Whitepaper 'FinOps and cost management for Kubernetes'
Please consider giving OptScale a Star on GitHub, it is 100% open source. It would increase its visibility to others and expedite product development. Thank you!
Webinar 'FinOps and cloud cost optimization for ML/AI workloads.' Register here →
Ebook 'From FinOps to proven cloud cost management & optimization strategies'
OptScale — FinOps
FinOps overview
Cost optimization:
AWS
MS Azure
Google Cloud
Alibaba Cloud
Kubernetes
OptScale — MLOps
ML/AI Profiling
ML/AI Optimization
Big Data Profiling
OPTSCALE PRICING
Acura — Cloud migration
Overview
Database replatforming
Migration to:
AWS
MS Azure
Google Cloud
Alibaba Cloud
VMWare
OpenStack
KVM
Public Cloud
Migration from:
On-premise
Acura — DR & cloud backup
Overview
Migration to:
AWS
MS Azure
Google Cloud
Alibaba Cloud
VMWare
OpenStack
KVM

Hystax announcement regarding 0-day vulnerability in Log4j

A high severity vulnerability (CVE-2021-44228) impacting multiple versions of the Apache Log4j 2 utility was disclosed publicly via the project’s GitHub on December 9, 2021. This vulnerability allows an attacker to exploit remote system and remote code execution if service logs incoming data using Log4j 2 versions 2.0 to 2.14.1.

Hystax team performed an analysis of the possible impact of the vulnerability on the users of Hystax Acura and Hystax OptScale.

Both OptScale and Acura don’t use Log4j in their own code. However, there is one third-party component that can be impacted there – ELK (Elasticsearch-Logstash-Kibana) stack. Elasticsearch team is openly working on the fix and providing mitigation workarounds here. While we are anticipating the updated version of ELK stack, please find mitigation scenarios for our products below.

Hystax Acura

Hystax Acura has integrated ELK (Elasticsearch-Logstash-Kibana) stack which serves for logging for remote replication agents, so potentially attackers can use the Logstash vulnerability to perform the attack.

To mitigate this, users should cover ingress port udp/12201 of Hystax Acura controller (or respective Load Balancer in case of HA deployment) by a whitelist of known source IP ranges where replication agents work.

Hystax team will reach our partners with the request to update their Acura deployment once we have the updated version of ELK stack ready.

Marketplace versions of Hystax Acura (on AWS, Azure, Alibaba and GCP) will also receive the updates.

Hystax OptScale

Hystax OptScale SaaS doesn’t have a public attack surface for this Log4j vulnerability. However, we’ve already patched the ELK component as recommended by the Elasticsearch team. 

Marketplace versions of Hystax OptScale will also receive the related updates.

Free cloud cost optimization. Lifetime

Please contact our support team at [email protected] if you have any questions.

Enter your email to be notified about new and relevant content.

Thank you for joining us!

We hope you'll find it usefull

You can unsubscribe from these communications at any time. Privacy Policy

News & Reports

FinOps and MLOps

A full description of OptScale as a FinOps and MLOps open source platform to optimize cloud workload performance and infrastructure cost. Cloud cost optimization, VM rightsizing, PaaS instrumentation, S3 duplicate finder, RI/SP usage, anomaly detection, + AI developer tools for optimal cloud utilization.

FinOps, cloud cost optimization and security

Discover our best practices: 

  • How to release Elastic IPs on Amazon EC2
  • Detect incorrectly stopped MS Azure VMs
  • Reduce your AWS bill by eliminating orphaned and unused disk snapshots
  • And much more deep insights

FinOps and cloud cost optimization for ML/AI workloads

Join our live demo on 7th 
May and discover how OptScale allows running ML/AI or any type of workload with optimal performance and infrastructure cost.