Predix Edge Technician Console Release Notes 2.2.0

These are the new features and known and resolved issues for the 2.2.0 release of Predix Edge Technician Console (PETC 1.2).

New Features

This release contains the following new features:

Input Validation for NTP Configuration
User input validation of the NTP configuration and additional details in the PETC UI about the NTP configuration:
  • Maximum of 10 addresses allowed in the NTP setting.
  • The user's session may be invalidated and the user logged out if the NTP server time differs by more than 5 minutes.
Support for Underscores
Support has been added for underscores in application/service names/IDs.
Disallowed Actions for System Containers Disabled
Actions that are not allowed on system containers are now disabled when a system container is selected.

Defect Fixes

This release contains the following defect fixes:

Accessibility of User Management Module
The user management module should always be accessible for PETC Admin users.
Duplicate Services
Remove duplicate services in the Logs module.
Certificate Issue

Fixed certificate issue that may prevent you from connecting to multiple Predix Edge consoles on the same browser. With this fix, you may have to manually refresh the PETC browser tab the first time after a Host OS upgrade.

Known Issues

This release contains the following known issues:

Firefox Log Out
When a user tries to log out of PETC in Firefox, it fails.

Workaround: Use Google Chrome, or clear cookies in Firefox.

Password Reset
You cannot reset your password via the PETC UI. To reset a user's password, a PETC admin user should delete the user and re-create it.
Update Host OS
If you are not redirected to the PETC login page within five minutes of applying a host OS update in PETC from Predix Edge 2.0.x, please refresh your browser.
Simultaneous Operations

PETC does not support concurrent administrative requests. Doing an operation which modifies the state of Predix Edge should be performed from only one browser at a time. Otherwise, the results are unpredictable. Examples of such operations include a host update and applying a configuration to an application.