Skip to content

Commit 875bde4

Browse files
committed
Move known issues in 2209 to Known issues from previous releases
1 parent a83b522 commit 875bde4

File tree

1 file changed

+13
-20
lines changed

1 file changed

+13
-20
lines changed

articles/private-5g-core/azure-private-5g-core-release-notes-2209.md

Lines changed: 13 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -28,35 +28,28 @@ The following table provides a summary of issues fixed in this release.
2828
| 6 | Local dashboards | Azure Private 5G Core local dashboard configuration may be lost during a configuration change. This issue has been fixed in this release. |
2929
| 7 | Local dashboards | Azure Private 5G Core local dashboards don't automatically refresh to show the latest data. This issue has been fixed in this release. |
3030

31-
## Known issues in the 2209 release
31+
## Known issues from previous releases
3232

33-
The following table provides a summary of known issues in this release.
33+
The following table provides a summary of known issues carried over from the previous releases.
3434

3535
|No. |Feature | Issue | Workaround/comments |
3636
|-----|-----|-----|-----|
3737
| 1 | Local dashboards | Azure Private 5G Core local dashboards may show incorrect values in some graphs (for example, session counts) after a power cycle of the Azure Stack Edge server. | Not applicable. |
3838
| 2 | Packet forwarding | Azure Private 5G Core drops N3 data packets received from a gNodeB if they have specific flags set in the GTP-UPacket Header, resulting in the traffic from the user equipment (UE) never reaching the server on the N6 side. Specifically, the *Sequence Number* or *N-PDU* GTP-U header flags being set cause this issue. | Configure the gNodeB to not set these problem flags. |
3939
| 3 | Local dashboards | The distributed tracing web GUI fails to display and decode some fields of 4G/5G NAS messages. Specifically, the *Request Type* and *DNN* information elements. | Messages will have to be viewed from separate packet capture if needed. |
4040
| 4 | Performance | It has been observed very rarely that CPU allocation on an Azure Private 5G Packet Core deployment can result in some signaling processing workloads sharing a logical CPU core with data plane processing workloads, resulting in session creation failures or packet processing latency/failures at a moderate load. | Redeploying the Azure Private 5G Packet Core may resolve the problematic CPU allocation. |
41-
| 5 | 4G/5G Signaling | Azure Private 5G Core may, with low periodicity, reject a small number of attach requests. | The attach requests should be reattempted. <!-- This one also shows in the August release notes - I thought we were only adding issues that first appeared in the release here? --> |
42-
| 6 | 4G/5G Signaling | 4G UEs that require both circuit switched (CS) and packet switched (PS) network availability to successfully attach to Azure Private 5G Core may disconnect immediately after a successful attach. | Update/enhance the UEs to support PS only networks if possible, as CS isn't supported by Azure Private 5G Core. If it isn't possible to reconfigure the UEs, customer support can apply a low-level configuration tweak to Azure Private 5G Core to let these UEs believe there's a CS network available. <!-- Also in the August release notes --> |
43-
44-
## Known issues from previous releases
41+
| 5 | 4G/5G Signaling | Azure Private 5G Core may, with low periodicity, reject a small number of attach requests. | The attach requests should be reattempted. |
42+
| 6 | 4G/5G Signaling | 4G UEs that require both circuit switched (CS) and packet switched (PS) network availability to successfully attach to Azure Private 5G Core may disconnect immediately after a successful attach. | Update/enhance the UEs to support PS only networks if possible, as CS isn't supported by Azure Private 5G Core. If it isn't possible to reconfigure the UEs, customer support can apply a low-level configuration tweak to Azure Private 5G Core to let these UEs believe there's a CS network available. |
43+
| 7 | Policy configuration | Azure Private 5G Core may ignore non-default quality of service (QoS) and policy configuration when handling 4G subscribers. | Not applicable. |
44+
| 8 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled. | Not applicable. |
45+
| 9 | 4G/5G Signaling | Azure Private 5G Core will incorrectly accept SCTP connections on the wrong N2 IP address. | Connect to Packet Core's N2 interface on the correct IP and port. |
46+
| 10 | 4G/5G Signaling | Azure Private 5G Core may perform an unnecessary PDU session resource setup transaction following a UE initiated service request. | Not applicable. |
47+
| 11 | 4G/5G Signaling | In rare scenarios, Azure Private 5G Core may corrupt the internal state of a packet data session, resulting in subsequent changes to that packet data session failing. | Reinstall the packet core. |
48+
| 12 | 4G/5G Signaling | In scenarios when the establishment of a PDU session has failed, Azure Private 5G Core may not automatically release the session, and the UE may need to re-register. | The UE should re-register. |
49+
| 13 | 4G/5G Signaling | In rare scenarios, due to a race condition triggered during a RAN disconnect/re-connect sequence, Azure Private 5G Core may fail to process incoming requests from the eNodeB or gNodeB.  | Reinstall the packet core. |
50+
| 14 | Local dashboards | On the packet core dashboards, the 4G interface panel doesn’t display the data. | Select each panel’s edit button and select Data source again as Prometheus and select refresh to see the data. |
51+
| 15 | 4G/5G Signaling | In rare scenarios when a significant number of UEs are bulk registered and send continuous data , the core may incorrectly release data sessions. | If sessions are released, UEs may need to re-connect with the system to use data services. |
4552

46-
The following table provides a summary of known issues carried over from the previous releases.
47-
48-
|No. |Feature | Issue | Workaround/comments |
49-
|-----|-----|-----|-----|
50-
| 1 | Policy configuration | Azure Private 5G Core may ignore non-default quality of service (QoS) and policy configuration when handling 4G subscribers. | Not applicable. |
51-
| 2 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled. | Not applicable. |
52-
| 3 | 4G/5G Signaling | Azure Private 5G Core will incorrectly accept SCTP connections on the wrong N2 IP address. | Connect to Packet Core's N2 interface on the correct IP and port. |
53-
| 4 | 4G/5G Signaling | Azure Private 5G Core may perform an unnecessary PDU session resource setup transaction following a UE initiated service request. | Not applicable. |
54-
| 5 | 4G/5G Signaling | In rare scenarios, Azure Private 5G Core may corrupt the internal state of a packet data session, resulting in subsequent changes to that packet data session failing. | Reinstall the packet core. |
55-
| 6 | 4G/5G Signaling | In scenarios when the establishment of a PDU session has failed, Azure Private 5G Core may not automatically release the session, and the UE may need to re-register. | The UE should re-register. |
56-
| 7 | 4G/5G Signaling | In rare scenarios, due to a race condition triggered during a RAN disconnect/re-connect sequence, Azure Private 5G Core may fail to process incoming requests from the eNodeB or gNodeB.  | Reinstall the packet core. |
57-
| 8 | Local dashboards | On the packet core dashboards, the 4G interface panel doesn’t display the data. | Select each panel’s edit button and select Data source again as Prometheus and select refresh to see the data. |
58-
| 9 | 4G/5G Signaling | In rare scenarios when a significant number of UEs are bulk registered and send continuous data , the core may incorrectly release data sessions. | If sessions are released, UEs may need to re-connect with the system to use data services. |
59-
6053
## Next steps
6154

6255
- [Upgrade the packet core instance in a site - Azure portal](upgrade-packet-core-azure-portal.md)

0 commit comments

Comments
 (0)