and are in no way externally exposed. Green Cloud Defense is starting on this remediation now. There is no expected impact to NSX Edge Gateways during this process, but administrative tasks via vCloud on Edge Gateways may be temporarily unavailable during the maintenance. No other type of firewall or vCloud administration tasks will be affected. We will continue updating this advisory as relevant information is made available and maintenance is completed. If you have any questions, please email support@greenclouddefense.com.
Dec 15, 14:13 EST
Update - The temporary remediation steps for vCenter have been implemented across our platforms including private cloud. We will continue updating this advisory as relevant information is made available. In the meantime, if you have any questions, please email support@greenclouddefense.com.
Dec 14, 14:51 EST
Update - Green Cloud Defense is starting on temporary remediation steps provided by VMware for private cloud environments. There is no expected impact to running VMs during this process, but access via vSphere will be impacted briefly during service restart intervals. We will continue updating this advisory as relevant information is made available and maintenance is completed. Additional If you have any questions, please email support@greenclouddefense.com.
Dec 13, 14:30 EST
Update - Green Cloud Defense has concluded implementing the temporary workaround across the affected external facing Horizon DaaS components. This workaround will be superseded by VMware’s official recommendation once that is made available. We would recommend partners test logins to their DaaS environments and if possible only allow traffic to DaaS from known good source IPs. If you have any questions please email support@greenclouddefense.com.
Dec 12, 19:46 EST
Update - Green Cloud Defense has identified a temporary workaround for the most critical Horizon DaaS components affecting end customer DaaS environments. This workaround should reduce the risk of exploitation from external sources while we wait for guidance from VMware. We believe that there may be additional steps needed to fully remediate this vulnerability. In order to implement this workaround, the tenant appliances services will need to be restarted for each appliance. We will be beginning that activity immediately. Any users that are connected when the services are restarted will disconnect but should be able to reconnect within a few minutes. If you have any questions please support@greenclouddefense.com.
Dec 12, 15:57 EST
Update - The temporary remediation steps for vCenter have been implemented across our IaaS and DaaS platforms. We will continue updating this advisory as relevant information is made available. In the meantime, if you have any questions, please email support@greenclouddefense.com.
Dec 12, 00:01 EST
Update - VMware has updated the VMSA-2021-0028 advisory with temporary remediation steps for vCenter. Given the severity of the CVE, Green Cloud Defense is immediately starting on this remediation across our IaaS and DaaS platforms. There is no expected impact to running VMs during this process, but administrative tasks via vCloud will be impacted briefly during service restart intervals. We will continue updating this advisory as relevant information is made available and maintenance is completed. Additional If you have any questions, please email support@greenclouddefense.com.
Dec 11, 17:19 EST
Identified - Green Cloud was notified today of the possibility of exploit for the log4j vulnerability detailed in this CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228. Our Security Operations (SOC), Cloud Infrastructure and Engineering teams immediately began our incident management processes and started to assess potential impact. We reached out to our vendors to determine which may be vulnerable and conducted our own internal investigation. We believe we have a fairly good idea at this time of what components may be affected.

To summarize, VMware has issued an advisory that notes vCenter and Horizon DaaS components as being potentially exploitable while VMware Cloud Director, VMware Cloud Director Availability and NSX-V are not. (https://www.vmware.com/security/advisories/VMSA-2021-0028.html) We will be waiting for VMware to issue patches or guidance on workarounds and implementing them as quickly as we can. Our Portal does not use the vulnerable log4j package and the rest of our critical vendors have either confirmed they are not vulnerable or will be issuing guidance as soon as they can confirm. Of particular note, both Veeam and Zerto have confirmed they do not use the vulnerable code or anything related. We foresee no impact to any Green Cloud backup or DR services and we are taking every precaution to make sure this continues to be the case. As always, protecting your data is our top priority.

Our SOC team has implemented specific monitoring and alerting for any possible exploits using our SIEM, EDR and Continuous Risk Scanning platforms and we are confident we can take appropriate action should we be affected. Due to the commonality of this component in applications across all industries, this is going to remain a fluid and ever-evolving situation for quite some time and we will be re-assessing our approach and protections regularly. We will be updating this advisory as relevant information is made available.

As always, please do not hesitate to reach out to support@greenclouddefense.com if you have questions or concerns.
Dec 10, 20:53 EST

About This Site

Welcome to Green Cloud's system status site. Please subscribe to updates above to get up to minute alert notifications on any scheduled maintenance activities and/or service interruptions. If you require further assistance, please email us at support@greenclouddefense.com or call us at 1.877.465.1217

Network Operational
Network - Greenville, SC ? Operational
Network - Nashville, TN ? Operational
Network - Houston, TX ? Operational
Network - Atlanta, GA ? Operational
Network - Phoenix, AZ ? Operational
Network - Minneapolis, MN ? Operational
IaaS ? Operational
IaaS - Nashville, TN ? Operational
IaaS - Greenville, SC ? Operational
IaaS - Houston, TX ? Operational
IaaS - Atlanta, GA ? Operational
IaaS - Phoenix, AZ ? Operational
IaaS - Minneapolis, MN ? Operational
Managed Security Operational
Managed SIEM ? Operational
DRaaS ? Operational
DRaaS with Zerto - Atlanta, GA ? Operational
DRaaS with Zerto - Greenville, SC ? Operational
DRaaS with Zerto - Nashville, TN ? Operational
DRaaS with Zerto - Houston, TX Operational
DRaaS with Zerto - Minneapolis, MN Operational
DRaaS with Zerto - Phoenix, AZ ? Operational
DRaaS with StorageCraft - Greenville, SC ? Operational
DRaaS with StorageCraft - Nashville, TN ? Operational
DRaaS with StorageCraft - Atlanta, GA ? Operational
DRaaS with StorageCraft - Phoenix, AZ ? Operational
DRaaS with Veeam - Atlanta, GA ? Operational
DaaS ? Operational
DaaS - Greenville, SC ? Operational
DaaS - Nashville, TN ? Operational
DaaS - Atlanta, GA ? Operational
DaaS - Houston, TX ? Operational
Private Cloud Operational
90 days ago
100.0 % uptime
Today
Private Cloud - Atlanta, GA Operational
90 days ago
100.0 % uptime
Today
Private Cloud - Greenville, SC Operational
90 days ago
100.0 % uptime
Today
Private Cloud - Nashville, TN Operational
90 days ago
100.0 % uptime
Today
Private Cloud - Houston, TX Operational
90 days ago
100.0 % uptime
Today
Private Cloud - Phoenix, AZ Operational
90 days ago
100.0 % uptime
Today
BaaS ? Operational
BaaS with Veeam - Greenville, SC ? Operational
BaaS with Veeam - Nashville, TN ? Operational
BaaS with Veeam - Atlanta, GA ? Operational
BaaS with Veeam - Phoenix, AZ ? Operational
BaaS with Ransomware Protection Operational
BaaS with Ransomware Protection - West-1 Operational
BaaS with Ransomware Protection - East-1 Operational
Office 365 BaaS Operational
Office 365 BaaS - Atlanta, GA ? Operational
Security ? Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Past Incidents
Jan 22, 2022

No incidents reported today.

Jan 21, 2022
Completed - The scheduled maintenance has been completed.
Jan 21, 12:08 EST
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 21, 08:00 EST
Scheduled - Green Cloud has determined that additional maintenance is required to complete the Veeam 11a upgrade across our Veeam infrastructure. A new maintenance window will begin tomorrow morning at 8:00 am EST after overnight backup and replication jobs have completed. Individual backup or replication jobs processing during the maintenance window may show a maintenance message until the upgrades are complete. If you have any questions, please email support@greenclouddefense.com
Jan 20, 21:56 EST
Jan 20, 2022
Completed - The scheduled maintenance has been completed.
Jan 20, 17:00 EST
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 20, 08:00 EST
Update - We will be undergoing scheduled maintenance during this time.
Jan 14, 09:50 EST
Update - We will be undergoing scheduled maintenance during this time.
Jan 14, 09:48 EST
Scheduled - Green Cloud Defense has completed the change management testing Veeam 11a and will apply this update on Thursday, January 20th to Baas, Secure BaaS, IaaS Backup and DRaaS with Veeam services across our platform. Individual backup or replication jobs processing during the maintenance window may show a maintenance message until the upgrades are complete. If you have any questions, please email support@gogreencloud.com.
Jan 14, 09:48 EST
Jan 19, 2022

No incidents reported.

Jan 18, 2022
Completed - The scheduled maintenance has been completed.
Jan 18, 00:32 EST
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 18, 00:01 EST
Scheduled - On Tuesday, Jan 18th 2022, during our maintenance window starting at 12:00AM EST, Green Cloud Defense will be performing maintenance on infrastructure supporting our vCloud Director IaaS portal in our west-1(PHX) datacenter.

During the maintenance period, console access to VMs will be unavailable. Other management access to VMs will be available.

VMs will continue to run, and have no impact to network traffic during this maintenance.

Please contact support at support@greenclouddefense.com with any questions or concerns.
Jan 12, 13:16 EST
Jan 17, 2022

No incidents reported.

Jan 16, 2022

No incidents reported.

Jan 15, 2022

No incidents reported.

Jan 14, 2022

No incidents reported.

Jan 13, 2022

No incidents reported.

Jan 12, 2022

No incidents reported.

Jan 11, 2022

No incidents reported.

Jan 10, 2022

No incidents reported.

Jan 9, 2022

No incidents reported.

Jan 8, 2022

No incidents reported.