Skip to content

Commit 1e096d7

Browse files
authored
Merge pull request github#36478 from github/repo-sync
Repo sync
2 parents 452c1a4 + 9c3ea63 commit 1e096d7

4 files changed

+14
-4
lines changed

content/admin/data-residency/network-details-for-ghecom.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ If you use Azure private networking for {% data variables.product.company_short
7878

7979
| Runner type | Supported regions |
8080
| ----------- | ----------------- |
81-
| x64 | `francecentral`, `swedencentral` |
82-
| arm64 | `francecentral`, `northeurope` |
81+
| x64 | `francecentral`, `swedencentral`, `germanywestcentral` |
82+
| arm64 | `francecentral`, `northeurope`, `germanywestcentral` |
8383
| GPU | `italynorth`, `swedencentral` |
8484

8585
### Supported regions in Australia

data/reusables/actions/azure-vnet-creating-network-configuration-prereqs.md

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,10 @@
1-
After configuring your Azure resources, you can use an Azure Virtual Network (VNET) for private networking by creating a network configuration{% ifversion ghec %} at the enterprise or organization level{% else %} at the organization level{% endif %}. Then, you can associate that network configuration to runner groups. For more information about runner groups, see [AUTOTITLE](/actions/using-github-hosted-runners/about-larger-runners/controlling-access-to-larger-runners).
1+
After configuring your Azure resources, you can use an Azure Virtual Network (VNET) for private networking by creating a network configuration{% ifversion ghec %} at the enterprise or organization level{% else %} at the organization level{% endif %}. Then, you can associate that network configuration to runner groups.
2+
3+
{% ifversion ghec %}
4+
5+
Please note that initial setup must be at the enterprise level when creating the network settings configured with Azure. This is why, when obtaining the `databaseId`, the steps require you to configure the enterprise slug. Organizations are only allowed to create their own network configurations once the enterprise has been established and enabled through enterprise policy for hosted compute networking. For more information about runner groups, see [AUTOTITLE](/actions/using-github-hosted-runners/about-larger-runners/controlling-access-to-larger-runners).
6+
7+
{% endif %}
28

39
Once the network configuration is associated with a runner group, all runners in that group will have access to the Azure VNET that has been connected to the underlying configuration.
410

data/reusables/actions/azure-vnet-hosted-compute-troubleshooting.md

+4
Original file line numberDiff line numberDiff line change
@@ -101,3 +101,7 @@ While running the command to configure Azure resources, ensure you are using the
101101
```
102102

103103
If you experience this error, you can see more information by running the command using the `---debug` flag.
104+
105+
### Network settings configured at the wrong level
106+
107+
If network settings were configured using an organization's `databaseId` instead of an enterprise `databaseId`, an error will occur. The error message will indicate that a private network cannot be established with the provided resource ID because it is already associated with a different enterprise or organization. To resolve this, delete the existing network settings and recreate them using the enterprise `databaseId`.

data/reusables/actions/azure-vnet-procedures-prereqs.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You will use a script to automate configuring your Azure resources.
1212

1313
The `.bicep` file we provide contains the minimal set of rules to use {% data variables.product.company_short %}-hosted runners with Azure VNET. You may need to add rules for your specific use case.
1414

15-
If you use {% data variables.enterprise.data_residency %}, in the `AllowOutBoundGitHub` section, you must also include the egress IP ranges for {% data variables.enterprise.data_residency_site %}. See [AUTOTITLE](/admin/data-residency/network-details-for-ghecom#ranges-for-egress-traffic).
15+
If you use {% data variables.enterprise.data_residency %}, in the `AllowOutBoundGitHub` section, you must also include the ingress IP ranges for {% data variables.enterprise.data_residency_site %}. See [AUTOTITLE](/admin/data-residency/network-details-for-ghecom#ranges-for-ingress-traffic).
1616

1717
> [!NOTE]
1818
> As an alternative to using the following file, to allow {% data variables.product.prodname_actions %} to communicate with the runners, you can allow the same firewall domains that are required for communication between self-hosted runners and {% data variables.product.github %}. For more information, see [AUTOTITLE](/actions/hosting-your-own-runners/managing-self-hosted-runners/about-self-hosted-runners#communication-between-self-hosted-runners-and-github-enterprise-cloud). To determine the appropriate subnet IP address range, we recommend adding a 30% buffer to the maximum job concurrency you anticipate. For instance, if your network configuration's runners are set to a maximum job concurrency of 300, it's recommended to utilize a subnet IP address range that can accommodate at least 390 runners. This buffer helps ensure that your network can handle unexpected increases in VM needs to meet job concurrency without running out of IP addresses.

0 commit comments

Comments
 (0)