Ascend

Globus downtime at 10:00 AM EDT on 11/02/2024

Globus services (including Auth, Transfer, Flows, Search, Timer, Compute, GlobusID, and Action Providers) will be unavailable for up to 1.5 hours beginning at 10:00 AM EDT on Saturday, November 2, 2024, due to planned maintenance. Transfers in progress at the start of the downtime will resume from the last checkpoint when services are restored. For more details, please visit: https://www.globus.org/blog/maintenance-downtime-for-database-upgrades-saturday-november-2-2024.

Change is Coming!

Later this fall, OSC will be introducing a major change to the current process clients use to get help. We will be rolling out a new web-based system for clients to manage and review open cases with the service desk. More information will be forthcoming over the next few months, so keep an eye out for messages on various OSC communication channels, as well as at https://www.osc.edu/service_portal_deployment .

System Downtime August 6 2024

A downtime for OSC HPC systems is scheduled from 7 a.m. to 9 p.m., Tuesday, August 6 2024. The downtime will affect the Pitzer, Owens and Ascend Clusters, web portals, and HPC file servers. There will be a short outage of the state-wide licenses; MyOSC (the client portal) will be available during the downtime. In preparation for the downtime, the batch scheduler will not start jobs that cannot be completed before 7 a.m., August 6. Jobs that are not started on clusters will be held until after the downtime and then started once the system is returned to production status.

Rolling reboot of Pitzer, Owens and Ascend, starting at 9am 06/06

A vulnerability, CVE-2024-27322, in the R programming language that affects the serialization and deserialization process in the R programming language prior to version 4.4.0 is discovered. This vulnerability can be exploited through R Data Serialization files or R packages, which are often shared between developers and data scientists. An attacker can create malicious RDS files or R packages containing embedded arbitrary R code that executes on the victim's target device upon interaction. R addresses the vulnerability starting from version 4.4.0.

Pages