General Cloud

Cloud

17 sections
55 source tickets

Last synthesized: 2026-02-13 02:46 | Model: gpt-5-mini
Table of Contents

1. Cloudinary folder visibility and permission issues across tenants/environments

5 tickets

2. Cloudinary account provisioning and feature (Portals) availability

12 tickets

3. Provisioning of cloud-hosted developer resources (Hugging Face Space, Supabase)

16 tickets

4. AWS SES SMTP authentication failures due to region/credentials mismatch

1 tickets

5. Virtual machine decommissioning and scheduled deletion

6 tickets

6. macOS OOBE not showing expected remote management (Jamf/PreStage) during setup

2 tickets

7. Accessing ZIP files shared via Google Drive and placing them on local Windows paths

1 tickets

8. Cloudflare outage causing access challenges and rate-limit errors

1 tickets

9. Admin restore of permanently deleted Google Drive file

1 tickets

10. Develop Cloud authorization error resolved by re-authentication and IU address correction

2 tickets

11. UiPath VMs C: drive full due to large .nuget folder causing throughput degradation

1 tickets

12. Transient VM unresponsive with no monitoring alert or log indications

1 tickets

13. Domain transfers between AWS Route53/registrar and another platform

1 tickets

14. Procurement request for SaaS via AWS Marketplace blocked by internal approval

2 tickets

15. Sharing very large macro-enabled files with external collaborators

1 tickets

16. CDN/Cloudflare cache preventing site content updates from appearing

1 tickets

17. Named disk preventing VM migration between Equinix datacenters

1 tickets

1. Cloudinary folder visibility and permission issues across tenants/environments
95% confidence
Problem Pattern

Users reported inability to see or access specific Cloudinary folders or subfolders (for example GLOBAL, INT, product- or unit-specific assets). Symptoms included folders or subfolders not listing, missing UI actions such as the "Replace" option, or access appearing in the wrong Cloudinary instance/tenant or product-environment selector (e.g., assets split across iugroup vs iubh). No explicit error codes were shown; visibility differences were driven by per-user permissions and incorrect tenant/product-environment assignments.

Solution

Support investigated and resolved tenant, product-environment, and per-user permission mismatches across Cloudinary instances. Actions that restored access included: identifying whether assets lived in the iugroup or iubh Cloudinary instance and re-granting access in the correct tenant/instance; sharing the exact requested folders with users; upgrading folder permissions to "can edit," which restored the Cloudinary UI "Replace" option; and coordinating with the CMS manager to confirm and grant access to named folders (for example GLOBAL). Where Storyblok or other tools referenced a specific Cloudinary instance, the instance linkage was verified and corrected so users saw the expected media-library assets.

2. Cloudinary account provisioning and feature (Portals) availability
91% confidence
Problem Pattern

Users were unable to access Cloudinary resources or features despite appearing in Okta or receiving invites. Symptoms included missing or non-provisioned accounts, HTTP 404 errors in browsers (e.g., Firefox), denied uploads, inability to access specific spaces or folders (examples: DACH, international, iu.org), no visibility to the Media Library or Analytics consoles (including video analytics), pending or ineffective invite acceptance, and SSO/Okta join conflicts caused by an existing standalone Cloudinary account tied to the user's email. Affected systems included Cloudinary accounts, Media Library, Analytics, and SSO/Okta.

Solution

Access problems were resolved by provisioning or enabling Okta-backed Cloudinary accounts and confirming SSO login. Support added users to the correct Okta/SSO groups and granted the requested space- or folder-level permissions (examples: DACH, international, iu.org, storyblok libraries) so users could upload and manage assets. Pending-invite cases were resolved by confirming invite acceptance and adding required library-group membership for space access. Role and permission updates were applied when feature visibility was restricted (for example, roles were changed to enable access to Cloudinary Analytics and video analytics). Administrative license seats were freed or activated when seat limits blocked provisioning, and approval workflows (Automation for Jira approver reviews) were used when required. In cases where an existing standalone Cloudinary account blocked joining the organization, support identified the conflict and required the user to remove the standalone account or engage Cloudinary Support before adding the user to the IU account; after that, the org-backed account was created and login details were provided. Some requests (for example, student accounts) were determined to be outside the supported entitlement and were closed as not supported. Investigation also confirmed the Cloudinary Portals capability was not enabled on some accounts; Portals was an add-on on certain Enterprise plans (Assets and Programmable Media) that required activation and pricing coordination through the Cloudinary Customer Success Manager.

3. Provisioning of cloud-hosted developer resources (Hugging Face Space, Supabase)
95% confidence
Problem Pattern

Requests to provision cloud-hosted development resources (hosted spaces, managed SaaS projects, or VMs) or to increase subscription/compute capacity. Symptoms included pending service-creation or access approvals in Software Catalogue/Automation-for-Jira; selection of compute tiers (micro/small/medium) or region/data-residency requests; role/access assignment requests (Admin/Owner/Write/User); and requests for specific OS/specs (Windows Server, Ubuntu/Tomcat). Users also reported blocked CI pipelines, exhausted build quotas, or slow/latency behaviour and asked for additional CPU/RAM or increased quotas; some affected services were owned by other internal teams and could not be changed by central IT.

Solution

Support provisioned requested cloud-hosted developer resources, processed subscription changes, and configured access roles across multiple platforms. Actions taken included: creating Hugging Face Spaces under the IU organization and delivering space URLs; creating numerous Supabase projects in IU teams on micro (commonly $10/month), small and medium compute tiers, fulfilling explicit data-residency requests (for example, projects placed in Germany), and recording GDPR data types where applicable. Support assigned Owner/Admin/Write/User roles and sent access invitations after approvals were recorded through Automation-for-Jira (approver records such as markus.traut@iu.org were tracked). Example project work included creating aia-lovable-template and aia-application-portal-dev (owner and admin assignments applied), provisioning aia-assisted-grading on a small plan, and rolling out MI_Changelog_Prod with German data residency. When requesters asked to connect external integrations or requested database credentials, projects were created and role assignments were applied as requested. Billing and cost tracking actions included associating resources with cost centers (for example CC13140) and purchasing subscriptions when required: an Xcode Cloud plan was purchased (100 hours, US$49.99/month) to restore pipeline capacity; a Meilisearch Pro SaaS subscription was approved and purchased (Pro plan ~US$300/month with included search/document quotas, priority support, 30-day analytics retention). Infrastructure provisioning included creating a Windows Server VM on Equinix Metal Managed to the requested specification (latest Windows Server, 4 vCPUs ≥2 GHz, 8 GB RAM, 50 GB disk) and assigning the final VM name. For performance or capacity requests affecting services not owned by central IT (for example a slow online-exams system), support identified the owning team and redirected the requester to the responsible internal unit (E-Assessment/Examinations office) rather than changing resources directly.

4. AWS SES SMTP authentication failures due to region/credentials mismatch
98% confidence
Problem Pattern

SMTP authentication attempts to AWS SES from applications (Python smtplib) returned authentication errors such as (535, 'Authentication Credentials Invalid') despite using provided credentials. SMTP endpoint region and SMTP user region did not match.

Solution

The SMTP user was created in the correct AWS SES region corresponding to the SES account (eu-central-1 rather than us-east-1), and the new credentials were stored in 1Password. Allowed sender addresses were configured for the account and a shared mailbox was created and access granted where required, resolving the SMTP authentication failures.

Source Tickets (1)
5. Virtual machine decommissioning and scheduled deletion
95% confidence
Problem Pattern

Requests to permanently remove unused cloud compute and storage resources across providers (VMs, dedicated servers, StorageBox). Reported symptoms included VMs powered off for extended periods, outdated or test instances, attached or legacy disks that blocked migrations or prevented vApp creation, residual services running on servers (e.g., Apache, MySQL), and storage contents requiring review. Stakeholder uncertainty or revocation of deletion requests frequently delayed or prevented removal.

Solution

Identified and decommissioned unused compute and storage resources across multiple providers. Powered-off, test, or otherwise unused VMs and dedicated servers were removed or reclassified according to stakeholder confirmation; when stakeholders revoked deletion, VMs were retained in their existing (powered-off) state. Disks that blocked operations were converted to lower-cost/compatible tiers or detached when necessary; in one Equinix Metal Managed case a disk-related blockage prevented vApp creation and the VM remained un-migrated after the blocking disk was addressed. For storage-specific resources (for example Hetzner StorageBox) and dedicated servers, contents were reviewed and final backups were taken and preserved; cancellations were scheduled for agreed dates and retention windows were applied where requested. Deletions were executed on scheduled dates and tickets were closed after the agreed retention/cancellation actions completed.

6. macOS OOBE not showing expected remote management (Jamf/PreStage) during setup
90% confidence
Problem Pattern

During macOS out‑of‑box experience (OOBE) the expected remote management/MDM enrollment option did not appear and the OOBE presented a "set up as a new device" choice instead, preventing continuation of the expected enrollment flow.

Solution

Support confirmed the device was present in Jamf PreStage (registration timing can affect OOBE behavior). The user proceeded by selecting the "Set up as a new device" option shown in the OOBE; the MacBook completed setup normally and enrolled as expected once registration and PreStage provisioning were in place.

Source Tickets (2)
7. Accessing ZIP files shared via Google Drive and placing them on local Windows paths
90% confidence
Problem Pattern

Users received Google Drive links to ZIP archives and could not open files inline from email; files required download to view and user requested placement into a specific local Windows folder.

Solution

Support had users download the ZIP from the Google Drive viewer (Download button), perform an antivirus scan on the downloaded archive, and extract or move the resulting folder to the specified local Windows path. This restored access to the contained documents on the user’s desktop environment.

Source Tickets (1)
8. Cloudflare outage causing access challenges and rate-limit errors
90% confidence
Problem Pattern

User-facing web access to ChatGPT (web + Playground) and other Cloudflare-protected services returned Cloudflare challenge pages and rate-limit messages such as "Allow challenges.cloudflare.com to proceed" and "We’ve seen far too many requests come from your IP address recently." The issue appeared suddenly, affected only the individual user’s sessions, and persisted across sites (including a private Yahoo account) despite local restarts. Symptoms included blocking/challenge interstitials rather than application-specific errors.

Solution

Root cause was identified as a widespread Cloudflare service outage that triggered challenge and rate-limit responses for the user’s IP. The support response communicated that the Cloudflare disruption caused the access blocks and that no local remediation was effective; normal access returned after Cloudflare’s service was restored.

Source Tickets (1)
9. Admin restore of permanently deleted Google Drive file
95% confidence
Problem Pattern

A user accidentally deleted a Google Sheets document and emptied their Google Drive trash, making the file unavailable via the user’s Drive UI. The deletion was not recoverable by the user and no Drive error codes were reported; the missing file was business-critical.

Solution

A Google Workspace administrator used the admin restore capability to recover the deleted spreadsheet and returned it to the user’s Drive, restoring access to the original file.

Source Tickets (1)
10. Develop Cloud authorization error resolved by re-authentication and IU address correction
90% confidence
Problem Pattern

Users could sign in but were unable to access cloud services after recent identity changes to their IU account (such as IU address reclamation, account data migration, or new device setup). Symptoms included permission/authorization errors in Develop Cloud (instance not selectable), and Google Cloud Platform login failures where self-service password reset was blocked following a private Google account that had been registered with the reclaimed IU email.

Solution

Access failures were resolved by addressing identity and authentication state. For Develop Cloud cases, access was restored after the user re-authenticated (signed out and signed back in) and the user’s IU address was corrected. For Google Cloud Platform cases where an IU email had been previously used for a private Google account and Google required migration to a private Gmail address after IU reclaimed the address, access was restored by an administrator-initiated password reset; the user then logged in with the new password and regained access to the GCP project.

Source Tickets (2)
11. UiPath VMs C: drive full due to large .nuget folder causing throughput degradation
80% confidence
Problem Pattern

UiPath VMs (IUZUGA1–3) experienced degraded document classification throughput and alerts indicating full system drives. C: on IUZUGA1 and IUZUGA2 remained nearly full with over 70 GB located in c:\users\omm-uipath-prod\.nuget, and service availability was impacted despite VM restarts.

Solution

All three VMs were restarted but the C: drive remained full on two VMs; investigation found >70 GB stored in c:\users\omm-uipath-prod\.nuget. The incident was escalated to the OMM service provider to clear the .nuget folder and to investigate the underlying cause of the recurring disk growth.

Source Tickets (1)
12. Transient VM unresponsive with no monitoring alert or log indications
80% confidence
Problem Pattern

A virtual machine became unresponsive without generating monitoring alerts or clear error entries in local logs, causing services to be moved to other hosts for continuity. The outage showed no explicit error codes or traceable cause in the VM logs or monitoring system, requiring manual recovery steps and vendor verification. Affected systems included the unresponsive VM and the failover hosts that received services.

Solution

Services were temporarily failed over to two alternative VMs to maintain continuity. An engineer restored the unresponsive VM (service/instance recovery) so it became reachable again, and the vendor confirmed the system state. Investigation of monitoring and VM logs produced no conclusive root cause entries before the restoration.

Source Tickets (1)
13. Domain transfers between AWS Route53/registrar and another platform
90% confidence
Problem Pattern

A request to transfer domain registrations from an AWS account (Route53/registrar) to an external hosting/management platform encountered normal transfer lifecycle states (one domain completed first, another in progress). No technical errors were reported; transfer status updates were the only observable indicators.

Solution

Infrastructure initiated and completed the registrar transfer process for both domains. The .de domain finished first and the .com domain completed subsequently; both domains became managed on the target platform and DNS configuration remained available in Route53 during/after the transfers.

Source Tickets (1)
14. Procurement request for SaaS via AWS Marketplace blocked by internal approval
75% confidence
Problem Pattern

Procurement requests for third-party SaaS (Marketplace or vendor-direct) stalled or failed to complete due to lack of internal commercial approval or sign-off. Requests frequently surfaced technical onboarding blockers such as failed account provisioning/automation requiring manual user additions, delayed SAML/SSO domain verification, and outstanding data-processing agreements or legal/privacy reviews. Affected systems included AWS Marketplace purchases and managed SaaS control planes (for example Astronomer replacing AWS MWAA).

Solution

Vendor pricing and discount options were obtained and vendor contacts engaged to negotiate terms. The request included a planned migration from AWS MWAA to Astronomer’s pay-as-you-go "Team" plan driven by MWAA limitations (outdated Airflow versions, delayed patches, weak SLAs). During procurement and onboarding, account provisioning automation failed and required manual user additions, SAML/SSO domain verification remained pending, and legal/privacy teams raised outstanding DPA questions. The procurement request remained pending sign-off from approvers and commercial review; purchase and deployment did not proceed while those approvals and legal items were unresolved.

Source Tickets (2)
15. Sharing very large macro-enabled files with external collaborators
95% confidence
Problem Pattern

Users needed a way to share very large files containing many macros with external collaborators outside the organization where email and standard collaboration tools were insufficient. Requirements included ease-of-use for internal users and minimal or no registration required for external recipients.

Solution

The IU SAFE Portal application was used: the requester authenticated with their Microsoft/Okta IU account and shared the large macro-containing files via the SAFE app, enabling external collaborators to receive access without typical email or Teams limitations.

Source Tickets (1)
16. CDN/Cloudflare cache preventing site content updates from appearing
95% confidence
Problem Pattern

Branding changes on a public site were not visible to users unless a cache-bypass query string was appended; site-level caches (WP Rocket, WP Engine) had been cleared but updates still did not appear, indicating a CDN-level cache was retaining old assets or pages.

Solution

All requesters cleared site-level caches they controlled, and then Cloudflare was used to purge the CDN cache for the affected path/assets (English site path). After the Cloudflare cache purge, the branding updates appeared without requiring query-string cache bypasses.

Source Tickets (1)
17. Named disk preventing VM migration between Equinix datacenters
90% confidence
Problem Pattern

A VM relocation between Equinix datacenters failed because a named (non-root) disk would not move. The migration stalled without a specific error code and the disk remained attached/immovable despite following the provider's manual migration procedure, preventing completion of the VM/datacenter move.

Solution

Support was escalated to Equinix after the provided manual migration steps did not resolve the issue. An Equinix engineer performed a manual disk move of the named disk on the provider side. Once the named disk was moved, the VM migration completed successfully and the ticket was closed.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X