Changes for page R15 Docker - Single Lane
Last modified by Erik Bakker on 2025/06/30 09:51
From version 3.1
edited by eMagiz
on 2022/10/04 08:18
on 2022/10/04 08:18
Change comment:
There is no comment for this version
To version 30.1
edited by Erik Bakker
on 2025/04/07 10:12
on 2025/04/07 10:12
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -R 5-DockerAlllanes1 +R14 Docker - Single Lane - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki.e Magiz1 +XWiki.ebakker - Content
-
... ... @@ -1,12 +1,19 @@ 1 -Service affecting template to use the R 5Docker lane release (Singleand Double Lane).In order to update to this cloud template there isonly a singlestep required.1 +**Service affecting** template to use the R14 single lane release. 2 2 3 -This update changes the Carwash (See https://docs.emagiz.com/bin/view/Main/eMagiz%20Academy/Fundamentals/fundamental-emagiz-cloud-inner-workings). Note that using this new version of the Carwash involves a DNS change, and thus relies on clients honoring TTLs of DNS records. This update also changes the IP adresses used in the infrastructure. For more details, please contact Expert Services. Furthermore, TLSv1.0 is disabled in this update. Verify legacy software can handle atleast TLSv1.1 before updating. 3 +**Process** 4 +To use the new R14 template on your environment, we replace all your machines with new ones to activate the new configuration. This update is service affecting and aims to increase the stability of models running in Production. 4 4 5 - Updates6 - • Changedciphersandciphersuites7 - • DisabledTLSV1.0supportand enableTLS V1.3 support.6 +**Overview** 7 +* Stability improvements to your **Production** model. 8 +* More control on resource management 8 8 9 -Technical notes 10 -• Supported Ciphers in OpenSSL Format: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:DHE-RSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS@SECLEVEL=1 11 -• Supported TLS Versions: TLSv1.1, TLSv1.2 and TLSv1.3 10 +**Update Steps** 11 +* Use the final template (service affecting)(duration: 10 minutes) 12 +** This step will upgrade the machines in your cloud slot 13 +*** The network drive containing the Artemis queue store and your Elastic IPs will remain. 12 12 15 +* User actions after applying the final template: 16 +** Check if all runtimes are up via the runtime overview 17 +** Check if all runtimes have been installed according to the active release 18 +** Check if messages pass through the model by verifying a critical message flow in external systems 19 +