Skip to content

Commit e7a3e66

Browse files
authored
Merge pull request #285392 from yousefi-msft/release-mswb
MSWB release candidate
2 parents 9550a67 + 7ae0f67 commit e7a3e66

File tree

60 files changed

+1130
-293
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+1130
-293
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
"redirect_url": "/previous-versions/azure/azure-app-configuration/rest-api-fiddler",
1111
"redirect_document_id": false
1212
},
13-
{
13+
{
1414
"source_path": "articles/kinect-dk/index.yml",
1515
"redirect_url": "/previous-versions/azure/kinect-dk/index",
1616
"redirect_document_id": false
@@ -4754,6 +4754,11 @@
47544754
"source_path_from_root": "/articles/virtual-network/virtual-network-service-endpoint-policies-powershell.md",
47554755
"redirect_url": "/azure/virtual-network/virtual-network-service-endpoint-policies",
47564756
"redirect_document_id": false
4757+
},
4758+
{
4759+
"source_path_from_root": "/articles/modeling-simulation-workbench/how-to-guide-manage-storage.md",
4760+
"redirect_url": "/azure/modeling-simulation-workbench/concept-storage",
4761+
"redirect_document_id": false
47574762
}
47584763
]
4759-
}
4764+
}

articles/modeling-simulation-workbench/concept-chamber.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,35 +9,37 @@ ms.topic: conceptual
99
ms.date: 01/01/2023
1010
# Customer intent: As a Modeling and Simulation Workbench user, I want to understand the chamber component.
1111
---
12+
# Chambers in the Azure Modeling and Simulation Workbench
1213

13-
# Chamber: Azure Modeling and Simulation Workbench
14+
In the Azure Modeling and Simulation Workbench, chambers are a security boundary for a group virtual machines (VM) (nodes) and share common users. A chamber provides a full-featured and secure environment for users to run engineering applications and workloads together in isolation. Chamber VMs are all on the same subnet and have no internet access.
1415

15-
In Azure Modeling and Simulation Workbench, a chamber is defined as a group of connected computers (nodes) that work together as a single system. A chamber provides a full-featured and secure environment for users to run engineering applications and workloads together.
16+
## Key features
1617

17-
- Chambers offer optimized infrastructure, allowing users to choose from varied VM sizes, storage options, and compute resources to constitute workloads.
18-
- Chambers enable a preconfig environment for license server access and full-featured workload tools.
19-
- On-demand chambers are nested to Modeling and Simulation [Workbench](./concept-workbench.md) resource.
18+
* Chambers offer optimized infrastructure, allowing users to choose from varied VM sizes, storage options, and compute resources to constitute workloads.
19+
* Chambers enable a preconfigured, isolated environment for license server access and full-featured workload tools.
20+
* Chambers are encapsulated in the [Workbench](./concept-workbench.md) resource.
2021

2122
## Chamber environment
2223

2324
Chambers create a secure and isolated environment by adding private IP access and removing internet access. Public domain access is restricted to authorized networks over encrypted sessions enabled by the connector component. A [connector](./concept-connector.md) exists per chamber that supports the protocols established through VPN, Azure Express Route, or allowlisted Public IP addresses.
2425

25-
Only provisioned users can access the chamber environment. User provisioning is done at the chamber component using IAM [(Access Control)](/azure/role-based-access-control/role-assignments-portal). This enables Cross team and/or cross-organization individuals to collaborate on the same projects through the chambers. Multifactor authentication (MFA) enabled through Microsoft Entra ID is recommended to enhance your organization's security.
26+
Only provisioned users can access the chamber environment. User provisioning is done at the chamber level using Azure's [Identity Access Management](/azure/role-based-access-control/role-assignments-portal). This enables cross-team and/or cross-organization collaboration on the same projects through chambers. Multifactor authentication (MFA) enabled through Microsoft Entra ID is recommended to enhance your organization's security.
2627

2728
## Chamber storage
2829

29-
Users can resize and tailor the chambers to support storage requirement needs throughout the design process. Chamber users can also allocate Chamber VMs on demand, select the right-sized VM/CPU for the task/job at hand, and decommission the workload when the job is done to save costs.
30+
Users can resize and tailor the chambers to support storage requirement needs throughout the design process. Chamber users can also allocate chamber VMs on demand, select the right-sized VM/CPU for the task/job at hand, and decommission the workload when the job is done to save costs.
3031

31-
### Right-sizing
32+
### Cost optimization
3233

33-
The right-sizing feature reduces the Azure spend by identifying idle and underutilized resources. For example:
34+
Administrators can optimize their resource consumption without necessarily destroying resources or moving data by:
3435

35-
- By managing the size and number of virtual machines.
36-
- By stopping unused workloads, connectors and chambers.
37-
- By managing the size and performance tier of chamber storages.
36+
* [Managing](./how-to-guide-chamber-vm.md) the size and number of virtual machines.
37+
* [Idling](./how-to-guide-chamber-idle.md) unused chambers to reduce cost without deleting VMs or storage.
38+
* [Managing](./how-to-guide-manage-chamber-storage.md) the size and performance tier of chamber storages.
3839

3940
Learn more about reducing service costs using [Azure Advisor](/azure/advisor/advisor-cost-recommendations#optimize-spend-for-mariadb-mysql-and-postgresql-servers-by-right-sizing) and [right-size VMs best practices](/azure/cloud-adoption-framework/migrate/azure-best-practices/migrate-best-practices-costs#best-practice-right-size-vms).
4041

41-
## Related content
42+
## Next steps
4243

43-
- [Connector](./concept-connector.md)
44+
> [!div class="nextstepaction"]
45+
> [Create a chamber VM](./how-to-guide-chamber.md)
Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,36 @@
11
---
2-
title: "Connector: Azure Modeling and Simulation Workbench"
3-
description: Overview of how the Azure Modeling and Simulation Workbench implements connectors.
2+
title: "Connectors: Azure Modeling and Simulation Workbench"
3+
description: Connector implementation in Azure Modeling and Simulation Workbench.
44
author: lynnar
55
ms.author: lynnar
66
ms.reviewer: yochu
77
ms.service: modeling-simulation-workbench
88
ms.topic: conceptual
99
ms.date: 01/01/2023
10-
#Customer intent: As a Modeling and Simulation Workbench user, I want to understand the connector component.
10+
11+
#Customer intent: As a Modeling and Simulation Workbench user, I want to understand the component.
1112
---
13+
# Connectors in Azure Modeling and Simulation Workbench
14+
15+
Connectors define the network access method between users and the Azure Modeling and Simulation Workbench chamber. Connectors support connectivity through allowlisted public IPs, VPN, or Azure ExpressRoute. A chamber can have only one connector configured at a time. Connectors also configure copy-paste functionality into chamber VMs. Connector types are immutable and once created can't be changed to another access model. Connectors are part of the Idle mode setting to reduce cost.
16+
17+
## Public IP access via allowlist
18+
19+
The Workbench can be built to allow users to connect directly from the internet, allowing flexible, open access. When a Public IP Connection is built, connections are permitted using an allowlist. The allowlist uses CIDR (Classless Interdomain Routing) notation to conveniently manage access from large network ranges, such as conference centers or corporate exit nodes. Only IPs listed in the allowlist are able to make connections to its associated chamber.
1220

13-
# Connector: Azure Modeling and Simulation Workbench
21+
## Private Azure networking
1422

15-
Connectors are used to define and configure the network access between an organization's on-premises or cloud environment into the Azure Modeling and Simulation Workbench chamber. The connector supports protocols established through VPN, Azure Express Route, or network Access Control Lists.
23+
A connector can be created for private network access from Azure virtual networks. This method is best suited where a private or controlled connection is required. Azure ExpressRoutes provide a dedicated connection from an on-premises infrastructure to an Azure data center and can be peered to the Workbench. With a VPN gateway, the Workbench can use a private network with extra encryption layers.
1624

17-
## VPN or Azure Express Route
25+
### VPN
1826

19-
For organizations who have an Azure network setup to manage access for their employees, they can have strict controls of the virtual network subnet addresses used for connecting into the chamber. At creation time of the connector, the Chamber Admin or Workbench Owner can connect a virtual network subnet with VPN gateway or ExpressRoute gateway to establish a secure connection from your on-premises network to the chamber. The subnet selection should be a non gateway subnet within the same virtual network with the gateway subnet for VPN gateway or ExpressRoute gateway.
27+
A VPN connector can be created which deploys infrastructure specifically for VPN access. The VPN connector is required if the chamber is accessed through a point-to-site or site-to-site VPN.
2028

21-
## Allowlisted Public IP addresses
29+
### Azure ExpressRoute
2230

23-
For those organizations who don't have an Azure network setup, or prefer to use the public network, they can configure their connector to allow access to the chamber via allowlisted Public IP addresses. The connector object allows the allowed IP list to be configured at creation time or added or removed dynamically after the connector object is created.
31+
[Azure ExpressRoute](/azure/expressroute/expressroute-introduction) provides secure, dedicated, encrypted connectivity from on-premises to an Azure landing zone. A Workbench Owner must create a connector expressly for ExpressRoute, providing the necessary virtual network, supporting network infrastructure, and peer the appropriate vnets.
2432

25-
## Related content
33+
## Next step
2634

27-
- [Data pipeline](./concept-data-pipeline.md)
35+
> [!div class="nextstepaction"]
36+
> [Create a connector](./how-to-guide-set-up-networking.md)

articles/modeling-simulation-workbench/concept-data-pipeline.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,23 +18,23 @@ The data pipeline enables users to bring data into the [chamber](./concept-chamb
1818

1919
## Importing data overview
2020

21-
Users with access to the chamber can bring data into the chamber via AzCopy and an expiring SAS URI token they get from the chamber component. They then use AzCopy to move data into the data pipeline endpoint. The chamber recognizes the data pipeline request and moves the file into the chamber. For traceability purposes, when a file is moved into the chamber, the data pipeline automatically creates a file object in the chamber that represents the file data.
21+
Users with access to the chamber can bring data into the chamber via AzCopy and an expiring SAS URI token they get from the chamber component. They then use AzCopy to move data into the data pipeline endpoint. The chamber recognizes the data pipeline request and moves the file into the chamber. For traceability purposes, when a file is moved into the chamber, the data pipeline automatically creates a file object in the chamber that represents the file data.
2222

2323
## Exporting data overview
2424

2525
Users with access to the chamber can export data from the chamber via the data pipeline.
2626

27-
1. **Identify file to export.** The export process is triggered when a user places a file to export into a designated area within the chamber. A Chamber Admin or Chamber User copies the file to the data out folder within the pipeline. The data pipeline detects the copied file and creates a file object. The file creation activity is traceable in the logs and enables the next step of the data pipeline.
27+
1. **Identify file to export.** The export process is triggered when a user places a file to export into a designated area within the chamber. A chamber Admin or chamber User copies the file to the data out folder within the pipeline. The data pipeline detects the copied file and creates a file object. The file creation activity is traceable in the logs and enables the next step of the data pipeline.
2828

29-
1. **Request file to export.** A Chamber Admin reviews files in the data pipeline and requests to export files in the data out folder in the chamber. The pipeline creates a file request object. The export request activity is traceable in the logs and enables the next step of the data pipeline.
29+
1. **Request file to export.** A Chamber Admin reviews the files staged in the data pipeline and requests to export. The pipeline manager creates a file request object. The export request activity is traceable in the logs and enables the next step of the data pipeline.
3030

31-
1. **Approve/reject export request.** The Workbench Owner approves or rejects the file request object for export. The export approval step must be completed by the Workbench Owner and can't be the same person who requested to export the data.
31+
1. **Approve/reject export request.** The Workbench Owner either approves or rejects the export file request. Only a Workbench Owner can approve or reject requests. The individual who approves or denies can't be the same person who initially requested the export.
3232

33-
1. **Download file to export.** If a file is approved for export, the user gets a download URI from the file request object and copies it out of the chamber using AzCopy. The URI has an expiration timestamp and must be downloaded before it expires. If the URI expires, you need to request a new download URI.
33+
1. **Download file.** If a file is approved for export, the user gets a download URI from the file request object and copies it out of the chamber using AzCopy. The URI has an expiration timestamp and must be downloaded before it expires. If the URI expires, you need to request a new download URI.
3434

35-
> [!NOTE]
36-
> Larger files take longer to be available to download after being approved and to download using AzCopy. Check the expiration on the download URI and request a new one if the window has expired.
35+
> [!NOTE]
36+
> Larger files take longer to be available to download after being approved and to download using AzCopy. Check the expiration on the download URI and request a new one if the window has expired.
3737
38-
## Related content
38+
## Next steps
3939

40-
- [License service](./concept-license-service.md)
40+
- [License service](./concept-license-service.md)

articles/modeling-simulation-workbench/concept-license-service.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,22 @@ ms.date: 01/01/2023
1212

1313
# License service: Azure Modeling and Simulation Workbench
1414

15-
A license service automates the installation of a license manager to help customers accelerate their engineering design. A license service is integrated into Azure Modeling and Simulation Workbench.
15+
A license service automates the installation of a license manager to help customers accelerate their engineering design. A license service is integrated into Azure Modeling and Simulation Workbench.
1616

1717
## Overview
1818

1919
Engineering design tools are widely used across industries to enable design teams to run their flows efficiently. Many of these proprietary software programs require licenses. License management is integrated into our flows via the most commonly used license manager, FLEXlm.
2020

2121
Here's how the license service works:
2222

23-
- For each deployed chamber within the workbench, we set up a license server and expose the FLEXlm HostID's to procure licenses.
24-
- Users request tool licenses for the specific HostID.
25-
- Once the license file is received from the tool vendor, users import it to enable the license service.
23+
For each deployed chamber within the workbench, we set up a license server and expose the FLEXlm HostID's to procure licenses. Users then request tool licenses referencing the specific HostID. Once the license file is received from the tool vendor, users import it to the chamber license server to enable the license service.
2624

2725
## Additional information
2826

29-
For silicon EDA, our service automation deploys license servers for each of the four common software vendors (Synopsys, Cadence, Siemens, and Ansys) as part of resource creation to enable multi-vendor flows. The workbench also supports license service beyond these common EDA tool vendors with some manual configuration.
27+
For semiconductor Electronic Design Automation (EDA), our service automation deploys license servers for each of the four common software vendors (Synopsys, Cadence, Siemens, and Ansys) as part of resource creation to enable multi-vendor flows. The workbench also supports license service beyond these common EDA tool vendors with some manual configuration.
3028

31-
This flow is extendible and can also include other software vendors across industry verticals."
29+
This flow is extendible and can also include other software vendors across industry verticals.
3230

3331
## Related content
3432

35-
- Learn more about the benefits and key features of using [Shared storage](./shared-storage.md).
33+
- Learn more about the benefits and key features of using [shared storage](./shared-storage.md).

0 commit comments

Comments
 (0)