Skip to content

Commit 7462f67

Browse files
authored
Merge pull request #8894 from MicrosoftDocs/main
Auto push to live 2025-05-08 10:02:02
2 parents 7f3f972 + 05dcb64 commit 7462f67

File tree

3 files changed

+57
-4
lines changed

3 files changed

+57
-4
lines changed

support/azure/azure-kubernetes/create-upgrade-delete/aks-common-issues-faq.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ metadata:
33
title: Azure Kubernetes Service (AKS) common issues FAQ
44
description: Review a list of frequently asked questions (FAQ) about common issues when you're working with an Azure Kubernetes Service (AKS) cluster.
55
ms.topic: faq
6-
ms.date: 03/06/2025
7-
ms.reviewer: chiragpa, nickoman, jotavar, v-leedennis, v-weizhu
6+
ms.date: 05/08/2025
7+
ms.reviewer: chiragpa, nickoman, jotavar, wilsondarko, v-leedennis, v-weizhu
88
ms.service: azure-kubernetes-service
99
ms.custom: sap:Create, Upgrade, Scale and Delete operations (cluster or nodepool)
1010

@@ -41,6 +41,8 @@ sections:
4141
- AKS node pool names must be all lowercase. The names must be 1-12 characters in length for Linux node pools and 1-6 characters for Windows node pools. A name must start with a letter, and the only allowed characters are letters and numbers.
4242
4343
- The *admin-username*, which sets the administrator user name for Linux nodes, must start with a letter. This user name may only contain letters, numbers, hyphens, and underscores. It has a maximum length of 32 characters.
44+
45+
- The *aksmanagedap* is blocked as a reserved name for AKS system components. It can't be used for nodepools.
4446
4547
For more information about naming convention. see the following resources:
4648
- [Naming rules and restrictions for Azure resources](/azure/azure-resource-manager/management/resource-name-rules#microsoftcontainerservice)

support/azure/virtual-machines/windows/performance-diagnostics.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ tags: ''
1010
ms.service: azure-virtual-machines
1111
ms.workload: infrastructure-services
1212
ms.topic: troubleshooting
13-
ms.date: 05/02/2025
13+
ms.date: 05/08/2025
1414
ms.custom: sap:VM Performance
1515
ms.reviewer: guywild, poharjan
1616
ms.author: anandh
@@ -53,6 +53,26 @@ This article explains how to use Performance Diagnostics and what the continuous
5353

5454
For detailed information about built-in roles for Azure Storage, refer to [Azure built-in roles for Storage](/azure/role-based-access-control/built-in-roles/storage).
5555

56+
For more information about storage account settings, see [view and manage storage account and stored data](performance-diagnostics.md#view-and-manage-storage-account-and-stored-data).
57+
58+
### Known issue
59+
60+
Some users who previously ran Performance Diagnostics successfully encounter the following error when attempting to run it again:
61+
62+
> 'Authorization failed for template resource '\<resource>' of type 'Microsoft.Storage/storageAccounts/providers/roleAssignments'. The client '\<client>' with object id '\<ID>' does not have permission to perform action 'Microsoft.Authorization/roleAssignments/write' at scope '\<scope>'.
63+
64+
#### Cause
65+
66+
A recent rollout has a bug that tries to grant the write permission to the storage account for the current user when initiating a run from the Azure portal. An Azure role that includes the `Microsoft.Storage/storageAccounts/listkeys/action` permission isn't enough to grant this permission, causing the run to fail.
67+
68+
#### Status
69+
70+
A fix is being deployed.
71+
72+
#### Workaround
73+
74+
If users still encounter this issue, grant the `Microsoft.Authorization/roleAssignments/write` permission to the storage account with the **Role Based Access Control Administrator** or **User Access Administrator** role. The latter role can grant higher permissions.
75+
5676
## Supported operating systems
5777

5878
### Windows

support/windows-server/active-directory/turn-on-debug-logging-in-windows-time-service.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Turn on debug logging in Windows Time Service
33
description: Describes how to turn on debug logging for the Windows Time service
4-
ms.date: 01/15/2025
4+
ms.date: 05/08/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -53,3 +53,34 @@ To turn on debug logging in the Windows Time service:
5353
> The Data Type value must be of type REG_SZ (String). You must type the value exactly as shown (that is, type 0-116 ). The highest possible value is 0-300 for most detailed logging. The meaning of this value is: Log all entries within the range of 0 and 116.
5454
5555
4. Restart the Windows Time service (W32Time) for the change to take effect.
56+
57+
## Gather information by using TSS for Windows Time related issues
58+
59+
If you need to contact Microsoft support, we recommend using the TroubleShootingScript (TSS) toolset to gather information about your issue.
60+
61+
### Prerequisites
62+
63+
Refer to [Introduction to TroubleShootingScript toolset (TSS)](../..//windows-client/windows-tss/introduction-to-troubleshootingscript-toolset-tss.md#prerequisites) for prerequisites for the toolset to run properly.
64+
65+
### Gather key information before contacting Microsoft support
66+
67+
1. Download [TSS](https://aka.ms/getTSS) and extract it in the *C:\\tss* folder.
68+
2. Open the *C:\\tss* folder from an elevated PowerShell command prompt.
69+
> [!NOTE]
70+
> Don't use the Windows PowerShell Integrated Scripting Environment (ISE).
71+
3. Run the following cmdlets:
72+
73+
```powershell
74+
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
75+
```
76+
77+
```powershell
78+
.\TSS.ps1 -ADS_W32Time -Netsh -PSR -AcceptEula
79+
```
80+
81+
4. Enter *A* for "Yes to All" for the execution policy change.
82+
83+
> [!NOTE]
84+
>
85+
> - The traces are stored in a compressed file in the *C:\\MS_DATA* folder. After a support case is created, this file can be uploaded to the secure workspace for analysis.
86+
> - If you've downloaded this tool previously, we recommend downloading the latest version. It doesn't automatically update when running `-Collectlog ADS_W32Time`.

0 commit comments

Comments
 (0)