You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/commission-cluster.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ The packet core instances in the Azure Private 5G Core service run on an Arc-ena
28
28
29
29
## Configure Kubernetes for Azure Private MEC on the Azure Stack Edge device
30
30
31
-
These steps modify the Kubernetes cluster on the Azure Stack Edge device to optimize it for Azure Private MEC workloads.
31
+
These steps modify the Kubernetes cluster on the Azure Stack Edge device to optimize it for Azure Private Multi-access Edge Compute (MEC) workloads.
32
32
33
33
1. In the local UI, select **Kubernetes** in the left-hand menu.
34
34
2. Under **Choose the option that best describes your scenario**, select **an Azure Private MEC solution in your environment**.
@@ -37,7 +37,7 @@ These steps modify the Kubernetes cluster on the Azure Stack Edge device to opti
37
37
38
38
:::image type="content" source="media/commission-cluster/commission-cluster-enable-aks.png" alt-text="Screenshot of ASE Kubernetes configuration menu. The Azure Private MEC radio button is selected. The Workload confirmation popup is overlaid.":::
39
39
40
-
Once you've applied these changes, you should see an updated option in the local UI – **Kubernetes** becomes **Kubernetes (Preview)** as shown in the following image.
40
+
You should see an updated option in the local UI – **Kubernetes** becomes **Kubernetes (Preview)** as shown in the following image.
41
41
42
42
:::image type="content" source="media/commission-cluster/commission-cluster-kubernetes-preview.png" alt-text="Screenshot of configuration menu, with Kubernetes (Preview) highlighted.":::
43
43
@@ -75,60 +75,60 @@ You can input all the settings on this page before selecting **Apply** at the bo
75
75
2. Create virtual networks representing the following interfaces (which you allocated subnets and IP addresses for in [Allocate subnets and IP addresses](complete-private-mobile-network-prerequisites.md#allocate-subnets-and-ip-addresses)):
76
76
- Control plane access interface
77
77
- User plane access interface
78
-
- User plane data interface(s)
78
+
- User plane data interfaces
79
79
80
80
You can name these networks yourself, but the name **must** match what you configure in the Azure portal when deploying Azure Private 5G Core. If you are using VLAN trunking (required for HA deployments), you have **one single** N6 virtual network with no IP information. VLAN and IP information is done when configuring the mobile network. With this setup, you could use the names **N2**, **N3** and **N6**.
81
81
82
-
Under Access VLAN or non-VLAN mode, there is an N6 virtual network for each attached data network. You could use the names **N2**, **N3** and up to ten**N6-DNX** (where **X** is the DN number 1-10 in a multiple DN deployment; or just **N6** for a single DN deployment). You can optionally configure each virtual network with a virtual local area network identifier (VLAN ID) to enable layer 2 traffic separation. The following example is for a 5G multi-DN deployment without VLANs.
82
+
Under Access VLAN or non-VLAN mode, there is an N6 virtual network for each attached data network. You could use the names **N2**, **N3** and up to 10**N6-DNX** (where **X** is the data network (DN) number 1-10 in a multiple DN deployment; or just **N6** for a single DN deployment). You can optionally configure each virtual network with a virtual local area network identifier (VLAN ID) to enable layer 2 traffic separation. The following example is for a 5G multi-DN deployment without VLANs.
83
83
:::zone pivot="ase-pro-2"
84
-
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure 3 times:
84
+
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure three times:
85
85
1. Select **Add virtual network** and fill in the side panel:
86
86
-**Virtual switch**: select **vswitch-port3** for N2 and N3. Select **vswitch-port4** for N6.
87
87
-**Name**: *N2*, *N3*, or *N6*.
88
88
-**VLAN type**: Trunk VLAN
89
89
-**Allowed VLAN ID Range**: Fill in the set of VLAN-IDs you want to configure.
90
90
2. Select **Modify** to save the configuration for this virtual network.
91
-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
92
-
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (twelve times in total if you have the maximum ten data networks):
91
+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
92
+
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (12 times in total if you have the maximum 10 data networks):
93
93
> [!IMPORTANT]
94
94
> If you are using port 3 for data networks, we recommend that it is used for the lowest expected load.
95
95
1. Select **Add virtual network** and fill in the side panel:
96
-
-**Virtual switch**: select **vswitch-port3** for N2, N3 and up to four DNs, and select **vswitch-port4** for up to six DNs.
96
+
-**Virtual switch**: select **vswitch-port3** for N2, N3, and up to four DNs, and select **vswitch-port4** for up to six DNs.
97
97
-**Name**: *N2*, *N3*, or *N6-DNX* (where *X* is the DN number 1-10).
98
98
-**VLAN**: VLAN ID, or 0 if not using VLANs
99
99
-**Network** and **Gateway**: Use the correct subnet and gateway for the IP address configured on the ASE port (even if the gateway is not set on the ASE port itself).
100
100
- For example, *10.232.44.0/24* and *10.232.44.1*
101
-
- If the subnet does not have a default gateway, use another IP address in the subnet which will respond to ARP requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
101
+
- If the subnet does not have a default gateway, use another IP address in the subnet that will respond to Address Resolution Protocol (ARP) requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
102
102
-**DNS server** and **DNS suffix** should be left blank.
103
103
1. Select **Modify** to save the configuration for this virtual network.
104
-
1. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
104
+
1. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
105
105
The page should now look like the following image:
106
106
107
107
:::image type="content" source="media/commission-cluster/commission-cluster-advanced-networking-ase-2.png" alt-text="Screenshot showing Advanced networking, with a table of virtual switch information and a table of virtual network information.":::
108
108
:::zone-end
109
109
:::zone pivot="ase-pro-gpu"
110
-
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure 3 times:
110
+
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure three times:
111
111
1. Select **Add virtual network** and fill in the side panel:
112
112
-**Virtual switch**: select **vswitch-port5** for N2 and N3. Select **vswitch-port6** for N6.
113
113
-**Name**: *N2*, *N3*, or *N6*.
114
114
-**VLAN type**: Trunk VLAN
115
115
-**Allowed VLAN ID Range**: Fill in the set of VLAN-IDs you want to configure.
116
116
2. Select **Modify** to save the configuration for this virtual network.
117
-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
117
+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
118
118
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (twelve times in total if you have the maximum ten data networks):
119
119
> [!IMPORTANT]
120
120
> If you are using port 5 for data networks, we recommend that it is used for the lowest expected load.
121
121
1. Select **Add virtual network** and fill in the side panel:
122
-
-**Virtual switch**: select **vswitch-port5** for N2, N3 and up to four DNs, and select **vswitch-port6** for up to six DNs.
122
+
-**Virtual switch**: select **vswitch-port5** for N2, N3, and up to four DNs, and select **vswitch-port6** for up to six DNs.
123
123
-**Name**: *N2*, *N3*, or *N6-DNX* (where *X* is the DN number 1-10).
124
124
-**VLAN type**: select as appropriate.
125
125
-**VLAN**: VLAN ID, or 0 if not using VLANs
126
126
-**Network** and **Gateway**: Use the correct subnet and gateway for the IP address configured on the ASE port (even if the gateway is not set on the ASE port itself).
127
127
- For example, *10.232.44.0/24* and *10.232.44.1*
128
-
- If the subnet does not have a default gateway, use another IP address in the subnet which will respond to ARP requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
128
+
- If the subnet does not have a default gateway, use another IP address in the subnet that will respond to Address Resolution Protocol (ARP) requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
129
129
-**DNS server** and **DNS suffix** should be left blank.
130
130
2. Select **Modify** to save the configuration for this virtual network.
131
-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
131
+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
132
132
133
133
The page should now look like the following image:
134
134
@@ -142,7 +142,7 @@ In the local Azure Stack Edge UI, go to the **Kubernetes (Preview)** page. You'l
142
142
1. Under **Compute virtual switch**, select **Modify**.
143
143
1. Select the vswitch with compute intent (for example, *vswitch-port2*)
144
144
1. Enter six IP addresses in a range for the node IP addresses on the management network.
145
-
1. Enter one IP address in a range for the service IP address, also on the management network. This will be used for accessing local monitoring tools for the packet core instance.
145
+
1. Enter one IP address in a range for the service IP address, also on the management network. This is used for accessing local monitoring tools for the packet core instance.
146
146
1. Select **Modify** at the bottom of the panel to save the configuration.
147
147
> [!IMPORTANT]
148
148
> If you are using VLAN trunking (required for HA deployments), no IP configuration is done for the virtual networks at this point. IP configuration is done when configuring the mobile network.
@@ -158,7 +158,7 @@ The page should now look like the following image (in VLAN trunking mode):
158
158
159
159
:::image type="content" source="media/commission-cluster/commission-cluster-kubernetes-preview-enabled.png" alt-text="Screenshot showing Kubernetes (Preview) with two tables. The first table is called Compute virtual switch and the second is called Virtual network. A green tick shows that the virtual networks are enabled for Kubernetes.":::
160
160
161
-
## Enable VM management on the ASE
161
+
## Enable virtual machine management on the ASE
162
162
163
163
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
164
164
1. Select **Edge services**.
@@ -167,7 +167,7 @@ The page should now look like the following image (in VLAN trunking mode):
167
167
168
168
## Start the cluster and set up Arc
169
169
170
-
If you're running other VMs on your Azure Stack Edge, we recommend that you stop them now, and start them again once the cluster is deployed. The cluster requires access to specific CPU resources that running VMs may already be using.
170
+
If you're running other virtual machines (VMs) on your Azure Stack Edge, we recommend that you stop them now, and start them again once the cluster is deployed. The cluster requires access to specific CPU resources that running VMs may already be using.
171
171
172
172
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
173
173
1. To deploy the cluster, select the **Kubernetes** option and then select the **Add** button to configure the cluster.
@@ -176,7 +176,7 @@ If you're running other VMs on your Azure Stack Edge, we recommend that you stop
176
176
177
177
1. For the **Node size**, select **Standard_F16s_HPN**.
178
178
1. Ensure the **Arc enabled Kubernetes** checkbox is selected.
179
-
1. Select the **Change** link and enter the Microsoft Entra application Object ID (OID) for the custom location which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
179
+
1. Select the **Change** link and enter the Microsoft Entra application Object ID (OID) for the custom location, which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
180
180
181
181
:::image type="content" source="media/commission-cluster/commission-cluster-configure-kubernetes.png" alt-text="Screenshot of Configure Arc enabled Kubernetes pane, showing where to enter the custom location OID.":::
182
182
@@ -235,7 +235,7 @@ Additionally, your AKS cluster should now be visible from your Azure Stack Edge
235
235
236
236
## Collect variables for the Kubernetes extensions
237
237
238
-
Collect each of the values in the table below.
238
+
Collect each of the values in the following table.
239
239
240
240
| Value | Variable name |
241
241
|--|--|
@@ -332,7 +332,7 @@ You should see the new **Custom location** visible as a resource in the Azure po
332
332
333
333
If you have made an error in the Azure Stack Edge configuration, you can use the portal to remove the AKS cluster (see [Deploy Azure Kubernetes service on Azure Stack Edge](/azure/databox-online/azure-stack-edge-deploy-aks-on-azure-stack-edge)). You can then modify the settings via the local UI.
334
334
335
-
Alternatively, you can perform a full reset using the **Device Reset** blade in the local UI (see [Azure Stack Edge device reset and reactivation](/azure/databox-online/azure-stack-edge-reset-reactivate-device)) and then restart this procedure. In this case, you should also [delete any associated resources](/azure/databox-online/azure-stack-edge-return-device?tabs=azure-portal) left in the Azure portal after completing the Azure Stack Edge reset. This will include some or all of the following, depending on how far through the process you are:
335
+
Alternatively, you can perform a full reset using the **Device Reset** blade in the local UI (see [Azure Stack Edge device reset and reactivation](/azure/databox-online/azure-stack-edge-reset-reactivate-device)) and then restart this procedure. In this case, you should also [delete any associated resources](/azure/databox-online/azure-stack-edge-return-device?tabs=azure-portal) left in the Azure portal after completing the Azure Stack Edge reset. This will include some or all of the following, depending on how far through the process you are:
336
336
337
337
- **Azure Stack Edge** resource
338
338
- Autogenerated **KeyVault** associated with the **Azure Stack Edge** resource
0 commit comments