Skip to content

Commit 6716f1a

Browse files
Merge pull request #10158 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-10 18:00 UTC
2 parents ccdc4fb + 29d0496 commit 6716f1a

File tree

4 files changed

+191
-6
lines changed

4 files changed

+191
-6
lines changed

support/azure/azure-kubernetes/logs/capture-system-insights-from-aks.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -76,11 +76,7 @@ To complement the demo that's presented at the beginning of this article, we com
7676

7777
## How to install Inspektor Gadget in an AKS cluster
7878

79-
### One-Click Inspektor Gadget deployment
80-
81-
By selecting the following button, an AKS cluster will be automatically created, and Inspektor Gadget will be deployed in the cluster. After the deployment is finished, you can explore all the features of Inspektor Gadget in the provided shell environment.
82-
83-
[![Deploy Inspektor Gadget in an AKS cluster](https://aka.ms/deploytoazurebutton)](https://go.microsoft.com/fwlink/?linkid=2286151)
79+
Learn how to deploy Inspektor Gadget in your cluster.
8480

8581
### Install Inspektor Gadget by running the "kubectl gadget" plug-in
8682

support/azure/logic-apps/toc.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,11 @@
1+
items:
2+
13
- name: Welcome
24
href: index.yml
35

46
- name: Troubleshoot logic apps with connectors
57
items:
6-
- name: Can't access the storage account services
8+
- name: Can't access the storage account services
79
href: common-error-deploy-logic-apps-private-storage-account.md
10+
- name: Troubleshoot Azure Logic Apps setup and connectivity
11+
href: troubleshoot-logic-apps-setup-connectivity.md
Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
---
2+
title: Troubleshoot Azure Logic Apps Setup and Connectivity
3+
description: This troubleshooting checklist consolidates the required steps for resolving Azure Logic Apps setup and connectivity issues.
4+
ms.service: azure-logic-apps
5+
ms.reviewer: xuehongg, shrahman, v-ryanberg, v-gsitser
6+
ms.topic: troubleshooting
7+
ms.custom: Networking
8+
ms.date: 11/5/2025
9+
author: JarrettRenshaw
10+
ms.author: jarrettr
11+
---
12+
13+
# Troubleshoot Azure Logic Apps setup and connectivity
14+
15+
This troubleshooting checklist consolidates the required steps for resolving Azure Logic Apps setup and connectivity issues.
16+
17+
## Troubleshooting checklist
18+
19+
### Configure the logic app for VNet integration
20+
21+
Make sure that the logic app is configured correctly for virtual network (VNet) integration:
22+
23+
1. On the Azure portal, navigate to **Logic App > Settings > Networking > Outbound traffic configuration**.
24+
1. Select **Add virtual network integration**.
25+
1. Choose a virtual network that includes a subnet without any delegations. For more information, see [Prerequisites](/azure/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint#prerequisites).
26+
1. Add this app setting: **WEBSITE_VNET_ROUTE_ALL = 1**.
27+
28+
### Verify storage account access
29+
30+
Verify that the storage account has the necessary network rules and permissions to allow access from the logic app:
31+
32+
1. Navigate to **Storage Account > Networking > Public network access > Enable from selected networks**.
33+
1. In **Virtual Networks**, add the logic app subnet.
34+
35+
### Verify that private addresses are returned for endpoints
36+
37+
If private endpoints are enabled, check DNS settings to make sure that private addresses are returned for endpoints.
38+
39+
> [!IMPORTANT]
40+
> Make sure that you follow these steps if you use your own DNS server instead of Azure DNS.
41+
42+
1. Create private DNS zones (for example: *privatelink.blob.core.windows.net*).
43+
1. Link the DNS zones to the VNet.
44+
1. Add these app settings:
45+
- **WEBSITE_DNS_SERVER**
46+
- **WEBSITE_DNS_ALT_SERVER**
47+
2. Verify these settings by using Kudu together with the `nameresolver` command.
48+
49+
### Enable Allow storage account key access
50+
51+
Enable **Allow storage account key access** in the storage account configuration:
52+
53+
1. Navigate to **Storage Account** > **Configuration**.
54+
1. Set **Allow storage account key access** to **Enabled**.
55+
56+
### Ensure private endpoint connectivity
57+
58+
Use the built-in connector for Azure Blob Storage to ensure private endpoint connectivity:
59+
60+
1. Navigate to **Workflows**, and select the workflow that you want.
61+
1. On the workflow menu, select **Designer**.
62+
1. Select **Built-in > Azure Blob Storage**.
63+
1. Provide the storage account connection string.
64+
65+
### Switch to built-in connectors
66+
67+
Switch to using built-in connectors for scenarios that require private endpoint access:
68+
69+
1. Select **Built-in connectors** for private endpoint scenarios.
70+
71+
### Route outbound traffic through the VNet
72+
73+
Make sure that the logic app's outbound traffic is correctly routed through the VNet:
74+
75+
1. Select **Route All**.
76+
1. Associate an Azure Network Address Translation (NAT) Gateway for predictable outbound IPs.
77+
1. Verify the network security groups (NSG) and user-defined routes (UDR) rules.
78+
79+
### Search for any missing app settings
80+
81+
Check the logic app runtime configuration to determine whether any app settings are missing.
82+
83+
### Deploy single-tenant logic apps that have private storage accounts
84+
85+
If you still experience deployment failures, make sure that your configurations align with the requirements of your specific deployment scenario. For example, you might have to add the following app settings:
86+
87+
- **WEBSITE_CONTENTOVERVNET = 1**
88+
- **WEBSITE_VNET_ROUTE_ALL = 1**
89+
90+
Additionally, check DNS and host settings.
91+
92+
## References
93+
94+
- [Secure traffic between Standard workflows and virtual networks - Azure Logic Apps](/azure/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint)
95+
- [Deploy Standard logic apps to private storage accounts - Azure Logic Apps](/azure/logic-apps/deploy-single-tenant-logic-apps-private-storage-account)
96+
- [Install on-premises data gateway for logic app workflows - Azure Logic Apps](/azure/logic-apps/install-on-premises-data-gateway-workflows)
97+
- [Connect to on-premises data sources - Azure Logic Apps](/azure/logic-apps/connect-on-premises-data-sources?tabs=consumption)
98+
99+
[!INCLUDE [Azure Help Support](~/includes/azure-help-support.md)]
100+
101+
[!INCLUDE [Third-party contact disclaimer](~/includes/third-party-contact-disclaimer.md)]
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
title: CMG Maintenance Task Fails to Update After Installaing KB32851084
3+
description: Troubleshoot the CMG Maintenance Task failure caused by Availability Zone conflicts in Public IP Resource updates for Configuration Manager version 2503.
4+
ms.service: configuration-manager
5+
ms.topic: troubleshooting
6+
ms.manager: dcscontentpm
7+
audience: itpro
8+
ms.date: 11/11/2025
9+
ms.reviewer: kaushika, payur
10+
ms.custom: sap:Cloud Services\Cloud Management Gateway (CMG)
11+
---
12+
# CMG maintenance task fails to update public IP resource after installing KB32851084
13+
14+
*Applies to*: Configuration Manager (current branch)
15+
16+
## Symptoms
17+
18+
After you install the [Update Rollup for Microsoft Configuration Manager version 2503 (KB32851084)](/intune/configmgr/hotfix/2503/32851084), CloudMgr.log on the Service Connection Point might display the following error message:
19+
20+
```output
21+
Resource Manager - Creating Public IP Address <Name of CMG> with deployment CreatePublicIPAddressXXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX~~
22+
ERROR: Exception occured for service <Name of CMG> : System.AggregateException: One or more errors occurred.
23+
---> Azure.RequestFailedException: At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/arm-deployment-operations for usage details.~~Status: 200 (OK)~~ErrorCode: DeploymentFailed~~~~Service request succeeded. Response content and headers are not included to avoid logging sensitive data.~~~~
24+
at Azure.Core.OperationInternal`1.GetResponseFromState(OperationState`1 state)~~
25+
at Azure.Core.OperationInternal`1.<UpdateStatusAsync>d__20.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
26+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
27+
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)~~
28+
at Azure.Core.OperationInternalBase.<UpdateStatusAsync>d__13.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
29+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
30+
at Azure.Core.OperationPoller.<WaitForCompletionAsync>d__11.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
31+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
32+
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)~~
33+
at Azure.Core.OperationInternalBase.<WaitForCompletionResponseAsync>d__19.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
34+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
35+
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)~~
36+
at Azure.Core.OperationInternal`1.<WaitForCompletionAsync>d__19.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
37+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
38+
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)~~
39+
at System.Threading.Tasks.ValueTask`1.get_Result()~~
40+
at Azure.Core.OperationInternal`1.<WaitForCompletionAsync>d__15.MoveNext()~~--- End of stack trace from previous location where exception was thrown ---~~
41+
at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()~~
42+
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)~~
43+
at Azure.ResourceManager.Resources.ArmDeploymentCollection.<CreateOrUpdateAsync>d__4.MoveNext()~~
44+
--- End of inner exception stack trace ---~~
45+
at System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification)~~
46+
at Microsoft.ConfigurationManager.AzureManagement.ResourceManager.StartAndMonitorDeployment(String resourceGroupName, String deploymentName, ArmDeploymentContent deploymentContent, Int32 secondsToWait, Int32 timeoutInMinutes)~~
47+
at Microsoft.ConfigurationManager.AzureManagement.Resource
48+
49+
TaskManager: Task [Deployment Maintenance for service <Name of CMG>] status is Faulted~~
50+
51+
ERROR: TaskManager: Task [Deployment Maintenance for service <Name of CMG>] has failed. Exception Azure.RequestFailedException, At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/arm-deployment-operations for usage details.~~Status: 200 (OK)~~ErrorCode: DeploymentFailed~~~~Service request succeeded. Response content and headers are not included to avoid logging sensitive data.~~.~~
52+
53+
TaskManager: Scheduling task [Deployment Maintenance for service <Name of CMG>] for retry.~~
54+
```
55+
56+
In the Azure portal, the Activity log of the Resource Group that contains the resources of the CMG displays the following error message:
57+
58+
```output
59+
Operation Name: Create or Update Public Ip Address
60+
61+
Summary - Message; Resource /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/<Name of CMG Resource Group>/providers/Microsoft.Network/publicIPAddresses/<Name of Public IP Address> has an existing availability zone constraint 1, 2, 3 and the request has availability zone constraint NoZone, which do not match. Zones cannot be added/updated/removed once the resource is created. The resource cannot be updated from regional to zonal or vice-versa.
62+
```
63+
64+
The Cloud Management Gateway (CMG) state in the Configuration Manager console might then appear in "Error" status with the detailed information "Failed to perform maintenance" in "Status Description" and flipping back to "Ready" shortly afterwards.
65+
66+
The error messages likely repeat every 20 minutes, aligning with the Deployment Maintenance Task retries.
67+
68+
## Cause
69+
70+
When you install the Update Rollup, it triggers a setup maintenance task for the CMG. This maintenance task launches deployments for CMG Resources in Azure. In the deployment associated to the Public IP Address, the maintenance task attempts to update its "Availability Zone" configuration property to **"No zone"**. If the existing Public IP resource already has "Availability Zone" property configured (for example, to "Zone 1", "Zone 2", or "Zone 3"), the deployment fails.
71+
72+
The issue then affects the Azure regions where [Availability Zones](/azure/reliability/availability-zones-overview?toc=%2Fazure%2Fvirtual-network%2Ftoc.json&tabs=azure-cli) are supported. The current list is available at [Azure regions list](/azure/reliability/regions-list#azure-regions-list-1).
73+
74+
Current Configuration Manager releases don't specify Availability Zone when creating a new Public IP Address Resource for CMG. Hence, this issue doesn't affect new CMG deployments.
75+
76+
## Resolution
77+
78+
At this point, there's no confirmed impact from this behavior, so we recommend that you ignore these errors.
79+
80+
Microsoft plans to resolve this problem in a future release of Microsoft Configuration Manager.
81+
82+
## More information
83+
84+
For more information about CMG monitoring, see [Monitor the CMG](/intune/configmgr/core/clients/manage/cmg/monitor-clients-cloud-management-gateway)

0 commit comments

Comments
 (0)