Skip to content

Commit 1a7b8ee

Browse files
authored
Merge pull request #253425 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 10/2
2 parents 1123b7d + 4c0d46b commit 1a7b8ee

File tree

6 files changed

+54
-22
lines changed

6 files changed

+54
-22
lines changed

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 08/22/2023
12+
ms.date: 09/12/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -88,7 +88,7 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
8989
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9090
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
91-
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
91+
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
9292
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
9393
| SingleLogoutEnabled | No | Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](./session-behavior.md#sign-out). Possible values: `true` (default), or `false`. |
9494
|ReadBodyClaimsOnIdpRedirect| No| Set to `true` to read claims from response body on identity provider redirect. This metadata is used with [Apple ID](identity-provider-apple-id.md), where claims return in the response payload.|

articles/databox-online/azure-stack-edge-gpu-2309-release-notes.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: article
10-
ms.date: 09/25/2023
10+
ms.date: 10/01/2023
1111
ms.author: alkohli
1212
---
1313

@@ -19,7 +19,7 @@ The following release notes identify the critical open issues and the resolved i
1919

2020
The release notes are continuously updated, and as critical issues requiring a workaround are discovered, they're added. Before you deploy your device, carefully review the information contained in the release notes.
2121

22-
This article applies to the **Azure Stack Edge 2309** release, which maps to software version **3.2.2380.1652**.
22+
This article applies to the **Azure Stack Edge 2309** release, which maps to software version **3.2.2380.1632**.
2323

2424
> [!Warning]
2525
> In this release, you must update the packet core version to AP5GC 2308 before you update to Azure Stack Edge 2309. For detailed steps, see [Azure Private 5G Core 2308 release notes](../private-5g-core/azure-private-5g-core-release-notes-2308.md).
@@ -49,15 +49,27 @@ You can update to the latest version using the following update paths:
4949

5050
The 2309 release has the following new features and enhancements:
5151

52-
- Beginning this release, you have the option of selecting Kubernetes profiles based on your workloads. You can also configure Maximum Transmission Unit (MTU) for the network interfaces on your device.
53-
- Starting March 2023, Azure Stack Edge devices are required to be on the 2301 release or later to create a Kubernetes cluster. In preparation for this requirement, it is highly recommended that you update to the latest version as soon as possible.
52+
- Beginning this release, you have the option of selecting Kubernetes profiles based on your workloads. You can select the Kubernetes workload profiles via the [local UI](azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md?pivots=two-node#configure-compute-ips-1) or via the [PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-workload-profiles) of your device.
53+
- In this release, you can configure Maximum Transmission Unit (MTU) for the network interfaces on your device. For more information, see [Configure MTU via the local UI](azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md?pivots=single-node#configure-virtual-switches).
54+
- In this release, new VM sizes have been added. For more information, see the [Supported VM sizes for Azure Stack Edge](azure-stack-edge-gpu-virtual-machine-sizes.md).
55+
- Starting this release, you can created a VM image with custom sizes and use that to create your VMs. For more information, see [Create a VM image with custom size](azure-stack-edge-create-vm-with-custom-size.md).
56+
- Beginning this release, you can create VM images starting from an image from Azure Marketplace or an image in your Storage account. For more information, see [Create a VM image from Azure Marketplace or Azure storage account](azure-stack-edge-create-a-vm-from-azure-marketplace.md).
57+
- Several security, supportability, diagnostics, resiliency, and performance improvements were made in this release.
5458
- You can deploy Azure Kubernetes service (AKS) on an Azure Stack Edge cluster. This feature is supported only for SAP and PMEC customers. For more information, see [Deploy AKS on Azure Stack Edge](azure-stack-edge-deploy-aks-on-azure-stack-edge.md).
59+
- In this release, a precheck that verifies if the Azure Resource Manager certificate has expired, was added to the Azure Kubernetes Service (AKS) update.
60+
- The `Set-HcsKubernetesAzureMonitorConfiguration` PowerShell cmdlet that enables the Azure Monitor is fixed in this release. Though the cmdlet is available to use, we recommend that you configure Azure Monitor for Azure Stack Edge via the Azure Arc portal.
61+
- Starting March 2023, Azure Stack Edge devices are required to be on the 2301 release or later to create a Kubernetes cluster. In preparation for this requirement, it is highly recommended that you update to the latest version as soon as possible.
62+
5563

5664
## Issues fixed in this release
5765

5866
| No. | Feature | Issue |
5967
| --- | --- | --- |
6068
|**1.**|Core Azure Stack Edge platform and Azure Kubernetes Service (AKS) on Azure Stack Edge |Critical bug fixes to improve workload availability during two-node Azure Stack Edge update of core Azure Stack Edge platform and AKS on Azure Stack Edge. |
69+
|**2.**|Virtual machines and virtual network |In previous releases, there were VM provisioning timeouts when virtual network was created on a port that supported accelerated networking and the primary network interface associated with the VM was also attached to the same virtual network. <br><br>A fix was incorporated in this release that always turned off accelerated networking on the primary network interface for the VM. |
70+
|**3.**|Virtual machines and virtual network |In the earlier releases, the primary network interface on the VM was not validated to have a reachable gateway IP. <br><br>In this release, this issue is fixed. The validation of the gateway IP helps identify any potential network configuration issues before the VM provision timeout occurs. |
71+
|**4.**|Virtual machines and virtual network |In the earlier releases, the MAC address allocation algorithm only considered the last two octets whereas the MAC address range actually spanned last three octets. This discrepancy led to allocation conflicts in certain corner cases, resulting in overlapping MAC addresses. <br><br>The MAC address allocation is revised in this release to fix the above issue.|
72+
|**5.**|Azure Kubernetes Service (AKS) |In previous releases, if there was a host power failure, the pod with SRIOV capable CNIs also failed with the following error: <br><br>`Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox "<GUID>": plugin type="multus" name="multus-cni-network" failed (add): [core/core-upf-pp-0:n3-dpdk]: error adding container to network "n3-dpdk": failed to rename netvsc link: failed to rename link "001dd81c9dd4_VF" to "001dd81c9dd4": file exists.`<br><br>This failure of pod with SRIOV capable CNIs is fixed in this release. For AKS SRIOV CNI plugin, the driver name returned from ethtool is used to determine device is VF or netvsc. |
6173

6274
<!--## Known issues in this release
6375

articles/databox-online/azure-stack-edge-gpu-connect-powershell-interface.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: how-to
10-
ms.date: 09/28/2023
10+
ms.date: 10/01/2023
1111
ms.author: alkohli
1212
---
1313
# Manage an Azure Stack Edge Pro GPU device via Windows PowerShell
@@ -100,21 +100,25 @@ After virtual switches are created, you can enable the switches for Kubernetes c
100100
101101
1. [Connect to the PowerShell interface](#connect-to-the-powershell-interface).
102102
2. Use the `Get-HcsApplianceInfo` cmdlet to get current `KubernetesPlatform` and `KubernetesWorkloadProfile` settings for your device.
103+
3. Use the `Get-HcsKubernetesWorkloadProfiles` cmdlet to identify the profiles available on your Azure Stack Edge device.
103104
104-
The following example shows the usage of this cmdlet:
105-
106-
```powershell
107-
Get-HcsApplianceInfo
108-
```
109-
110-
3. Use the `Set-HcsKubernetesWorkloadProfile` cmdlet to set the workload profile for AP5GC an Azure Private MEC solution.
105+
```powershell
106+
[Device-IP]: PS>Get-HcsKubernetesWorkloadProfiles
107+
Type Description
108+
---- -----------
109+
AP5GC an Azure Private MEC solution
110+
SAP a SAP Digital Manufacturing for Edge Computing or another Microsoft partner solution
111+
NONE other workloads
112+
[Device-IP]: PS>
113+
```
114+
115+
4. Use the `Set-HcsKubernetesWorkloadProfile` cmdlet to set the workload profile for AP5GC, an Azure Private MEC solution.
111116

112117
The following example shows the usage of this cmdlet:
113118

114119
```powershell
115120
Set-HcsKubernetesWorkloadProfile -Type "AP5GC"
116121
```
117-
118122
Here is sample output for this cmdlet:
119123
120124
```powershell

articles/private-5g-core/complete-private-mobile-network-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ To use Azure Private 5G Core, you need to register some additional resource prov
243243
1. If your account has multiple subscriptions, make sure you are in the correct one:
244244
245245
```azurecli
246-
az account set -subscription <subscription_id>
246+
az account set --subscription <subscription_id>
247247
```
248248
249249
1. Check the Azure CLI version:

articles/private-5g-core/ue-usage-event-hub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ When configured, AP5GC will send data usage reports per QoS flow level for all P
4848
|**IP Address** |String |The UE's IP address.|
4949
|**Packet Core Control Plane ARM ID** |String |The identifier of the packet core control plane ARM associated with the UE.|
5050
|**Packet Core Data Plane ARM ID** |String |The identifier of the packet core data plane ARM associated with the UE.|
51-
|**ARP**|String|The address resolution protocol, including the: priority level, preemption capability and preemption vulnerability. See [5G quality of service (QoS) and QoS flows](policy-control.md#5g-quality-of-service-qos-and-qos-flows) for more information. |
51+
|**ARP**|Object|The Allocation and Retention Policy, including the: priority level, preemption capability and preemption vulnerability. See [5G quality of service (QoS) and QoS flows](policy-control.md#5g-quality-of-service-qos-and-qos-flows) for more information. |
5252
|- **ArpPriorityLevel**|Int (1-15) |See **ARP** above.|
5353
|- **Preemption Capability**|String |See **ARP** above.|
5454
|- **Preemption Vulnerability**|String |See **ARP** above.|

articles/virtual-machines/includes/dedicated-hosts-resize.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mattmcinnes
66
ms.topic: include
77
ms.service: virtual-machines
88
ms.subservice: azure-dedicated-host
9-
ms.date: 07/12/2023
9+
ms.date: 09/11/2023
1010
ms.author: mattmcinnes
1111
ms.reviewer: vamckMS
1212
ms.custom: include file
@@ -22,7 +22,7 @@ Resize limitations:
2222
- Host can only be resized to an ADH within the same VM family. A Dsv3-Type3 host can be resized to Dsv3-Type4 but **not** to an **E**sv3-Type4.
2323
- You can only resize to newer generation of hardware. A Dsv3-Type3 host can be resized to Dsv3-Type4 but **not** Dsv3-Type2.
2424
- Resizing changes the 'Host Asset ID'. The 'Host ID' remains the same.
25-
- The host and all associated VMs becomes unavailable during the resize operation.
25+
- The host and all associated VMs become unavailable during the resize operation.
2626

2727
> [!Warning]
2828
> The resize operation causes the loss of any non-persistent data such as temp disk data. Save all your work to persistent data storage before triggering resize.
@@ -45,7 +45,7 @@ Resize limitations:
4545

4646
### [CLI](#tab/cli)
4747

48-
First list the sizes that you can resize in case you are unsure which to resize to.
48+
First list the sizes that you can resize in case you're unsure which to resize to.
4949

5050
Use [az vm host list-resize-options](/cli/azure/vm#az-vm-host-list-resize-options) [Preview]
5151

@@ -68,6 +68,22 @@ az vm host resize \
6868

6969
### [PowerShell](#tab/powershell)
7070

71-
PowerShell support for host resize is coming soon.
71+
When using PowerShell, the resize feature is referred to as a host 'Update'. Use the following commands to update the host:
72+
73+
```azurepowershell-interactive
74+
Update-AzHost
75+
[-ResourceGroupName] <String>
76+
[-HostGroupName] <String>
77+
[-Name] <String>
78+
[-Sku <String>]
79+
[-AutoReplaceOnFailure <Boolean>]
80+
[-LicenseType <DedicatedHostLicenseTypes>]
81+
[-DefaultProfile <IAzureContextContainer>]
82+
[-WhatIf]
83+
[-Confirm]
84+
[<CommonParameters>]
85+
```
86+
87+
For more info on Update-AzHost, check out the [Update-AzHost reference docs](https://learn.microsoft.com/powershell/module/az.compute/update-azhost).
7288

73-
---
89+
---

0 commit comments

Comments
 (0)