Skip to content

Commit 4fb7a00

Browse files
committed
Updated to remove references to 'Data Box Gateway'.
1 parent 68da2c0 commit 4fb7a00

5 files changed

+9
-9
lines changed

articles/databox-online/azure-stack-edge-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: v-dalc
77
ms.service: azure-stack-edge
88
ms.custom: devx-track-arm-template
99
ms.topic: how-to
10-
ms.date: 01/29/2025
10+
ms.date: 02/04/2025
1111
ms.author: alkohli
1212
---
1313
# Review alerts on Azure Stack Edge

articles/databox-online/azure-stack-edge-gpu-deploy-add-shares.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: alkohli
66

77
ms.service: azure-stack-edge
88
ms.topic: tutorial
9-
ms.date: 05/09/2022
9+
ms.date: 02/04/2025
1010
ms.author: alkohli
1111
# Customer intent: As an IT admin, I need to understand how to add and connect to shares on Azure Stack Edge Pro so I can use it to transfer data to Azure.
1212
---
@@ -57,7 +57,7 @@ To create a share, do the following procedure:
5757
c. Provide a storage account where the share will reside.
5858

5959
> [!IMPORTANT]
60-
> Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
60+
> Tiering data from an Azure Stack Edge Pro device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
6161
>
6262
> * Storage Blob Data Contributor
6363
> * Storage File Data Privileged Contributor

articles/databox-online/azure-stack-edge-gpu-install-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: alkohli
66

77
ms.service: azure-stack-edge
88
ms.topic: how-to
9-
ms.date: 08/14/2024
9+
ms.date: 02/04/2025
1010
ms.author: alkohli
1111
---
1212
# Update your Azure Stack Edge Pro GPU
@@ -119,7 +119,7 @@ We recommend that you install updates through Azure portal. The device automatic
119119

120120
> [!NOTE]
121121
> - Make sure that the device is healthy and status shows as **Your device is running fine!** before you proceed to install the updates.
122-
> - Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
122+
> - Tiering data from an Azure Stack Edge Pro device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
123123
>
124124
> - Storage Blob Data Contributor
125125
> - Storage File Data Privileged Contributor

articles/databox-online/azure-stack-edge-gpu-manage-storage-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: azure-stack-edge
88
ms.custom: devx-track-azurepowershell
99
ms.topic: how-to
10-
ms.date: 01/29/2025
10+
ms.date: 02/05/2025
1111
ms.author: alkohli
1212
---
1313
# Use the Azure portal to manage Edge storage accounts on your Azure Stack Edge Pro GPU
@@ -89,7 +89,7 @@ You can now select a container from this list and select **+ Delete container**
8989
Each Azure Storage account has two 512-bit storage access keys that are used for authentication when the storage account is accessed. One of these two keys must be supplied when your Azure Stack Edge device accesses your cloud storage service provider (in this case, Azure).
9090

9191
> [!NOTE]
92-
> Access to your Azure Storage Account using storage access keys from Azure Stack Edge Pro or Data Box Gateway device has been deprecated in 2501. Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access from 2501. For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
92+
> Access to your Azure Storage Account using storage access keys from an Azure Stack Edge Pro device has been deprecated in 2501. Tiering data from an Azure Stack Edge Pro device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access from 2501. For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
9393
9494
An Azure administrator can regenerate or change the access key by directly accessing the storage account (via the Azure Storage service). The Azure Stack Edge service and the device do not see this change automatically.
9595

includes/azure-stack-edge-gateway-add-storage-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: alkohli
33
ms.service: azure-databox
44
ms.topic: include
5-
ms.date: 01/29/2025
5+
ms.date: 02/04/2025
66
ms.author: alkohli
77
---
88

@@ -20,7 +20,7 @@ ms.author: alkohli
2020

2121
3. By default, the Edge storage account is mapped to an Azure Storage account in the cloud, and the data from the storage account is automatically pushed to the cloud. Specify the Azure storage account that your Edge storage account is mapped to.
2222
> [!IMPORTANT]
23-
> Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
23+
> Tiering data from an Azure Stack Edge Pro device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
2424
>
2525
> * Storage Blob Data Contributor
2626
> * Storage File Data Privileged Contributor

0 commit comments

Comments
 (0)