Skip to content

Commit c21339b

Browse files
committed
acrolinx tweaks
1 parent 63a5195 commit c21339b

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ You can use this information to create a site in an existing private mobile netw
1919

2020
## Prerequisites
2121

22-
- You must have completed the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md).
22+
- Complete the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md).
2323
- If you want to give Azure role-based access control (Azure RBAC) to storage accounts, you must have the relevant permissions on your account.
2424
- Make a note of the resource group that contains your private mobile network that was collected in [Collect the required information to deploy a private mobile network](collect-required-information-for-private-mobile-network.md). We recommend that the mobile network site resource you create in this procedure belongs to the same resource group.
2525

@@ -29,7 +29,7 @@ Choose the service plan that best fits your requirements and verify pricing and
2929

3030
## Collect mobile network site resource values
3131

32-
Collect all the values in the following table for the mobile network site resource that will represent your site.
32+
Collect all the values in the following table for the mobile network site resource that represents your site.
3333

3434
|Value |Field name in Azure portal |
3535
|---------|---------|
@@ -44,7 +44,7 @@ Collect all the values in the following table for the mobile network site resour
4444

4545
## Collect packet core configuration values
4646

47-
Collect all the values in the following table for the packet core instance that will run in the site.
47+
Collect all the values in the following table for the packet core instance that runs in the site.
4848

4949
|Value |Field name in Azure portal |
5050
|---------|---------|
@@ -54,7 +54,7 @@ Collect all the values in the following table for the packet core instance that
5454

5555
## Collect access network values
5656

57-
Collect all the values in the following table to define the packet core instance's connection to the access network over the control plane and user plane interfaces. The field name displayed in the Azure portal will depend on the value you have chosen for **Technology type**, as described in [Collect packet core configuration values](#collect-packet-core-configuration-values).
57+
Collect all the values in the following table to define the packet core instance's connection to the access network over the control plane and user plane interfaces. The field name displayed in the Azure portal depends on the value you have chosen for **Technology type**, as described in [Collect packet core configuration values](#collect-packet-core-configuration-values).
5858

5959
:::zone pivot="ase-pro-gpu"
6060
|Value |Field name in Azure portal |
@@ -83,8 +83,8 @@ If you want to configure UE usage tracking for your site, collect all the values
8383
8484
|Value |Field name in Azure portal |
8585
|---------|---------|
86-
|The namespace for the Azure Event Hubs instance that your site will use for UE usage tracking. |**Azure Event Hub Namespace**|
87-
|The name of the Azure Event Hubs instance that your site will use for UE usage tracking.|**Event Hub name**|
86+
|The namespace for the Azure Event Hubs instance that your site uses for UE usage tracking. |**Azure Event Hub Namespace**|
87+
|The name of the Azure Event Hubs instance that your site uses for UE usage tracking.|**Event Hub name**|
8888
|The user assigned managed identity that has the **Resource Policy Contributor** role for the Event Hubs instance. <br /> **Note:** The managed identity must be assigned to the Packet Core Control Plane for the site and assigned to the Event Hubs instance via the instance's **Identity and Access Management (IAM)** blade. <br /> **Note:** Only assign one managed identity to the site. This managed identity must be used for any UE usage tracking for the site after upgrade and site configuration modifications.<br /><br /> See [Use a user-assigned managed identity to capture events](/azure/event-hubs/event-hubs-capture-managed-identity) for more information on managed identities. |**User Assigned Managed Identity**|
8989

9090
## Collect data network values
@@ -155,7 +155,7 @@ If you want to provide a custom HTTPS certificate at site creation, follow the s
155155

156156
> [!NOTE]
157157
>
158-
> - Certificate validation will always be performed against the latest version of the local access certificate in the Key Vault.
158+
> - Certificate validation is always be performed against the latest version of the local access certificate in the Key Vault.
159159
> - If you enable auto-rotation, it might take up to four hours for certificate updates in the Key Vault to synchronize with the edge location.
160160
161161
1. Decide how you want to provide access to your certificate. You can use a Key Vault access policy or Azure role-based access control (Azure RBAC).

0 commit comments

Comments
 (0)