Skip to content

Commit f5e65eb

Browse files
authored
Merge pull request #272175 from robswain/high-availability
Add AP5GC HA
2 parents 6097239 + 5fd475c commit f5e65eb

10 files changed

+228
-43
lines changed

articles/private-5g-core/azure-stack-edge-virtual-machine-sizing.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,14 @@ This article describes the maximum supported limits of the Azure Private 5G Core
1616

1717
The following table lists the maximum supported limits for a range of parameters in an Azure Private 5G Core deployment. These limits have been confirmed through testing, but other factors may affect what is achievable in a given scenario. For example, usage patterns, UE types and third-party network elements may impact one or more of these parameters. It is important to test the limits of your deployment before launching a live service.
1818

19-
| Element | Maximum supported |
20-
|------------------------|-------------------|
21-
| PDU sessions | 10,000 per Packet Core |
22-
| Bandwidth | Over 25 Gbps combined uplink and downlink per Packet Core |
23-
| RAN nodes (eNB/gNB) | 200 per Packet Core |
24-
| Active UEs | 10,000 per Packet Core |
25-
| SIMs | 20,000 per Mobile Network |
26-
| SIM provisioning | 10,000 per JSON file via Azure portal, 4MB per REST API call |
19+
| Element | Maximum supported | Additional limits in a Highly Available (HA) deployment |
20+
|------------------------|-------------------|-------------------|
21+
| PDU sessions | 10,000 per Packet Core | |
22+
| Bandwidth | Over 25 Gbps combined uplink and downlink per Packet Core | |
23+
| RAN nodes (eNB/gNB) | 200 per Packet Core | 20 per Packet Core |
24+
| Active UEs | 10,000 per Packet Core | 500 per Packet Core |
25+
| SIMs | 20,000 per Mobile Network | |
26+
| SIM provisioning | 10,000 per JSON file via Azure portal, 4MB per REST API call | |
2727

2828
Your chosen service package may define lower limits, with overage charges for exceeding them - see [Azure Private 5G Core pricing](https://azure.microsoft.com/pricing/details/private-5g-core/) for details. If you require higher throughput for your use case, please contact us to discuss your needs.
2929

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 19 additions & 19 deletions
Large diffs are not rendered by default.

articles/private-5g-core/commission-cluster.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,9 @@ In the local Azure Stack Edge UI, go to the **Kubernetes (Preview)** page. You'l
125125
1. Enter one IP address in a range for the service IP address, also on the management network. This will be used for accessing local monitoring tools for the packet core instance.
126126
1. Select **Modify** at the bottom of the panel to save the configuration.
127127
1. Under **Virtual network**, select a virtual network, from **N2**, **N3**, **N6-DNX** (where *X* is the DN number 1-10). In the side panel:
128-
1. Enable the virtual network for Kubernetes and add a pool of IP addresses. Add a range of one IP address for the appropriate address (N2, N3, or N6-DNX as collected earlier). For example, *10.10.10.20-10.10.10.20*.
128+
1. Enable the virtual network for Kubernetes and add a pool of IP addresses.
129+
1. For a standard deployment, add a range of one IP address for the appropriate address (N2, N3, or N6-DNX as collected earlier). For example, *10.10.10.20-10.10.10.20*.
130+
1. For an HA deployment, add a range of two IP addresses for each virtual network, where the N2 and N3 pod IP addresses are in the local access subnet and the N6 pod IP addresses are in the appropriate local data subnet.
129131
1. Repeat for each of the N2, N3, and N6-DNX virtual networks.
130132
1. Select **Modify** at the bottom of the panel to save the configuration.
131133
1. Select **Apply** at the bottom of the page and wait for the settings to be applied. Applying the settings will take approximately 5 minutes.
@@ -157,7 +159,7 @@ If you're running other VMs on your Azure Stack Edge, we recommend that you stop
157159

158160
1. For the **Node size**, select **Standard_F16s_HPN**.
159161
1. Ensure the **Arc enabled Kubernetes** checkbox is selected.
160-
1. Select the **Change** link and enter the Microsoft Entra application Object Id (OID) for the custom location which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
162+
1. Select the **Change** link and enter the Microsoft Entra application Object ID (OID) for the custom location which you obtained from [Retrieve the Object ID (OID)](complete-private-mobile-network-prerequisites.md#retrieve-the-object-id-oid).
161163

162164
:::image type="content" source="media/commission-cluster/commission-cluster-configure-kubernetes.png" alt-text="Screenshot of Configure Arc enabled Kubernetes pane, showing where to enter the custom location OID.":::
163165

@@ -339,6 +341,7 @@ Your packet core should now be in service with the updated ASE configuration. To
339341
340342
## Next steps
341343
342-
Your Azure Stack Edge device is now ready for Azure Private 5G Core. The next step is to collect the information you'll need to deploy your private network.
344+
Your Azure Stack Edge device is now ready for Azure Private 5G Core. For an HA deployment, you will also need to configure your routers. Otherwise, the next step is to collect the information you'll need to deploy your private network.
343345
346+
- [Configure routers for a Highly Available (HA) deployment](configure-routers-high-availability.md)
344347
- [Collect the required information to deploy a private mobile network](./collect-required-information-for-private-mobile-network.md)

0 commit comments

Comments
 (0)