Frequently asked questions

Active Events

    
5:01 PMINVESTIGATING: Issues creating Blockchain InstancesBlockchain PlatformTokyo
5:01 PMINVESTIGATING: Issues creating Blockchain InstancesBlockchain Platform2Japan
     
5 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2Sydney
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
6 Nov 2019PLANNED: Migrate the service data store to the new UVATION Cloud database offerings - Premium customersDb2Dallas
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2Blockchain Platform
6 Nov 2019PLANNED: Planned Database Restart (All Plans)Db2London
     
31 Oct 2019Red Hat OpenShift on IBM Cloud is affected by Kubernetes security vulnerability (CVE-2019-11247)Kubernetes ServiceAsia Pacific, North America, Europe
31 Oct 2019Red Hat OpenShift on IBM Cloud is affected by Kubernetes security vulnerability (CVE-2019-11247)Kubernetes ServiceAsia Pacific, North America, Europe
31 Oct 2019Red Hat OpenShift on IBM Cloud is affected by Kubernetes security vulnerability (CVE-2019-11247)Kubernetes ServiceAsia Pacific, North America, Europe
11 Oct 2019Red Hat OpenShift on IBM Cloud is affected by Kubernetes security vulnerability (CVE-2019-11247)Kubernetes ServiceAsia Pacific, North America, Europe
25 Oct 2019Cloud Kubernetes Service is affected by a Python security vulnerability (CVE-2019-10160)Kubernetes ServiceEurope, North America, Asia Pacific
6 Sep 2019Cloud Kubernetes Service is affected by a Python security vulnerability (CVE-2019-10160)Kubernetes ClusterNorth America, Asia Pacific, Europe
25 Oct 2019Red Hat OpenShift on IBM Cloud is NOT affected by Kubernetes vulnerability (CVE-2019-11248)Kubernetes ClusterEurope, North America, Asia Pacific
25 Oct 2019IBM Cloud Kubernetes Service is NOT affected by Kubernetes `kubectl cp` directory traversal vulnerability (CVE-2019-11249)Kubernetes ClusterEurope, North America, Asia Pacific
     
30 Oct 2019Customer action needed: TensorFlow Version Upgrade in the Watson Machine Learning serviceMachine LearningNorth America, Europe, Asia Pacific
30 Oct 2019Customer action needed: TensorFlow Version Upgrade in the Watson Machine Learning serviceMachine LearningNorth America, Europe, Asia Pacific
23 Oct 2019Action required for Cloud Internet Services customers: 4 Nov 2019 changes to the default settings of the WAF RulesMachine LearningAsia Pacific, North America, Europe
30 Oct 2019Customer action needed: TensorFlow Version Upgrade in the Watson Machine Learning serviceMachine LearningNorth America, Europe, Asia Pacific
30 Oct 2019Customer action needed: TensorFlow Version Upgrade in the Watson Machine Learning serviceMachine LearningNorth America, Europe, Asia Pacific
30 Oct 2019Customer action needed: TensorFlow Version Upgrade in the Watson Machine Learning serviceMachine LearningNorth America, Europe, Asia Pacific
15 Oct 2019User Action: User Interface enhancements to the user invitation and assigning access flowCloud PlatformNorth America, Europe, Asia Pacific
     
9:30 AMCOMPLETED: Migrate the service data store to the new IBM Cloud database offerings - Premium customersSpeech to TextDallas
COMPLETED: Remove SHA-1 support now TLS 1.0/1.1 is deprecated
Component: Cloudant
Location: Tokyo
Start time: 31 Oct 2019 12:30 PM
End time: 8 Nov 2019 11:30 PM
Update time: 5 Nov 2019 4:56 PM
Type: Maintenance
ID: CHG0408692

What are we changing?

Starting on October 31, 2019, we are removing the option to negotiate SHA-1 for message authentication within a TLS connection, and will require SHA-2 (256 or 384) instead.

Why are we making this change?

SHA-1 is considered cryptographically weak, susceptible to attack and should, therefore, be deprecated/disabled if possible. We previously did not remove this message digest algorithm because it was required for TLS 1.0/1.1 connections by older Java clients. Now that TLS 1.0/1.1 has been deprecated, we  are removing SHA-1 support.

How will it impact the environment?

We advise you to make any necessary changes prior to the date mentioned in order to avoid disruption for requests made using SHA-1.

Maintenance Duration: 12180 minutes

Disruption Duration: 60 minutes

Uvation Cloud Services Support

Log in to Uvation Cloud Services Portal to create service requests pertaining to cloud services for a faster response.

Marketplace Support

Log in to Marketplace to create service requests for a faster response.

Managed Services & Contract Support

For Managed Services and Contract Support create support requests using a dedicated support center.

Log in with your credentials

Forgot your details?