Skip to content

Commit 10da7b2

Browse files
authored
Merge pull request #230610 from James-Green-Microsoft/ha-ase-ui-changes
GUI changes for HA
2 parents 5ab7e49 + 079d141 commit 10da7b2

18 files changed

+179
-82
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22445,6 +22445,11 @@
2244522445
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2244622446
"redirect_URL": "/azure/private-5g-core",
2244722447
"redirect_document_id": false
22448+
},
22449+
{
22450+
"source_path": "articles/private-5g-core/modify-site-plan.md",
22451+
"redirect_URL": "/azure/private-5g-core/modify-service-plan",
22452+
"redirect_document_id": false
2244822453
},
2244922454
{
2245022455
"source_path": "articles/communications-gateway/rotate-secrets.md",

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,10 @@ Collect all the values in the following table for the mobile network site resour
3131
|The Azure resource group in which to create the mobile network site resource. We recommend that you use the same resource group that already contains your private mobile network. |**Project details: Resource group**|
3232
|The name for the site. |**Instance details: Name**|
3333
|The region in which you deployed the private mobile network. |**Instance details: Region**|
34+
|The packet core in which to create the mobile network site resource. |**Instance details: Packet core name**|
3435
|The [region code name](region-code-names.md) of the region in which you deployed the private mobile network. For the East US region, this is *eastus*; for West Europe, this is *westeurope*. </br></br>You only need to collect this value if you're going to create your site using an ARM template. |Not applicable.|
3536
|The mobile network resource representing the private mobile network to which you’re adding the site. </br></br>You only need to collect this value if you're going to create your site using an ARM template. |Not applicable.|
36-
|The billing plan for the site that you are creating. The available plans have the following throughput, activated SIMs and radio access network (RAN) allowances:</br></br>G0 - 100 Mbps per site, 20 activated SIMs per network and 2 RAN connections. </br> G1 - 1 Gbps per site, 100 activated SIMs per network and 5 RAN connections. </br> G2 - 2 Gbps per site, 200 activated SIMs per network and 10 RAN connections. </br> G3 - 3 Gbps per site, 300 activated SIMs per network and unlimited RAN connections. </br> G4 - 4 Gbps per site, 400 activated SIMs per network and unlimited RAN connections. </br> G5 - 5 Gbps per site, 500 activated SIMs per network and unlimited RAN connections. </br> G10 - 10 Gbps per site, 1000 activated SIMs per network and unlimited RAN connections.|**Instance details: Site plan**|
37+
|The billing plan for the site that you are creating. The available plans have the following throughput, activated SIMs and radio access network (RAN) allowances:</br></br>G0 - 100 Mbps per site, 20 activated SIMs per network and 2 RAN connections. </br> G1 - 1 Gbps per site, 100 activated SIMs per network and 5 RAN connections. </br> G2 - 2 Gbps per site, 200 activated SIMs per network and 10 RAN connections. </br> G5 - 5 Gbps per site, 500 activated SIMs per network and unlimited RAN connections. </br> G10 - 10 Gbps per site, 1000 activated SIMs per network and unlimited RAN connections.|**Instance details: Service plan**|
3738

3839
## Collect packet core configuration values
3940

articles/private-5g-core/create-a-site.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,15 @@ In this step, you'll create the mobile network site resource representing the ph
4848
- Use the information you collected in [Collect packet core configuration values](collect-required-information-for-a-site.md#collect-packet-core-configuration-values) to fill out the **Technology type**, **Azure Stack Edge device**, and **Custom location** fields.
4949
- Select the recommended packet core version in the **Version** field.
5050

51-
> [!NOTE]
52-
> If a warning appears about an incompatibility between the selected packet core version and the current Azure Stack Edge version, you'll need to update ASE first. Select **Upgrade ASE** from the warning prompt and follow the instructions in [Update your Azure Stack Edge Pro GPU](../databox-online/azure-stack-edge-gpu-install-update.md). Once you've finished updating your ASE, go back to the beginning of this step to create the site resource.
51+
> [!NOTE]
52+
> If a warning appears about an incompatibility between the selected packet core version and the current Azure Stack Edge version, you'll need to update ASE first. Select **Upgrade ASE** from the warning prompt and follow the instructions in [Update your Azure Stack Edge Pro GPU](../databox-online/azure-stack-edge-gpu-install-update.md). Once you've finished updating your ASE, go back to the beginning of this step to create the site resource.
5353
5454
- Ensure **AKS-HCI** is selected in the **Platform** field.
5555

56-
1. Use the information you collected in [Collect access network values](collect-required-information-for-a-site.md#collect-access-network-values) to fill out the fields in the **Access network** section. Note:
56+
1. Use the information you collected in [Collect access network values](collect-required-information-for-a-site.md#collect-access-network-values) to fill out the fields in the **Access network** section.
5757

58-
- **ASE N2 virtual subnet** and **ASE N3 virtual subnet** (if this site will support 5G UEs) or **ASE S1-MME virtual subnet** and **ASE S1-U virtual subnet** (if this site will support 4G UEs) must match the corresponding virtual network names on port 5 on your Azure Stack Edge Pro device.
58+
> [!NOTE]
59+
> **ASE N2 virtual subnet** and **ASE N3 virtual subnet** (if this site will support 5G UEs) or **ASE S1-MME virtual subnet** and **ASE S1-U virtual subnet** (if this site will support 4G UEs) must match the corresponding virtual network names on port 5 on your Azure Stack Edge Pro device.
5960
6061
1. In the **Attached data networks** section, select **Attach data network**. Choose whether you want to use an existing data network or create a new one, then use the information you collected in [Collect data network values](collect-required-information-for-a-site.md#collect-data-network-values) to fill out the fields. Note the following:
6162
- **ASE N6 virtual subnet** (if this site will support 5G UEs) or **ASE SGi virtual subnet** (if this site will support 4G UEs) must match the corresponding virtual network name on port 6 on your Azure Stack Edge Pro device.
@@ -82,7 +83,7 @@ If you decided not to configure diagnostics packet collection or use a user assi
8283
:::image type="content" source="media/create-a-site/create-site-local-access-tab.png" alt-text="Screenshot of the Azure portal showing the Local access configuration tab for a site resource.":::
8384

8485
- Under **Authentication type**, select the authentication method you decided to use in [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools).
85-
- under **Provide custom HTTPS certificate?**, select **Yes** or **No** based on whether you decided to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values). If you selected **Yes**, use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
86+
- Under **Provide custom HTTPS certificate?**, select **Yes** or **No** based on whether you decided to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values). If you selected **Yes**, use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
8687

8788
1. Select **Review + create**.
8889
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
@@ -105,6 +106,8 @@ If you decided not to configure diagnostics packet collection or use a user assi
105106

106107
:::image type="content" source="media/create-a-site/site-related-resources.png" alt-text="Screenshot of the Azure portal showing a resource group containing a site and its related resources." lightbox="media/create-a-site/site-related-resources.png":::
107108

109+
1. If you want to assign additional packet cores to the site, for each new packet core resource see LINK
110+
108111
## Next steps
109112

110113
If you decided to set up Azure AD for local monitoring access, follow the steps in [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md).
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Create additional Packet Core instances for a site - Azure portal
3+
titleSuffix: Azure Private 5G Core
4+
description: This how-to guide shows how to create additional packet core instances for a site in your private mobile network.
5+
author: James-Green-Microsoft
6+
ms.author: jamesgreen
7+
ms.service: private-5g-core
8+
ms.topic: how-to
9+
ms.date: 03/21/2023
10+
ms.custom: template-how-to
11+
---
12+
13+
# Create additional Packet Core instances for a site using the Azure portal
14+
15+
Azure Private 5G Core private mobile networks include one or more sites. Once deployed, each site can have multiple packet core instances for redundancy. In this how-to guide, you'll learn how to add additional packet core instances to a site in your private mobile network using the Azure portal.
16+
17+
## Prerequisites
18+
19+
- You must already have a site deployed in your private mobile network.
20+
- Collect all of the information in [Collect required information for a site](collect-required-information-for-a-site.md) that you used for the site.
21+
- Ensure you can sign in to the Azure portal using an account with access to the active subscription you used to create your private mobile network. This account must have the built-in Contributor or Owner role at the subscription scope.
22+
23+
## Create the packet core instance
24+
25+
In this step, you'll create an additional packet core instance for a site in your private mobile network.
26+
27+
1. Sign in to the [Azure portal](https://portal.azure.com/).
28+
1. Search for and select the **Mobile Network** resource representing the private mobile network containing the site that you want to add a packet core instance to.
29+
1. Select the **Sites** blade on the resource menu.
30+
1. Select the **Site** resource that you want to add a packet core instance to.
31+
1. Select **Add packet core**.
32+
1. Specify a **Packet core name** and select **Next : Packet core >**.
33+
1. You'll now see the **Packet core** configuration tab.
34+
1. In the **Packet core** section, set the fields as follows:
35+
36+
- Use the information you collected in [Collect packet core configuration values](collect-required-information-for-a-site.md#collect-packet-core-configuration-values) to fill out the **Technology type**, **Azure Stack Edge device**, and **Custom location** fields.
37+
- Select the recommended packet core version in the **Version** field.
38+
39+
> [!NOTE]
40+
> If a warning appears about an incompatibility between the selected packet core version and the current Azure Stack Edge version, you'll need to update ASE first. Select **Upgrade ASE** from the warning prompt and follow the instructions in [Update your Azure Stack Edge Pro GPU](../databox-online/azure-stack-edge-gpu-install-update.md). Once you've finished updating your ASE, go back to the beginning of this step to create the packet core resource.
41+
42+
- Ensure **AKS-HCI** is selected in the **Platform** field.
43+
44+
1. Use the information you collected in [Collect access network values](collect-required-information-for-a-site.md#collect-access-network-values) for the site to fill out the fields in the **Access network** section.
45+
> [!NOTE]
46+
> **ASE N2 virtual subnet** and **ASE N3 virtual subnet** (if this site supports 5G UEs) or **ASE S1-MME virtual subnet** and **ASE S1-U virtual subnet** (if this site supports 4G UEs) must match the corresponding virtual network names on port 5 on your Azure Stack Edge Pro device.
47+
48+
1. In the **Attached data networks** section, select **Attach data network**. Select the existing data network you used for the site then use the information you collected in [Collect data network values](collect-required-information-for-a-site.md#collect-data-network-values) to fill out the fields. Note the following:
49+
- **ASE N6 virtual subnet** (if this site supports 5G UEs) or **ASE SGi virtual subnet** (if this site supports 4G UEs) must match the corresponding virtual network name on port 6 on your Azure Stack Edge Pro device.
50+
- If you decided not to configure a DNS server, clear the **Specify DNS addresses for UEs?** checkbox.
51+
- If you decided to keep NAPT disabled, ensure you configure your data network router with static routes to the UE IP pools via the appropriate user plane data IP address for the corresponding attached data network.
52+
53+
Once you've finished filling out the fields, select **Attach**.
54+
55+
1. Repeat the previous step for each additional data network configured on the site.
56+
1. If you decided to configure diagnostics packet collection or use a user assigned managed identity for HTTPS certificate for this site, select **Next : Identity >**.
57+
If you decided not to configure diagnostics packet collection or use a user assigned managed identity for HTTPS certificates for this site, you can skip this step.
58+
1. Select **+ Add** to configure a user assigned managed identity.
59+
1. In the **Select Managed Identity** side panel:
60+
- Select the **Subscription** from the dropdown.
61+
- Select the **Managed identity** from the dropdown.
62+
1. If you decided you want to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values), select **Next : Local access >**. If you decided not to provide a custom HTTPS certificate for monitoring this site, you can skip this step.
63+
1. Under **Provide custom HTTPS certificate?**, select **Yes**.
64+
1. Use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
65+
1. In the **Local access** section, set the fields as follows:
66+
- Under **Authentication type**, select the authentication method you decided to use in [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools).
67+
- Under **Provide custom HTTPS certificate?**, select **Yes** or **No** based on whether you decided to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values). If you selected **Yes**, use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
68+
69+
1. Select **Review + create**.
70+
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
71+
72+
If the validation fails, you'll see an error message and the **Configuration** tab(s) containing the invalid configuration will be flagged with red dots. Select the flagged tab(s) and use the error messages to correct invalid configuration before returning to the **Review + create** tab.
73+
74+
1. Once your configuration has been validated, you can select **Create** to create the packet core instance. The Azure portal will display a confirmation screen when the packet core instance has been created.
75+
76+
1. Return to the **Site** overview, and confirm that it contains the new packet core instance.
77+
78+
## Next steps
79+
80+
If you decided to set up Azure AD for local monitoring access, follow the steps in [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md).
81+
82+
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows. See [Policy control](policy-control.md) to learn more about designing the policy control configuration for your private mobile network.

articles/private-5g-core/index.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,10 @@ landingContent:
6868
url: create-a-site.md
6969
- text: Create a site - ARM template
7070
url: create-site-arm-template.md
71-
- text: Modify a site plan
72-
url: modify-site-plan.md
71+
- text: Create additional Packet Core instances for a site - Azure portal
72+
url: create-additional-packet-core.md
73+
- text: Modify a service plan
74+
url: modify-service-plan.md
7375
- text: Delete a site
7476
url: delete-a-site.md
7577
- text: Modify a packet core instance
-44.5 KB
Loading
3.63 KB
Loading
4.72 KB
Loading
66.3 KB
Loading

0 commit comments

Comments
 (0)