On May 23, 2018, Lumen Cloud upgraded the Virtual Machine (VM) hardware version for all VMs in each of our public cloud service locations. This upgrade was released in order to apply guest-level protection from the Meltdown and Spectre security vulnerabilities.
Applying the update
In order for the update to take effect, all VMs in each Lumen Cloud service location will need to be issued a shut down command followed by a power on command. Customers may issue the "Shut Down" server power operation from the Control Portal or API, followed by the "On" server power operation to apply the update.
Alternatively, the shut down command can be initiated from a VM Operating System directly, followed by the "On" server power operation from the Control Portal or API. Issuing a "Reboot" server power operation or an Operating System-level reboot command will not cause the update to take effect, since the VM must be completely powered off. There is no minimum amount of time a VM needs to remain in a powered off state in order for the update to take effect.
For more information about Lumen Cloud server power operations, please review this guide.
Customers may also use the "Reset" or "Power Off" followed by "Power On" server power operations from the Lumen Cloud Control Portal or API to apply the update. These power operations force a VM to power off, similar to switching off the power on a physical computer. The "Reset" or "Power Off" server power operations should only be used in the event that a shut down command is unable to properly power off a VM.
Customers should not expect any change to the regular operation of their VMs after the update has been applied. This update will not make any Operating System or application-level changes.
Application of this update is not mandatory and there is no deadline for completion. Customers may initiate the shut down and power on commands at any time that is convenient.
While this update is not mandatory, Lumen Cloud recommends that this update is applied as soon as possible in order to benefit from guest-level protection against the Meltdown and Spectre security vulnerabilities. We also recommend that customers apply any Operating System or application-level patches that may be available to protect against these vulnerabilities.
Depending on the OS type, different steps may need to be taken to validate vulnerability mitigation.
For Windows, from a PowerShell session prompt customers can run
Install-Module SpeculationControl (requires PS 5+), then
Import-Module SpeculationControl, and then run the command
Get-SpeculationControlSettings. Some of the OS patches previously released do require customers activation via registry edits or via group policy. The command output should be green if/when compliant. (Instructions for Windows Server 2012 R2 might be slightly different; see the link below for more details).
For Linux, there is a shell script called spectre-meltdown-checker available via GitHub here.
For both of the above, see here for further details including screenshots.
Infrastructure-level patches to protect against the Meltdown and Spectre security vulnerabilities have already been applied across all Lumen Cloud service hosting infrastructure.
More information about the Meltdown and Spectre security vulnerabilities can be found here.
If you would like more information, please submit a ticket or contact our support team by e-mailing email@example.com.