Spectre and Meltdown - We got your back

January 05, 2018 - 8 min read
Spectre and Meltdown - We got your back

If you've not been living in a cave these last days, the words Spectre and Meltdown should sound familiar to you. This weeks, two CPU chips design flaws have been revealed to the public leading to possible data theft across application in a same system and even across virtual machines in a virtualized environment through the host.

To work around this hardware flaw, softwares have to be updated. Almost everyone is impacted: desktops, laptops, servers, you should update your workstation, as we are upgrading our infrastructure.

Maintenance operations on the platform

Our infrastructure contains hardware servers used as hypervisors, and Linux guest virtual machines dispatched on the different hosts running your app and database containers. To cover the Meltdown and Spectre vulnerabilites, two maintenance operations have to be done from our side. The first one is to upgrade the hypervisors running the virtual machines to protect the infrastructure against cross-VM side-channel attacks. This operation has already been achieved by our underlying provider. Thanks to the live-migration feature of our hypervisors (VMware), it did not have any impact on your applications or addons availability, communication has been done through our status page.

The second required maintenance operation is to update the Linux kernel of the virtual machines in our infrastructure. This upgrade is required to protect the infrastructure against cross-process information leak. By its nature, this kernel upgrade is not achievable without rebooting each operating system.

As soon as Canonical will release its patched version of the Linux kernel, we'll start this second maintenance operation:

  • Application containers will be transparently migrated before a server is rebooted as the platform already does for self-healing operations or internal load balancing actions. This has no impact on applications availability.

  • Single-node database addons will experience a short downtime during the reboot of the server, and their initialization duration.

  • Multi-node databases addons will be restarted transparently, as only one of the nodes will be restarted at a given time, the cluster will remain available.

If you have any question concerning this maintenance operation, feel free to reach us through our support channels (in-app or email).

Performance Impact on the hosted applications and databases

The patchset added to the Linux kernel, named Kernel page-table isolation has a performance downside. Reseachers have observed a performance overhead of around 5% for most workload, and up to 30% in some more uncommon cases (application with intense memory usage).

Linux maintainers have decided to include KPTI in the mainline kernel first to protect against Spectre and Meltdown, then work will be done to improve performance and reduce the above-mentioned overhead. Our infrastructure will also be updated when this work will be released.

More about Spectre and Meltdown

If you wish to get more information about these security threats, here are interesting references about them:

Share the article
Yann Klis
Yann Klis
Yann Klis co-founded Scalingo. Scalingo's vision is to offer a european sovereign cloud housting platform for developers. Today Scalingo hosts thousands of web applications from customers located all over the world. Before that Yann founded Novelys a web studio specialised in Ruby on Rails technology.

Try Scalingo for free

30-day free trial / No credit card required / Hosted in Europe