You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/collect-required-information-for-a-site.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ You can use this information to create a site in an existing private mobile netw
19
19
20
20
## Prerequisites
21
21
22
-
-You must have completed the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md).
22
+
-Complete the steps in [Complete the prerequisite tasks for deploying a private mobile network](complete-private-mobile-network-prerequisites.md).
23
23
- If you want to give Azure role-based access control (Azure RBAC) to storage accounts, you must have the relevant permissions on your account.
24
24
- Make a note of the resource group that contains your private mobile network that was collected in [Collect the required information to deploy a private mobile network](collect-required-information-for-private-mobile-network.md). We recommend that the mobile network site resource you create in this procedure belongs to the same resource group.
25
25
@@ -29,7 +29,7 @@ Choose the service plan that best fits your requirements and verify pricing and
29
29
30
30
## Collect mobile network site resource values
31
31
32
-
Collect all the values in the following table for the mobile network site resource that will represent your site.
32
+
Collect all the values in the following table for the mobile network site resource that represents your site.
33
33
34
34
|Value |Field name in Azure portal |
35
35
|---------|---------|
@@ -44,7 +44,7 @@ Collect all the values in the following table for the mobile network site resour
44
44
45
45
## Collect packet core configuration values
46
46
47
-
Collect all the values in the following table for the packet core instance that will run in the site.
47
+
Collect all the values in the following table for the packet core instance that runs in the site.
48
48
49
49
|Value |Field name in Azure portal |
50
50
|---------|---------|
@@ -54,7 +54,7 @@ Collect all the values in the following table for the packet core instance that
54
54
55
55
## Collect access network values
56
56
57
-
Collect all the values in the following table to define the packet core instance's connection to the access network over the control plane and user plane interfaces. The field name displayed in the Azure portal will depend on the value you have chosen for **Technology type**, as described in [Collect packet core configuration values](#collect-packet-core-configuration-values).
57
+
Collect all the values in the following table to define the packet core instance's connection to the access network over the control plane and user plane interfaces. The field name displayed in the Azure portal depends on the value you have chosen for **Technology type**, as described in [Collect packet core configuration values](#collect-packet-core-configuration-values).
58
58
59
59
:::zone pivot="ase-pro-gpu"
60
60
|Value |Field name in Azure portal |
@@ -83,8 +83,8 @@ If you want to configure UE usage tracking for your site, collect all the values
83
83
84
84
|Value |Field name in Azure portal |
85
85
|---------|---------|
86
-
|The namespace for the Azure Event Hubs instance that your site will use for UE usage tracking. |**Azure Event Hub Namespace**|
87
-
|The name of the Azure Event Hubs instance that your site will use for UE usage tracking.|**Event Hub name**|
86
+
|The namespace for the Azure Event Hubs instance that your site uses for UE usage tracking. |**Azure Event Hub Namespace**|
87
+
|The name of the Azure Event Hubs instance that your site uses for UE usage tracking.|**Event Hub name**|
88
88
|The user assigned managed identity that has the **Resource Policy Contributor** role for the Event Hubs instance. <br /> **Note:** The managed identity must be assigned to the Packet Core Control Plane for the site and assigned to the Event Hubs instance via the instance's **Identity and Access Management (IAM)** blade. <br /> **Note:** Only assign one managed identity to the site. This managed identity must be used for any UE usage tracking for the site after upgrade and site configuration modifications.<br /><br /> See [Use a user-assigned managed identity to capture events](/azure/event-hubs/event-hubs-capture-managed-identity) for more information on managed identities. |**User Assigned Managed Identity**|
89
89
90
90
## Collect data network values
@@ -155,7 +155,7 @@ If you want to provide a custom HTTPS certificate at site creation, follow the s
155
155
156
156
> [!NOTE]
157
157
>
158
-
> - Certificate validation will always be performed against the latest version of the local access certificate in the Key Vault.
158
+
> - Certificate validation is always be performed against the latest version of the local access certificate in the Key Vault.
159
159
> - If you enable auto-rotation, it might take up to four hours for certificate updates in the Key Vault to synchronize with the edge location.
160
160
161
161
1. Decide how you want to provide access to your certificate. You can use a Key Vault access policy or Azure role-based access control (Azure RBAC).
0 commit comments