You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/openid-connect-technical-profile.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 08/22/2023
12
+
ms.date: 09/12/2023
13
13
ms.author: kengaderdus
14
14
ms.subservice: B2C
15
15
---
@@ -88,7 +88,7 @@ The technical profile also returns claims that aren't returned by the identity p
88
88
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
89
89
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
90
90
| IncludeClaimResolvingInClaimsHandling | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
91
-
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
91
+
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
92
92
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
93
93
| SingleLogoutEnabled | No | Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](./session-behavior.md#sign-out). Possible values: `true` (default), or `false`. |
94
94
|ReadBodyClaimsOnIdpRedirect| No| Set to `true` to read claims from response body on identity provider redirect. This metadata is used with [Apple ID](identity-provider-apple-id.md), where claims return in the response payload.|
Copy file name to clipboardExpand all lines: articles/databox-online/azure-stack-edge-gpu-2309-release-notes.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: alkohli
7
7
ms.service: databox
8
8
ms.subservice: edge
9
9
ms.topic: article
10
-
ms.date: 09/25/2023
10
+
ms.date: 10/01/2023
11
11
ms.author: alkohli
12
12
---
13
13
@@ -19,7 +19,7 @@ The following release notes identify the critical open issues and the resolved i
19
19
20
20
The release notes are continuously updated, and as critical issues requiring a workaround are discovered, they're added. Before you deploy your device, carefully review the information contained in the release notes.
21
21
22
-
This article applies to the **Azure Stack Edge 2309** release, which maps to software version **3.2.2380.1652**.
22
+
This article applies to the **Azure Stack Edge 2309** release, which maps to software version **3.2.2380.1632**.
23
23
24
24
> [!Warning]
25
25
> In this release, you must update the packet core version to AP5GC 2308 before you update to Azure Stack Edge 2309. For detailed steps, see [Azure Private 5G Core 2308 release notes](../private-5g-core/azure-private-5g-core-release-notes-2308.md).
@@ -49,15 +49,27 @@ You can update to the latest version using the following update paths:
49
49
50
50
The 2309 release has the following new features and enhancements:
51
51
52
-
- Beginning this release, you have the option of selecting Kubernetes profiles based on your workloads. You can also configure Maximum Transmission Unit (MTU) for the network interfaces on your device.
53
-
- Starting March 2023, Azure Stack Edge devices are required to be on the 2301 release or later to create a Kubernetes cluster. In preparation for this requirement, it is highly recommended that you update to the latest version as soon as possible.
52
+
- Beginning this release, you have the option of selecting Kubernetes profiles based on your workloads. You can select the Kubernetes workload profiles via the [local UI](azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md?pivots=two-node#configure-compute-ips-1) or via the [PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-workload-profiles) of your device.
53
+
- In this release, you can configure Maximum Transmission Unit (MTU) for the network interfaces on your device. For more information, see [Configure MTU via the local UI](azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md?pivots=single-node#configure-virtual-switches).
54
+
- In this release, new VM sizes have been added. For more information, see the [Supported VM sizes for Azure Stack Edge](azure-stack-edge-gpu-virtual-machine-sizes.md).
55
+
- Starting this release, you can created a VM image with custom sizes and use that to create your VMs. For more information, see [Create a VM image with custom size](azure-stack-edge-create-vm-with-custom-size.md).
56
+
- Beginning this release, you can create VM images starting from an image from Azure Marketplace or an image in your Storage account. For more information, see [Create a VM image from Azure Marketplace or Azure storage account](azure-stack-edge-create-a-vm-from-azure-marketplace.md).
57
+
- Several security, supportability, diagnostics, resiliency, and performance improvements were made in this release.
54
58
- You can deploy Azure Kubernetes service (AKS) on an Azure Stack Edge cluster. This feature is supported only for SAP and PMEC customers. For more information, see [Deploy AKS on Azure Stack Edge](azure-stack-edge-deploy-aks-on-azure-stack-edge.md).
59
+
- In this release, a precheck that verifies if the Azure Resource Manager certificate has expired, was added to the Azure Kubernetes Service (AKS) update.
60
+
- The `Set-HcsKubernetesAzureMonitorConfiguration` PowerShell cmdlet that enables the Azure Monitor is fixed in this release. Though the cmdlet is available to use, we recommend that you configure Azure Monitor for Azure Stack Edge via the Azure Arc portal.
61
+
- Starting March 2023, Azure Stack Edge devices are required to be on the 2301 release or later to create a Kubernetes cluster. In preparation for this requirement, it is highly recommended that you update to the latest version as soon as possible.
62
+
55
63
56
64
## Issues fixed in this release
57
65
58
66
| No. | Feature | Issue |
59
67
| --- | --- | --- |
60
68
|**1.**|Core Azure Stack Edge platform and Azure Kubernetes Service (AKS) on Azure Stack Edge |Critical bug fixes to improve workload availability during two-node Azure Stack Edge update of core Azure Stack Edge platform and AKS on Azure Stack Edge. |
69
+
|**2.**|Virtual machines and virtual network |In previous releases, there were VM provisioning timeouts when virtual network was created on a port that supported accelerated networking and the primary network interface associated with the VM was also attached to the same virtual network. <br><br>A fix was incorporated in this release that always turned off accelerated networking on the primary network interface for the VM. |
70
+
|**3.**|Virtual machines and virtual network |In the earlier releases, the primary network interface on the VM was not validated to have a reachable gateway IP. <br><br>In this release, this issue is fixed. The validation of the gateway IP helps identify any potential network configuration issues before the VM provision timeout occurs. |
71
+
|**4.**|Virtual machines and virtual network |In the earlier releases, the MAC address allocation algorithm only considered the last two octets whereas the MAC address range actually spanned last three octets. This discrepancy led to allocation conflicts in certain corner cases, resulting in overlapping MAC addresses. <br><br>The MAC address allocation is revised in this release to fix the above issue.|
72
+
|**5.**|Azure Kubernetes Service (AKS) |In previous releases, if there was a host power failure, the pod with SRIOV capable CNIs also failed with the following error: <br><br>`Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox "<GUID>": plugin type="multus" name="multus-cni-network" failed (add): [core/core-upf-pp-0:n3-dpdk]: error adding container to network "n3-dpdk": failed to rename netvsc link: failed to rename link "001dd81c9dd4_VF" to "001dd81c9dd4": file exists.`<br><br>This failure of pod with SRIOV capable CNIs is fixed in this release. For AKS SRIOV CNI plugin, the driver name returned from ethtool is used to determine device is VF or netvsc. |
Copy file name to clipboardExpand all lines: articles/private-5g-core/ue-usage-event-hub.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ When configured, AP5GC will send data usage reports per QoS flow level for all P
48
48
|**IP Address**|String |The UE's IP address.|
49
49
|**Packet Core Control Plane ARM ID**|String |The identifier of the packet core control plane ARM associated with the UE.|
50
50
|**Packet Core Data Plane ARM ID**|String |The identifier of the packet core data plane ARM associated with the UE.|
51
-
|**ARP**|String|The address resolution protocol, including the: priority level, preemption capability and preemption vulnerability. See [5G quality of service (QoS) and QoS flows](policy-control.md#5g-quality-of-service-qos-and-qos-flows) for more information. |
51
+
|**ARP**|Object|The Allocation and Retention Policy, including the: priority level, preemption capability and preemption vulnerability. See [5G quality of service (QoS) and QoS flows](policy-control.md#5g-quality-of-service-qos-and-qos-flows) for more information. |
Copy file name to clipboardExpand all lines: articles/virtual-machines/includes/dedicated-hosts-resize.md
+21-5Lines changed: 21 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mattmcinnes
6
6
ms.topic: include
7
7
ms.service: virtual-machines
8
8
ms.subservice: azure-dedicated-host
9
-
ms.date: 07/12/2023
9
+
ms.date: 09/11/2023
10
10
ms.author: mattmcinnes
11
11
ms.reviewer: vamckMS
12
12
ms.custom: include file
@@ -22,7 +22,7 @@ Resize limitations:
22
22
- Host can only be resized to an ADH within the same VM family. A Dsv3-Type3 host can be resized to Dsv3-Type4 but **not** to an **E**sv3-Type4.
23
23
- You can only resize to newer generation of hardware. A Dsv3-Type3 host can be resized to Dsv3-Type4 but **not** Dsv3-Type2.
24
24
- Resizing changes the 'Host Asset ID'. The 'Host ID' remains the same.
25
-
- The host and all associated VMs becomes unavailable during the resize operation.
25
+
- The host and all associated VMs become unavailable during the resize operation.
26
26
27
27
> [!Warning]
28
28
> The resize operation causes the loss of any non-persistent data such as temp disk data. Save all your work to persistent data storage before triggering resize.
@@ -45,7 +45,7 @@ Resize limitations:
45
45
46
46
### [CLI](#tab/cli)
47
47
48
-
First list the sizes that you can resize in case you are unsure which to resize to.
48
+
First list the sizes that you can resize in case you're unsure which to resize to.
49
49
50
50
Use [az vm host list-resize-options](/cli/azure/vm#az-vm-host-list-resize-options)[Preview]
51
51
@@ -68,6 +68,22 @@ az vm host resize \
68
68
69
69
### [PowerShell](#tab/powershell)
70
70
71
-
PowerShell support for host resize is coming soon.
71
+
When using PowerShell, the resize feature is referred to as a host 'Update'. Use the following commands to update the host:
72
+
73
+
```azurepowershell-interactive
74
+
Update-AzHost
75
+
[-ResourceGroupName] <String>
76
+
[-HostGroupName] <String>
77
+
[-Name] <String>
78
+
[-Sku <String>]
79
+
[-AutoReplaceOnFailure <Boolean>]
80
+
[-LicenseType <DedicatedHostLicenseTypes>]
81
+
[-DefaultProfile <IAzureContextContainer>]
82
+
[-WhatIf]
83
+
[-Confirm]
84
+
[<CommonParameters>]
85
+
```
86
+
87
+
For more info on Update-AzHost, check out the [Update-AzHost reference docs](https://learn.microsoft.com/powershell/module/az.compute/update-azhost).
0 commit comments