Predix Edge Technician Console Release Notes 2.2.0
These are the new features and known and resolved issues for the 2.2.0 release of Predix Edge Technician Console (PETC 1.2).
New Features
This release contains the following new features:
- Input Validation for NTP Configuration
- User input validation of the NTP configuration and additional details in the PETC UI about the NTP configuration:
- Maximum of 10 addresses allowed in the NTP setting.
- The user's session may be invalidated and the user logged out if the NTP server time differs by more than 5 minutes.
- Support for Underscores
- Support has been added for underscores in application/service names/IDs.
- Disallowed Actions for System Containers Disabled
- Actions that are not allowed on system containers are now disabled when a system container is selected.
Defect Fixes
This release contains the following defect fixes:
- Accessibility of User Management Module
- The user management module should always be accessible for PETC Admin users.
- Duplicate Services
- Remove duplicate services in the Logs module.
- Certificate Issue
-
Fixed certificate issue that may prevent you from connecting to multiple Predix Edge consoles on the same browser. With this fix, you may have to manually refresh the PETC browser tab the first time after a Host OS upgrade.
Known Issues
This release contains the following known issues:
- Firefox Log Out
- When a user tries to log out of PETC in Firefox, it fails.
Workaround: Use Google Chrome, or clear cookies in Firefox.
- Password Reset
- You cannot reset your password via the PETC UI. To reset a user's password, a PETC admin user should delete the user and re-create it.
- Update Host OS
- If you are not redirected to the PETC login page within five minutes of applying a host OS update in PETC from Predix Edge 2.0.x, please refresh your browser.
- Simultaneous Operations
-
PETC does not support concurrent administrative requests. Doing an operation which modifies the state of Predix Edge should be performed from only one browser at a time. Otherwise, the results are unpredictable. Examples of such operations include a host update and applying a configuration to an application.