Changes for page R15 Docker - Single Lane
Last modified by Erik Bakker on 2025/06/30 09:51
From version 1.1
edited by eMagiz
on 2022/10/04 08:16
on 2022/10/04 08:16
Change comment:
There is no comment for this version
To version 32.1
edited by Erik Bakker
on 2025/06/30 09:51
on 2025/06/30 09:51
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -R5 -Docker Singlelane1 +R15 Docker - Single Lane - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki.e Magiz1 +XWiki.ebakker - Content
-
... ... @@ -1,13 +1,16 @@ 1 -Service affecting template to use the R5 Dockersingle lane release.In order to update to this cloud template there is only a single step required.1 +**Service affecting** template to use the R15 single lane release. 2 2 3 -This update changes the Carwash (See https://docs.emagiz.com/bin/view/Main/eMagiz%20Academy/Fundamentals/fundamental-emagiz-cloud-inner-workings). Note that using this new version of the Carwash involves a DNS change, and thus relies on clients honoring TTLs of DNS records. This update also changes the IP adresses used in the infrastructure. For more details, please contact Expert Services. Furthermore, TLSv1.0 is disabled in this update. Verify legacy software can handle atleast TLSv1.1 before updating. 3 +**Process** 4 +To use the new R15 template on your environment, we replace all connections to activate the new configuration. This update is service affecting and aims to enable data traffic via our new carwash. 4 4 5 -Updates 6 -• Changed ciphers and cipher suites 7 -• Disabled TLS V1.0 support and enable TLS V1.3 support. 6 +**Overview** 7 +* New connections to a **new** carwash. 8 8 9 - Technicalnotes10 - • SupportedCiphersinOpenSSLFormat:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:DHE-RSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS@SECLEVEL=111 - • SupportedTLSVersions: TLSv1.1, TLSv1.2 and TLSv1.39 +**Update Steps** 10 +* Use the final template (service affecting)(duration: < 10 minutes) 11 +** This step will replace all connections. 12 12 13 - 13 +* User actions after applying the final template: 14 +** Check if all runtimes are up via the runtime overview or Deploy Architecture 15 +** Check if all runtimes have been installed according to the active release 16 +** Check if messages pass through the model by verifying a critical message flow in external systems