Skip to content

Commit eb8f9e4

Browse files
authored
Merge pull request #205887 from LouisBerner/v-lberner-ADO-1971973
update to clarify use of free IP addresses
2 parents 582c23c + 30d5b66 commit eb8f9e4

10 files changed

+53
-13
lines changed

articles/databox-online/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy.md

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: tutorial
10-
ms.date: 05/24/2022
10+
ms.date: 08/01/2022
1111
ms.author: alkohli
1212
zone_pivot_groups: azure-stack-edge-device-deployment
1313
# Customer intent: As an IT admin, I need to understand how to connect and activate Azure Stack Edge Pro so I can use it to transfer data to Azure.
@@ -39,6 +39,7 @@ In this tutorial, you learn about:
3939
> * Configure network
4040
> * Configure advanced networking
4141
> * Configure web proxy
42+
> * Validate network settings
4243
4344
::: zone-end
4445

@@ -53,6 +54,7 @@ In this tutorial, you learn about:
5354
> * Configure virtual IP settings for Azure Consistent Services and NFS
5455
> * Configure advanced networking
5556
> * Configure web proxy
57+
> * Validate network settings
5658
5759
::: zone-end
5860

@@ -181,14 +183,14 @@ Follow these steps to configure compute IPs for your Kubernetes workloads.
181183

182184
1. Assign **Kubernetes node IPs**. These static IP addresses are for the Kubernetes VMs.
183185

184-
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 contiguous IPv4 addresses.
186+
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 free, contiguous IPv4 addresses.
185187

186188
> [!IMPORTANT]
187189
> - Kubernetes on Azure Stack Edge uses 172.27.0.0/16 subnet for pod and 172.28.0.0/16 subnet for service. Make sure that these are not in use in your network. If these subnets are already in use in your network, you can change these subnets by running the `Set-HcsKubeClusterNetworkInfo` cmdlet from the PowerShell interface of the device. For more information, see [Change Kubernetes pod and service subnets](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-pod-and-service-subnets).
188190
> - DHCP mode is not supported for Kubernetes node IPs. If you plan to deploy IoT Edge/Kubernetes, you must assign static Kubernetes IPs and then enable IoT role. This will ensure that static IPs are assigned to Kubernetes node VMs.
189191
> - If your datacenter firewall is restricting or filtering traffic based on source IPs or MAC addresses, make sure that the compute IPs (Kubernetes node IPs) and MAC addresses are on the allowed list. The MAC addresses can be specified by running the `Set-HcsMacAddressPool` cmdlet on the PowerShell interface of the device.
190192
191-
1. Assign **Kubernetes external service IPs**. These are also the load-balancing IP addresses. These contiguous IP addresses are for services that you want to expose outside of the Kubernetes cluster and you specify the static IP range depending on the number of services exposed.
193+
1. Assign **Kubernetes external service IPs**. These are also the load-balancing IP addresses. These contiguous IP addresses are for services that you want to expose outside of the Kubernetes cluster and you specify the static IP range depending on the number of services exposed.
192194

193195
> [!IMPORTANT]
194196
> We strongly recommend that you specify a minimum of 1 IP address for Azure Stack Edge Hub service to access compute modules. You can then optionally specify additional IP addresses for other services/IoT Edge modules (1 per service/module) that need to be accessed from outside the cluster. The service IP addresses can be updated later.
@@ -486,8 +488,8 @@ After the virtual switches are created, you can enable these switches for Kubern
486488
1. From the dropdown list, select the virtual switch you want to enable for Kubernetes compute traffic.
487489
1. Assign **Kubernetes node IPs**. These static IP addresses are for the Kubernetes VMs.
488490

489-
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 contiguous IPv4 addresses. For a two-node cluster, provide a minimum of 3 contiguous IPv4 addresses.
490-
491+
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 free, contiguous IPv4 addresses. For a two-node cluster, provide a minimum of 3 free, contiguous IPv4 addresses.
492+
491493
> [!IMPORTANT]
492494
> - Kubernetes on Azure Stack Edge uses 172.27.0.0/16 subnet for pod and 172.28.0.0/16 subnet for service. Make sure that these are not in use in your network. If these subnets are already in use in your network, you can change these subnets by running the `Set-HcsKubeClusterNetworkInfo` cmdlet from the PowerShell interface of the device. For more information, see [Change Kubernetes pod and service subnets](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-pod-and-service-subnets).
493495
> - DHCP mode is not supported for Kubernetes node IPs. If you plan to deploy IoT Edge/Kubernetes, you must assign static Kubernetes IPs and then enable IoT role. This will ensure that static IPs are assigned to Kubernetes node VMs.
@@ -520,9 +522,26 @@ This is an optional configuration. Although web proxy configuration is optional,
520522

521523
2. To validate and apply the configured web proxy settings, select **Apply**.
522524

523-
![Local web UI "Web proxy settings" page 2](./media/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy/configure-web-proxy-1.png).
525+
![Screenshot of local web UI "Web proxy settings" page 2](./media/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy/configure-web-proxy-1.png)
526+
527+
## Validate network settings
528+
529+
Follow these steps to validate your network settings.
530+
531+
1. Go to the **Diagnostic tests** page and select the tests as shown below.
532+
1. Select **Run test**.
533+
534+
![Screenshot of the Diagnostic tests page in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy/validate-network-settings-with-diagnostic-test.png)
535+
536+
1. Review test results to ensure that status shows **Healthy** for each test that was run.
537+
538+
![Screenshot of the Diagnostic tests results page in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy/validate-network-settings-with-diagnostic-test-results.png)
539+
540+
1. If a test fails, select **Recommended actions** on the test results page, implement the recommended change, and then rerun the test. For example, the dialog below shows recommended actions if the Azure Edge compute runtime test fails.
541+
542+
![Screenshot of Recommended actions when the Azure Edge compute runtime test fails as shown in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-gpu-deploy-configure-network-compute-web-proxy/recommended-actions-ip-already-in-use.png)
524543

525-
1. After the settings are applied, select **Next: Device**.
544+
1. After network settings are validated and all tests return **Healthy** status, proceed to the device settings page.
526545

527546
::: zone pivot="two-node"
528547

@@ -541,6 +560,7 @@ In this tutorial, you learned about:
541560
> * Configure network
542561
> * Enable compute network
543562
> * Configure web proxy
563+
> * Validate network settings
544564
545565
::: zone-end
546566

@@ -555,6 +575,7 @@ In this tutorial, you learned about:
555575
> * Configure virtual IP settings for Azure Consistent Services and NFS
556576
> * Configure advanced networking
557577
> * Configure web proxy
578+
> * Validate network settings
558579
559580
::: zone-end
560581

articles/databox-online/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: tutorial
10-
ms.date: 03/04/2022
10+
ms.date: 08/01/2022
1111
ms.author: alkohli
1212
zone_pivot_groups: azure-stack-edge-device-deployment
1313
# Customer intent: As an IT admin, I need to understand how to connect and activate Azure Stack Edge Pro so I can use it to transfer data to Azure.
@@ -39,6 +39,7 @@ In this tutorial, you learn about:
3939
> * Configure network
4040
> * Configure advanced networking
4141
> * Configure web proxy
42+
> * Validate network settings
4243
4344
::: zone-end
4445

@@ -53,6 +54,7 @@ In this tutorial, you learn about:
5354
> * Configure virtual IP settings for Azure Consistent Services and NFS
5455
> * Configure advanced networking
5556
> * Configure web proxy
57+
> * Validate network settings
5658
5759
::: zone-end
5860

@@ -80,7 +82,7 @@ Follow these steps to configure the network for your device.
8082

8183
![Screenshot of the Get started page in the local web UI of an Azure Stack Edge device. The Needs setup is highlighted on the Network tile.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/network-1.png)
8284

83-
On your physical device, there are four network interfaces. Port 1 and Port 2 are 1-Gbps network interfaces that can also serve as 10-Gbps network interfaces. Port 3 and Port 4 are 100-Gbps network interfaces. Port 1 is used for the intial configuration of the device. For a new device, the **Network** page is as shown below.
85+
On your physical device, there are four network interfaces. Port 1 and Port 2 are 1-Gbps network interfaces that can also serve as 10-Gbps network interfaces. Port 3 and Port 4 are 100-Gbps network interfaces. Port 1 is used for the initial configuration of the device. For a new device, the **Network** page is as shown below.
8486

8587
![Screenshot of the Network page in the local web UI of an Azure Stack Edge device whose network isn't configured.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/network-2.png)
8688

@@ -131,7 +133,7 @@ Follow these steps to configure advanced network settings such as creating a swi
131133
1. Assign an intent for your virtual switch. To deploy compute workloads, you'll select compute as the intent.
132134
1. Assign **Kubernetes node IPs**. These static IP addresses are for the compute VM that will be created on this virtual switch.
133135

134-
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 contiguous IPv4 addresses.
136+
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 free, contiguous IPv4 addresses.
135137

136138
> [!IMPORTANT]
137139
> Kubernetes on Azure Stack Edge uses 172.27.0.0/16 subnet for pod and 172.28.0.0/16 subnet for service. Make sure that these are not in use in your network. If these subnets are already in use in your network, you can change these subnets by running the `Set-HcsKubeClusterNetworkInfo` cmdlet from the PowerShell interface of the device. For more information, see [Change Kubernetes pod and service subnets](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-pod-and-service-subnets).
@@ -154,7 +156,6 @@ Follow these steps to configure advanced network settings such as creating a swi
154156

155157
![Screenshot of the Advanced networking page in the local web UI of an Azure Stack Edge device. The newly added virtual switch is highlighted.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/advanced-networking-4.png)
156158

157-
158159
1. Optionally you can create a virtual network and associate it with your virtual switch if you wish to route your traffic. Select **Add virtual network** and then input the following information.
159160

160161
1. Select a **Virtual switch** to which you'll add a virtual network.
@@ -483,7 +484,7 @@ After the cluster is formed and configured, you'll now create new virtual switch
483484
484485
1. Assign **Kubernetes node IPs**. These static IP addresses are for the Kubernetes VMs.
485486

486-
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 contiguous IPv4 addresses. For a two-node cluster, provide a minimum of 3 contiguous IPv4 addresses.
487+
For an *n*-node device, a contiguous range of a minimum of *n+1* IPv4 addresses (or more) are provided for the compute VM using the start and end IP addresses. For a 1-node device, provide a minimum of 2 free, contiguous IPv4 addresses. For a two-node cluster, provide a minimum of 3 free, contiguous IPv4 addresses.
487488

488489
> [!IMPORTANT]
489490
> - Kubernetes on Azure Stack Edge uses 172.27.0.0/16 subnet for pod and 172.28.0.0/16 subnet for service. Make sure that these are not in use in your network. If these subnets are already in use in your network, you can change these subnets by running the `Set-HcsKubeClusterNetworkInfo` cmdlet from the PowerShell interface of the device. For more information, see [Change Kubernetes pod and service subnets](azure-stack-edge-gpu-connect-powershell-interface.md#change-kubernetes-pod-and-service-subnets).
@@ -542,8 +543,24 @@ This is an optional configuration. However, if you use a web proxy, you can conf
542543

543544
![Screenshot of the Web proxy page in the local web UI of an Azure Stack Edge device. The Apply button is highlighted.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/web-proxy-1.png)
544545

545-
2. After the settings are applied, select **Next: Device**.
546+
## Validate network settings
547+
548+
Follow these steps to validate your network settings.
549+
550+
1. Go to the **Diagnostic tests** page and select the tests as shown below.
551+
1. Select **Run test**.
552+
553+
![Screenshot of the Diagnostic tests page in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/validate-network-settings-with-diagnostic-test.png)
554+
555+
1. Review test results to ensure that status shows **Healthy** for each test that was run.
556+
557+
![Screenshot of the Diagnostic test results page in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/validate-network-settings-with-diagnostic-test-results.png)
558+
559+
1. If a test fails, select **Recommended actions** on the test results page, implement the recommended change, and then rerun the test. For example, the dialog below shows recommended actions if the Azure Edge compute runtime test fails.
560+
561+
![Screenshot of Recommended actions when the Azure Edge compute runtime test fails as shown in the local web UI of an Azure Stack Edge device.](./media/azure-stack-edge-pro-2-deploy-configure-network-compute-web-proxy/recommended-actions-ip-already-in-use.png)
546562

563+
1. After network settings are validated and all tests return **Healthy** status, proceed to the device settings page.
547564

548565
## Next steps
549566

@@ -556,6 +573,7 @@ In this tutorial, you learned about:
556573
> * Configure network
557574
> * Configure advanced networking
558575
> * Configure web proxy
576+
> * Validate network settings
559577
560578
::: zone-end
561579

@@ -570,6 +588,7 @@ In this tutorial, you learned about:
570588
> * Configure virtual IP settings for Azure Consistent Services and NFS
571589
> * Configure advanced networking
572590
> * Configure web proxy
591+
> * Validate network settings
573592
574593
::: zone-end
575594

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)