<link href="/user/plugins/datatables/assets/datatables.min.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/markdown-notices/assets/notices.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/form/assets/form-styles.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/simplesearch/css/simplesearch.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/highlight/css/default.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/login/css/login.css" type="text/css" rel="stylesheet"> <link href="/user/themes/imagefactory/css/components.min.css" type="text/css" rel="stylesheet"> <link href="/user/themes/imagefactory/css/otc.css" type="text/css" rel="stylesheet"> <script src="/user/themes/imagefactory/js/jquery.min.js"></script> <script src="/user/plugins/datatables/assets/datatables.min.js"></script> <script src="/user/plugins/highlight/js/highlight.pack.js"></script> <script src="/user/themes/imagefactory/js/components.min.js"></script> <script src="/user/themes/imagefactory/js/totop.js"></script> <script> hljs.initHighlightingOnLoad(); </script>
Brand Claim Brand Claim
<h2>Linux</h2> <ul> <li> <p>discontinue Ubuntu 14.04</p> <p>OTC public image Standard_Ubuntu_14.04 will be discontinued 31st August 2020</p> <p>what does that mean then?</p> <ul> <li>public images will be no longer listed in OTC public image list <ul> <li>Standard_Ubuntu_14.04_latest</li> <li>Standard_Ubuntu_14.04_prev </li> </ul></li> <li>OTC internal package repositories preconfigured in Standard_Ubuntu_14.04_latest images will be available until 31st August 2021 <ul> <li>https://imagefactory.otc.t-systems.com/package-repositories</li> </ul></li> <li>existing ECS installed with one of these images can be reinstalled</li> <li>existing ECS installed with one of these images can be used to create a new ECS</li> <li>new ECS can be installed by using image id from existing ECS installed with one of these images</li> <li>continue using these images is without OTC support</li> </ul> <p>It is recommended to migrate existing ECS to Ubuntu 16.04/18.04.</p> </li> <li> <p>Red Hat Enterprise Linux 6.10 </p> <ul> <li>Updated to new kernel version 2.6.32-754.29.2.el6.x86_64</li> <li>Further updated packages <ul> <li>kernel-firmware-2.6.32-754.29.2.el6.noarch</li> <li>tzdata-2020a-1.el6.noarch </li> </ul></li> </ul> </li> <li> <p>Red Hat Enterprise Linux 7.8 released and certified</p> <ul> <li><a href="https://access.redhat.com/ecosystem/cloud-provider/2774571">Red Hat certification list</a> </li> </ul> </li> <li> <p>EulerOS-2.5 </p> <ul> <li>Updated packages <ul> <li>ansible-2.9.9-2.el7.noarch</li> <li>ixgbevf453-4.5.3-1.3.x86_64</li> <li>kmod-ixgbevf453-4.5.3-1.3.x86_64</li> <li>kmod-scsi_ep_front-2.2.50-1.2.x86_64</li> <li>openssl-1.0.2k-16.h10.eulerosv2r7.x86_64</li> <li>python2-cffi-1.5.2-1.el7.x86_64</li> <li>python2-cryptography-1.7.2-1.1.eulerosv2r7.x86_64</li> <li>python2-idna-2.5-1.el7.noarch</li> <li>python2-pyasn1-0.1.9-7.eulerosv2r7.noarch</li> <li>python-enum34-1.0.4-1.eulerosv2r7.noarch</li> <li>python-paramiko-2.1.1-4.h2.eulerosv2r7.noarch</li> <li>python-ply-3.4-11.eulerosv2r7.noarch</li> <li>python-pycparser-2.14-1.eulerosv2r7.noarch</li> <li>sshpass-1.05-5.el7.x86_64 </li> </ul></li> </ul> </li> <li> <p>Obsolete garloff repositories will no longer be mirrored for Debian and Ubuntu<br /> (please see below on how to migrate to the Cloud OTC Tools repository)</p> </li> </ul> <h2>How to enable the Cloud OTC Tools packages on Debian based systems</h2> <h3>Cleanup home garloff</h3> <p>Older ECS installations may still have the home garloff repository configured.<br /> Since this repository is obsolete and replaced by Cloud OTC Tools, it is strongly recommended to remove any remains of this repository from <em>/etc/apt/sources.list</em> and <em>/etc/apt/sources.list.d/</em>.</p> <h3>Configure repository URL</h3> <p>Please have a look at <a href="http://download.opensuse.org/repositories/Cloud:/OTC:/Tools/">http://download.opensuse.org/repositories/Cloud:/OTC:/Tools/</a> or our local mirror <a href="http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/">http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/</a> to find the correct URL for your distribution and version.<br /> Hint: You can also use a command line browser like w3m to do this.</p> <p>For example the repository URL for Debian 10 is <a href="http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/">http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/</a>.</p> <p>To configure the repository on your system create the file <em>/etc/apt/sources.list.d/cloud-otc.list</em> with the following contents (this example demonstrates Debian 10):</p> <pre><code># otc-tools deb [arch=amd64] http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/ /</code></pre> <h3>Install the apt key</h3> <p>If you would run apt update now, you would get a error message like: "The repository 'http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10 Release' is not signed."<br /> To fix this the apt key for the Cloud OTC Tools repository needs to be installed.</p> <p>For this the apt cache needs to be updated ignoring the missing key:</p> <pre><code>$ apt -o Acquire::AllowInsecureRepositories=true update</code></pre> <p>Then the cloud-otc-keyring package can be installed:</p> <pre><code>$ apt install --allow-unauthenticated cloud-otc-keyring</code></pre> <p>Now you run apt update, again. It should not show any errors anymore. The repository is now ready and can be used to install and upgrade packages. </p> <h2>Windows</h2> <ul> <li> <p>updated Microsoft Windws Server Images with current Microsoft Windows Server Patches of May 2020 (13th) </p> <ul> <li>Windows Server 2012 R2 <ul> <li>2020-05 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4556798)</li> <li>2020-05 Update for Windows Server 2012 R2 for x64-based Systems (KB4557900) </li> <li>2020-05 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Server 2012 R2 for x64 (KB4556405)</li> <li>2020-05 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4556846) </li> <li>2020-05 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4556853) </li> </ul></li> <li>Windows Server 2016 <ul> <li>2020-05 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4556813) </li> </ul></li> <li>Windows Server 2019 <ul> <li>2020-05 Cumulative Update for Windows Server 2019 for x64-based Systems (KB4551853) </li> <li>2020-05 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 for x64 (KB4556441) </li> </ul></li> </ul> </li> <li> <p>Driver and tools of all Windows Server types</p> <ul> <li>Cloudbase-Init: 0.9.12.dev86</li> <li>XEN GPL driver: 5.0.136.10</li> <li>KVM UVP Vmtools: 2.5.0.156</li> <li>Intel(R) Network Connections Software Version 25.0, January 2, 2020</li> <li>NVIDIA vGPU driver: 370.41 (fixes CVE‑2019‑5698)</li> <li>NVIDIA pGPU driver:442.50 (fixes CVE‑2020‑5957 CVE‑2020‑5958)</li> <li>NVIDIA V100 / T4 driver: 426.52 (fixes CVE‑2020‑5661)</li> </ul> </li> </ul>