Release-3447: stricter fail2ban rules on rss notifystock
We tightened our fail2ban rules for rss/notifystock bruteforce attempts to ban 24 hours instead of previously 2 hours. Additionally we enabled the automatic recovery for all nodes now, along with a minor improvement in the auto recover logic.
Read moreRelease-3428: Stop HHVM on all A-L Hypernodes which are not using it
For all Hypernodes with the first letter A-L we’ve stopped HHVM unless it was used. On the remaining Hypernodes (M-Z), we stopped HHVM already in an the earlier release. HHVM is deprecated in favor for PHP7. In order to save memory we’ve stopped HHVM on all nodes which were not using it to reclaim memory….
Read moreRelease-3421: Stop HHVM on all M-Z Hypernodes which are not using it
For all Hypernodes with the first letter M-Z we’ve stopped HHVM unless it was used. The remaining Hypernodes (A-L) will also receive this feature in due time. HHVM is deprecated in favor for PHP7. In order to save memory we’ve stopped HHVM on all nodes which were not using it to reclaim memory. New Hypernodes…
Read moreRelease-3411: Automatic recovery
For all Hypernodes, whose first letter begins with M-Z, we’ve enabled a new automatic recovery feature today. All Hypernodes starting with letters A-L will receive this feature as well in due time. Should a Hypernode become unreachable or unresponsive, our automation will attempt to resolve the problem before alerting one of our technicians. The automation…
Read moreRelease-3405: new hypernode-importer features, tweaks in memory management
Today we deployed some changes to the hypernode-importer which might end up saving you some time when migrating a Magento shop to a Hypernode or a local hypernode-vagrant development environment. The –set-maintenance-on-source flag This new option for the hypernode-importer enables you to automatically put the Magento installation you are importing from in maintenance mode before…
Read moreRelease-3377: Remove HHVM for new Hypernodes
As of now newly ordered Hypernodes will not have HHVM available anymore. Support can re-enable HHVM for you, should it really be necessary. We recommend everyone to use PHP7 instead. It delivers an even better performance boost and is better maintained by the community.
Read moreRelease-3359: NGINX config reloader no longer allows absolute includes
We’ve updated the NGINX config reloader to not allow absolute includes. Absolute includes worked against the NGINX config reloader. The purpose of the config reloader is to ensure that the live config is syntactically correct and working, having an outside dependency (include) that can change the running live config can cause NGINX to no longer come up. Specifically the following includes are…
Read moreRelease-3359: Let’s Encrypt Firefox fix
We’ve improved the let’s encrypt implementation. Firefox now accepts the certificates as expected.
Read moreRelease-3331: Increased server_names_hash_bucket_size and more
In this release we made a couple of minor changes to our configurations on Hypernode. Increased the server_names_hash_bucket_size to 128 The server_names_hash_bucket_size NGINX config value was increased from 64 to 128 as it was causing issues with longer domain names. For example previously trying to generate an SSL configuration for domains of a certain length…
Read moreRelease-3331: Fix multiple domains in user generated SSL configs and changes to WAF
Yesterday we started rolling out a pre-configured Let’s Encrypt automatic renewal and configuration mechanism based on dehydrated. We noticed a bug in our SSL config generation script that made it impossible to load certificates for more than one domain. This has been fixed now. If you ran in to this problem you can re-run dehydrated…
Read moreRelease-3323: Let’s Encrypt support [BETA]
In this release we started rolling out compatibility with Let’s Encrypt auto-renewal. Previously it was already possible to use Let’s Encrypt certificates on Hypernode by uploading them to the service panel, but the real beauty of Let’s Encrypt is in it’s short lived certificates which can be automatically updated. Requesting a Let’s Encrypt certificate on…
Read moreRelease-3318: patch OpenSSL CVE-2016-6304, notify out of memory killed on SSH login
The last couple of weeks we have been mostly focused on improving our back-end logic for dealing with external API failures and implementing extra tests for our automation. However there were some things we did that might be interesting to hear about for Hypernode users so here is a short summary. OpenSSL CVE-2016-6304 Early last…
Read moreRelease-3294: new magerun commands, prepare for Let’s Encrypt
This release contains an update of the wildly popular Hypernode & Elgentos n98-magerun modules. Import change: all Hypernode commands can now be found in the hypernode:* namespace (see a list here). Also, we have released software to support Let’s Encrypt in an upcoming release shortly.
Read moreRelease-3285: updated Blackfire and GeoIP database, and added GeoIP city
We updated the Blackfire PHP5 probes to the latest versions (agent 1.7.4, PHP probe 1.12.0) We updated the GeoIP* database to the latest version which comes with Ubuntu 16.04 We included the GeoIP city database into NGINX. The city fields are now available in the PHP $_SERVER environment variable. Fixed a problem where backups were…
Read moreRelease-3274: NGINX upgrade for all remaining nodes
Today all Hypernodes starting with N-Z and 0-9 will be upgraded to a newer NGINX version. Additionally we made some changes to our Web Application Firewall (WAF). If you notice something out of the usual or think this new configuration is somehow clashing with your NGINX configuration, please contact us.
Read moreRelease-3272: PHP 7 update to version 7.0.10
We’ve deployed the latest PHP 7.0 to all nodes running PHP 7.0. This is PHP 7.0.10, that contains a couple minor security fixes. Please find the changelog here: http://www.php.net/ChangeLog-7.php#7.0.10
Read moreRelease-3270: NGINX upgrade, hypernode-importer can use a jumphost
Today all Hypernodes starting with the letters A-M will be upgraded to a newer NGINX version. Additionally we made some changes to our Web Application Firewall (WAF). If you notice something out of the usual or think this new configuration is somehow clashing with your NGINX configuration, please contact us. Also we upgraded the globally…
Read moreRelease-3237: hypernode-importer can import ZIPs and SQL dumps
This release contains a couple of new hypernode-importer features that have been used by our onboarding team for a while already and today they have been added to the help menu so they can be used by all Hypernode users. Importing the webroot from the filesystem instead of the remote host This flag enables you…
Read moreRelease-3229: per IP PHP worker limit for all (remaining) nodes
The per IP dynamic worker limit is now enabled for all nodes starting with N-Z and 0-9. Any IP address who is using too many PHP workers (already) will receive a 429 error code on their next request. Documentation on how to whitelist IPs or disable this feature can be found in our support documentation.
Read moreRelease-3204: installed Node.js, Compass and Sass
We installed Compass and Sass, a CSS pre-compiler that provides organizable, reusable CSS. This tool received 18 votes on our Uservoice. Please let us know if you have any issues with the versions we’ve provided, as they come from the default 12.04 repositories. Also, we installed Node.js (version 0.10.37) by default on all Hypernodes. No need to install…
Read moreRelease-3200: increase FastCGI buffers and dynamic IP limit overrideable
In this release we increased the FastCGI buffers by default, because in some corner cases customers had to increase these themselves. Next to that we changed the implementation of the dynamic request limit per IP in such a way that it can be overridden in the Nginx config. Documentation about this will follow.
Read moreRelease-3179: Enable slot limiting for nodes with the letter A-M and disable MySQL binlog
All nodes starting with the letter A-M, will have the slot limiting enabled as described here. We’ve disabled the MySQL bin logs, since we do not do any replication. This avoids unneeded overhead.
Read moreRelease-3168: New n98-magerun commands for Varnish and more
We released a few minor changes and improvements to the platform: We’ve added two new Magerun commands for Varnish: turpentine turpentine:config:save Save and apply Turpentine’s VCL configuration to Varnish turpentine:varnish:flush Flushes all cached varnish URL’s. We’ve installed ‘zip’. Allow files from within /.well-known/ folder as per RFC5785. It’s used for discovery of policy or other…
Read moreRelease-3150 (update): WebForms Pro 2 vulnerability – deny PHP files in upload directory
A vulnerability was discovered in the Magento module WebForms Pro 2. We’ve added a security filter to deny PHP files to be executed from within the upload directory of the module WebForms Pro 2. All requests looking like /js/webforms/upload/*.php will be denied. All users of the module WebForms Pro 2 should immediately update to the…
Read more