Skip to content

Commit cdb915f

Browse files
authored
Merge pull request #72603 from sethmanheim/wk4-9
Adding customer feedback issues
2 parents 7f7dd29 + 14f5afc commit cdb915f

File tree

2 files changed

+21
-11
lines changed

2 files changed

+21
-11
lines changed

articles/azure-stack/azure-stack-update-1902.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -194,8 +194,13 @@ The following are post-installation known issues for this build version.
194194
<!-- 1663805 - IS ASDK -->
195195
- You cannot view permissions to your subscription using the Azure Stack portals. As a workaround, use [PowerShell to verify permissions](/powershell/module/azs.subscriptions.admin/get-azssubscriptionplan).
196196

197-
<!-- 4377800 - IS ASDK -->
198-
In the user portal, when you navigate to a blob within a storage account and try to open Access Policy from the navigation tree, the subsequent window fails to load.
197+
<!-- Daniel 3/28 -->
198+
- In the user portal, when you navigate to a blob within a storage account and try to open **Access Policy** from the navigation tree, the subsequent window fails to load. To work around this issue, the following PowerShell cmdlets enable creating, retrieving, setting and deleting access policies, respectively:
199+
200+
- [New-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/new-azurestoragecontainerstoredaccesspolicy)
201+
- [Get-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/get-azurestoragecontainerstoredaccesspolicy)
202+
- [Set-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/set-azurestoragecontainerstoredaccesspolicy)
203+
- [Remove-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/remove-azurestoragecontainerstoredaccesspolicy)
199204

200205
<!-- ### Health and monitoring -->
201206

articles/azure-stack/azure-stack-update-1903.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ ms.workload: na
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 04/09/2019
16+
ms.date: 04/10/2019
1717
ms.author: sethm
1818
ms.reviewer: adepue
19-
ms.lastreviewed: 04/09/2019
19+
ms.lastreviewed: 04/10/2019
2020
---
2121

2222
# Azure Stack 1903 update
@@ -93,7 +93,8 @@ Azure Stack hotfixes are only applicable to Azure Stack integrated systems; do n
9393
9494
- When you run [Test-AzureStack](azure-stack-diagnostic-test.md), a warning message from the Baseboard Management Controller (BMC) is displayed. You can safely ignore this warning.
9595
96-
- <!-- 2468613 - IS --> During installation of this update, you might see alerts with the title **Error – Template for FaultType UserAccounts.New is missing.** You can safely ignore these alerts. The alerts close automatically after the installation of this update completes.
96+
<!-- 2468613 - IS -->
97+
- During installation of this update, you might see alerts with the title **Error – Template for FaultType UserAccounts. New is missing.** You can safely ignore these alerts. The alerts close automatically after the installation of this update completes.
9798
9899
## Post-update steps
99100
@@ -120,10 +121,15 @@ The following are post-installation known issues for this build version.
120121
- Deleting user subscriptions results in orphaned resources. As a workaround, first delete user resources or the entire resource group, and then delete the user subscriptions.
121122
122123
<!-- 1663805 - IS ASDK -->
123-
- You cannot view permissions to your subscription using the Azure Stack portals. As a workaround, use [PowerShell to verify permissions](/powershell/module/azs.subscriptions.admin/get-azssubscriptionplan).
124+
- You cannot view permissions to your subscription using the Azure Stack portals. As a workaround, use [PowerShell to verify permissions](/powershell/module/azurerm.resources/get-azurermroleassignment).
124125
125126
<!-- Daniel 3/28 -->
126-
- In the user portal, when you navigate to a blob within a storage account and try to open **Access Policy** from the navigation tree, the subsequent window fails to load.
127+
- In the user portal, when you navigate to a blob within a storage account and try to open **Access Policy** from the navigation tree, the subsequent window fails to load. To work around this issue, the following PowerShell cmdlets enable creating, retrieving, setting and deleting access policies, respectively:
128+
129+
- [New-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/new-azurestoragecontainerstoredaccesspolicy)
130+
- [Get-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/get-azurestoragecontainerstoredaccesspolicy)
131+
- [Set-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/set-azurestoragecontainerstoredaccesspolicy)
132+
- [Remove-AzureStorageContainerStoredAccessPolicy](/powershell/module/azure.storage/remove-azurestoragecontainerstoredaccesspolicy)
127133
128134
<!-- Daniel 3/28 -->
129135
- In the user portal, when you try to upload a blob using the **OAuth(preview)** option, the task fails with an error message. To work around this issue, upload the blob using the **SAS** option.
@@ -153,17 +159,16 @@ The following are post-installation known issues for this build version.
153159
154160
- An Ubuntu 18.04 VM created with SSH authorization enabled will not allow you to use the SSH keys to sign in. As a workaround, use VM access for the Linux extension to implement SSH keys after provisioning, or use password-based authentication.
155161
156-
- Azure Stack now supports Windows Azure Linux agents greater than version 2.2.20. This support was a part of 1901 and 1902 hotfix and allows customers to maintain consistent linux images between Azure and Azure Stack.
157-
162+
- Azure Stack now supports Windows Azure Linux agents greater than version 2.2.20. This support was a part of the 1901 and 1902 hotfixes and allows customers to maintain consistent Linux images between Azure and Azure Stack.
158163
159164
- If you do not have a Hardware Lifecycle Host (HLH): before build 1902, you had to set group policy **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options** to **Send LM & NTLM – use NTLMv2 session security if negotiated**. Since build 1902, you must leave it as **Not Defined** or set it to **Send NTLMv2 response only** (which is the default value). Otherwise, you won't be able to establish a PowerShell remote session and you will see an **Access is denied** error:
160165
161-
```shell
166+
```powershell
162167
PS C:\Users\Administrator> $session = New-PSSession -ComputerName x.x.x.x -ConfigurationName PrivilegedEndpoint -Credential $cred
163168
New-PSSession : [x.x.x.x] Connecting to remote server x.x.x.x failed with the following error message : Access is denied. For more information, see the
164169
about_Remote_Troubleshooting Help topic.
165170
At line:1 char:12
166-
+ $session = New-PSSession -ComputerName x.x.x.x -ConfigurationNa ...
171+
+ $Session = New-PSSession -ComputerName x.x.x.x -ConfigurationNa ...
167172
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
168173
+ CategoryInfo : OpenError: (System.Manageme....RemoteRunspace:RemoteRunspace) [New-PSSession], PSRemotingTransportException
169174
+ FullyQualifiedErrorId : AccessDenied,PSSessionOpenFailed

0 commit comments

Comments
 (0)