You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/commission-cluster.md
+20-10Lines changed: 20 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,14 +54,12 @@ WinRM may already be enabled on your machine, as you only need to do it once. En
54
54
55
55
1. At the prompt, enter your Azure Stack Edge password. Ignore the following message:
56
56
57
-
```powershell
58
-
WARNING: The Windows PowerShell interface of your device is intended to
57
+
`WARNING: The Windows PowerShell interface of your device is intended to
59
58
be used only for the initial network configuration. Please
60
59
engage Microsoft Support if you need to access this interface
61
60
to troubleshoot any potential issues you may be experiencing.
62
61
Changes made through this interface without involving Microsoft
63
-
Support could result in an unsupported configuration.
64
-
```
62
+
Support could result in an unsupported configuration.`
65
63
66
64
You now have a minishell session set up ready to enable your Azure Kubernetes Service in the next step.
67
65
@@ -177,12 +175,18 @@ The page should now look like the following image:
177
175
:::image type="content" source="media/commission-cluster/commission-cluster-kubernetes-preview-enabled.png" alt-text="Screenshot showing Kubernetes (Preview) with two tables. The first table is called Compute virtual switch and the second is called Virtual network. A green tick shows that the virtual networks are enabled for Kubernetes.":::
178
176
:::zone-end
179
177
180
-
## Start the cluster and set up Arc
178
+
## Enable VM management on the ASE
181
179
182
-
Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
180
+
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
181
+
1. Select **Edge services**.
182
+
1. Select **Virtual machines**.
183
+
1. Select **Enable**.
184
+
185
+
## Start the cluster and set up Arc
183
186
184
187
If you're running other VMs on your Azure Stack Edge, we recommend that you stop them now, and start them again once the cluster is deployed. The cluster requires access to specific CPU resources that running VMs may already be using.
185
188
189
+
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
186
190
1. To deploy the cluster, select the **Kubernetes** option and then select the **Add** button to configure the cluster.
187
191
188
192
:::image type="content" source="media/commission-cluster/commission-cluster-add-kubernetes.png" alt-text="Screenshot of Kubernetes Overview pane, showing the Add button to configure Kubernetes service.":::
@@ -194,7 +198,7 @@ If you're running other VMs on your Azure Stack Edge, we recommend that you stop
194
198
195
199
The creation of the Kubernetes cluster takes about 20 minutes. During creation, there may be a critical alarm displayed on the **Azure Stack Edge** resource. This alarm is expected and should disappear after a few minutes.
196
200
197
-
Once deployed, the portal should show **Kubernetes service is healthy** on the overview page.
201
+
Once deployed, the portal should show **Kubernetes service is running** on the overview page.
198
202
199
203
## Set up kubectl access
200
204
@@ -240,13 +244,17 @@ You can now view information about what’s running on the cluster – the follo
240
244
241
245
You should verify that the AKS cluster is set up correctly by running the following *kubectl* commands using the *kubeconfig* downloaded from the UI in [Set up kubectl access](#set-up-kubectl-access):
242
246
243
-
`kubectl get nodes`
247
+
```azurecli
248
+
kubectl get nodes
249
+
```
244
250
245
251
This command should return two nodes, one named *nodepool-aaa-bbb* and one named *target-cluster-control-plane-ccc*.
246
252
247
253
To view all the running pods, run:
248
254
249
-
`kubectl get pods -A`
255
+
```azurecli
256
+
kubectl get pods -A
257
+
```
250
258
251
259
Additionally, your AKS cluster should now be visible from your Azure Stack Edge resource in the portal.
252
260
@@ -302,8 +310,10 @@ The Azure Private 5G Core private mobile network requires a custom location and
1. View the list of interfaces that can be monitored:
35
37
36
-
`upft list`
38
+
```azurecli
39
+
upft list
40
+
```
37
41
38
42
1. Run `upftdump` with any parameters that you would usually pass to tcpdump. In particular, `-i` to specify the interface, and `-w` to specify where to write to. Close the UPFT tool when done by pressing <kbd>Ctrl + C</kbd>. The following examples are common use cases:
39
43
- To run capture packets on all interfaces run `upftdump -i any -w any.pcap`
@@ -43,17 +47,23 @@ Data plane packet capture works by mirroring packets to a Linux kernel interface
43
47
> Packet capture files may be large, particularly when running packet capture on all interfaces. Specify filters when running packet capture to reduce the file size - see the tcpdump documentation for the available filters.
44
48
1. Leave the container:
45
49
46
-
`exit`
50
+
```azurecli
51
+
exit
52
+
```
47
53
48
54
1. Copy the output files:
49
55
50
-
`kubectl cp -n core core-upf-pp-0: <path to output file> <location to copy to> -c troubleshooter`
56
+
```azurecli
57
+
kubectl cp -n core core-upf-pp-0:<path to output file> <location to copy to> -c troubleshooter
58
+
```
51
59
52
60
The `tcpdump` may have been stopped in the middle of writing a packet, which can cause this step to produce an error stating `unexpected EOF`. However, your file should have copied successfully, but you can check your target output file to confirm.
0 commit comments