Skip to content

Commit b207fa4

Browse files
authored
Merge pull request #225369 from MicrosoftDocs/release-ga-private-5g-core
Release ga private 5g core--scheduled release at 4AM of 2/01
2 parents 330ecac + c2d6d2b commit b207fa4

File tree

100 files changed

+1708
-254
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+1708
-254
lines changed

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/virtual-desktop/troubleshoot-client-windows",
106106
"redirect_document_id": true
107107
},
108+
{
109+
"source_path_from_root": "/articles/private-5g-core/disconnected-mode.md",
110+
"redirect_url": "/azure/private-5g-core/azure-stack-edge-disconnects",
111+
"redirect_document_id": true
112+
},
108113
{
109114
"source_path_from_root": "/articles/virtual-desktop/virtual-desktop-fall-2019/connect-windows-7-10-2019.md",
110115
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/connect-windows-2019",

articles/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1364,7 +1364,7 @@ productDirectory:
13641364
- networking
13651365
url: private-link/index.yml
13661366
# Card
1367-
- title: Azure Private 5G Core (Preview)
1367+
- title: Azure Private 5G Core
13681368
summary: Rapidly deploy and manage private 5G networks at the enterprise edge
13691369
imageSrc: ./media/index/private-5g-core.svg
13701370
azureCategories:

articles/private-5g-core/azure-private-5g-core-release-notes-2208.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ The following table provides a summary of known issues in this release.
5050
| 10 | 4G/5G signaling | In rare scenarios, Azure Private 5G Core may corrupt the internal state of a packet data session, resulting in subsequent changes to that packet data session failing. | Reinstall the Packet Core. |
5151
| 11 | 4G/5G signaling | In scenarios when the establishment of a PDU session has failed, Azure Private 5G Core may not automatically release the session, and the UE may need to re-register. | The UE should re-register. |
5252
| 12 | 4G/5G signaling | 4G UEs that require both circuit switched (CS) and packet switched (PS) network availability to successfully attach to Azure Private 5G Core may disconnect after a successful attach. | Update/enhance the UEs to support PS only networks if possible, as CS isn't supported by Azure Private 5G Core. If it isn't possible to reconfigure the UEs, customer support can apply a low-level configuration tweak to Azure Private 5G Core to let these UEs believe there's a CS network available. |
53+
| 13 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
5354

5455
## Next steps
5556

articles/private-5g-core/azure-private-5g-core-release-notes-2209.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ The following table provides a summary of known issues carried over from the pre
5353
| 13 | 4G/5G Signaling | In rare scenarios, due to a race condition triggered during a RAN disconnect/re-connect sequence, Azure Private 5G Core may fail to process incoming requests from the eNodeB or gNodeB.  | Reinstall the packet core. |
5454
| 14 | Local dashboards | On the packet core dashboards, the 4G interface panel doesn’t display the data. | Select each panel’s edit button and select Data source again as Prometheus and select refresh to see the data. |
5555
| 15 | 4G/5G Signaling | In rare scenarios when a significant number of UEs are bulk registered and send continuous data , the core may incorrectly release data sessions. | If sessions are released, UEs may need to re-connect with the system to use data services. |
56+
| 16 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
5657

5758
## Next steps
5859

articles/private-5g-core/azure-private-5g-core-release-notes-2210.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ The following table provides a summary of known issues carried over from the pre
4040
| 5 | Local dashboards | Azure Private 5G Core local dashboards may show incorrect values in some graphs (for example, session counts) after a power cycle of the Azure Stack Edge server. | Not applicable. |
4141
| 6 | Local dashboards | The distributed tracing web GUI fails to display and decode some fields of 4G/5G NAS messages. Specifically, the *Request Type* and *DNN* information elements. | Messages will have to be viewed from separate packet capture if needed. |
4242
| 7 | Performance | It has been observed very rarely that CPU allocation on an Azure Private 5G Packet Core deployment can result in some signaling processing workloads sharing a logical CPU core with data plane processing workloads, resulting in session creation failures or packet processing latency/failures at a moderate load. | Redeploying the Azure Private 5G Packet Core may resolve the problematic CPU allocation. |
43+
| 8 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
4344

4445
## Next steps
4546

articles/private-5g-core/azure-private-5g-core-release-notes-2211.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ The following table provides a summary of known issues carried over from the pre
6868
|-----|-----|-----|
6969
| 1 | Policy configuration | Azure Private 5G Core may ignore non-default QoS and Policy configuration when handling 4G subscribers. |
7070
| 2 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled.  |
71+
| 3 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
7172

7273

7374
## Next steps
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Azure Private 5G Core 2301 release notes
3+
description: Discover what's new in the Azure Private 5G Core 2301 release
4+
author: b-branco
5+
ms.author: biancabranco
6+
ms.service: private-5g-core
7+
ms.topic: release-notes
8+
ms.date: 01/31/2023
9+
---
10+
11+
# Azure Private 5G Core 2301 release notes
12+
13+
The following release notes identify the new features, critical open issues, and resolved issues for the 2301 release of Azure Private 5G Core (AP5GC). The release notes are continuously updated, and as critical issues requiring a workaround are discovered, they’re added. Before deploying this new version, please review the information contained in these release notes.
14+
15+
This article applies to the AP5GC 2301 release (PMN-2301-0). This release is compatible with the ASE Pro GPU running the ASE 2210 and ASE 2301 releases, and is supported by the 2022-04-01-preview and 2022-11-01 [Microsoft.MobileNetwork](/rest/api/mobilenetwork) API versions.
16+
17+
## Support
18+
19+
The default support lifetime for a Packet Core version is roughly two calendar months from release.
20+
21+
The support lifetime for version 2301 will end on March 31, 2023. Please be prepared to plan your packet core upgrade to a future version before 2301 goes out of support on this date.
22+
23+
## What's new
24+
25+
- **Azure Active Directory based login to SAS and Grafana** - Azure Private 5G Core provides the distributed tracing and packet core dashboards tools for monitoring your deployment at the edge. With this new feature available as part of this AP5GC release, you can access these tools using Azure Active Directory (Azure AD) authentication. We recommend setting up Azure AD authentication to improve security in your deployment, although the existing local username and password mechanism is also available.
26+
27+
For details on configuring Azure AD based login after creating a site, see [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md). You can also change the authentication type for existing sites by following [Modify the local access configuration in a site](modify-local-access-configuration.md).
28+
29+
- **Multiple attached data networks improvements** – These improvements remove the need for additional manual steps when deploying or editing configuration for multiple data networks for your packet core. Additional guidance for configuring multiple data networks is also provided. All other support for multiple data network functionality remains as per the 2211 release.
30+
31+
- **User plane packet capture** - This feature delivers a new debugging tool for use during system turn-up. The tool allows you to capture packet trace on N3 and N6 interfaces in order to debug network connectivity. For more details, see [Perform data plane packet capture for a packet core instance](data-plane-packet-capture.md).
32+
33+
## Issues fixed in the AP5GC 2301 release
34+
35+
The following table provides a summary of issues fixed in this release.
36+
37+
|No. |Feature | Issue |
38+
|-----|-----|-----|
39+
| 1 | Local dashboards | In deployments with multiple Data Networks, **UPF Downstream CPU Utilization** is incorrectly reported on the local dashboards when running calls using single Data Network. This issue has been fixed in this release. |
40+
41+
## Known issues from previous releases
42+
43+
The following table provides a summary of known issues carried over from the previous releases.
44+
45+
|No. |Feature | Issue |
46+
|-----|-----|-----|
47+
| 1 | Policy configuration | Azure Private 5G Core may ignore non-default QoS and Policy configuration when handling 4G subscribers. |
48+
| 2 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled.  |
49+
| 3 | Local dashboards | In some scenarios, the local dashboards don't show session rejection under the **Device and Session Statistics** panel if Session Establishment requests are rejected due to invalid PDU type (e.g. IPv6 when only IPv4 supported).  |
50+
| 4 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
51+
52+
## Next steps
53+
54+
- [Upgrade the packet core instance in a site - Azure portal](upgrade-packet-core-azure-portal.md)
55+
- [Upgrade the packet core instance in a site - ARM template](upgrade-packet-core-arm-template.md)
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Azure Stack Edge disconnects
3+
titleSuffix: Azure Private 5G Core
4+
description: An overview of Azure Private 5G Core's behavior during disconnects.
5+
author: James-Green-Microsoft
6+
ms.author: jamesgreen
7+
ms.service: private-5g-core
8+
ms.topic: conceptual
9+
ms.date: 11/30/2022
10+
ms.custom: template-concept
11+
---
12+
13+
# Azure Stack Edge disconnects
14+
15+
There are several reasons why your *Azure Private 5G Core (AP5GC)* may have *Azure Stack Edge (ASE)* disconnects. These disconnects can either be unplanned short-term [Temporary disconnects](#temporary-disconnects) or periods of [Disconnected mode for up to two days](#disconnected-mode-for-azure-private-5g-core).
16+
17+
## Temporary disconnects
18+
19+
ASE can tolerate small periods of unplanned connectivity issues. The following sections detail the behavior expected during these times and behavior after ASE connectivity resumes.
20+
21+
Throughout any temporary disconnects, the **Azure Stack Edge overview** will display a banner stating `The device heartbeat is missing. Some operations will not be available in this state. Critical alert(s) present. Click here to view details.`
22+
23+
### Configuration and provisioning actions during temporary disconnects
24+
25+
It's common to see temporary failures such as timeouts of configuration and provisioning while ASE is online, but there is a connectivity issue. AP5GC can handle such events by automatically retrying configuration and provisioning actions once the ASE connectivity is restored. If ASE connectivity is not restored within 10 minutes or ASE is detected as being offline, ongoing operations will fail and you will need to repeat the action manually once ASE reconnects.
26+
27+
The **Sim overview** and **Sim Policy overview** blades display provisioning status of the resource in the site. This allows you to monitor the progress of provisioning actions. Additionally, the **Packet core control plane overview** displays the **Installation state** which can be used to monitor changes due to configuration actions.
28+
29+
### ASE behavior after connectivity resumes
30+
31+
Once ASE connectivity resumes, several features will resume:
32+
33+
- ASE management will resume immediately.
34+
- **Resource Health** will be viewable immediately.
35+
- **Workbooks** will be viewable immediately and will populate for the disconnected duration.
36+
- **Kubernetes Cluster Overview** will show as **Online** after 10 minutes.
37+
- **Monitoring** tabs will show metrics for sites after 10 minutes, but won't populate stats for the disconnected duration.
38+
- **Kubernetes Arc Insights** will show new stats after 10 minutes, but won't populate stats for the disconnected duration.
39+
- **Resource Health** views will be viewable immediately.
40+
- [Workbooks](/azure/update-center/workbooks) for the ASE will be viewable immediately and will populate for the disconnected duration.
41+
42+
## Disconnected mode for Azure Private 5G Core
43+
44+
*Disconnected mode* allows for ASE disconnects of up to two days. During disconnected mode, AP5GC core functionality persists through ASE disconnects due to: network issues, network equipment resets and temporary network equipment separation. During disconnects, the ASE management GUI will display several banners alerting that it's currently disconnected and the impact on functions.
45+
46+
### Functions not supported while in disconnected mode
47+
48+
The following functions aren't supported while in disconnected mode:
49+
50+
- Deployment of the 5G core
51+
- Updating the 5G core version
52+
- Updating SIM configuration
53+
- Updating NAT configuration
54+
- Updating service policy
55+
- Provisioning SIMs
56+
57+
### Monitoring and troubleshooting during disconnects
58+
59+
While in disconnected mode, you won't be able to change the local monitoring authentication method or sign in to the [distributed tracing](distributed-tracing.md) and [packet core dashboards](packet-core-dashboards.md) using Azure Active Directory. If you expect to need access to your local monitoring tools while the ASE is disconnected, you can change your authentication method to local usernames and passwords by following [Modify the local access configuration in a site](modify-local-access-configuration.md).
60+
61+
Once the disconnect ends, log analytics on Azure will update with the stored data, excluding rate and gauge type metrics.
62+
63+
## Next steps
64+
65+
Once reconnected, you can continue to manage your deployment:
66+
67+
- [Create a site using the Azure portal](create-a-site.md)
68+
- [Modify the packet core instance in a site](modify-packet-core.md)
69+
- [Provision new SIMs for Azure Private 5G Core - Azure portal](provision-sims-azure-portal.md)
70+
- [Provision new SIMs for Azure Private 5G Core - ARM template](provision-sims-arm-template.md)

articles/private-5g-core/azure-stack-edge-packet-core-compatibility.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ The following table provides information on which versions of the ASE device are
1818

1919
| Packet core version | Compatible ASE versions |
2020
|-----|-----|
21+
| 2301 | 2210, 2301 |
2122
| 2211 | 2210 |
2223
| 2210 | 2209, 2210 |
2324
| 2209 | 2209 |
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Azure Stack Edge virtual machine sizing
3+
description: Learn about the VMs that Azure Private 5G Core uses when running on an Azure Stack Edge device.
4+
author: b-branco
5+
ms.author: biancabranco
6+
ms.service: private-5g-core
7+
ms.topic: reference
8+
ms.date: 01/27/2023
9+
---
10+
11+
# Azure Stack Edge virtual machine sizing
12+
13+
The following table contains information about the VMs that Azure Private 5G Core (AP5GC) uses when running on an Azure Stack Edge (ASE) device. You can use this information, for example, to check how much space you'll have remaining on your ASE device after installing Azure Private 5G Core.
14+
15+
| VM detail | Flavor name | vCPUs | Memory (GB) | Disk size | VM function |
16+
|---|---|---|---|---|---|
17+
| Management Control Plane VM | Standard_F4s_v1 | 4 | 4 | Ephemeral - 80 GB | Management Control Plane to create Kubernetes clusters |
18+
| AP5GC Cluster Control Plane VM | Standard_F4s_v1 | 4 | 4 | Ephemeral - 128 GB | Master Node of the Kubernetes cluster used for AP5GC |
19+
| AP5GC Cluster Worker Node VM | Standard_F16s_HPN | 16 | 32 | Ephemeral - 128 GB <br>Persistent - 102 GB | Worker node - AP5GC workload |

0 commit comments

Comments
 (0)