<h2>Linux</h2>
<ul>
<li>
<p>discontinue Ubuntu 14.04</p>
<p>OTC public image Standard_Ubuntu_14.04 will be discontinued 31st August 2020</p>
<p>what does that mean then?</p>
<ul>
<li>public images will be no longer listed in OTC public image list
<ul>
<li>Standard_Ubuntu_14.04_latest</li>
<li>Standard_Ubuntu_14.04_prev </li>
</ul></li>
<li>OTC internal package repositories preconfigured in Standard_Ubuntu_14.04_latest images will be available until 31st August 2021
<ul>
<li>https://imagefactory.otc.t-systems.com/package-repositories</li>
</ul></li>
<li>existing ECS installed with one of these images can be reinstalled</li>
<li>existing ECS installed with one of these images can be used to create a new ECS</li>
<li>new ECS can be installed by using image id from existing ECS installed with one of these images</li>
<li>continue using these images is without OTC support</li>
</ul>
<p>It is recommended to migrate existing ECS to Ubuntu 16.04/18.04.</p>
</li>
<li>
<p>Red Hat Enterprise Linux 6.10 </p>
<ul>
<li>Updated to new kernel version 2.6.32-754.29.2.el6.x86_64</li>
<li>Further updated packages
<ul>
<li>kernel-firmware-2.6.32-754.29.2.el6.noarch</li>
<li>tzdata-2020a-1.el6.noarch </li>
</ul></li>
</ul>
</li>
<li>
<p>Red Hat Enterprise Linux 7.8 released and certified</p>
<ul>
<li><a href="https://access.redhat.com/ecosystem/cloud-provider/2774571">Red Hat certification list</a> </li>
</ul>
</li>
<li>
<p>EulerOS-2.5 </p>
<ul>
<li>Updated packages
<ul>
<li>ansible-2.9.9-2.el7.noarch</li>
<li>ixgbevf453-4.5.3-1.3.x86_64</li>
<li>kmod-ixgbevf453-4.5.3-1.3.x86_64</li>
<li>kmod-scsi_ep_front-2.2.50-1.2.x86_64</li>
<li>openssl-1.0.2k-16.h10.eulerosv2r7.x86_64</li>
<li>python2-cffi-1.5.2-1.el7.x86_64</li>
<li>python2-cryptography-1.7.2-1.1.eulerosv2r7.x86_64</li>
<li>python2-idna-2.5-1.el7.noarch</li>
<li>python2-pyasn1-0.1.9-7.eulerosv2r7.noarch</li>
<li>python-enum34-1.0.4-1.eulerosv2r7.noarch</li>
<li>python-paramiko-2.1.1-4.h2.eulerosv2r7.noarch</li>
<li>python-ply-3.4-11.eulerosv2r7.noarch</li>
<li>python-pycparser-2.14-1.eulerosv2r7.noarch</li>
<li>sshpass-1.05-5.el7.x86_64 </li>
</ul></li>
</ul>
</li>
<li>
<p>Obsolete garloff repositories will no longer be mirrored for Debian and Ubuntu<br />
(please see below on how to migrate to the Cloud OTC Tools repository)</p>
</li>
</ul>
<h2>How to enable the Cloud OTC Tools packages on Debian based systems</h2>
<h3>Cleanup home garloff</h3>
<p>Older ECS installations may still have the home garloff repository configured.<br />
Since this repository is obsolete and replaced by Cloud OTC Tools, it is strongly recommended to remove any remains of this repository from <em>/etc/apt/sources.list</em> and <em>/etc/apt/sources.list.d/</em>.</p>
<h3>Configure repository URL</h3>
<p>Please have a look at <a href="http://download.opensuse.org/repositories/Cloud:/OTC:/Tools/">http://download.opensuse.org/repositories/Cloud:/OTC:/Tools/</a> or our local mirror <a href="http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/">http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/</a> to find the correct URL for your distribution and version.<br />
Hint: You can also use a command line browser like w3m to do this.</p>
<p>For example the repository URL for Debian 10 is <a href="http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/">http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/</a>.</p>
<p>To configure the repository on your system create the file <em>/etc/apt/sources.list.d/cloud-otc.list</em> with the following contents (this example demonstrates Debian 10):</p>
<pre><code># otc-tools
deb [arch=amd64] http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/ /</code></pre>
<h3>Install the apt key</h3>
<p>If you would run apt update now, you would get a error message like: "The repository 'http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10 Release' is not signed."<br />
To fix this the apt key for the Cloud OTC Tools repository needs to be installed.</p>
<p>For this the apt cache needs to be updated ignoring the missing key:</p>
<pre><code>$ apt -o Acquire::AllowInsecureRepositories=true update</code></pre>
<p>Then the cloud-otc-keyring package can be installed:</p>
<pre><code>$ apt install --allow-unauthenticated cloud-otc-keyring</code></pre>
<p>Now you run apt update, again. It should not show any errors anymore. The repository is now ready and can be used to install and upgrade packages. </p>
<h2>Windows</h2>
<ul>
<li>
<p>updated Microsoft Windws Server Images with current Microsoft Windows Server Patches of May 2020 (13th) </p>
<ul>
<li>Windows Server 2012 R2
<ul>
<li>2020-05 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4556798)</li>
<li>2020-05 Update for Windows Server 2012 R2 for x64-based Systems (KB4557900) </li>
<li>2020-05 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Server 2012 R2 for x64 (KB4556405)</li>
<li>2020-05 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4556846) </li>
<li>2020-05 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4556853) </li>
</ul></li>
<li>Windows Server 2016
<ul>
<li>2020-05 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4556813) </li>
</ul></li>
<li>Windows Server 2019
<ul>
<li>2020-05 Cumulative Update for Windows Server 2019 for x64-based Systems (KB4551853) </li>
<li>2020-05 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 for x64 (KB4556441) </li>
</ul></li>
</ul>
</li>
<li>
<p>Driver and tools of all Windows Server types</p>
<ul>
<li>Cloudbase-Init: 0.9.12.dev86</li>
<li>XEN GPL driver: 5.0.136.10</li>
<li>KVM UVP Vmtools: 2.5.0.156</li>
<li>Intel(R) Network Connections Software Version 25.0, January 2, 2020</li>
<li>NVIDIA vGPU driver: 370.41 (fixes CVE‑2019‑5698)</li>
<li>NVIDIA pGPU driver:442.50 (fixes CVE‑2020‑5957 CVE‑2020‑5958)</li>
<li>NVIDIA V100 / T4 driver: 426.52 (fixes CVE‑2020‑5661)</li>
</ul>
</li>
</ul>