You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Device Kubernetes workload profile: Other workloads.
32
-
- Kubernetes server version: v1.28.5.
32
+
- Kubernetes server version: v1.29.4.
33
33
- IoT Edge version: 0.1.0-beta15.
34
-
- Azure Arc version: 1.16.10.
35
-
- GPU driver version: 535.161.08.
34
+
- Azure Arc version: 1.19.2.
35
+
- GPU driver version: 535.183.06.
36
36
- CUDA version: 12.2.
37
37
38
-
For information on what's new in this update, go to [Release notes](azure-stack-edge-gpu-2407-release-notes.md).
38
+
For information on what's new in this update, go to [Release notes](azure-stack-edge-gpu-2501-release-notes.md).
39
39
40
-
**To apply the 2407 update, your device must be running version 2403 or later.**
40
+
**To apply the 2501 update, your device must be running version 2403 or later.**
41
41
42
42
- If you aren't running the minimum required version, you see this error:
43
43
44
44
*Update package can't be installed as its dependencies aren't met.*
45
45
46
-
- You can update to 2403 from 2303 or later, and then install 2407.
46
+
- You can update to 2403 from 2303 or later, and then install 2501.
47
47
48
48
Supported update paths:
49
49
50
-
| Current version of Azure Stack Edge software and Kubernetes | Upgrade to Azure Stack Edge software and Kubernetes | Desired update to 2407|
50
+
| Current version of Azure Stack Edge software and Kubernetes | Upgrade to Azure Stack Edge software and Kubernetes | Desired update to 2501|
51
51
|-------|----------|------------ |
52
-
| 2303 | 2403 |2407|
53
-
| 2309 | 2403 |2407|
54
-
| 2312 | 2403 |2407|
55
-
| 2403 | Directly to |2407|
52
+
| 2303 | 2403 |2501|
53
+
| 2309 | 2403 |2501|
54
+
| 2312 | 2403 |2501|
55
+
| 2403 | Directly to |2501|
56
56
57
57
### Update Azure Kubernetes service on Azure Stack Edge
58
58
59
59
> [!IMPORTANT]
60
60
> Use the following procedure only if you are an SAP or a PMEC customer.
61
61
62
-
If you have Azure Kubernetes service deployed and your Azure Stack Edge device and Kubernetes versions are either 2207 or 2209, you must update in multiple steps to apply 2407.
62
+
If you have Azure Kubernetes service deployed and your Azure Stack Edge device and Kubernetes versions are either 2207 or 2209, you must update in multiple steps to apply 2501.
63
63
64
64
Use the following steps to update your Azure Stack Edge version and Kubernetes version to 2407:
65
65
66
66
1. Update your device version to 2403.
67
67
1. Update your Kubernetes version to 2210.
68
68
1. Update your Kubernetes version to 2403.
69
-
1. Update both device software and Kubernetes to 2407.
69
+
1. Update both device software and Kubernetes to 2501.
70
70
71
-
If you're running 2210 or 2301, you can update both your device version and Kubernetes version directly to 2403 and then to 2407.
71
+
If you're running 2210 or 2301, you can update both your device version and Kubernetes version directly to 2403 and then to 2501.
72
72
73
-
If you're running 2403, you can update both your device version and Kubernetes version directly to 2407.
73
+
If you're running 2403, you can update both your device version and Kubernetes version directly to 2501.
74
74
75
-
In Azure portal, the process requires two clicks, the first update gets your device version to 2403 and your Kubernetes version to 2210, and the second update gets your Kubernetes version upgraded to 2407.
75
+
In Azure portal, the process requires two clicks, the first update gets your device version to 2403 and your Kubernetes version to 2210, and the second update gets your Kubernetes version upgraded to 2501.
76
76
77
-
From the local UI, you'll have to run each update separately: update the device version to 2403, update Kubernetes version to 2210, update Kubernetes version to 2403, and then the third update gets both the device version and Kubernetes version to 2407.
77
+
From the local UI, you'll have to run each update separately: update the device version to 2403, update Kubernetes version to 2210, update Kubernetes version to 2403, and then the third update gets both the device version and Kubernetes version to 2501.
78
78
79
79
Each time you change the Kubernetes profile, you're prompted for the Kubernetes update. Go ahead and apply the update.
80
80
@@ -231,7 +231,7 @@ Do the following steps to download the update from the Microsoft Update Catalog.
231
231
232
232
1. In the search box of the Microsoft Update Catalog, enter the Knowledge Base (KB) number of the hotfix or terms for the update you want to download. For example, enter **Azure Stack Edge**, and then select **Search**.
233
233
234
-
The update listing appears as **Azure Stack Edge Update 2403**.
234
+
The update listing appears as **Azure Stack Edge Update 2501**.
235
235
236
236
> [!NOTE]
237
237
> Make sure to verify which workload you are running on your device [via the local UI](./azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md#configure-compute-ips-1) or [via the PowerShell](./azure-stack-edge-connect-powershell-interface.md) interface of the device. Depending on the workload that you are running, the update package will differ.
@@ -275,7 +275,7 @@ This procedure takes around 20 minutes to complete. Perform the following steps
275
275
276
276
5. The update starts. After the device is successfully updated, it restarts. The local UI isn't accessible in this duration.
277
277
278
-
6. After the restart is complete, you're taken to the **Sign in** page. To verify that the device software has been updated, in the local web UI, go to **Maintenance** > **Software update**. For the current release, the displayed software version should be **Azure Stack Edge 2403**.
278
+
6. After the restart is complete, you're taken to the **Sign in** page. To verify that the device software has been updated, in the local web UI, go to **Maintenance** > **Software update**. For the current release, the displayed software version should be **Azure Stack Edge 2501**.
279
279
280
280
281
281
7. You'll now update the Kubernetes software version. Select the remaining two Kubernetes files together (file with the *Kubernetes_Package.0.exe* and *Kubernetes_Package.1.exe* suffix) and repeat the above steps to apply update.
Copy file name to clipboardExpand all lines: articles/dns/private-dns-fallback.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,18 @@
1
1
---
2
-
title: Fallback to internet for Azure Private DNS zones (Preview)
2
+
title: Fallback to internet for Azure Private DNS zones
3
3
titleSuffix: Azure DNS
4
4
description: Learn how to enable fallback to internet resolution for private DNS.
5
5
services: dns
6
6
author: greg-lindsay
7
7
ms.service: azure-dns
8
-
ms.date: 11/24/2024
8
+
ms.date: 02/04/2025
9
9
ms.author: greglin
10
10
ms.topic: how-to
11
11
---
12
12
13
-
# Fallback to internet for Azure Private DNS zones (Preview)
13
+
# Fallback to internet for Azure Private DNS zones
14
14
15
-
This article shows you how to set the [ResolutionPolicy](/java/api/com.azure.resourcemanager.privatedns.models.resolutionpolicy) property in Azure Private DNS to enable fallback to internet recursion when an authoritative NXDOMAIN response is received for a Private Link zone. On the DNS client side, there's no response to the DNS query.
16
-
17
-
> [!NOTE]
18
-
> Fallback to internet for Azure Private DNS is in PREVIEW.<br>
19
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.<br><br>
20
-
> This internet fallback policy preview is offered without a requirement to enroll in a pre-release feature preview.
15
+
This article shows you how to set the [ResolutionPolicy](/java/api/com.azure.resourcemanager.privatedns.models.resolutionpolicy) property in Azure Private DNS to enable fallback to internet recursion when an authoritative NXDOMAIN response is received for a Private Link zone. NXDOMAIN is also known as a negative response. When a DNS resolver receives (or has cached) a negative response, it sends no DNS response to the DNS client and the query fails.
21
16
22
17
## Problem
23
18
@@ -101,7 +96,7 @@ This guide assumes you have provisioned the prerequisite resources before procee
101
96
102
97
> [!NOTE]
103
98
> Storage accounts that are in the same resource group have resource records in the same Private DNS zone.<br>
104
-
> Storage accounts that are in different resource groups have resource records in different (identically-named) Private DNS zones.
99
+
> Storage accounts that are in different resource groups have resource records in different (identicallynamed) Private DNS zones.
Copy file name to clipboardExpand all lines: articles/firmware-analysis/automate-firmware-analysis-service-principals.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: Use service principals to automate workflows in Firmware analysis
3
-
description: Learn about how to use service principals to automate workflows for Firmware Analysis.
2
+
title: Use service principals to automate workflows in firmware analysis
3
+
description: Learn about how to use service principals to automate workflows for firmware analysis.
4
4
author: karengu0
5
5
ms.author: karenguo
6
6
ms.topic: conceptual
7
7
ms.date: 11/04/2024
8
8
ms.service: azure
9
9
---
10
10
11
-
# How to Use Service Principals to Automate Workflows in Firmware analysis
11
+
# How to Use Service Principals to Automate Workflows in firmware analysis
12
12
13
13
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A [service principal](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
14
14
@@ -44,9 +44,12 @@ Many users of the firmware analysis service may need to automate their workflow.
44
44
az login --service-principal --username <CLIENT_ID> --password <SECRET> --tenant <TENANT_ID>
45
45
```
46
46
47
-
6. Once logged in, refer to the following Quickstarts for scripts to interact with the Firmware analysis service via Azure PowerShell, Azure CLI, or Python:
47
+
6. Once logged in, refer to the following Quickstarts for scripts to interact with the firmware analysis service via Azure PowerShell, Azure CLI, or Python:
48
48
- [Upload firmware using Azure CLI](quickstart-upload-firmware-using-azure-command-line-interface.md)
49
49
- [Upload firmware using Azure PowerShell](quickstart-upload-firmware-using-powershell.md)
50
50
- [Upload firmware using Python](quickstart-upload-firmware-using-python.md)
0 commit comments