Brand Claim Brand Claim

Linux

  • discontinue Ubuntu 14.04

    OTC public image Standard_Ubuntu_14.04 will be discontinued 31st August 2020

    what does that mean then?

    • public images will be no longer listed in OTC public image list
      • Standard_Ubuntu_14.04_latest
      • Standard_Ubuntu_14.04_prev
    • OTC internal package repositories preconfigured in Standard_Ubuntu_14.04_latest images will be available until 31st August 2021
      • https://imagefactory.otc.t-systems.com/package-repositories
    • existing ECS installed with one of these images can be reinstalled
    • existing ECS installed with one of these images can be used to create a new ECS
    • new ECS can be installed by using image id from existing ECS installed with one of these images
    • continue using these images is without OTC support

    It is recommended to migrate existing ECS to Ubuntu 16.04/18.04.

  • Red Hat Enterprise Linux 6.10

    • Updated to new kernel version 2.6.32-754.29.2.el6.x86_64
    • Further updated packages
      • kernel-firmware-2.6.32-754.29.2.el6.noarch
      • tzdata-2020a-1.el6.noarch
  • Red Hat Enterprise Linux 7.8 released and certified

  • EulerOS-2.5

    • Updated packages
      • ansible-2.9.9-2.el7.noarch
      • ixgbevf453-4.5.3-1.3.x86_64
      • kmod-ixgbevf453-4.5.3-1.3.x86_64
      • kmod-scsi_ep_front-2.2.50-1.2.x86_64
      • openssl-1.0.2k-16.h10.eulerosv2r7.x86_64
      • python2-cffi-1.5.2-1.el7.x86_64
      • python2-cryptography-1.7.2-1.1.eulerosv2r7.x86_64
      • python2-idna-2.5-1.el7.noarch
      • python2-pyasn1-0.1.9-7.eulerosv2r7.noarch
      • python-enum34-1.0.4-1.eulerosv2r7.noarch
      • python-paramiko-2.1.1-4.h2.eulerosv2r7.noarch
      • python-ply-3.4-11.eulerosv2r7.noarch
      • python-pycparser-2.14-1.eulerosv2r7.noarch
      • sshpass-1.05-5.el7.x86_64
  • Obsolete garloff repositories will no longer be mirrored for Debian and Ubuntu
    (please see below on how to migrate to the Cloud OTC Tools repository)

How to enable the Cloud OTC Tools packages on Debian based systems

Cleanup home garloff

Older ECS installations may still have the home garloff repository configured.
Since this repository is obsolete and replaced by Cloud OTC Tools, it is strongly recommended to remove any remains of this repository from /etc/apt/sources.list and /etc/apt/sources.list.d/.

Configure repository URL

Please have a look at http://download.opensuse.org/repositories/Cloud:/OTC:/Tools/ or our local mirror http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/ to find the correct URL for your distribution and version.
Hint: You can also use a command line browser like w3m to do this.

For example the repository URL for Debian 10 is http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/.

To configure the repository on your system create the file /etc/apt/sources.list.d/cloud-otc.list with the following contents (this example demonstrates Debian 10):

# otc-tools
deb [arch=amd64] http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10/ /

Install the apt key

If you would run apt update now, you would get a error message like: "The repository 'http://debmirror.otc-service.com/repositories/Cloud:/OTC:/Tools/Debian_10 Release' is not signed."
To fix this the apt key for the Cloud OTC Tools repository needs to be installed.

For this the apt cache needs to be updated ignoring the missing key:

$ apt -o Acquire::AllowInsecureRepositories=true update

Then the cloud-otc-keyring package can be installed:

$ apt install --allow-unauthenticated cloud-otc-keyring

Now you run apt update, again. It should not show any errors anymore. The repository is now ready and can be used to install and upgrade packages.

Windows

  • updated Microsoft Windws Server Images with current Microsoft Windows Server Patches of May 2020 (13th)

    • Windows Server 2012 R2
      • 2020-05 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4556798)
      • 2020-05 Update for Windows Server 2012 R2 for x64-based Systems (KB4557900)
      • 2020-05 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Server 2012 R2 for x64 (KB4556405)
      • 2020-05 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4556846)
      • 2020-05 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4556853)
    • Windows Server 2016
      • 2020-05 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4556813)
    • Windows Server 2019
      • 2020-05 Cumulative Update for Windows Server 2019 for x64-based Systems (KB4551853)
      • 2020-05 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 for x64 (KB4556441)
  • Driver and tools of all Windows Server types

    • Cloudbase-Init: 0.9.12.dev86
    • XEN GPL driver: 5.0.136.10
    • KVM UVP Vmtools: 2.5.0.156
    • Intel(R) Network Connections Software Version 25.0, January 2, 2020
    • NVIDIA vGPU driver: 370.41 (fixes CVE‑2019‑5698)
    • NVIDIA pGPU driver:442.50 (fixes CVE‑2020‑5957 CVE‑2020‑5958)
    • NVIDIA V100 / T4 driver: 426.52 (fixes CVE‑2020‑5661)