Changes for page R11 Docker - Single Lane
Last modified by Carlijn Kokkeler on 2023/11/21 11:47
From version 11.1
edited by Erik Bakker
on 2023/03/03 11:24
on 2023/03/03 11:24
Change comment:
There is no comment for this version
To version 12.1
edited by Erik Bakker
on 2023/03/03 11:25
on 2023/03/03 11:25
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -2,7 +2,7 @@ 2 2 Process: To use the new R6 release of our cloud template we upgrade in one steps, the update is non service affecting. 3 3 4 4 **Overview** 5 -This update changes the C arwash - forcontexton thecarwashsee [[this link>>doc:Main.eMagizAcademy.Fundamentals.fundamental-emagiz-cloud-inner-workings||target="blank"]]. Note that using this new versionofthe Carwash involvesaDNS change, andthus relies onclientshonoring TTLsof DNS records. This update alsochanges the IP adressesused inheinfrastructure.Formoredetails,please contact ExpertServices. Furthermore, TLSv1.0 is disabled inthisupdate. Verify legacysoftware can handle atleast TLSv1.1 before updating.5 +This update changes the Cloud port check, coordination faled and clean store functionality on our 3rd generation runtimes. 6 6 7 7 **Updates** 8 8 * Cloud Port check: When the software does not expose the right ports, it will be restarted ... ... @@ -9,8 +9,9 @@ 9 9 * Coordnation failed: When the runtimes failes to startup due to a corrupted startup order, the runtime will restart freshly to remove the corrupted state. 10 10 * Clean store: The functionality to clean a store is added for generation 3 runtimes. See [[this link>>doc:Main.eMagiz Academy.Microlearnings.Expert Level.eMagiz Cloud Management.expert-emagiz-cloud-management-clean-store||target="blank"]] 11 11 12 - 13 -**Technical notes** 14 -• Supported Ciphers in OpenSSL Format: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:DHE-RSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS@SECLEVEL=1 15 -• Supported TLS Versions: TLSv1.1, TLSv1.2 and TLSv1.3 16 - 12 +**Update Steps** 13 +* Use the final R6 template (non service affecting) (duration: 4 minutes) 14 +* User actions after applying the final template: 15 +** Check if all runtimes are reachable by the runtime dashboard. 16 +** Check if all flows have been installed according to the active release. 17 +** Check if messages pass through the bus by verifying a critical message flow in external systems.