Skip to content

Commit 7b46490

Browse files
Merge pull request #245127 from robswain/copyedits
Add warning for compatibility issue with AAD and web proxy
2 parents 2504b7c + ed876da commit 7b46490

File tree

2 files changed

+19
-15
lines changed

2 files changed

+19
-15
lines changed

articles/private-5g-core/azure-private-5g-core-release-notes-2305.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,31 +20,32 @@ Packet core versions are supported until two subsequent versions have been relea
2020

2121
## What's new
2222

23-
- **User-Plane Inactivity Detection** - Starting from AP5GC 2305, a user-plane inactivity timer with a value of 600 seconds is configured for 5G sessions. If there is no traffic for a period of 600 seconds and RAN-initiated Access Network release has not occurred, the Packet Core will release Access Network resources.
23+
- **User-Plane Inactivity Detection** - Starting from AP5GC 2305, a user-plane inactivity timer with a value of 600 seconds is configured for 5G sessions. If there is no traffic for 600 seconds and RAN-initiated Access Network release has not occurred, the Packet Core will release Access Network resources.
2424

25-
- **UE (user equipment) to UE internal forwarding** - This release delivers the ability for AP5GC to internally forward UE data traffic destined to another UE in the same Data Network (without going via an external router).
25+
- **UE (user equipment) to UE internal forwarding** - This release delivers the ability for AP5GC to internally forward UE data traffic destined to another UE in the same Data Network (without going via an external router).
2626

27-
If you are currently using the default service with allow-all SIM policy along with NAT enabled for the Data Network, or with an external router with deny rules for this traffic, you might have UE to UE traffic forwarding blocked. If you want to continue this blocking behavior with AP5GC 2305, see [Configure UE to UE internal forwarding](configure-internal-forwarding.md).
27+
If you're currently using the default service with allow-all SIM policy along with NAT enabled for the Data Network, or with an external router with deny rules for this traffic, you might have UE to UE traffic forwarding blocked. If you want to continue this blocking behavior with AP5GC 2305, see [Configure UE to UE internal forwarding](configure-internal-forwarding.md).
2828

29-
If you are not using the default service with allow-all SIM policy and want to allow UE-UE internal forwarding, see [Configure UE to UE internal forwarding](configure-internal-forwarding.md).
29+
If you're not using the default service with allow-all SIM policy and want to allow UE-UE internal forwarding, see [Configure UE to UE internal forwarding](configure-internal-forwarding.md).
3030

31-
- **Event Hubs feed of UE Usage** - This feature enhances AP5GC to provide an Azure Event Hubs feed of UE Data Usage events. You can integrate with Event Hubs to build reports on how your private 4G/5G network is being used or carry out other data processing using the information in these events. If you want to enable this feature for your deployment, please contact your support representative.
31+
- **Event Hubs feed of UE Usage** - This feature enhances AP5GC to provide an Azure Event Hubs feed of UE Data Usage events. You can integrate with Event Hubs to build reports on how your private 4G/5G network is being used or carry out other data processing using the information in these events. If you want to enable this feature for your deployment, contact your support representative.
3232

3333
## Issues fixed in the AP5GC 2305 release
3434

3535
The following table provides a summary of issues fixed in this release.
3636

3737
|No. |Feature | Issue |
3838
|-----|-----|-----|
39-
| 1 | Packet forwarding | In scenarios of sustained high load (e.g., continuous setup of hundreds of TCP flows per second) combined with NAT pin-hole exhaustion, AP5GC can encounter a memory leak, leading to a short period of service disruption resulting in some call failures. This issue has been fixed in this release. |
39+
| 1 | Packet forwarding | In scenarios of sustained high load (e.g. continuous setup of hundreds of TCP flows per second) combined with NAT pin-hole exhaustion, AP5GC can encounter a memory leak, leading to a short period of service disruption resulting in some call failures. This issue has been fixed in this release. |
4040
| 2 | Install/Upgrade | Changing the technology type of a deployment from 4G (EPC) to 5G using the upgrade or site delete/add sequence is not supported. This issue has been fixed in this release. |
41-
| 3 | Local dashboards | In some scenarios, the Azure Private 5G Core local dashboards don't show session rejection under the **Device and Session Statistics** panel if "Session Establishment" requests are rejected due to invalid PDU type (e.g. IPv6 when only IPv4 is supported). This issue has been fixed in this release. |
41+
| 3 | Local dashboards | In some scenarios, the Azure Private 5G Core local dashboards don't show session rejection under the **Device and Session Statistics** panel if "Session Establishment" requests are rejected due to invalid PDU type (e.g. IPv6 when only IPv4 is supported). This issue has been fixed in this release. |
4242

4343
## Known issues in the AP5GC 2305 release
4444

4545
|No. |Feature | Issue | Workaround/comments |
4646
|-----|-----|-----|-----|
47-
| 1 | Local Dashboards | Where Azure Active Directory is used to authenticate access to AP5GC Local Dashboards, this traffic doesn't transmit via the web proxy when enabled on the Azure Stack Edge appliance that the packet core is running on. | Not applicable. |
47+
| 1 | Local Dashboards | When a web proxy is enabled on the Azure Stack Edge appliance that the packet core is running on and Azure Active Directory is used to authenticate access to AP5GC Local Dashboards, the traffic to Azure Active Directory does not transmit via the web proxy. If there is a firewall blocking traffic that does not go via the web proxy then enabling Azure Active Directory will cause the packet core install to fail. | Disable Azure Active Directory and use password based authentication to authenticate access to AP5GC Local Dashboards instead.
48+
Description |
4849
| 2 | Reboot | AP5GC may intermittently fail to recover after the underlying platform is rebooted and may require another reboot to recover. | Not applicable. |
4950

5051
## Known issues from previous releases

articles/private-5g-core/enable-azure-active-directory.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Enable Azure Active Directory (Azure AD) for local monitoring tools
33
titleSuffix: Azure Private 5G Core
4-
description: Complete the prerequisite tasks for enabling Azure Active Directory to access Azure Private 5G Core's local monitoring tools.
4+
description: Complete the prerequisite tasks for enabling Azure Active Directory to access Azure Private 5G Core's local monitoring tools.
55
author: robswain
66
ms.author: robswain
77
ms.service: private-5g-core
8-
ms.topic: how-to
8+
ms.topic: how-to
99
ms.date: 12/29/2022
1010
ms.custom: template-how-to
1111
---
@@ -16,6 +16,9 @@ Azure Private 5G Core provides the [distributed tracing](distributed-tracing.md)
1616

1717
In this how-to guide, you'll carry out the steps you need to complete after deploying or configuring a site that uses Azure AD to authenticate access to your local monitoring tools. You don't need to follow this if you decided to use local usernames and passwords to access the distributed tracing and packet core dashboards.
1818

19+
> [!CAUTION]
20+
> Azure AD for local monitoring tools is not supported when a web proxy is enabled on the Azure Stack Edge device on which Azure Private 5G Core is running. If you have configured a firewall that blocks traffic not transmitted via the web proxy, then enabling Azure AD will cause the Azure Private 5G Core installation to fail.
21+
1922
## Prerequisites
2023

2124
- You must have completed the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md) and [Collect the required information for a site](collect-required-information-for-a-site.md).
@@ -32,13 +35,13 @@ In the authoritative DNS server for the DNS zone you want to create the DNS reco
3235

3336
## Register application
3437

35-
You'll now register a new local monitoring application with Azure AD to establish a trust relationship with the Microsoft identity platform.
38+
You'll now register a new local monitoring application with Azure AD to establish a trust relationship with the Microsoft identity platform.
3639

3740
If your deployment contains multiple sites, you can use the same two redirect URIs for all sites, or create different URI pairs for each site. You can configure a maximum of two redirect URIs per site. If you've already registered an application for your deployment and you want to use the same URIs across your sites, you can skip this step.
3841

3942
1. Follow [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md) to register a new application for your local monitoring tools with the Microsoft identity platform.
4043
1. In *Add a redirect URI*, select the **Web** platform and add the following two redirect URIs, where *\<local monitoring domain\>* is the domain name for your local monitoring tools that you set up in [Configure domain system name (DNS) for local monitoring IP](#configure-domain-system-name-dns-for-local-monitoring-ip):
41-
44+
4245
- https://*\<local monitoring domain\>*/sas/auth/aad/callback
4346
- https://*\<local monitoring domain\>*/grafana/login/azuread
4447

@@ -74,7 +77,7 @@ To support Azure AD on Azure Private 5G Core applications, you'll need a YAML fi
7477

7578
1. Convert each of the values you collected in [Collect the information for Kubernetes Secret Objects](#collect-the-information-for-kubernetes-secret-objects) into Base64 format. For example, you can run the following command in an Azure Cloud Shell **Bash** window:
7679

77-
```bash
80+
```bash
7881
echo -n <Value> | base64
7982
```
8083

@@ -115,7 +118,7 @@ You'll need to apply your Kubernetes Secret Objects if you're enabling Azure AD
115118

116119
1. Sign in to [Azure Cloud Shell](../cloud-shell/overview.md) and select **PowerShell**. If this is your first time accessing your cluster via Azure Cloud Shell, follow [Access your cluster](../azure-arc/kubernetes/cluster-connect.md?tabs=azure-cli) to configure kubectl access.
117120
1. Apply the Secret Object for both distributed tracing and the packet core dashboards, specifying the core kubeconfig filename.
118-
121+
119122
`kubectl apply -f /home/centos/secret-azure-ad-local-monitoring.yaml --kubeconfig=<core kubeconfig>`
120123

121124
1. Use the following commands to verify if the Secret Objects were applied correctly, specifying the core kubeconfig filename. You should see the correct **Name**, **Namespace**, and **Type** values, along with the size of the encoded values.
@@ -127,7 +130,7 @@ You'll need to apply your Kubernetes Secret Objects if you're enabling Azure AD
127130
1. Restart the distributed tracing and packet core dashboards pods.
128131

129132
1. Obtain the name of your packet core dashboards pod:
130-
133+
131134
`kubectl get pods -n core --kubeconfig=<core kubeconfig>" | grep "grafana"`
132135
133136
1. Copy the output of the previous step and replace it into the following command to restart your pods.

0 commit comments

Comments
 (0)