Skip to content

Commit c6bb420

Browse files
authored
Merge pull request #295010 from sushantjrao/break-glass-setup
NNF 8.0 Features
2 parents c0b07af + 5bd2156 commit c6bb420

13 files changed

+784
-53
lines changed

articles/operator-nexus/.openpublishing.redirection.operator-nexus.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,11 @@
6969
"source_path": "howto-create-cluster-with-user-assigned-managed-identity.md",
7070
"redirect_url": "howto-cluster-managed-identity-user-provided-resources",
7171
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "howto-replace-a-terminal-server.md",
75+
"redirect_url": "howto-replace-terminal-server",
76+
"redirect_document_id": false
7277
}
7378
]
7479
}

articles/operator-nexus/TOC.yml

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -210,14 +210,26 @@
210210
href: howto-set-up-break-glass-access.md
211211
- name: How to use-break-glass-access
212212
href: howto-use-break-glass-access.md
213+
- name: How to set up break-glass access using In-Band management
214+
href: howto-set-up-break-glass-access-using-in-band-management.md
213215
- name: How to enable-Micro-BFD on CE and PE devices
214216
href: howto-enable-micro-bfd.md
215-
- name: How to replace a terminal server
216-
href: howto-replace-a-terminal-server.md
217+
- name: How to replace terminal server
218+
href: howto-replace-terminal-server.md
217219
- name: How to upgrade os of terminal server
218220
href: howto-upgrade-os-of-terminal-server.md
219221
- name: How to restrict serial port access and set timeout on terminal-server
220222
href: howto-restrict-serial-port-access-and-set-timeout-on-terminal-server.md
223+
- name: How to append custom suffix to interface descriptions
224+
href: howto-append-custom-suffix-to-interface-descriptions.md
225+
- name: How to reboot Network Device in Azure Operator Nexus Network Fabric
226+
href: howto-reboot-network-device.md
227+
- name: How to Configure NNF with Bring Your Own (BYO) Storage
228+
href: howto-configure-bring-your-own-storage-network-fabric.md
229+
- name: How to upgrade OS of terminal server
230+
href: howto-upgrade-os-of-terminal-server.md
231+
- name: How to restrict serial port access and set timeout on terminal-server
232+
href: howto-restrict-serial-port-access-and-set-timeout-on-terminal-server.md
221233
- name: Cluster
222234
expanded: false
223235
items:
@@ -269,6 +281,8 @@
269281
href: howto-kubernetes-cluster-install-microsoft-defender.md
270282
- name: Kubernetes cluster features
271283
href: howto-kubernetes-cluster-features.md
284+
285+
272286
- name: Nexus Virtual Machine
273287
expanded: false
274288
items:

articles/operator-nexus/concepts-access-control-lists.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,21 @@ The action property of an ACL statement can have one of the following types:
5353
- **Drop**: Discards packets that match specified conditions.
5454
- **Count**: Counts the number of packets that match specified conditions.
5555

56+
## Control plane traffic policy (CP-TP)
57+
58+
Additionally to add an additional layer of control plane protection for enhancing network security, users can also configure and modify control plane traffic policies on supported devices via APIs.
59+
60+
• A Traffic Policy (TP) solution for securing the Fabric device Control Plane (packets destined to or originating from the Fabric device) of the supported devices in AON.
61+
62+
• The device control plane (which includes Policing/Rate Limiting) can be implemented as Traffic Policies based on source/destination IP, source/destination ports, and protocols.
63+
• API supports create, update, and delete the TP entries/rules/Policing/Rate Limiting.
64+
65+
To implement the functionality for Control Plane ACL - Traffic Policy:
66+
67+
• For existing deployments, users must create a CPTP ACL resource, associate it with the Network Fabric (NF), and perform a patch operation.
68+
69+
• For new deployments, users should create the CPTP ACL resource either during Fabric creation or after the Fabric has been provisioned, followed by patching it to the NF resource. Since the CPTP ACL resource is not created by default, users must manually create it before attaching it to the NF.
70+
5671
## Next steps:
5772

5873
[Creating Access Control List (ACL) management for NNI and layer 3 isolation domain external networks](howto-create-access-control-list-for-network-to-network-interconnects.md)

articles/operator-nexus/concepts-isolation-domain.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,17 @@ An Isolation Domain resource enables the creation of layer-2 and layer-3 network
1515

1616
- **Layer-2 isolation domain** - provides layer-2 networking capabilities within and across the racks for workloads running on servers. Workloads can take advantage of the isolated layer-2 network to establish direct connectivity among themselves at layer 2 and above.
1717

18+
- **L2 isolation domain with extended VLAN Support (L2VRF)** - Nexus provides a way to extend Layer 2 (L2) connectivity from the Customer Edge (CE) router to the Provider Edge (PE) router. This is particularly useful workloads that require Layer 2 reachability outside nexus instance
19+
1820
- **Layer-3 isolation domain with Internal Networks** - provides workloads the ability to connect across a layer 3 (IP) network.
1921

20-
- **Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus network fabric.
22+
- **Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus Network Fabric.
2123

2224
An isolation domain offers:
2325

2426
- Unified network capabilities with full integration with your compute resources, enabling connectivity between your Operator Nexus platform workloads.
2527

26-
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus network fabric and the operator's external network.
28+
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus Network Fabric and the operator's external network.
2729

2830
- Southbound connectivity with telco workloads using internal networks.
2931

@@ -39,12 +41,22 @@ A layer 2 isolation domain provides L2 networking capabilities between workloads
3941

4042
The NNF enables operators to provision and manage layer 2 isolation domains below resource level. Each layer-2 isolation domain has an associated VLAN ID. If a workload needs connectivity to multiple VLANs, multiple layer-2 isolation domains must be created. A separate NIC resource is required for each layer-2 domain that the workload connects to.
4143

44+
L2 isolation domain with extended VLAN Support (L2VRF)
45+
46+
The L2VRF feature in Nexus enhances the flexibility and scalability of network configurations, making it easier to manage complex enterprise use cases.
47+
48+
- **Extended VLAN Support:** The Layer 2 Isolation Domain (ISD) ARM resource now supports a new read-write property called extendedVlan, which defaults to false. When this property is set, the CEs are configured to trunk through the VLAN ID of the L2 ISD to the PE.
49+
50+
- **Dynamic Configuration:** The extendedVlan property can be dynamically toggled, and changes apply at the point of the next Fabric commit.
51+
52+
- **Traffic Agnosticism:** Nexus is agnostic to the traffic running over this network and does not run any hosts or services on it. Address management, security, and services (DNS, DHCP, NTP, etc.) are user responsibilities.
53+
4254
## Layer 3 Isolation Domains
4355

44-
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus network fabric and with external networks.
56+
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus Network Fabric and with external networks.
4557

4658
Layer-3 isolation domains can provide two types of network:
4759

48-
- **Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
60+
- **Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network Fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
4961

50-
- **External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus network fabric. Each Layer 3 isolation domain supports one external network.
62+
- **External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus Network Fabric. Each Layer 3 isolation domain supports one external network.

articles/operator-nexus/concepts-observability.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,10 @@ You can use the sample Azure Resource Manager workbook templates for [Operator N
105105

106106
You can use the sample Azure Resource Manager alarm templates for [Operator Nexus alerting rules](https://github.com/microsoft/AzureMonitorCommunity/tree/master/Azure%20Services/Azure%20Operator%20Nexus#alert-rules). You should specify thresholds and conditions for the alerts. You can then deploy these alert templates on your on-premises environment.
107107

108+
#### Hardware capacity alerts
109+
110+
The hardware capacity threshold for devices is set at 60%, and the TrafficPolicy limit thresholds are set at 35%. All alerts will be published via syslog.
111+
108112
## Log Analytic Workspace
109113

110114
A [Log Analytics Workspace (LAW)](/azure/azure-monitor/logs/log-analytics-workspace-overview) is a unique environment to log data from Azure Monitor and other Azure services. Each workspace has its own data repository and configuration but may combine data from multiple services. Each workspace consists of multiple data tables.
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: How to append custom suffix to interface descriptions in Azure Operator Nexus Network Fabric
3+
description: Learn how to append and remove custom suffix from interface descriptions in Azure Operator Nexus Network Fabric for enhanced operational annotations.
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.service: azure-operator-nexus
7+
ms.topic: how-to
8+
ms.date: 02/24/2025
9+
ms.custom: template-how-to
10+
---
11+
12+
# Append custom suffix to interface descriptions in Azure Operator Nexus Network Fabric
13+
14+
This guide explains how to append a user-defined suffix (`additionalDescription`) to interface descriptions in Azure Operator Nexus Network Fabric. This feature provides enhanced flexibility for operational annotations, allowing users to customize interface descriptions for specific maintenance or operational requirements.
15+
16+
## Prerequisites
17+
18+
- **Azure CLI**: Version 2.61 or higher
19+
20+
## Steps to append a custom suffix
21+
22+
### 1. Check the current interface description
23+
24+
Before making changes, verify the existing interface description using the following command:
25+
26+
```Azure CLI
27+
az networkfabric interface show -g "example-rg" \
28+
--network-device-name "example-device" \
29+
--resource-name "example-interface" --query description
30+
```
31+
32+
### Parameter Details
33+
34+
| Parameter | Short Form | Description |
35+
|--------------------------------|-----------|-------------|
36+
| `az networkfabric interface show` | N/A | Displays details of a specified network fabric interface. |
37+
| `-g, --resource-group` | `-g` | Name of the resource group where the network device resides. |
38+
| `--network-device-name` | N/A | Name of the Network Fabric device. |
39+
| `--resource-name` | N/A | Name of the network interface resource. |
40+
| `--query` | N/A | Filters the output to show only the specified field (e.g., `description`). |
41+
42+
### 2. Append a suffix to the interface description
43+
44+
To add a custom suffix, use the following command:
45+
46+
```Azure CLI
47+
az networkfabric interface update --additional-description "example-description" \
48+
--device "example-device" \
49+
-g "example-resource-group" \
50+
--resource-name "example-interface"
51+
```
52+
53+
### Parameter Details
54+
55+
| Parameter | Description | Constraints |
56+
|--------------------------|--------------------------------------------------|-------------|
57+
| `--additional-description` | Provides an additional description for the interface update. | Alphanumeric (`A-Z`, `a-z`, `0-9`), `-`, and `_` allowed. Max 64 characters. Can be an empty string with a space or null. |
58+
| `--device` | Specifies the name of the Network Fabric device. | No specific constraints. |
59+
| `-g, --resource-group` | Defines the name of the resource group where the device is located. | No specific constraints. |
60+
| `--resource-name` | Indicates the name of the network interface resource. | No specific constraints. |
61+
62+
### 3. Commit the configuration
63+
64+
After updating the description, apply the changes to the Fabric:
65+
66+
```Azure CLI
67+
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
68+
```
69+
Parameter Details:
70+
71+
| Parameter | Short Form | Description |
72+
|----------------------|-----------|-------------|
73+
| `--resource-group` | `-g` | Name of the resource group. |
74+
| `--resource-name` | N/A | Name of the Network Fabric. |
75+
76+
### Example
77+
78+
#### **Original interface description:**
79+
80+
```Azure CLI
81+
AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23
82+
```
83+
84+
#### **Updated Description:**
85+
```Azure CLI
86+
AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23-Additional_description-1234
87+
```
88+
89+
## Removing the interface description
90+
91+
To restore the default description, set `additionalDescription` to an empty string with a space (`" "`) or null:
92+
93+
```Azure CLI
94+
az networkfabric interface update --additional-description "example-description" \
95+
--device "example-device" \
96+
-g "example-resource-group" \
97+
--resource-name "example-interface"
98+
```
99+
100+
### Parameter Details
101+
102+
| Parameter | Description | Constraints |
103+
|--------------------------|--------------------------------------------------|-------------|
104+
| `--additional-description` | Provides an additional description for the interface update. | Alphanumeric (`A-Z`, `a-z`, `0-9`), `-`, and `_` allowed. Max 64 characters. Can be an empty string with a space or null. |
105+
| `--device` | Specifies the name of the Network Fabric device. | No specific constraints. |
106+
| `-g, --resource-group` | Defines the name of the resource group where the device is located. | No specific constraints. |
107+
| `--resource-name` | Indicates the name of the network interface resource. | No specific constraints. |
108+
109+
### 3. Commit the configuration
110+
111+
After removing the suffix, apply the changes to the Fabric:
112+
113+
```Azure CLI
114+
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
115+
```
116+
117+
Parameter Details:
118+
119+
| Parameter | Short Form | Description |
120+
|----------------------|-----------|-------------|
121+
| `--resource-group` | `-g` | Name of the resource group. |
122+
| `--resource-name` | N/A | Name of the Network Fabric. |
123+
124+
Once committed, the interface description reverts to its original state:
125+
126+
```
127+
AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23
128+
```
129+
130+
## Supported interface types
131+
132+
This feature is available for the following interface types:
133+
134+
- **Agg Rack CE**
135+
- **Agg Rack Management**
136+
- **Comp Rack TOR**
137+
- **Comp Rack Management**
138+
- **NPB Device**
139+
140+
> [!Note]
141+
> **Existing deployments** will retain their **current descriptions** until Fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.

0 commit comments

Comments
 (0)