Changes for page R17 Docker - Single Lane
Last modified by Erik Bakker on 2025/10/23 08:46
From version 36.1
edited by Erik Bakker
on 2025/10/23 08:46
on 2025/10/23 08:46
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -R 17Docker- SingleLane1 +R5 - Docker All lanes - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki.e bakker1 +XWiki.eMagiz - Content
-
... ... @@ -1,15 +1,12 @@ 1 - **Non-service-affecting**finaltemplate to use the**R17**single lane release.1 +Service affecting template to use the R5 Docker lane release (Single and Double Lane). In order to update to this cloud template there is only a single step required. 2 2 3 -**Process** 4 -To use the new R17 release of our cloud template we upgrade in one step. This is a rolling update, making it non-service affecting. 3 +This update changes the Carwash (See https://docs.emagiz.com/bin/view/Main/eMagiz%20Academy/Fundamentals/fundamental-emagiz-cloud-inner-workings). Note that using this new version of the Carwash involves a DNS change, and thus relies on clients honoring TTLs of DNS records. This update also changes the IP adresses used in the infrastructure. For more details, please contact Expert Services. Furthermore, TLSv1.0 is disabled in this update. Verify legacy software can handle atleast TLSv1.1 before updating. 5 5 6 - **Overview**7 - * Non-service-affectingtemplate to upgradeto thelatest versionof theauthorizationserver. Applying this templateonly affectscustomers running on DSH EventStreaming.8 - * Updatetheversionof authorizationserveraspreparation forthe API-Gateway MAM migration.5 +Updates 6 +• Changed ciphers and cipher suites 7 +• Disabled TLS V1.0 support and enable TLS V1.3 support. 9 9 10 -**Update Steps** 11 -* Use the final R17 template (non-service affecting)(duration: < 5 minutes) 9 +Technical notes 10 +• Supported Ciphers in OpenSSL Format: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:DHE-RSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS@SECLEVEL=1 11 +• Supported TLS Versions: TLSv1.1, TLSv1.2 and TLSv1.3 12 12 13 -**Remarks** 14 - 15 -Deadline of December 14th, 2025