Changes for page R17 Docker - Single Lane
Last modified by Erik Bakker on 2025/10/23 08:46
From version 2.1
edited by eMagiz
on 2022/10/04 08:16
on 2022/10/04 08:16
Change comment:
There is no comment for this version
To version 33.1
edited by Erik Bakker
on 2025/10/09 10:12
on 2025/10/09 10:12
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -R 5-Docker Singlelane1 +R16 Docker - Single Lane - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki.e Magiz1 +XWiki.ebakker - Content
-
... ... @@ -1,12 +1,19 @@ 1 - Serviceaffecting template to use the R5Docker single lane release.In order to update to this cloud template there is only a single step required.1 +**Non-service-affecting** final template to use the *R16* double lane release. 2 2 3 -This update changes the Carwash (See https://docs.emagiz.com/bin/view/Main/eMagiz%20Academy/Fundamentals/fundamental-emagiz-cloud-inner-workings). Note that using this new version of the Carwash involves a DNS change, and thus relies on clients honoring TTLs of DNS records. This update also changes the IP adresses used in the infrastructure. For more details, please contact Expert Services. Furthermore, TLSv1.0 is disabled in this update. Verify legacy software can handle atleast TLSv1.1 before updating. 3 +**Process** 4 +To use the new R16 release of our cloud template we upgrade in one step. This step is non-service-affecting. 4 4 5 -Updates 6 -• Changed ciphers and cipher suites 7 -• Disabled TLS V1.0 support and enable TLS V1.3 support. 6 +**Overview** 7 +* Update versions of dependencies. 8 8 9 -Technical notes 10 -• Supported Ciphers in OpenSSL Format: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:DHE-RSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS@SECLEVEL=1 11 -• Supported TLS Versions: TLSv1.1, TLSv1.2 and TLSv1.3 9 +**Update Steps** 10 +* Use the final R*18* template (non-service affecting)(duration: < 5 minutes) 12 12 12 +* User actions after applying the final template: 13 +** Check if all runtimes are up via the runtime overview or Deploy Architecture 14 +** Check if all runtimes have been installed according to the active release 15 +** Check if messages pass through the bus by verifying a critical message flow in external systems 16 + 17 +**Remarks** 18 + 19 +Deadline of December 14th, 2025