RWTHjupyter
Mehr Informationen zu dem Service finden Sie in unserem Dokumentationsportal.
RWTHjupyter - Login malfunction
It is currently not possible to log in to RWTHjupyter.
Error message:
opensaml::FatalProfileException
The relevant department has been informed and is working on a solution.
Login not possible
RWTH Single Sign-On login ist not possible at the moment.
Existing sessions are not affected.
We are working on fixing the problem.
The problem has been solved.
Login via RWTH Single Sign-On not working
There are currently disruptions to RWTH Single Sign-On. After entering your login details, the screen loads and then an Internal Server Error appears. This affects all services that use the RWTH Single Sign-On login.
The specialist department has been informed and is working to resolve the issue.
The problem has been fixed.
Routing über neue XWiN-Router
During this period, the routing of the previous XWiN routers (Nexus 7700) will be switched to the new XWiN routers (Catalyst 9600). These routers are essential for RWTH's network connection. This changeover also requires the migration of the DFN connection, which is switched redundantly to Frankfurt and Hannover, and the RWTH firewall to the new systems.
There will be complete or partial outages of the external connection during the maintenance window. All RWTH services (e.g. VPN, email, RWTHonline, RWTHmoodle) will not be available during this period. The accessibility of services within the RWTH network will be temporarily unavailable due to limited DNS functionality.
Der Uplink nach Frankfurt wurde erfolgreich auf das neue System geschwenkt.
Umbau des Uplinks nach Hannover beginnt.
Uplink nach Hannover auf das neue System umgezogen.
BGP v4/v6 nach Frankfurt und Hannover sind nun über die neue Routern funktional.
Es stehen noch ein paar kleinere Nacharbeiten an.
Wartung ist abgeschlossen. Der Datenverkehr läuft nun vollständig über die neuen Router!
Problematik mit der Anbindung zur Physik identifiziert, Lösung erfolgt morgen früh.
Kurze SSO-Störung
This evening around 20:25 - 21:00 there was a performance low in the SSO service and was checked by the specialist department during this time. The problem has been solved and fast logins without waiting times are possible again.
Single sign-on and MFA mailfunction
At the moment, single sign-on and multi-factor authentication are sporadically disrupted. We are already working on a solution and ask for your patience.
Temporary Loss of Services Due to Defective Hardware
Due to problems with the load balancers (F5), the majority of services such as RWTHmoodle, RWTH Single Sign-On, RWTH E-Mail etc. and all services behind the RWTH Single Sign-On are disrupted.
A technician from the manufacturer has now also been called in to solve the problem.
The fault has been rectified. However, there may still be delays in delivery or receipt.
Interruption of the Login via RWTH Single Sign-On
Due to database maintenance, login to applications protected by RWTH Single Sign-On (e.g. RWTHonline, RWTHmoodle, Selfservice, SAP) will not be possible for a short time during the specified period.
Please log in to the application in which you would like to work during this period before the maintenance.
We assume that the interruption of the login will last about five minutes.
Short problems while using RWTH Single Sign-On
For a short period of time, there was an error while using RWTH Single Sign-On.
The problem has been solved.
Expired certificate
Due to the expired certificate for idm.rwth-aachen.de, no IdM applications and the applications that use RWTH Single Sign-On can be accessed.
We are working on a solution.
- An insecure connection message is displayed when calling up IdM applications.
- When calling up applications with access via RWTH Single Sign-On, a message about missing authorisations is displayed.
The certificate has been updated and the applications can be accessed again. Please delete the browser cache before accessing the pages again.
Hosts of RWTH Aachen University partly not accessible from networks of other providers
Due to DNS disruption, the name servers of various providers are currently not returning an IP address for hosts under *.rwth-aachen.de.
As a workaround, you can store alternative DNS servers in your connection settings, e.g. the Level3-Nameserver (4.2.2.2 and 4.2.2.1) or Comodo (8.26.56.26 und 8.20.247.20). It may also be possible to reach the RWTH VPN server, in which case please use VPN.
Instructions for configuring an alternative DNS server under Windows can be found via the following links:
https:
www.ionos.de/digitalguide/server/konfiguration/windows-11-dns-aendern/
https:
www.netzwelt.de/galerie/25894-dns-einstellungen-windows-10-11-aendern.html
You can also use VPN as an alternative. If you cannot reach the VPN server, you can adjust the host file under Windows according to the following instructions. This will allow you to reach the server vpn.rwth-aachen.de. To do this, the following entry must be added:
134.130.5.231 vpn.rwth-aachen.de
https:
www.windows-faq.de/2022/10/04/windows-11-hosts-datei-bearbeiten/
The hosts of RWTH Aachen University can now be reached again from outside the RWTH network.
Individual users may have experienced problems even after the fault was rectified on 25 August at 9 pm. On 26.8. at 9 a.m. all follow-up work was completed, so there should be no further problems.
vCenter Server
Aufgrund von Erneuerung der SSL Zertifikate wird der vCenter Server im genannten Zeitraum teilweise kurzzeitig nicht erreichbar sein.
Alle VMs laufen wie gewohnt weiter und die Erreichbarkeit der darauf laufenden Dienste wird NICHT durch diese Wartung beeinträchtigt werden. Lediglich die Funktionen des HTML5 Clients für das Management ihrer VMs werden nicht verfügbar sein, da Sie sich während der Wartung nicht am vCenter Server einloggen können.
Während der Wartung ist es zu Fehlern gekommen, sodass die Wartung verlängert werden muss.
---englisch version below---
Due to maintenance, some servers are currently unavailable.
There are temporary connection problems with some services.
Multifactor-Authentication for the RWTH Single Sign-On
Since July 2, 2024, the RWTH Single Sign-On (SSO) and the login of all SSO-connected services is protected with multifactor-authentication (MFA). In addition to an individual password, users must now enter a second factor when logging in. The second factor must be generated in Selfservice [1] via the Token Manager. Further information can be found on IT Center Help [2] and the IT Center Blog [3].
[1] http:
www.rwth-aachen.de/selfservice
[2] https:
help.itc.rwth-aachen.de/service/0f861f53818c44e9a5df6ea7b244dacd/article/b084004d1bcf40a3be00f456f3e4a543/
[3] https:
blog.rwth-aachen.de/itc/en/tag/mfa/
Login via RWTH Single Sign-On Partially Not Possible
Unfortunately, the login via the RWTH Single Sign-On and thus into the connected services is currently only successful in individual cases.
If you receive an error message, please try to log in again in about an hour.
People who are already successfully logged in are not affected by the disruption.
The servers are currently at full capacity. We therefore ask you to try to log in at a later time (approx. in one hour). We are working on a solution to the problem.
Through various measures, which have significantly increased the overall performance of the servers, the loading difficulties and login problems were resolved around 3 pm.
For the time being, the message remains as a note, as we continue to monitor the load on the system.
The login to the RWTH Single Sign-On is stabilized. For this reason, we are ending this notice.
RWTHjupyter not available
RWTHjupyter is not available at the moment:
Error message: Service unavailable.
We are working on a solution of the problem.
The problem has been solved.
Fehlersuche Teilstörung
In dieser Wartung werden wir versuchen die bisherige Teilstörung des Profile-Builders und weiterer Services in RWTHjupyter zu beheben.
In dieser Zeit steht RWTHjupyter nicht zur Verfügung.