Virtual Server Hosting Services (Intelligent Infrastructure): Service Level Expectations

Last updated: September 17, 2014

Related policies

On this page:


1 General overview

University Information Technology Services (UITS) provides Virtual Server Hosting Services to the Indiana University campuses. This Service Level Expectation (SLE) is specific to the Virtual Server Hosting Services known as the Intelligent Infrastructure (II). Unlike co-location or other physical server hosting services, II is a service where a virtual server is leased and the customer is not required to make an initial capital investment in buying physical server and storage hardware.

This is an SLE between II customers and UITS. The scope of this document includes:

  • Services provided by UITS to II customers
  • Levels of response time, availability, and support associated with these services
  • Responsibilities of the UITS service provider and responsibilities of the customer
  • Processes for requesting services and getting support

This SLE covers the period from July 1, 2014 to June 30, 2015, and will be reviewed and revised at the end of this period.

OR

This SLE shall remain valid until revised or terminated.

1.1 Terms and definitions

  • Backup solutions: Optional service available for subscription that provides cross-site backups and cross-campus failover options, which isolate you from potential disasters by securing your backup data within hardened data centers
  • Business day: Normal working day in the time zone where Indiana Data Center facilities are located (Eastern Time Zone -5GMT and participates in Daylight Savings Time)
  • Customer: The party identified as the purchasing organization to this Agreement with UITS
  • Designated contacts: Customer-named contacts, technical resources, and fiscal account resources which are established, person-specific email addresses associated with the customer support contract. It is expected that these contacts will be updated upon any personnel or responsibility change by the Customer.
  • Intelligent Infrastructure (II): Virtual Server Hosting Services, where unlike "co-location" or other physical server hosting services, a virtual server is leased and the customer is not required to make an initial investment in buying capital equipment such as servers and storage hardware. On-call support coverage for service outages is 24 hours a day, 7 days a week, 365 days a year.
  • Problem resolution: The use of reasonable commercial efforts to resolve the reported problem. These methods may include (but are not limited to) configuration changes, patches that fix an issue, replacing failed hardware, reinstalling software, etc.
  • Respond: Addressing the initial request and taking ownership of the issue
  • Response time: The amount of time elapsed between the initial contact by the customer to UITS and the returned response to the customer by UITS staff
  • Service Level Expectation (SLE): The customer Service Level Expectation (SLE) that identifies the features and defines the processes involved with the delivery by UITS of various support functions to customers, as presented by this document's content
  • Service Request (SR): A single issue opened with UITS. The SR number identifies the Service Request. The format for the unique SR number can be as follows: SAV #nnnnnnn.

    Severity Definitions for Intelligent Infrastructure:

    • Severity 1 (Urgent):
      1. An error with a direct security impact on the service
      2. An error isolated to the Virtual System production environment that renders the Virtual System inoperative or causes the Virtual System to fail catastrophically; i.e., critical system impact, system down
      3. A reported defect in the production environment, which cannot be reasonably circumvented, in which there is an emergency condition that significantly restricts the use of the product to perform necessary business functions
      4. Inability to use the product or critical impact on operation requiring an immediate solution.
    • Severity 2 (High):
      1. An error isolated to the Virtual System that substantially degrades the performance of the service or materially restricts business; i.e., major system impact, temporary system hanging
      2. A reported defect in the Virtual System, which restricts the use of one or more features of the Virtual System to perform necessary business functions but does not completely restrict the use of the Virtual System
      3. Ability to use the Virtual System, but an important function is not available, and operations are severely impacted
    • Severity 3 (Medium):
      1. An error isolated to the Virtual System that causes only a moderate impact on the use of the service: i.e., moderate system impact, performance/operational impact
      2. A reported defect in the Virtual System that restricts the use of one or more features of the Virtual System to perform necessary business functions, while the defect can be easily circumvented
      3. An error that can cause some functional restrictions but does not have a critical or severe impact on operations
    • Severity 4 (Low):
      1. A reported anomaly in the Virtual System environment that does not substantially restrict the use of one or more features of the Virtual System to perform necessary business functions; a minor problem and not significant to operations
      2. An anomaly that may be easily circumvented or may need to be submitted to UITS as an enhancement request
  • UITS: University Information Technology Services, which is staffed by professional support personnel providing assistance with diagnosis and resolution of defects and/or failures in II services
  • Virtual System: The method to supply the infrastructure and network capacity necessary to host your applications, while optional disk storage on UITS enterprise-class SANs (Storage Area Networks) ensures your files are highly secure and available
  • VMware: The virtualization platform is built on a business-ready architecture and uses software such as VMware vSphere to transform or "virtualize" the hardware resources of an x86-based computer including the CPU, RAM, hard disk, and network controller to create a fully functional virtual system that can run its own operating system and applications just like a "physical" computer. Each virtual system contains a complete system, eliminating potential conflicts. VMware virtualization works by inserting a thin layer of software directly on the computer hardware or on a host operating system. This contains a virtual system monitor or "hypervisor" that allocates hardware resources dynamically and transparently. Multiple operating systems run concurrently on a single physical computer and share hardware resources with each other. By encapsulating an entire machine, including CPU, memory, operating system, and network devices, a virtual system is completely compatible with all standard x86 operating systems, applications, and device drivers. You can safely run several operating systems and applications at the same time on a single computer, with each having access to the resources it needs when it needs them.
  • Workaround: A change in the environment or data to avoid error without substantially impairing use of the II service

2 Service descriptions

2.1 Service scope

Services supporting virtual systems include virtualized CPU, RAM, hard disk, and network within a cluster of physical servers in one of the IU Data Centers, provisioning of the virtual server, operations support, monitoring, systems administration of the physical servers, network connectivity to the virtual server, customized firewalls on the physical servers, and (within IU Data Centers) network infrastructure and back-up services with off-site storage.

There are two principal components to the II service package:

  1. Virtual systems supply the infrastructure for compute, disk, and network capacity necessary to host applications. Disk storage on UITS enterprise-class SANs ensures files are highly secure and available.
  2. Backup solutions provide cross-site backups and cross-campus failover options, which are isolated from potential disasters by securing backup files within hardened IU Data Centers. Virtual system rentals include a disaster recovery off-site backup of your operating system disk. Data protection services are offered as a subscription-based model.

2.1.1 Service exclusions

Support does not include the following items or actions:

  1. Step-by-step assistance for installation of operating system or service packs
  2. On-site services
  3. Installation or configuration of applications hosted on virtual systems
  4. Modifications of software code, security-policy configuration, audits, or security design

UITS shall have no obligation to support:

  1. Problems caused by customer negligence, misuse, misapplication, or use of the product beyond the control of the UITS
  2. Unsupported operating systems:
    1. II-Enterprise-supported operating systems are specifically listed on the VMware Guest Operating System guide.
    2. System owners should only install and manage operating systems that are covered by security patches; i.e., while Windows 2000 is technically possible to install in VMware, based upon the end of life of the product, it should not be used for services.
  3. Products installed, intentionally or unintentionally, that result in nefarious activities
  4. Operating systems that are past their end-of-support date as listed by the operating system vendor

2.2 IU Data Centers IUB and IUPUI

IU has two hardened data centers, one each on the Bloomington and Indianapolis campuses. The Data Centers provide a safe and secure location for IT equipment. This includes the basic infrastructure of standardized cabinets and cabinet distribution units for power. Additionally, the Data Centers have uninterruptible power supplies (UPS), power distribution, and HVAC to provide year-round cooling and protect equipment from environmental hazards of dust, temperature, and humidity. Diesel generators will provide ongoing power in the event of a campus or Data Center power outage. Enhanced cabinet power distribution provides redundant circuits and remote monitoring of the power distribution. Physical security includes proximity card readers and biometric hand scanners for access authentication, ID cards, reinforced doors, security glass, and alarms. Fire suppression equipment is provided by a double inter-lock pre-action sprinkler system. Additionally, both facilities have UITS staff on site in the building 24 hours a day, 7 days a week.

2.3 Operating parameters

Trained operators provide support for the Data Center 24 hours a day, 7 days a week. Operations staff monitor vital data center and server information. Examples include: temperature, network connectivity, and server vitals as set up by the Systems Administrator. Problem coordination/management, notification, escalation, and reporting are done by the operations staff.

2.4 System level

Storage and Virtualization (SAV) Systems Administrators provision the CPU, RAM, hard disk, and network resources for the virtual servers in VMware. The virtual server creation and configuration provides the infrastructure for storage, network, security administration, and account management of the virtual server. Ongoing support includes monitoring, performance tuning, and software patches of the physical servers hosting the virtual server.

3 Roles and responsibilities

3.1 Customer obligations

Customer responsibilities and/or requirements include:

  • Staffing: All customer personnel contacting UITS for support must be fully trained on the operating system running in the virtual system.
  • Named designated contacts:
    • Customer-named contacts, technical resources, and fiscal account resources, which are established, person-specific email addresses associated with the customer support contract. It is expected that these contacts will be updated upon any personnel or responsibility change.
    • Customer Active Directory Services (ADS) group to be used for Virtual System resource assignment. The ADS group contents are managed by the customer, thereby providing the most control over resource access to the customer.
    • Customer group email distribution list to be used for notification of service-impacting events which involve that specific virtual server. The group email should be an IU address and membership should be managed by the customer, providing control to distribute the information to the desired user base.
  • Full responsibility for system administration: System administration falls into, but is not limited to, the following areas:
    • Installation and licensing of all operating system and application software
    • VMware Tools services:
      • VMware Tools software installation is required to maintain a supported infrastructure. Installation of VMware Tools is required for each virtual server. It is strongly recommended to include VMware Tools updates as part of normal operating system patch cycles. The VMware Tools version will be evaluated as part of any debugging endeavor. In the event that the Virtual System has a VMware Tools version that is not current, upgrading VMware Tools will be the first step in solving the problem.
    • Support and maintenance of all operating systems and application software, including the timely application of all patches and upgrades
    • Configuration of network address through Domain Name Services (DNS) administrators at UITS
    • Configuration of machine room firewall ports through Network administrators at UITS
    • Security measures, particularly the establishment of appropriate authentication and authorization processes, application of operating system and application security patches, and the performance and resolution of the University Information Security Office (UISO) scans. For general security information, see Information Security Best Practices.
    • Data management, as prescribed by university policies and state and federal laws and regulations in respect to protection of, access to, and confidentiality of institutional or personal data residing on or processed by the system
    • Liaison or manager who will provide operations staff with support escalation and contact information for system administration functions. Contact information for billing and operational inquiries.
    • Optional backup services are offered that provide cross-site backups and cross-campus failover options, which isolate potential disasters by securing backup data within hardened Data Centers. In the event the optional services are not utilized, data protection is solely the responsibility of the customer.
    • Active incident response plan as outlined by University Information Policy Office (UIPO)
    • Managing system logs for operating system and application-related troubleshooting
    • Regular scheduled auditing for abnormal events including intrusion detection
    • If production systems are deemed critical, test VMs should be installed and maintained. In the event a vulnerability is discovered, the test VM can be utilized to test the fix quickly and deploy it with confidence in the production environment.
    • In the event that critical data is stored within an II VM, the client is responsible for securing data approval from the appropriate Data Steward. The environment is managed to standards that allow for storage of critical data.
    • University Information Technology policy IT-12 requires that university organizational units manage technology resources securely.
    • A default layer of data protection is included as part of the storage subsystem supporting the II-E environment. All storage servicing the II-E environment leverages AES-256 encryption at rest as part of the base installation. The encryption at rest will address a significant concern related to IT-12 for data storage. Note that this addresses data at rest only. Data storage within a virtual machine still requires responsible administrative protection by the operating system administrator.

UISO reserves the right to audit the security of any system residing in its facilities through periodic security scans, per Policy IT-12: "Proactively seek out and apply vendor-supplied fixes necessary to repair security vulnerabilities, within a timeframe commensurate with the level of risk (i.e., within 24 hours for high-risk, with 48 hours for medium-risk, and within 72 hours for low-risk)".

If a system becomes compromised, UITS will immediately remove it from the network and notify the customer. The system will not be allowed back on the network until the customer has resolved the situation and UISO has certified the resolution.

3.1.1 Virtual Server System administration

  • At the physical host level, review logs, performance, system status, resource usage, and events that may result in security issues and identify any required performance tuning.
  • Maintain base hypervisor and network security. This includes hypervisor patching, firewall settings, and associated infrastructure components of the virtual hosts. If a secured base system is compromised via the application layer, the SAV System Administrator has the right to disconnect the machine from the network.

3.1.2 Charges (if applicable)

Customer billing for services will occur monthly.

3.1.3 Assumptions

  • Services are clearly documented on the II website.
  • Major II upgrades will be treated as a project outside the scope of this document.
  • Changes to services will be communicated and documented.

3.1.4 Hardware and infrastructure technology updates

  • The physical compute resources serving the II workload are hosted on high-end enterprise-class x86 hardware. The x86 hardware has an expected lifecycle replacement of approximately every 36 months. The replacement process may require the virtual system to be momentarily power cycled to complete the migration process. The migration process can be scheduled during normal customer maintenance activities at the convenience of the customer.
  • The storage supporting the II environment is hosted on high-end enterprise-class SAN. The SAN lifecycle replacement occurs between 48 and 60 months. The replacement process does require virtual systems to be interrupted.
  • Patch processing for the x86 hardware, hypervisor, and SAN occur concurrently and do not require virtual systems to be interrupted during updates.
  • UITS will provide adequate hardware for both x86 compute and storage required to support the customer workload.

3.1.5 Backup and removal of data

  • To reconstruct lost or altered customer files, data, or programs, customers must maintain a separate backup system or procedure that is not dependent on the software or hardware products under support.
  • Note: Optional backup services are offered that provide cross-site backups and cross-campus failover options, which isolate potential disasters by securing backup data within hardened Data Centers. The customer is responsible for backup contents; UITS is responsible for maintaining media services to host the backup content.
  • Prior to termination of services, customers must maintain a separate backup system or procedure that is not dependent on the software or hardware products under II services.
  • Upon termination of services, the virtual system and data will be securely erased in accordance with IU IT policies and procedures. All programs and data that were served via the II offering will no longer be accessible.

3.2 Service provider requirements

SAV System Administration responsibilities and/or requirements include:

3.2.1 Physical hardware - system administration

  • At the physical hardware level (hypervisor), review logs and performance counters to obtain system status required to identify and correct potential hardware problems.
  • Apply critical patches as recommended for the virtual environment.
  • Perform system tuning as needed to the physical server environment.
  • Assign space and manage permissions and security groups.
  • Coordinate with vendors for any maintenance or support requests.
  • Capacity planning for physical resources (physical servers, SAN storage)

3.2.2 Problem determination

  • Coordinate with the vendor for any required support.
  • Determine if the problem is hardware, software, or storage by reviewing the hypervisor/backup solution event logs.
  • If and when resource contention occurs due to a server host failure or over-allocation, production systems will have priority in resource allocation over test and development systems. The virtual server clusters have been designed to avoid resource contention; however, the potential exists.

3.2.3 Backups/storage of backups

  • Virtual server rentals include an off-site backup of the OS disk volume (scsi:0:0), provided the volume does not exceed 60 GB in size. Data volumes are excluded from this protection service. Any customer with an OS volume that exceeds 60 GB in size and data volumes is also excluded from this protection service. Customers may choose to opt out of this backup.
  • Virtual server rentals can subscribe to the optional data backup service: Commvault software is used for backups in conjunction with a virtual server rental. There is no additional license cost; however, additional charges apply for additional storage media consumed by the backup data. This service can also be used to protect virtual servers with OS disk volume (scsi:0:0) larger than 60 GB, with the caveat that all volumes would be in scope as this backup is for the entire virtual server data volumes.
  • Data backups will occur for all virtual servers that have opted to extend protection to cover the full server. A backup of the customer server is scheduled to run every night, 365 days a year. Commvault will store a total of 14 versions of each file, which will also include off-site copies of the data.
  • The customer is responsible for backup contents; UITS is responsible for maintaining media services to host the backup content.

3.2.4 Network Services

Provide and support physical and logical network infrastructure; act as a liaison to UITS Network Engineering for problem reports and incident handling.

4 Hours of coverage, support, response times, and escalation

4.1 Hours of system administration support

The Virtual System request queue for support requests is monitored Monday-Friday 8am-5pm, with the exception of university holidays.

4.2 Service requests

The process of requesting a new Virtual System involves submitting the New Virtual Machine Request form (click Request a virtual system on the II Virtual systems page). Change requests for existing virtual servers (e.g., RAM, CPU, disk changes) also must be submitted using the New Virtual Machine Request form.

In support of services outlined in this document, UITS will respond to service-related incidents and/or change requests submitted by the customer through Virtual System request.

Note:
DO NOT submit a service request for a Severity 1 issue via the web request form. For a Severity 1 case, contact UITS directly by telephone (812-855-9910), and request that a Severity 1 incident be opened with the SAV group related to II services. An incident number will be generated and sent to the customer via email. Provide and include any additional details that may be relevant to the case.

4.3 Service request priorities and response times

Priority Criteria Example Target response time*
Low- Severity 4
  1. Virtual System environment that does not substantially restrict the use of one or more features of the Virtual System to perform necessary business functions; this is a minor problem and is not significant to operations
  2. An anomaly that may be easily circumvented or may need to be submitted to UITS as an enhancement request
I would like to increase the disk space available to my Virtual System; how can I accomplish this task?
UITS and customer will provide resources during normal business hours for problem resolution.
Medium- Severity 3
  1. An error isolated to the Virtual System that causes only a moderate impact on the use of the service: i.e., moderate system impact, performance/operational impact
  2. A reported defect in the Virtual System that restricts the use of one or more features of the Virtual System to perform necessary business functions, while the defect can be easily circumvented
  3. An error that can cause some functional restrictions but does not have a critical or severe impact on operations.
Virtual System occasionally hangs on a device driver during reboot; retrying the reboot typically corrects the issue. Please help research a resolution.
UITS and the customer will commit full-time resources during normal business hours for problem resolution to obtain a workaround or reduce the severity of the error and alternative resources during normal business hours.

*Target response time is defined as the time between receipt of the call and the time that a Support Team member begins working on the problem. Due to the wide diversity of problems that can occur, and the methods needed to resolve them, response time IS NOT defined as the time between the receipt of a call and problem resolution. UITS does not guarantee the resolution of a problem within the times specified.

4.3.1 Normal incident processing

In the event that a customer accidentally or incorrectly assigns a request priority, UITS will correct the priority by utilizing the severity definitions. Communication with the customer will occur for any priority change.

Service providers supporting this service will prioritize incoming service incidents as normal priority unless the service incident fits one or more of the criteria listed in the major incident handling section of this document.

When an IT Request ticket is opened for a client via the web interface:

  • The Support Center will respond to the customer and process all new IT Request tickets within 8 business hours.
  • Low (Severity 4) priority incidents will be resolved within 30 days with a status provided every five days.
  • Medium (Severity 3) priority incidents will be resolved within five days with a daily status provided.

4.3.2 Major incident handling

UITS staff supporting this service will prioritize an incoming incident request as high priority if it meets any one of the following criteria:

  • Significant number of people affected
  • Organizational structure is a multiplier for number of people affected
  • Percentage of total tasks that can no longer be performed by individuals
  • Academic and Administrative Calendar deadlines
  • Significant impact on the delivery of instruction
  • Significant or lasting impact on student academic performance
  • Significant risk to law, rule, or policy compliance

Urgent (Severity 1) priority incidents will be resolved within eight business hours with a status provided every two hours.

High (Severity 2) priority incidents will be resolved within one day with a status provided every six hours.

The infrastructure is protected and supported by vendor support 7 days a week, 24 hours per day. If incidents are linked to vendor related components, an appropriate level support case will be opened with the vendor. The customer will be updated by SAV staff with case progress.

4.3.2.1 Service request priorities and response times

Priority Criteria Example Target response time*
High- Severity 2
  1. An error isolated to the Virtual System that substantially degrades the performance of the service or materially restricts business; i.e. major system impact, temporary system hanging
  2. A reported defect in the Virtual System which restricts the use of one or more features required to perform necessary business functions. While the error does not completely restrict the use of the Virtual System, operations are severely impacted.
The allocated memory is being consumed by my workload; please allocate additional resources during this peak processing time.
UITS and the customer must commit full-time resources during non-standard business hours for problem resolution, to obtain workaround, or reduce the severity of the error.
Urgent- Severity 1
  1. An error with a direct security impact on the service
  2. An error isolated to the Virtual System production environment that renders the Virtual System inoperative or causes the Virtual System to fail catastrophically; i.e., critical system impact, system down
  3. A reported defect in the production environment which cannot be reasonably circumvented, in which there is an emergency condition that significantly restricts the use of the product to perform necessary business functions
  4. Inability to use the product or critical impact on operation requiring an immediate solution
Email services are not functional; network is not available; classroom computing technology is not functioning pending a class
UITS and the customer must commit the necessary resources around the clock for problem resolution to obtain workaround or reduce the severity of the error. UITS will use commercially reasonable efforts to make II services available with a monthly uptime percentage of at least 99.9% during any monthly billing cycle.

*Target response time is defined as the time between receipt of the call and the time that a Support Team member begins working on the problem. Due to the wide diversity of problems that can occur and the methods needed to resolve them, response time IS NOT defined as the time between the receipt of a call and problem resolution. UITS does not guarantee the resolution of a problem within the times specified.

4.3.2.2 Major incident response times

Service provider Service hours and conditions
Backup contacted under what conditions
Escalation rules
Response time from notification
SAV 24/7
Virtual server environment performance degradation
Follow on-call contact list for off hours and normal senior management escalation
1 hour
Data Center Operations 24/7  
Follow on-call contact list for off hours and normal senior management escalation
5 minutes

4.4 Maintenance management

4.4.1 Service maintenance/change management

The II Virtual Server Hosting services adheres to the UITS Change Management process. Service providers for this service adhere to the UITS Maintenance Window Guidelines. Review the UITS Scheduled Maintenance windows.

All services and/or related components require regularly scheduled maintenance ("maintenance window") in order to meet established service levels. These activities may render systems and/or applications unavailable for normal user interaction.

Due to the technology available within the virtual infrastructure, a maintenance window is not reserved for II. Patches are implemented to the infrastructure in a rolling mode, which ensures Virtual Systems are available during the infrastructure maintenance. UITS will use commercially reasonable efforts to make II services available with a monthly uptime percentage of at least 99.9% of the time in a given month.

One exception is the virtual center service, which is not required for virtual system availability. The virtual center maintenance window is reserved weekly unless a different maintenance window is required because of risk or impact to the customer. The virtual center standard maintenance window is weekly from noon to 2pm on Wednesdays:

Time Sunday Monday Tuesday Wednesday Thursday Friday Saturday
Begin       12pm      
End       2pm      

4.4.2 General exceptions to the standard maintenance window

Exceptions Parameters Coverage
University holidays  
Unless emergency or 24/7 supported servers
Fiscal year close Last business day in June Unless emergency
Finals/grade weeks   Unless emergency

5 Reporting, reviewing, and auditing

IU Internal Audit performs periodic audits of the II services. This document should be reviewed a minimum of once per fiscal year. However, in lieu of a review during any period specified, the current document will remain in effect.

5.1 Term and termination

  • Term: Support shall be provided in annual terms and shall be renewable to then-current support plan when UITS is notified of customer's intent to renew the existing contract, or UITS is notified of customer's intent not to renew services.
    Note:
    Optional backup services are offered that provide cross-site backups and cross-campus failover options, which isolate potential disasters by securing backup data within hardened Data Centers. The customer is responsible for backup contents; UITS is responsible for maintaining media services to host the backup content.
  • Termination: Customer may terminate this service via submission of a support request. Services are billed in arrears based on actual usage; charges will be processed through month of service termination.

    Prior to termination of services, customers must maintain a separate backup system or procedure that is not dependent on the software or hardware products under II services.

    Upon termination of services, virtual system and data will be securely erased in accordance with IT policies and procedures. All programs and data that were served via the II offering will no longer be accessible.

5.2 Service Level Expectation (SLE)

SLE Update: This agreement and related UITS plan offering details are operational in nature and may be modified any time by UITS. UITS will communicate in advance proposed changes to customer. The customer may terminate the customer relationship without penalty if all parties cannot abide by the revisions. This agreement supersedes any previous service level expectation.

5.3 Miscellaneous

Force Majeure: Except for the obligation to pay monies due and owing, neither party shall be liable for any delay or failure in performance due to an event outside the defaulting party's reasonable control, including without limitation, acts of God, earthquakes, labor disputes, shortages of supplies, actions of governmental entities, riots, war, fire, epidemics, or other circumstances beyond its reasonable control. The obligations and rights of the excused party shall be extended on a day-to-day basis for the period equal to the period of the excusable delay.

This is document bdyo in the Knowledge Base.
Last modified on 2017-07-31 15:24:33.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.