<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://all.docs.genesys.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Corinneh</id>
	<title>Genesys Documentation - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://all.docs.genesys.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Corinneh"/>
	<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/Special:Contributions/Corinneh"/>
	<updated>2026-04-14T17:51:42Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Voicemcs_private_edition_architecture_diagram.png&amp;diff=124530</id>
		<title>File:Voicemcs private edition architecture diagram.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Voicemcs_private_edition_architecture_diagram.png&amp;diff=124530"/>
		<updated>2022-07-18T05:45:50Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Corinneh uploaded a new version of File:Voicemcs private edition architecture diagram.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=Draft:RN/VoiceOrchestration_Service/100.0.100.0055&amp;diff=123789</id>
		<title>Draft:RN/VoiceOrchestration Service/100.0.100.0055</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=Draft:RN/VoiceOrchestration_Service/100.0.100.0055&amp;diff=123789"/>
		<updated>2022-06-30T02:44:11Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Corinneh moved page Draft:RN/VoiceOrchestration Service/100.0.100.0055 to Draft:RN/VoiceOrchestration Service/100.0.100.0056: The team had to republish software, which changed the release number&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Draft:RN/VoiceOrchestration Service/100.0.100.0056]]&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0010&amp;diff=117405</id>
		<title>RN/VoiceSIP Proxy Service/100.0.100.0010</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0010&amp;diff=117405"/>
		<updated>2022-03-30T18:14:14Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ComponentRN&lt;br /&gt;
|ComponentId=4c32d167-fb8a-4157-a204-8dbb1342a9f8&lt;br /&gt;
|JQL=issue = VOICEMCS-3063&lt;br /&gt;
|DeploymentTypeId=5439f1be-1868-4091-b058-1667389b6ce1, 8b480b3c-2733-433a-9166-eab2c2d0663a&lt;br /&gt;
|ReleaseDate=2021-11-12&lt;br /&gt;
|PrivateEditionReleaseDate=2022-03-28&lt;br /&gt;
|Highlight=100.0.100.0010: Resolved issue.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3063&lt;br /&gt;
|IssueCategoryId=5c483167-c133-4dc5-87c0-bd2719670bc1&lt;br /&gt;
|Content=Voice SIP Proxy Service now includes an X-Genesys-Partition-Id header in the incoming initial INVITE message.&lt;br /&gt;
|LocalContent=Voice SIP Proxy Service now includes an '''X-Genesys-Partition-Id''' header containing the tenant '''callcenterid''' (CCID) in the outgoing initial INVITE message.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0014&amp;diff=117404</id>
		<title>RN/VoiceSIP Proxy Service/100.0.100.0014</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0014&amp;diff=117404"/>
		<updated>2022-03-30T18:12:30Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ComponentRN&lt;br /&gt;
|ComponentId=4c32d167-fb8a-4157-a204-8dbb1342a9f8&lt;br /&gt;
|JQL=issue = VOICEMCS-3813 OR issue = VOICEMCS-3855 OR issue = VOICEMCS-3638&lt;br /&gt;
|DeploymentTypeId=8b480b3c-2733-433a-9166-eab2c2d0663a, 5439f1be-1868-4091-b058-1667389b6ce1&lt;br /&gt;
|ReleaseDate=2022-03-08&lt;br /&gt;
|PrivateEditionReleaseDate=2022-03-28&lt;br /&gt;
|Highlight=*Support for a new voice call rebalancing feature.&lt;br /&gt;
*Voice SIP Proxy service now supports the reuse of TCP connections.&lt;br /&gt;
*Voice SIP Proxy now maintains a TCP connection when it receives an incorrect SIP message over the connection.&lt;br /&gt;
&amp;lt;!--*{{SecurityBoilerplate|Boilerplate=NodeHighlight}}&lt;br /&gt;
*{{PrivateEditionBoilerplate|Boilerplate=single-ns}}--&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3855&lt;br /&gt;
|IssueCategoryId=5c483167-c133-4dc5-87c0-bd2719670bc1&lt;br /&gt;
|Content=SIP Proxy now does not close TCP connection if received incorrect SIP message over it. SIP Proxy now will reject with 400 Bad request response and keep connection intact.&lt;br /&gt;
|LocalContent=Voice SIP Proxy no longer closes a TCP connection when it receives an incorrect SIP message over it. Instead, SIP Proxy now rejects the message with a &amp;lt;tt&amp;gt;400 Bad request&amp;lt;/tt&amp;gt; response and keeps the connection intact.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3813&lt;br /&gt;
|IssueCategoryId=5c483167-c133-4dc5-87c0-bd2719670bc1&lt;br /&gt;
|Content=SIP Proxy now supports SIP devices reusing same TCP connection for all communications with SIP Proxy&lt;br /&gt;
|LocalContent=Voice SIP Proxy service now supports SIP devices reusing the same TCP connection for all communications with SIP Proxy.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3638&lt;br /&gt;
|IssueCategoryId=720446c8-10b6-42b8-af36-34a298aa1c72&lt;br /&gt;
|LocalContent=Voice SIP Cluster service now supports a voice call rebalancing feature that allows the transition of voice calls from a SIP Cluster service instance, undergoing graceful termination, to a successor service instance. This type of voice call transition enhances call handling continuation during a rolling upgrade or service scale-down. Voice SIP Proxy service both supports and facilitates the voice call rebalancing feature.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_ges_architecture_diagram.png&amp;diff=116894</id>
		<title>File:Pe ges architecture diagram.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_ges_architecture_diagram.png&amp;diff=116894"/>
		<updated>2022-03-29T19:34:32Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=PrivateEdition/Current/TenantPEGuide/Deploy&amp;diff=116646</id>
		<title>PrivateEdition/Current/TenantPEGuide/Deploy</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=PrivateEdition/Current/TenantPEGuide/Deploy&amp;diff=116646"/>
		<updated>2022-03-21T17:39:00Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Deploy the Tenant Service&lt;br /&gt;
|Context=Learn how to deploy the Tenant Service.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext={{NoteFormat|Make sure to review {{Link-SomewhereInThisVersion|topic=Planning}} for the full list of prerequisites required to deploy the Tenant Service.|}}&lt;br /&gt;
&amp;lt;!--For solution-level deployment information, see {{SuiteLevelLink|openshift}}.--&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Deployment scenarios&lt;br /&gt;
|anchor=Scenarios&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=More than one deployment scenario is supported, including single region, redundant, and multi-region deployment as well as multi-Tenant deployment.&lt;br /&gt;
&lt;br /&gt;
===Single region/location/cluster===&lt;br /&gt;
You deploy Tenant resources in a single Kubernetes cluster within the same or separate namespace (project) with the Voice platform. If shared resources are being deployed across all Tenants, they must also be added to the same target namespace.&lt;br /&gt;
&lt;br /&gt;
The Tenant deployment process creates resources using a ''release name'' parameter, specified when executing the Helm deployment step. When installed in a single namespace, you must make sure that the release name value is distinct across all Tenants and other deployments.&lt;br /&gt;
&lt;br /&gt;
For example, you might specify the Helm release name in the format &amp;lt;tt&amp;gt;t&amp;lt;short_id&amp;gt;&amp;lt;/tt&amp;gt;. Optionally, if you want the Tenant service name to match other Voice services, you can prefix the Tenant name with &amp;lt;tt&amp;gt;voice-&amp;lt;/tt&amp;gt; in the Helm release name. So, in this example, you would specify the release name as &amp;lt;tt&amp;gt;voice-t&amp;lt;short_id&amp;gt;&amp;lt;/tt&amp;gt; during Helm deployment. The value for &amp;lt;tt&amp;gt;&amp;lt;short_id&amp;gt;&amp;lt;/tt&amp;gt; is the last four characters of the Tenant UUID that you configure in the '''values.yaml''' file. For more information about the identification parameters for the Tenant service, see {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=idparams|display text=Identification}}.&lt;br /&gt;
&lt;br /&gt;
If you plan to use Prometheus monitoring or Fluent Bit logging framework for Tenant, you must execute the '''tenant-monitor''' module, as described in {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Deploy|anchor=locationspecificdeploy|display text=tenant-monitor}}. The module enables the following features:&lt;br /&gt;
&lt;br /&gt;
*Prometheus PodMonitor definition for all tenant pods.&lt;br /&gt;
*Common Fluent Bit framework configuration for all tenant pods.&lt;br /&gt;
&lt;br /&gt;
====Single Tenant: Basic deployment====&lt;br /&gt;
Single-node deployment requires a single override file and one &amp;quot;tenant&amp;quot; module to deploy, with reference implementation described at {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Deploy|anchor=servicespecificdeploy|display text=Single service at one location}}.&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|mandatoryparams}}Mandatory parameters for basic installation are:&lt;br /&gt;
&lt;br /&gt;
*tenant uuid (v4)&lt;br /&gt;
*tenant nickname (becomes a Helm release name)&lt;br /&gt;
*all {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=backend|display text=backend parameters}} (along with all secrets that may be required based on these parameters)&lt;br /&gt;
&lt;br /&gt;
To increase the number of nodes, adjust the '''node count''' parameter. For more information, see {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=scalabilityparams|display text=Scalability and redundancy parameters}}.&lt;br /&gt;
&lt;br /&gt;
====Upgrade====&lt;br /&gt;
An upgrade can be performed by re-running deployment with the same mandatory parameters and adjusted version of Tenant image(s) and Helm charts. The upgrade is performed automatically, one node at a time (if '''node count''' is &amp;gt; 1). The update of the Tenant configuration may happen automatically when the primary node is upgraded. Genesys recommends performing a backup of the backend database for a Tenant Service before upgrading.&lt;br /&gt;
&lt;br /&gt;
====Multiple Tenants at one location: Basic deployment====&lt;br /&gt;
You can deploy additional Tenants at the same location using the following guidelines:&lt;br /&gt;
&lt;br /&gt;
*Each Tenant Service must have a unique tenant uuid, shortid, and nickname.&lt;br /&gt;
*Each Tenant Service is deployed or upgraded and adjusted independently.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext====Multiple regions/locations/clusters: Basic deployment===&lt;br /&gt;
In multi-regional/multi-location deployments, one region/location is considered &amp;quot;master&amp;quot; (from the Tenant perspective) and includes the database backend with &amp;lt;tt&amp;gt;write&amp;lt;/tt&amp;gt; capabilities. Other regions/locations have replicas of the database backend in read-only mode. A Tenant Service at each location may be deployed to have one of its nodes running as master (&amp;lt;tt&amp;gt;write&amp;lt;/tt&amp;gt; access to provisioning data through the config API) or have all its nodes running only as replicas (&amp;lt;tt&amp;gt;read&amp;lt;/tt&amp;gt; access to configuration). &lt;br /&gt;
&lt;br /&gt;
Multi-regional deployments must be performed using the following steps (with prerequisites already satisfied at each region/location):&lt;br /&gt;
&lt;br /&gt;
*If required, deploy the '''tenant-monitor''' module at a location planned as a Master Tenant node.&lt;br /&gt;
*Complete the basic deployment of a Tenant Service in the Master region, including specification of DR parameters for the Master, as per {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=scalabilityparams|display text=Scalability and redundancy parameters}}.&lt;br /&gt;
*Complete the deployment of the database backend with replica of the Master database at location(s) where the replica Tenant nodes are expected to run, including provisioning of access keys/secrets to access the local replica.&lt;br /&gt;
*If required, deploy the '''tenant-monitor''' module at location(s) where replicas are expected to run.&lt;br /&gt;
*Complete the basic Tenant deployment for additional region(s) and specify DR parameters for the Master region (see {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=scalabilityparams|display text=Scalability and redundancy parameters}}).&lt;br /&gt;
&lt;br /&gt;
The same customization scenarios described for Tenant nodes can be applied for each location independently.  &lt;br /&gt;
&lt;br /&gt;
====Upgrade====&lt;br /&gt;
An upgrade can be performed by re-running the deployment with the same mandatory parameters and adjusted version of the Tenant image(s) and Helm charts for every location. Update of the tenant configuration may happen automatically when the Master node in the Master region is upgraded. Genesys recommends performing a backup of the backend database for a Tenant Service before you upgrade the Master region.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Deploy the service&lt;br /&gt;
|anchor=DeployService&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=This section provides reference commands with key parameters that are required to complete each deployment step.&lt;br /&gt;
&lt;br /&gt;
On this page, the '''tenant-values.yaml''' file refers to the '''values.yaml''' file in the Tenant Helm chart. Likewise, the '''tenant-monitor-values.yaml''' file refers to the '''values.yaml''' file in the Tenant Monitor Helm chart.&lt;br /&gt;
===Prerequisite===&lt;br /&gt;
Before proceeding with the Tenant Service deployment, ensure you have completed procedures in the {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=ConfigSecurity|display text=Configure security}} section of this guide.&lt;br /&gt;
{{AnchorDiv|locationspecificdeploy}}&lt;br /&gt;
&lt;br /&gt;
===Location-specific deployment steps===&lt;br /&gt;
====tenant-monitor====&lt;br /&gt;
Monitoring/logging shared configuration and infrastructure deployment:&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
helm upgrade --install --force --wait --timeout 600s -n voice  tenant-monitor https://&amp;lt;jfrog artifactory/helm location&amp;gt;/tenant-monitor-$TENANT_MANIFEST_VERSION.tgz  --username &amp;quot;$JFROG_USER&amp;quot; --password &amp;quot;$JFROG_PASSWORD&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To enable Prometheus monitoring, you can use the following overrides with tenant-monitor. Use the following changes in the '''tenant-monitor-values.yaml''' file to implement the changes:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
prometheus:&lt;br /&gt;
  podMonitor:&lt;br /&gt;
    create: &amp;quot;true&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To enable Fluent Bit to send additional logs to stdout in json format (for selected Tenant functions, such as configuration audit) and/or raw format (such as from internal applications such as StatServer and URS), modify the following changes to upgrade tenant-monitor. Use the following changes in the '''tenant-monitor-values.yaml''' file to implement the changes.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
fluent:&lt;br /&gt;
  enable: &amp;quot;true&amp;quot;&lt;br /&gt;
  rawlogs:&lt;br /&gt;
    stdout:&lt;br /&gt;
      enable: &amp;quot;true&amp;quot;&lt;br /&gt;
  jsonlogs:&lt;br /&gt;
    stdout:&lt;br /&gt;
      enable: &amp;quot;true&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To enable RWX Persistent Volume Claim (PVC) in tenant-monitor to store Tenant logs shared across all Tenant pods, make the following modifications to override values in the '''tenant-monitor-values.yaml''' file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
tenant:&lt;br /&gt;
  logging:&lt;br /&gt;
    volume:&lt;br /&gt;
      enabled: &amp;quot;true&amp;quot;&lt;br /&gt;
      createSC: &amp;quot;false&amp;quot;&lt;br /&gt;
      createpvClaim: &amp;quot;true&amp;quot;&lt;br /&gt;
      logClaim: &amp;quot;tenant-logs-pvc&amp;quot;&lt;br /&gt;
      logClaimSize: &amp;quot;5Gi&amp;quot;&lt;br /&gt;
      logStorageClass: &amp;quot;&amp;lt;storage class&amp;gt;&amp;quot;&lt;br /&gt;
      Storageprovisioner: &amp;quot;TBD OC provisioner&amp;quot;&lt;br /&gt;
      parameters: {}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RWX PV is disabled by default; no overrides are required in the '''tenant-monitor-values.yaml''' file to disable it.&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|servicespecificdeploy}}&lt;br /&gt;
&lt;br /&gt;
===Service-specific deployment steps: Single service at one location===&lt;br /&gt;
A PostgreSQL database must be available for the Tenant Service before you begin the service deployment. For more information about the database requirements, see {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Planning|anchor=ThirdParty|display text=Third-party prerequisites}}. In addition, after the PostgreSQL database is deployed and before you deploy the Tenant Service, you must configure secrets that contain values for certain PostgreSQL database parameters. To configure the secrets, see {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=servicespecificsecrets|display text=Service-specific secrets}}.&lt;br /&gt;
&lt;br /&gt;
Use the following template if you are deploying with the tenant Helm chart. A single-service deployment can be implemented with the following sample parameters in the '''tenant-values.yaml''' file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
##UUID 4 format ( Set a new UUID for new tenant deployment)&lt;br /&gt;
tenantid: &amp;lt;tenant-uuid&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
serviceAccount:&lt;br /&gt;
    create: true&lt;br /&gt;
 &lt;br /&gt;
images:&lt;br /&gt;
  imagePullSecrets: mycred&lt;br /&gt;
  registry: &amp;lt;docker-repo&amp;gt; &lt;br /&gt;
  pullPolicy: Always&lt;br /&gt;
  tenant:&lt;br /&gt;
    tag: &amp;lt;version of tenant service&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
  pgdbInit:&lt;br /&gt;
    tag: &amp;lt;version of tenant service&amp;gt;&lt;br /&gt;
   &lt;br /&gt;
  rcsInit:&lt;br /&gt;
    tag: &amp;lt;version of roles service batch image&amp;gt;&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
  pulseInit:&lt;br /&gt;
    tag: &amp;lt;version of tenant service&amp;gt;&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    pulseMode: &amp;quot;setup&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
   &lt;br /&gt;
 &lt;br /&gt;
tenant:&lt;br /&gt;
  general:&lt;br /&gt;
    upstreamServices: voice-sipfe:9101,voice-config:9100,ixn-server-{{ $.Values.tenantid }}:7120,ixn-vqnode-{{ $.Values.tenantid }}:7122&amp;quot;&lt;br /&gt;
  pgdb:&lt;br /&gt;
    dbhost: &amp;quot;/opt/genesys/dbserver/dbserver&amp;quot;&lt;br /&gt;
    dbuser: &amp;quot;/opt/genesys/dbuser/dbuser&amp;quot;&lt;br /&gt;
    dbname: &amp;quot;/opt/genesys/dbname/dbname&amp;quot;&lt;br /&gt;
  securityContext:&lt;br /&gt;
    fsGroup: 0        &lt;br /&gt;
 &lt;br /&gt;
  logging&lt;br /&gt;
 ....&lt;br /&gt;
  volumes: &lt;br /&gt;
    logPvc:&lt;br /&gt;
        enabled: &amp;quot;true&amp;quot;&lt;br /&gt;
        logClaimSize: &amp;quot;5Gi&amp;quot;&lt;br /&gt;
        accessModes: &amp;quot;ReadWriteOnce&amp;quot;&lt;br /&gt;
        logStorageClass: &amp;quot;&amp;lt;storage class&amp;gt;&amp;quot;   #Replace the storage class that's relevant to the Openshift Cluster&lt;br /&gt;
&lt;br /&gt;
    mounts:&lt;br /&gt;
      log:&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /opt/genesys/logs/volume&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /logs&lt;br /&gt;
  secrets:&lt;br /&gt;
    pgdb:&lt;br /&gt;
      pwd:            &lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/dbpassword/dbpassword&amp;quot;&lt;br /&gt;
        secretKey: &amp;quot;dbpassword&amp;quot;&lt;br /&gt;
      volumes: | &lt;br /&gt;
        - name: dbpassword&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: dbpassword&lt;br /&gt;
        - name: dbserver&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: dbserver&lt;br /&gt;
        - name: dbname&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: dbname&lt;br /&gt;
        - name: dbuser&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: dbuser                        &lt;br /&gt;
      mounts:&lt;br /&gt;
        - name: dbpassword&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/dbpassword&amp;quot;&lt;br /&gt;
        - name: dbserver&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/dbserver&amp;quot; &lt;br /&gt;
        - name: dbname&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/dbname&amp;quot;  &lt;br /&gt;
        - name: dbuser&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/dbuser&amp;quot;                          &lt;br /&gt;
 &lt;br /&gt;
    consul:&lt;br /&gt;
      acl:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/consul-shared-secret/consul-consul-voice-token&amp;quot;&lt;br /&gt;
      volumes:&lt;br /&gt;
        - name: consul-shared-secret&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: consul-voice-token              &lt;br /&gt;
      mounts:&lt;br /&gt;
        - name: consul-shared-secret&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/consul-shared-secret&amp;quot;     &lt;br /&gt;
    redis:&lt;br /&gt;
      configPwd:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/redis-config-secret/redis-config-state&amp;quot;&lt;br /&gt;
        volumes:&lt;br /&gt;
          - name: redis-config-secret&lt;br /&gt;
            secret:&lt;br /&gt;
              secretName: redis-config-token              &lt;br /&gt;
        mounts:&lt;br /&gt;
          - name: redis-config-secret&lt;br /&gt;
            readOnly: true&lt;br /&gt;
            mountPath: &amp;quot;/opt/genesys/redis-config-secret&amp;quot; &lt;br /&gt;
         &lt;br /&gt;
      streamPwd:          &lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/redis-tenant-secret/redis-tenant-stream&amp;quot;&lt;br /&gt;
        volumes:&lt;br /&gt;
          - name: redis-tenant-secret&lt;br /&gt;
            secret:&lt;br /&gt;
              secretName: redis-tenant-token              &lt;br /&gt;
        mounts:&lt;br /&gt;
          - name: redis-tenant-secret&lt;br /&gt;
            readOnly: true&lt;br /&gt;
            mountPath: &amp;quot;/opt/genesys/redis-tenant-secret&amp;quot;        &lt;br /&gt;
 &lt;br /&gt;
    kafka:&lt;br /&gt;
      pwd:&lt;br /&gt;
         secretName: &amp;quot;/opt/genesys/kafka-secrets/kafka-secrets&amp;quot;&lt;br /&gt;
      volumes:  &lt;br /&gt;
        - name: kafka-secrets&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: kafka-secrets-token&lt;br /&gt;
      mounts:&lt;br /&gt;
        - name: kafka-secrets&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/kafka-secrets&amp;quot;&lt;br /&gt;
    gws:&lt;br /&gt;
      user:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/gauth-client-id/clientid&amp;quot;&lt;br /&gt;
      pwd:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/gauth-client-token/clientsecret&amp;quot;&lt;br /&gt;
      volumes:&lt;br /&gt;
        - name: gauth-client-id&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: gauthclientid    &lt;br /&gt;
        - name: gauth-client-token&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: gauthclientsecret     &lt;br /&gt;
      mounts:          &lt;br /&gt;
        - name: gauth-client-id&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/gauth-client-id&amp;quot;&lt;br /&gt;
        - name: gauth-client-token&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/gauth-client-token&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
  redis:&lt;br /&gt;
    isCluster: true&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In addition, use the following deployment command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
helm upgrade --install --force --wait --timeout 600s -n voice -f ./tenant-node-values.yaml t&amp;lt;shortid&amp;gt; \&lt;br /&gt;
https://&amp;lt;jfrog artifactory/helm location&amp;gt;/tenant-&amp;lt;helm version&amp;gt;.tgz \&lt;br /&gt;
--username &amp;quot;$JFROG_USER&amp;quot; --password &amp;quot;$JFROG_PASSWORD&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The preceding deployment will create a Tenant with the password of the service account set up explicitly and without enabling GWS integration. See {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Deploy|anchor=enablegws|display text=Samples and references}} for values that allow you to reset the Tenant password upon deployment using a pre-generated value from the secret and to enable automated GWS integration.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Samples and references&lt;br /&gt;
|anchor=SamplesReferences&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Enabling a service admin password (the secret should be created as described in the {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=servicespecificsecrets|display text=Service account password}} section):&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
tenant:&lt;br /&gt;
  serviceuser: &amp;quot;default&amp;quot;&lt;br /&gt;
  svcpwdSecretName: &amp;quot;/opt/genesys/service-user-account/svcpassword&amp;quot;&lt;br /&gt;
  ...&lt;br /&gt;
  volumes: |&lt;br /&gt;
    - name: service-user-account&lt;br /&gt;
      secret:&lt;br /&gt;
           secretName: svcuseraccount&lt;br /&gt;
    ...&lt;br /&gt;
  volumeMounts: |&lt;br /&gt;
    - name: service-user-account&lt;br /&gt;
      readOnly: true&lt;br /&gt;
      mountPath: &amp;quot;/opt/genesys/service-user-account&amp;quot;   &lt;br /&gt;
    ....&lt;br /&gt;
  initVolumeMounts: |        &lt;br /&gt;
    - name: service-user-account&lt;br /&gt;
      readOnly: true&lt;br /&gt;
      mountPath: &amp;quot;/opt/genesys/service-user-account&amp;quot;   &lt;br /&gt;
    ....&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|logstostdout}}&lt;br /&gt;
To enable stdout log output for all Tenant components, make the following modifications to override values in the '''tenant-values.yaml''' file.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
images&lt;br /&gt;
fbregistry: fluent/fluent-bit&lt;br /&gt;
...&lt;br /&gt;
  fluentBit:&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    name: json-sidecar&lt;br /&gt;
    tag: 1.8.x&lt;br /&gt;
 &lt;br /&gt;
  fluentBitUrs:&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    name: stdouturs-sidecar&lt;br /&gt;
    tag: 1.8.x&lt;br /&gt;
 &lt;br /&gt;
  fluentBitSs:&lt;br /&gt;
    enable: &amp;quot;true&amp;quot; &lt;br /&gt;
    name: stdoutss-sidecar&lt;br /&gt;
    tag: 1.8.x&lt;br /&gt;
 &lt;br /&gt;
  fluentBitOcs:&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    name: stdoutocs-sidecar&lt;br /&gt;
    tag: 1.8.x&lt;br /&gt;
 &lt;br /&gt;
  fluentBitCs:&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    name: stdoutcs-sidecar&lt;br /&gt;
    tag: 1.8.x&lt;br /&gt;
 &lt;br /&gt;
tenant:&lt;br /&gt;
 ...&lt;br /&gt;
  logging:&lt;br /&gt;
    volumes:&lt;br /&gt;
      log:&lt;br /&gt;
        - name: log&lt;br /&gt;
      jsonLog:&lt;br /&gt;
        - name: fluent-logs   &lt;br /&gt;
          emptyDir: {}&lt;br /&gt;
      stdoutUrsLog:&lt;br /&gt;
        - name: fluenturs-logs&lt;br /&gt;
          emptyDir: {}&lt;br /&gt;
      stdoutOcsLog:&lt;br /&gt;
        - name: fluentocs-logs&lt;br /&gt;
          emptyDir: {}&lt;br /&gt;
      stdoutSsLog:&lt;br /&gt;
        - name: fluentss-logs&lt;br /&gt;
          emptyDir: {}&lt;br /&gt;
      stdoutCsLog:&lt;br /&gt;
        - name: fluentcs-logs&lt;br /&gt;
          emptyDir: {}         &lt;br /&gt;
      fluentBconfigmap:&lt;br /&gt;
        - configMap:&lt;br /&gt;
            defaultMode: 420       &lt;br /&gt;
            name: tenants-fluent-bit-config&lt;br /&gt;
          name: tenants-fluent-bit-config         &lt;br /&gt;
      fluentBconfigmapCs:&lt;br /&gt;
        - configMap:&lt;br /&gt;
            defaultMode: 420       &lt;br /&gt;
            name: tenants-fluent-bit-config-cs&lt;br /&gt;
          name: tenants-fluent-bit-config-cs&lt;br /&gt;
      fluentBconfigmapSs:&lt;br /&gt;
        - configMap:&lt;br /&gt;
            defaultMode: 420&lt;br /&gt;
            name: tenants-fluent-bit-config-ss&lt;br /&gt;
          name: tenants-fluent-bit-config-ss&lt;br /&gt;
      fluentBconfigmapOcs:&lt;br /&gt;
        - configMap:&lt;br /&gt;
            defaultMode: 420&lt;br /&gt;
            name: tenants-fluent-bit-config-ocs&lt;br /&gt;
          name: tenants-fluent-bit-config-ocs&lt;br /&gt;
      fluentBconfigmapUrs:&lt;br /&gt;
        - configMap:&lt;br /&gt;
            defaultMode: 420&lt;br /&gt;
            name: tenants-fluent-bit-config-urs&lt;br /&gt;
          name: tenants-fluent-bit-config-urs           &lt;br /&gt;
    mounts:&lt;br /&gt;
      log:&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /opt/genesys/logs/volume&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /logs&lt;br /&gt;
      jsonLog:&lt;br /&gt;
        - name: fluent-logs&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/logs/JSON&amp;quot;         &lt;br /&gt;
      stdoutUrsLog:&lt;br /&gt;
        - name: fluenturs-logs&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/logs/URS&amp;quot;&lt;br /&gt;
      stdoutSsLog:&lt;br /&gt;
        - name: fluentss-logs&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/logs/SS&amp;quot;&lt;br /&gt;
      stdoutOcsLog:&lt;br /&gt;
        - name: fluentocs-logs&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/logs/OCS&amp;quot;&lt;br /&gt;
      stdoutCsLog:&lt;br /&gt;
        - name: fluentcs-logs&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/logs/confserv&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
      fbJsonLog:&lt;br /&gt;
        - name: fluent-logs&lt;br /&gt;
          mountPath: &amp;quot;/mnt/logs&amp;quot;         &lt;br /&gt;
      fbstdoutUrsLog:&lt;br /&gt;
        - name: fluenturs-logs&lt;br /&gt;
          mountPath: &amp;quot;/mnt/logs&amp;quot;&lt;br /&gt;
      fbstdoutSsLog:&lt;br /&gt;
        - name: fluentss-logs&lt;br /&gt;
          mountPath: &amp;quot;/mnt/logs&amp;quot;&lt;br /&gt;
      fbstdoutOcsLog:&lt;br /&gt;
        - name: fluentocs-logs&lt;br /&gt;
          mountPath: &amp;quot;/mnt/logs&amp;quot;&lt;br /&gt;
      fbstdoutCsLog:&lt;br /&gt;
        - name: fluentcs-logs&lt;br /&gt;
          mountPath: &amp;quot;/mnt/logs&amp;quot;         &lt;br /&gt;
 &lt;br /&gt;
      fluentBconfigmap:&lt;br /&gt;
          - mountPath: /fluent-bit/etc/&lt;br /&gt;
            name: tenants-fluent-bit-config&lt;br /&gt;
      fluentBconfigmapCs:&lt;br /&gt;
          - mountPath: /fluent-bit/etc/&lt;br /&gt;
            name: tenants-fluent-bit-config-cs     &lt;br /&gt;
      fluentBconfigmapSs:&lt;br /&gt;
          - mountPath: /fluent-bit/etc/&lt;br /&gt;
            name: tenants-fluent-bit-config-ss   &lt;br /&gt;
      fluentBconfigmapOcs:&lt;br /&gt;
          - mountPath: /fluent-bit/etc/&lt;br /&gt;
            name: tenants-fluent-bit-config-ocs     &lt;br /&gt;
      fluentBconfigmapUrs:&lt;br /&gt;
          - mountPath: /fluent-bit/etc/&lt;br /&gt;
            name: tenants-fluent-bit-config-urs&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|rwopvclogging}}&lt;br /&gt;
You can deploy Persistent Volume/Persistent Volume Claim (PV/PVC) in two ways:&lt;br /&gt;
&lt;br /&gt;
#Enable ReadWriteOnce (RWO) from the tenant Helm chart, which maintains unique PVCs for each pod/replica from the same Tenant.&lt;br /&gt;
#Enable ReadWriteMany (RWX) from the tenant-monitor Helm chart, which has multiple Tenant pods sharing the same PVC.&lt;br /&gt;
&lt;br /&gt;
To enable RWO PV/PVC logging from individual Tenant pods in Statefulset, make the following modifications to override the values in the '''tenant-values.yaml''' file. RWO Persistent Volume is disabled by default.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
logging&lt;br /&gt;
 ....&lt;br /&gt;
  volumes: &lt;br /&gt;
    logPvc:&lt;br /&gt;
        enabled: &amp;quot;true&amp;quot;&lt;br /&gt;
        logClaimSize: &amp;quot;5Gi&amp;quot;&lt;br /&gt;
        accessModes: &amp;quot;ReadWriteOnce&amp;quot;&lt;br /&gt;
        logStorageClass: &amp;quot;&amp;lt;storage class&amp;gt;&amp;quot;   #Replace the storage class that's relevant to the Openshift Cluster&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|enablegws}}&lt;br /&gt;
Enabling GWS integration (the secret should be created as described in the {{Link-SomewhereInThisVersion|manual=TenantPEGuide|topic=Configure|anchor=servicespecificsecrets|display text=Genesys Authentication backend secrets}} section):&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
tenant:&lt;br /&gt;
…&lt;br /&gt;
gws:&lt;br /&gt;
    # enable: Enable GWS registeration about tenant&lt;br /&gt;
    # tls: Enable/Disable Secure connection to GWS&lt;br /&gt;
    # authEndpoint: GWS auth end point&lt;br /&gt;
    # envEndpoint: GWS env end point for Registeration&lt;br /&gt;
    # db: Pass DB infromation for GWS to connect to PSQL DB for read and store data&lt;br /&gt;
    enable: &amp;quot;true&amp;quot;&lt;br /&gt;
    tls: false&lt;br /&gt;
    authEndpoint: &amp;quot;gauth-auth.gauth.svc.cluster.local&amp;quot;&lt;br /&gt;
    envEndpoint: &amp;quot;&amp;quot;&lt;br /&gt;
    db:&lt;br /&gt;
      enable: &amp;quot;false&amp;quot;&lt;br /&gt;
      read: &amp;quot;false&amp;quot;&lt;br /&gt;
      init: &amp;quot;false&amp;quot;&lt;br /&gt;
             secrets:&lt;br /&gt;
……….&lt;br /&gt;
gws:&lt;br /&gt;
      enabled: true &lt;br /&gt;
      user:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/gauth-client-id/clientid&amp;quot;&lt;br /&gt;
      pwd:&lt;br /&gt;
        secretName: &amp;quot;/opt/genesys/gauth-client-token/clientsecret&amp;quot;&lt;br /&gt;
      volumes:&lt;br /&gt;
        - name: gauth-client-id&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: gauthclientid    &lt;br /&gt;
        - name: gauth-client-token&lt;br /&gt;
          secret:&lt;br /&gt;
            secretName: gauthclientsecret     &lt;br /&gt;
      mounts:          &lt;br /&gt;
        - name: gauth-client-id&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/gauth-client-id&amp;quot;&lt;br /&gt;
        - name: gauth-client-token&lt;br /&gt;
          readOnly: true&lt;br /&gt;
          mountPath: &amp;quot;/opt/genesys/gauth-client-token&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|mountpvc}}&lt;br /&gt;
To mount the PVC to store Tenant logs, make the following modifications to override the values in the '''tenant-values.yaml''' file:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
.....&lt;br /&gt;
 &lt;br /&gt;
tenant:&lt;br /&gt;
  ...&lt;br /&gt;
    logging:&lt;br /&gt;
    mounts:&lt;br /&gt;
      log:&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /opt/genesys/logs/volume&lt;br /&gt;
        - name: log&lt;br /&gt;
          mountPath: /logs&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Validate the deployment&lt;br /&gt;
|anchor=Validate&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext={{Notices|Notice=PEComingSoon}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=45d1441f-dc69-4a17-bd47-af5d811ce167&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0014&amp;diff=116468</id>
		<title>RN/VoiceSIP Proxy Service/100.0.100.0014</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Proxy_Service/100.0.100.0014&amp;diff=116468"/>
		<updated>2022-03-09T05:17:10Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ComponentRN&lt;br /&gt;
|ComponentId=4c32d167-fb8a-4157-a204-8dbb1342a9f8&lt;br /&gt;
|JQL=issue = VOICEMCS-3813 OR issue = VOICEMCS-3855 OR issue = VOICEMCS-3638&lt;br /&gt;
|DeploymentTypeId=5439f1be-1868-4091-b058-1667389b6ce1&lt;br /&gt;
|ReleaseDate=2022-03-08&lt;br /&gt;
|Highlight=*Support for a new voice call rebalancing feature.&lt;br /&gt;
*Voice SIP Proxy service now supports the reuse of TCP connections.&lt;br /&gt;
*Voice SIP Proxy now maintains a TCP connection when it receives an incorrect SIP message over the connection.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3855&lt;br /&gt;
|IssueCategoryId=5c483167-c133-4dc5-87c0-bd2719670bc1&lt;br /&gt;
|Content=SIP Proxy now does not close TCP connection if received incorrect SIP message over it. SIP Proxy now will reject with 400 Bad request response and keep connection intact.&lt;br /&gt;
|LocalContent=Voice SIP Proxy no longer closes a TCP connection when it receives an incorrect SIP message over it. Instead, SIP Proxy now rejects the message with a &amp;lt;tt&amp;gt;400 Bad request&amp;lt;/tt&amp;gt; response and keeps the connection intact.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3813&lt;br /&gt;
|IssueCategoryId=5c483167-c133-4dc5-87c0-bd2719670bc1&lt;br /&gt;
|Content=SIP Proxy now supports SIP devices reusing same TCP connection for all communications with SIP Proxy&lt;br /&gt;
|LocalContent=Voice SIP Proxy service now supports SIP devices reusing the same TCP connection for all communications with SIP Proxy.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3638&lt;br /&gt;
|IssueCategoryId=720446c8-10b6-42b8-af36-34a298aa1c72&lt;br /&gt;
|LocalContent=Voice SIP Cluster service now supports a voice call rebalancing feature that allows the transition of voice calls from a SIP Cluster service instance, undergoing graceful termination, to a successor service instance. This type of voice call transition enhances call handling continuation during a rolling upgrade or service scale-down. Voice SIP Proxy service both supports and facilitates the voice call rebalancing feature.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Cluster_Service/100.0.100.0025&amp;diff=116421</id>
		<title>RN/VoiceSIP Cluster Service/100.0.100.0025</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=RN/VoiceSIP_Cluster_Service/100.0.100.0025&amp;diff=116421"/>
		<updated>2022-03-07T20:19:19Z</updated>

		<summary type="html">&lt;p&gt;Corinneh: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ComponentRN&lt;br /&gt;
|ComponentId=dc95d354-6dba-4291-98d9-f11343c12f7b&lt;br /&gt;
|JQL=issue = VOICEMCS-3844 OR issue = VOICEMCS-3843&lt;br /&gt;
|DeploymentTypeId=5439f1be-1868-4091-b058-1667389b6ce1&lt;br /&gt;
|ReleaseDate=2022-03-07&lt;br /&gt;
|Highlight=*Support for a new voice call rebalancing feature.&lt;br /&gt;
*Support for customization of the Designer Application Server (DAS) part of the &amp;lt;tt&amp;gt;dial-plan-moh&amp;lt;/tt&amp;gt; option value.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3844&lt;br /&gt;
|IssueCategoryId=720446c8-10b6-42b8-af36-34a298aa1c72&lt;br /&gt;
|Content=In this release, SIP Cluster service introduces support of new ‘Voice call rebalance’ feature allowing transition of voice calls from a SIP Cluster service instance, undergoing graceful termination, to a successor service instance.Such transition of voice calls enhances call handling continuation in cases of rolling upgrade or service scale down. (VOICEMCS-2596)&lt;br /&gt;
|LocalContent=Voice SIP Cluster service now supports a voice call rebalancing feature that allows the transition of voice calls from a SIP Cluster service instance, undergoing graceful termination, to a successor service instance. This type of voice call transition enhances call handling continuation during a rolling upgrade or service scale-down.&lt;br /&gt;
}}&lt;br /&gt;
{{Issue&lt;br /&gt;
|TicketNumber=VOICEMCS-3843&lt;br /&gt;
|IssueCategoryId=720446c8-10b6-42b8-af36-34a298aa1c72&lt;br /&gt;
|LocalContent=Voice SIP Cluster service now allows customization of the Designer Application Server (DAS) part of the &amp;lt;tt&amp;gt;dial-plan-moh&amp;lt;/tt&amp;gt; option value. To customize the value, specify a new &amp;lt;tt&amp;gt;designerDasAddress&amp;lt;/tt&amp;gt; parameter in the Helm chart '''values.yaml''' file.&lt;br /&gt;
&lt;br /&gt;
Support for this feature begins with Helm chart version voice-sip-100.0.1000013.tgz.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Corinneh</name></author>
		
	</entry>
</feed>