Skip to content

Commit 1bcfbe8

Browse files
committed
acrolinx tweaks
1 parent 6ba4bf2 commit 1bcfbe8

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

articles/private-5g-core/commission-cluster.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The packet core instances in the Azure Private 5G Core service run on an Arc-ena
2828

2929
## Configure Kubernetes for Azure Private MEC on the Azure Stack Edge device
3030

31-
These steps modify the Kubernetes cluster on the Azure Stack Edge device to optimize it for Azure Private MEC workloads.
31+
These steps modify the Kubernetes cluster on the Azure Stack Edge device to optimize it for Azure Private Multi-access Edge Compute (MEC) workloads.
3232

3333
1. In the local UI, select **Kubernetes** in the left-hand menu.
3434
2. Under **Choose the option that best describes your scenario**, select **an Azure Private MEC solution in your environment**.
@@ -37,7 +37,7 @@ These steps modify the Kubernetes cluster on the Azure Stack Edge device to opti
3737

3838
:::image type="content" source="media/commission-cluster/commission-cluster-enable-aks.png" alt-text="Screenshot of ASE Kubernetes configuration menu. The Azure Private MEC radio button is selected. The Workload confirmation popup is overlaid.":::
3939

40-
Once you've applied these changes, you should see an updated option in the local UI – **Kubernetes** becomes **Kubernetes (Preview)** as shown in the following image.
40+
You should see an updated option in the local UI – **Kubernetes** becomes **Kubernetes (Preview)** as shown in the following image.
4141

4242
:::image type="content" source="media/commission-cluster/commission-cluster-kubernetes-preview.png" alt-text="Screenshot of configuration menu, with Kubernetes (Preview) highlighted.":::
4343

@@ -75,60 +75,60 @@ You can input all the settings on this page before selecting **Apply** at the bo
7575
2. Create virtual networks representing the following interfaces (which you allocated subnets and IP addresses for in [Allocate subnets and IP addresses](complete-private-mobile-network-prerequisites.md#allocate-subnets-and-ip-addresses)):
7676
- Control plane access interface
7777
- User plane access interface
78-
- User plane data interface(s)
78+
- User plane data interfaces
7979

8080
You can name these networks yourself, but the name **must** match what you configure in the Azure portal when deploying Azure Private 5G Core. If you are using VLAN trunking (required for HA deployments), you have **one single** N6 virtual network with no IP information. VLAN and IP information is done when configuring the mobile network. With this setup, you could use the names **N2**, **N3** and **N6**.
8181

82-
Under Access VLAN or non-VLAN mode, there is an N6 virtual network for each attached data network. You could use the names **N2**, **N3** and up to ten **N6-DNX** (where **X** is the DN number 1-10 in a multiple DN deployment; or just **N6** for a single DN deployment). You can optionally configure each virtual network with a virtual local area network identifier (VLAN ID) to enable layer 2 traffic separation. The following example is for a 5G multi-DN deployment without VLANs.
82+
Under Access VLAN or non-VLAN mode, there is an N6 virtual network for each attached data network. You could use the names **N2**, **N3** and up to 10 **N6-DNX** (where **X** is the data network (DN) number 1-10 in a multiple DN deployment; or just **N6** for a single DN deployment). You can optionally configure each virtual network with a virtual local area network identifier (VLAN ID) to enable layer 2 traffic separation. The following example is for a 5G multi-DN deployment without VLANs.
8383
:::zone pivot="ase-pro-2"
84-
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure 3 times:
84+
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure three times:
8585
1. Select **Add virtual network** and fill in the side panel:
8686
- **Virtual switch**: select **vswitch-port3** for N2 and N3. Select **vswitch-port4** for N6.
8787
- **Name**: *N2*, *N3*, or *N6*.
8888
- **VLAN type**: Trunk VLAN
8989
- **Allowed VLAN ID Range**: Fill in the set of VLAN-IDs you want to configure.
9090
2. Select **Modify** to save the configuration for this virtual network.
91-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
92-
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (twelve times in total if you have the maximum ten data networks):
91+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
92+
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (12 times in total if you have the maximum 10 data networks):
9393
> [!IMPORTANT]
9494
> If you are using port 3 for data networks, we recommend that it is used for the lowest expected load.
9595
1. Select **Add virtual network** and fill in the side panel:
96-
- **Virtual switch**: select **vswitch-port3** for N2, N3 and up to four DNs, and select **vswitch-port4** for up to six DNs.
96+
- **Virtual switch**: select **vswitch-port3** for N2, N3, and up to four DNs, and select **vswitch-port4** for up to six DNs.
9797
- **Name**: *N2*, *N3*, or *N6-DNX* (where *X* is the DN number 1-10).
9898
- **VLAN**: VLAN ID, or 0 if not using VLANs
9999
- **Network** and **Gateway**: Use the correct subnet and gateway for the IP address configured on the ASE port (even if the gateway is not set on the ASE port itself).
100100
- For example, *10.232.44.0/24* and *10.232.44.1*
101-
- If the subnet does not have a default gateway, use another IP address in the subnet which will respond to ARP requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
101+
- If the subnet does not have a default gateway, use another IP address in the subnet that will respond to Address Resolution Protocol (ARP) requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
102102
- **DNS server** and **DNS suffix** should be left blank.
103103
1. Select **Modify** to save the configuration for this virtual network.
104-
1. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
104+
1. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
105105
The page should now look like the following image:
106106

107107
:::image type="content" source="media/commission-cluster/commission-cluster-advanced-networking-ase-2.png" alt-text="Screenshot showing Advanced networking, with a table of virtual switch information and a table of virtual network information.":::
108108
:::zone-end
109109
:::zone pivot="ase-pro-gpu"
110-
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure 3 times:
110+
3. If you are using VLAN trunking (required for HA deployments), carry out the following procedure three times:
111111
1. Select **Add virtual network** and fill in the side panel:
112112
- **Virtual switch**: select **vswitch-port5** for N2 and N3. Select **vswitch-port6** for N6.
113113
- **Name**: *N2*, *N3*, or *N6*.
114114
- **VLAN type**: Trunk VLAN
115115
- **Allowed VLAN ID Range**: Fill in the set of VLAN-IDs you want to configure.
116116
2. Select **Modify** to save the configuration for this virtual network.
117-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
117+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
118118
4. If you are using Access VLAN or non-VLAN mode, carry out the following procedure three times, plus once for each of the supplementary data networks (twelve times in total if you have the maximum ten data networks):
119119
> [!IMPORTANT]
120120
> If you are using port 5 for data networks, we recommend that it is used for the lowest expected load.
121121
1. Select **Add virtual network** and fill in the side panel:
122-
- **Virtual switch**: select **vswitch-port5** for N2, N3 and up to four DNs, and select **vswitch-port6** for up to six DNs.
122+
- **Virtual switch**: select **vswitch-port5** for N2, N3, and up to four DNs, and select **vswitch-port6** for up to six DNs.
123123
- **Name**: *N2*, *N3*, or *N6-DNX* (where *X* is the DN number 1-10).
124124
- **VLAN type**: select as appropriate.
125125
- **VLAN**: VLAN ID, or 0 if not using VLANs
126126
- **Network** and **Gateway**: Use the correct subnet and gateway for the IP address configured on the ASE port (even if the gateway is not set on the ASE port itself).
127127
- For example, *10.232.44.0/24* and *10.232.44.1*
128-
- If the subnet does not have a default gateway, use another IP address in the subnet which will respond to ARP requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
128+
- If the subnet does not have a default gateway, use another IP address in the subnet that will respond to Address Resolution Protocol (ARP) requests (such as one of the RAN IP addresses). If there's more than one gNB connected via a switch, choose one of the IP addresses for the gateway.
129129
- **DNS server** and **DNS suffix** should be left blank.
130130
2. Select **Modify** to save the configuration for this virtual network.
131-
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings will take approximately 8 minutes.
131+
3. Select **Apply** at the bottom of the page and wait for the notification (a bell icon) to confirm that the settings have been applied. Applying the settings takes approximately 8 minutes.
132132

133133
The page should now look like the following image:
134134

@@ -142,7 +142,7 @@ In the local Azure Stack Edge UI, go to the **Kubernetes (Preview)** page. You'l
142142
1. Under **Compute virtual switch**, select **Modify**.
143143
1. Select the vswitch with compute intent (for example, *vswitch-port2*)
144144
1. Enter six IP addresses in a range for the node IP addresses on the management network.
145-
1. Enter one IP address in a range for the service IP address, also on the management network. This will be used for accessing local monitoring tools for the packet core instance.
145+
1. Enter one IP address in a range for the service IP address, also on the management network. This is used for accessing local monitoring tools for the packet core instance.
146146
1. Select **Modify** at the bottom of the panel to save the configuration.
147147
> [!IMPORTANT]
148148
> If you are using VLAN trunking (required for HA deployments), no IP configuration is done for the virtual networks at this point. IP configuration is done when configuring the mobile network.
@@ -158,7 +158,7 @@ The page should now look like the following image (in VLAN trunking mode):
158158

159159
:::image type="content" source="media/commission-cluster/commission-cluster-kubernetes-preview-enabled.png" alt-text="Screenshot showing Kubernetes (Preview) with two tables. The first table is called Compute virtual switch and the second is called Virtual network. A green tick shows that the virtual networks are enabled for Kubernetes.":::
160160

161-
## Enable VM management on the ASE
161+
## Enable virtual machine management on the ASE
162162

163163
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
164164
1. Select **Edge services**.
@@ -167,7 +167,7 @@ The page should now look like the following image (in VLAN trunking mode):
167167

168168
## Start the cluster and set up Arc
169169

170-
If you're running other VMs on your Azure Stack Edge, we recommend that you stop them now, and start them again once the cluster is deployed. The cluster requires access to specific CPU resources that running VMs may already be using.
170+
If you're running other virtual machines (VMs) on your Azure Stack Edge, we recommend that you stop them now, and start them again once the cluster is deployed. The cluster requires access to specific CPU resources that running VMs may already be using.
171171

172172
1. Access the Azure portal and go to the **Azure Stack Edge** resource created in the Azure portal.
173173
1. To deploy the cluster, select the **Kubernetes** option and then select the **Add** button to configure the cluster.
@@ -176,7 +176,7 @@ If you're running other VMs on your Azure Stack Edge, we recommend that you stop
176176

177177
1. For the **Node size**, select **Standard_F16s_HPN**.
178178
1. Ensure the **Arc enabled Kubernetes** checkbox is selected.
179-
1. Select the **Change** link and enter the Microsoft Entra application Object ID (OID) for the custom location which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
179+
1. Select the **Change** link and enter the Microsoft Entra application Object ID (OID) for the custom location, which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
180180

181181
:::image type="content" source="media/commission-cluster/commission-cluster-configure-kubernetes.png" alt-text="Screenshot of Configure Arc enabled Kubernetes pane, showing where to enter the custom location OID.":::
182182

@@ -235,7 +235,7 @@ Additionally, your AKS cluster should now be visible from your Azure Stack Edge
235235

236236
## Collect variables for the Kubernetes extensions
237237

238-
Collect each of the values in the table below.
238+
Collect each of the values in the following table.
239239

240240
| Value | Variable name |
241241
|--|--|
@@ -332,7 +332,7 @@ You should see the new **Custom location** visible as a resource in the Azure po
332332
333333
If you have made an error in the Azure Stack Edge configuration, you can use the portal to remove the AKS cluster (see [Deploy Azure Kubernetes service on Azure Stack Edge](/azure/databox-online/azure-stack-edge-deploy-aks-on-azure-stack-edge)). You can then modify the settings via the local UI.
334334
335-
Alternatively, you can perform a full reset using the **Device Reset** blade in the local UI (see [Azure Stack Edge device reset and reactivation](/azure/databox-online/azure-stack-edge-reset-reactivate-device)) and then restart this procedure. In this case, you should also [delete any associated resources](/azure/databox-online/azure-stack-edge-return-device?tabs=azure-portal) left in the Azure portal after completing the Azure Stack Edge reset. This will include some or all of the following, depending on how far through the process you are:
335+
Alternatively, you can perform a full reset using the **Device Reset** blade in the local UI (see [Azure Stack Edge device reset and reactivation](/azure/databox-online/azure-stack-edge-reset-reactivate-device)) and then restart this procedure. In this case, you should also [delete any associated resources](/azure/databox-online/azure-stack-edge-return-device?tabs=azure-portal) left in the Azure portal after completing the Azure Stack Edge reset. This will include some or all of the following, depending on how far through the process you are:
336336
337337
- **Azure Stack Edge** resource
338338
- Autogenerated **KeyVault** associated with the **Azure Stack Edge** resource

0 commit comments

Comments
 (0)