Skip to content

Commit 0957e2b

Browse files
authored
Merge pull request #296356 from MicrosoftDocs/main
OOB Publish 3/14 - ASAP
2 parents 78ab6f8 + 2c7bd43 commit 0957e2b

33 files changed

+3965
-2161
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6289,6 +6289,11 @@
62896289
"redirect_url": "/azure/virtual-network/vnet-integration-for-azure-services",
62906290
"redirect_document_id": false
62916291
},
6292+
{
6293+
"source_path_from_root": "/articles/cyclecloud/how-to/ccws/cleanup-roles.md",
6294+
"redirect_url": "/azure/cyclecloud/how-to/ccws/deploy-with-cli",
6295+
"redirect_document_id": false
6296+
},
62926297
{
62936298
"source_path": "articles/cloud-services/applications-dont-support-tls-1-2.md",
62946299
"redirect_url": "/previous-versions/azure/cloud-services/applications-dont-support-tls-1-2",

articles/app-service/overview-vnet-integration.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: madsd
55
ms.topic: conceptual
6-
ms.date: 04/05/2024
6+
ms.date: 03/14/2025
77
ms.author: madsd
88
ms.custom: UpdateFrequency3
99

@@ -20,15 +20,15 @@ This article describes the Azure App Service virtual network integration feature
2020
App Service has two variations:
2121

2222
* The dedicated compute pricing tiers, which include the Basic, Standard, Premium, Premium v2, and Premium v3.
23-
* The App Service Environment, which deploys directly into your virtual network with dedicated supporting infrastructure and is using the Isolated and Isolated v2 pricing tiers.
23+
* The App Service Environment, which deploys directly into your virtual network with dedicated supporting infrastructure and is using the Isolated v2 pricing tiers.
2424

2525
The virtual network integration feature is used in Azure App Service dedicated compute pricing tiers. If your app is in an [App Service Environment](./environment/overview.md), it already integrates with a virtual network and doesn't require you to configure virtual network integration feature to reach resources in the same virtual network. For more information on all the networking features, see [App Service networking features](./networking-features.md).
2626

2727
Virtual network integration gives your app access to resources in your virtual network, but it doesn't grant inbound private access to your app from the virtual network. Private site access refers to making an app accessible only from a private network, such as from within an Azure virtual network. Virtual network integration is used only to make outbound calls from your app into your virtual network. Refer to [private endpoint](./networking/private-endpoint.md) for inbound private access.
2828

2929
The virtual network integration feature:
3030

31-
* Requires a [supported Basic or Standard](./overview-vnet-integration.md#limitations), Premium, Premium v2, Premium v3, or Elastic Premium App Service pricing tier.
31+
* Requires a Basic, Standard, Premium, Premium v2, Premium v3, or Elastic Premium App Service pricing tier.
3232
* Supports TCP and UDP.
3333
* Works with App Service apps, function apps, and Logic apps.
3434

@@ -211,9 +211,6 @@ After your app integrates with your virtual network, it uses the same DNS server
211211

212212
There are some limitations with using virtual network integration:
213213

214-
* The feature is available from all App Service deployments in Premium v2 and Premium v3. It's also available in Basic and Standard tier but only from newer App Service deployments. If you're on an older deployment, you can only use the feature from a Premium v2 App Service plan. If you want to make sure you can use the feature in a Basic or Standard App Service plan, create your app in a Premium v3 App Service plan. Those plans are only supported on our newest deployments. You can scale down if you want after the plan is created.
215-
* The feature isn't available for Isolated plan apps in an App Service Environment.
216-
* You can't reach resources across peering connections with classic virtual networks.
217214
* The feature requires an unused subnet that's an IPv4 `/28` block or larger in an Azure Resource Manager virtual network. MPSJ requires a `/26` block or larger.
218215
* The app and the virtual network must be in the same region.
219216
* The integration virtual network can't have IPv6 address spaces defined.

articles/bastion/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can also find the latest Bastion updates and subscribe to the RSS feed [here
2727
| SKU | [Bastion Premium SKU](bastion-overview.md#sku)| Bastion Premium SKU is now generally available in all regions that Bastion is available in. | June 2024 | N/A|
2828
| Feature | [Microsoft Entra ID support for portal (SSH)](bastion-connect-vm-ssh-linux.md#microsoft-entra-id-authentication) |Microsoft Entra ID support for SSH connections in portal is now GA. | November 2024 | N/A|
2929
|Feature | [Availability Zones for Bastion](../reliability/reliability-bastion.md?toc=/azure/bastion/TOC.json) |Availability Zones is now in public preview as a customer-enabled feature in select regions. | May 2024 | See available region list [here](../reliability/reliability-bastion.md?toc=%2Fazure%2Fbastion%2FTOC.json#regions-supported).
30-
|SKU | [Bastion Developer SKU](quickstart-developer-sku.md) | Bastion Developer SKU is now in GA for select regions. | May 2024 | See available region list [here](quickstart-developer-sku.md#developer).
30+
|Platform Capability| [Bastion Developer](quickstart-developer-sku.md) | Bastion Developer is now in GA for select regions. | May 2024 | See available region list [here](quickstart-developer-sku.md#developer).
3131

3232

3333
## Next steps

articles/cost-management-billing/savings-plan/scope-savings-plan.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,10 @@ You have the following options to scope a savings plan, depending on your needs:
2121

2222
- **Resource group scope** - Applies benefits to eligible resources in the selected resource group.
2323
- **Subscription scope** - Applies benefits to eligible resources in the selected subscription.
24-
- **Management group** - Applies benefits to eligible resources from all subscriptions in both the management group and billing scope.
25-
- **Shared scope** - Applies benefits to eligible resources within subscriptions that are in the EA enrollment or MCA billing profile.
26-
- If a subscription is moved to different enrollment/billing profile, benefits will no longer be applied to the subscription.
27-
- For EA customers, shared scope can include multiple Microsoft Entra tenants in the enrollment.
28-
- For Microsoft Customer Agreement customers, the billing scope is the billing profile. The shared scope can include multiple Microsoft Entra tenants in a billing profile.
24+
- **Management group** - Applies benefits to eligible resources from all subscriptions that are in both:
25+
- the management group
26+
- the same Enrollment/Billing Profile as the subscription used to purchase the benefit
27+
- **Shared scope** - Applies benefits to eligible resources within subscriptions that are in the EA Enrollment or MCA Billing Profile. The shared scope benefits applied to all Microsoft Entra tenants in the Enrollment/Billing Profile.
2928

3029
## Scope processing order
3130
While applying savings plan benefits to your usage, Azure processes savings plans in the following order:

articles/cyclecloud/how-to/ccws/cleanup-roles.md

Lines changed: 0 additions & 18 deletions
This file was deleted.

articles/cyclecloud/how-to/ccws/plan-your-deployment.md

Lines changed: 41 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -2,46 +2,59 @@
22
title: Plan your CycleCloud Workspace for Slurm Deployment
33
description: A checklist to help plan for your CycleCloud Workspace for Slurm deployment
44
author: xpillons
5-
ms.date: 08/22/2024
6-
ms.author: xpillons
5+
ms.date: 03/05/2025
6+
ms.author: padmalathas
77
---
88

99
# Plan your CycleCloud Workspace for Slurm Deployment
10-
You can deploy either a greenfield environment in which all resources needed for Azure CycleCloud Workspace for Slurm will be provisioned for you or a brownfield deployment for which you will provide existing resources.
10+
11+
You have two deployment options for Azure CycleCloud Workspace for Slurm:
12+
- Greenfield environment: In this option, all the resources needed are provisioned for you.
13+
- Brownfield deployment: In this option, you provide the existing resources.
1114

1215
When doing a deployment, the Azure user account used need to be granted the following roles:
1316
- `Contributor` on the Subscription
1417
- `User Access Administrator` on the Subscription
1518

19+
> Note: It is recommended to pre-deploy a [Hub VNet](/azure/architecture/networking/architecture/hub-spoke) to connect to your enterprise network if one is not already established. This hub can accommodate a [VPN Gateway](/azure/vpn-gateway/tutorial-create-gateway-portal) and an Azure Bastion. The CycleCloud Workspace for Slurm environment will be a spoke and peered during deployment.
20+
1621
## Greenfield Deployment
1722

18-
In a greenfield deployment, the following resources and role assignments will be created:
19-
- Resource Group
20-
- The Virtual Network, its subnets `ccw-cyclecloud-subnet`, and `ccw-compute-subnet`
21-
- The Virtual Machine `ccw-cyclecloud-vm`, NIC, OS, Data Disks, and a System Managed Identity
22-
- A uniquely named storage account for CycleCloud projects
23-
- Network Security Group named `nsg-ccw-common`
24-
- `Contributor`, `Storage Account Contributor`, and `Storage Blob Data Contributor` roles at the subscription level for the CycleCloud VM System Managed Identity
25-
- Optionally a Bastion, subnet `AzureBastionSubnet`, and public IP `bastion-pip`
26-
- Optionally a NAT gateway named `ccw-nat-gateway` and public IP `pip-ccw-nat-gateway`
27-
- Optionally an Azure NetApp Files account, pool, and volume with subnet `hpc-anf-subnet`
28-
- Optionally an Azure Managed Lustre Filesystem with subnet `ccw-lustre-subnet`
29-
- Optionally a VNET Peering
30-
- Optionally a Private Endpoint to an existing Azure Database for MySQL flexible server instance
23+
In a greenfield deployment, the following resources and role assignments are created:
24+
- A Resource Group.
25+
- The Virtual Network, its subnets `ccw-cyclecloud-subnet`, and `ccw-compute-subnet`.
26+
- The Virtual Machine (VM) `ccw-cyclecloud-vm`, NIC, OS, Data Disks, and a System Managed Identity.
27+
- A User-Assigned Managed Identity used to access the CycleCloud storage account.
28+
- A uniquely named storage account for CycleCloud projects and a Private Endpoint in the `ccw-cyclecloud-subnet`.
29+
- Network Security Group (NSG) named `nsg-ccw-common`.
30+
- `Contributor`, `Storage Account Contributor`, and `Storage Blob Data Contributor` roles at the subscription level for the CycleCloud VM System Managed Identity.
31+
- Optionally a Bastion, subnet `AzureBastionSubnet`, and public IP `bastion-pip`.
32+
- Optionally a NAT gateway named `ccw-nat-gateway` and public IP `pip-ccw-nat-gateway`.
33+
- Optionally an Azure NetApp Files account, pool, and volume with subnet `hpc-anf-subnet`.
34+
- Optionally an Azure Managed Lustre Filesystem with subnet `ccw-lustre-subnet`.
35+
- Optionally a VNET Peering.
36+
- Optionally a Private Endpoint to an existing Azure Database for MySQL flexible server instance.
3137

3238
## Brownfield Deployment
33-
You will be able to provide existing resources for:
34-
- The VNET and subnets in which the environment will be deployed
35-
- Filesystem Storage for the users's home directories and/or additional filers, as external NFS mount points or Azure Managed Lustre Filesystem
36-
- an Azure Database for MySQL flexible server instance for Slurm Job Accounting
37-
38-
If you bring your own VNET you have to follow these pre-requisistes:
39-
- a /29 **cyclecloud** subnet for the CycleCloud VM, with `Microsoft.Storage` Service Endpoint assigned,
40-
- a **compute** subnet for the nodes, with `Microsoft.Storage` Service Endpoint assigned. This is where the scheduler, login, and compute nodes will be created
41-
- when using Azure NetApp Files, a dedicated **netapp** subnet with the `Microsoft.NetApp/volumes` delegation as documented here [Azure NetApp Files](/azure/azure-netapp-files/azure-netapp-files-introduction).
42-
- when using Azure Managed Lustre Filesystem, a dedicated **lustre** subnet with a CIDR based on the storage capacity to provision as documented here [Azure Managed Lustre](/azure/azure-managed-lustre/amlfs-overview)
43-
- if deploying a Bastion, a dedicated **BastionSubnet** as documented [here](/azure/bastion/configuration-settings#subnet)
39+
40+
In a brownfield deployment, you can provide existing resources for:
41+
- The VNET and subnets in which the environment is deployed.
42+
- Filesystem Storage for the user's home directories and/or other filers, as external NFS mount points or Azure Managed Lustre Filesystem (AMLS).
43+
- An Azure Database for MySQL flexible server instance for Slurm Job Accounting.
44+
45+
If you're bringing your own VNET, follow these prerequisites:
46+
- A /29 **cyclecloud** subnet for the CycleCloud VM.
47+
- A **compute** subnet for the nodes, where the scheduler, login, and compute nodes are created.
48+
- When using Azure NetApp Files, a dedicated **netapp** subnet with the `Microsoft.NetApp/volumes` delegation as documented here [Azure NetApp Files](/azure/azure-netapp-files/azure-netapp-files-introduction).
49+
- When using Azure Managed Lustre Filesystem, a dedicated **lustre** subnet with a CIDR based on the storage capacity to provision as documented here [Azure Managed Lustre](/azure/azure-managed-lustre/amlfs-overview).
50+
- If deploying a Bastion, a dedicated **BastionSubnet** as documented [here](/azure/bastion/configuration-settings#subnet).
4451
- Your NSGs should allow communications between subnets as defined in the [bicep/network-new.bicep](https://github.com/Azure/cyclecloud-slurm-workspace/blob/main/bicep/network-new.bicep) file.
4552

4653
## Quotas
47-
Before deploying, ensure that your subscription has the required quota for the Virtual Machine types desired for CycleCloud nodes.
54+
55+
Before deploying, ensure that your subscription has the required quota for the VM types desired for the CycleCloud nodes.
56+
57+
## Resources
58+
59+
* [How to create and manage a VPN gateway using the Azure portal](/azure/vpn-gateway/tutorial-create-gateway-portal)
60+
* [Configure P2S VPN Gateway for Microsoft Entra ID authentication – Microsoft-registered app](/azure/vpn-gateway/point-to-site-entra-gateway)
304 KB
Loading
-2.96 KB
Loading
4.83 KB
Loading

0 commit comments

Comments
 (0)