Skip to content

Commit 94826bc

Browse files
authored
Merge pull request #8506 from MicrosoftDocs/main
Auto push to live 2025-03-19 02:00:02
2 parents cc8fbe2 + 70719dc commit 94826bc

File tree

13 files changed

+167
-27
lines changed

13 files changed

+167
-27
lines changed

support/azure/azure-kubernetes/availability-performance/node-not-ready-then-recovers.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
22
title: Node not ready but then recovers
33
description: Troubleshoot scenarios in which the status of an AKS cluster node is Node Not Ready, but then the node recovers.
4-
ms.date: 12/09/2024
5-
ms.reviewer: rissing, chiragpa, momajed, v-leedennis
4+
ms.date: 2/25/2024
5+
ms.reviewer: rissing, chiragpa, momajed, v-leedennis, novictor
66
ms.service: azure-kubernetes-service
77
#Customer intent: As an Azure Kubernetes user, I want to prevent the Node Not Ready status for nodes that later recover so that I can avoid future errors within an AKS cluster.
88
ms.custom: sap:Node/node pool availability and performance
99
---
1010
# Troubleshoot Node Not Ready failures that are followed by recoveries
1111

12-
This article provides a guide to troubleshoot and resolve "Node Not Ready" issues in Azure Kubernetes Service (AKS) clusters. When a node enters a "Not Ready" state, it can disrupt the application's functionality and cause it to stop responding. Typically, the node recovers automatically after a short period. However, to prevent recurring issues and maintain a stable environment, it's important to understand the underlying causes to be able to implement effective resolutions.
12+
This article provides a guide to troubleshoot and resolve Node Not Ready" issues in Azure Kubernetes Service (AKS) clusters. When a node enters a "NotReady" state, it can disrupt the application's functionality and cause it to stop responding. Typically, the node recovers automatically after a short period. However, to prevent recurring issues and maintain a stable environment, it's important to understand the underlying causes to be able to implement effective resolutions.
1313

1414
## Cause
1515

16-
There are several scenarios that could cause a "Not Ready" state to occur:
16+
There are several scenarios that could cause a "NotReady" state to occur:
1717

1818
- The unavailability of the API server. This causes the readiness probe to fail. This prevents the pod from being attached to the service so that traffic is no longer forwarded to the pod instance.
1919

@@ -24,7 +24,12 @@ There are several scenarios that could cause a "Not Ready" state to occur:
2424

2525
## Resolution
2626

27-
Check the API server availability by running the `kubectl get apiservices` command. Make sure that the readiness probe is correctly configured in the deployment YAML file.
27+
To resolve this issue, follow these steps:
28+
29+
1. Run `kubectl describe node <node-name>` to review detail information about the node's status. Look for any error messages or warnings that might indicate the root cause of the issue.
30+
2. Check the API server availability by running the `kubectl get apiservices` command. Make sure that the readiness probe is correctly configured in the deployment YAML file.
31+
3. Verify the node's network configuration to make sure that there are no connectivity issues.
32+
4. Check the node's resource usage, such as CPU, memory, and disk, to identify potential constraints. For more informations see [Monitor your Kubernetes cluster performance with Container insights](/azure/azure-monitor/containers/container-insights-analyze#view-performance-directly-from-a-cluster)
2833

2934
For further steps, see [Basic troubleshooting of Node Not Ready failures](node-not-ready-basic-troubleshooting.md).
3035

support/azure/azure-kubernetes/create-upgrade-delete/troubleshoot-aks-cluster-start-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Troubleshoot Azure Kubernetes Service cluster startup issues
33
description: Learn about basic troubleshooting methods to use when you can't start an Azure Kubernetes Service (AKS) cluster.
4-
ms.date: 01/25/2024
5-
ms.reviewer: chiragpa, v-weizhu, jovieir
4+
ms.date: 03/14/2025
5+
ms.reviewer: chiragpa, v-weizhu, jovieir, addobres
66
ms.service: azure-kubernetes-service
77
ms.custom: sap:Create, Upgrade, Scale and Delete operations (cluster or nodepool), devx-track-azurecli
88
#Customer intent: As an Azure Kubernetes user, I want to take basic troubleshooting measures to resolve issues that occur when I try to start an Azure Kubernetes Service (AKS) cluster.

support/azure/azure-monitor/app-insights/telemetry/opentelemetry-troubleshooting-java.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,22 @@
11
---
22
title: Troubleshoot OpenTelemetry issues in Java
33
description: Learn how to troubleshoot OpenTelemetry issues in Java. Test connectivity between your application host and the ingestion service.
4-
ms.date: 06/24/2024
4+
ms.date: 03/19/2025
55
editor: v-jsitser
66
ms.service: azure-monitor
77
ms.devlang: java
8-
ms.reviewer: mmcc, lechen, aaronmax, v-leedennis
8+
ms.reviewer: mmcc, lechen, aaronmax
99
ms.custom: sap:Missing or Incorrect data after enabling Application Insights in Azure Portal
1010
---
1111

1212
# Troubleshoot OpenTelemetry issues in Java
1313

14-
This article discusses how to troubleshoot OpenTelemetry issues in Java.
14+
This article discusses how to troubleshoot OpenTelemetry issues in Java.
1515

1616
## Troubleshooting checklist
1717

18+
Starting from version 3.0.3, you can use configuration options to suppress specific autocollected telemetry. For more information, see [Suppress specific autocollected telemetry](/azure/azure-monitor/app/java-standalone-config#suppress-specific-autocollected-telemetry).
19+
1820
### Step 1: Enable diagnostic logging
1921

2022
By default, diagnostic logging is enabled in Azure Monitor Application Insights. For more information, see [Troubleshoot guide: Azure Monitor Application Insights for Java](java-standalone-troubleshoot.md).
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Deleted Event Hub Is Automatically Re-created by Diagnostic Settings
3+
description: Resolves issues with an Azure event hub that is automatically re-created by diagnostic settings after being deleted.
4+
ms.date: 03/19/2025
5+
ms.reviewer: jfanjoy, v-weizhu
6+
ms.service: azure-monitor
7+
ms.custom: sap:Issues with configuring diagnostic settings
8+
---
9+
# Deleted Azure event hub is automatically re-created by diagnostic settings
10+
11+
This article provides a solution to an issue where a deleted Azure event hub is automatically re-created by Azure diagnostic settings or their configuration cache.
12+
13+
## Symptoms
14+
15+
You might see the following symptoms:
16+
17+
- When you delete an event hub from an Event Hubs namespace, the event hub is re-created automatically by the data flowing into it through the diagnostic settings.
18+
- After you delete an event hub and all diagnostic settings configured to send data to it, the event hub is re-created automatically.
19+
20+
## Cause
21+
22+
Here are the causes of the issue:
23+
24+
- When a diagnostic setting is configured to send data to an Azure event hub, if it receives an error indicating that the event hub doesn't exist, the diagnostic setting will try to create it and then continue trying to send the data.
25+
- Azure diagnostic settings maintain a cache of configurations for approximately one hour. During this period, even if the diagnostic settings were removed, they'll continue to send data to the destination, such as a deleted event hub, causing the event hub to be re-created.
26+
27+
## Solution
28+
29+
In a scenario where you delete an event hub from an Event Hubs namespace, use one of the following methods to resolve the issue:
30+
31+
- Update the diagnostic settings to prevent them from sending data to the event hub.
32+
- Delete the diagnostic settings.
33+
34+
In a scenario where you delete an event hub and related diagnostic settings, use this method to resolve the issue:
35+
36+
- Update the diagnostic settings to prevent them from sending data to the event hub, delete them, wait at least one hour to allow their configuration cache to expire, and then delete the event hub.
37+
38+
[!INCLUDE [Azure Help Support](../../../../includes/azure-help-support.md)]

support/azure/azure-monitor/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,3 +142,7 @@ items:
142142
- name: Advanced troubleshooting steps
143143
href: azure-monitor-agent/ama-windows-installation-issues-advanced-troubleshooting-steps.md
144144

145+
- name: Diagnostic settings
146+
items:
147+
- name: Deleted event hub is automatically re-created
148+
href: diagnostic-settings/data-flow/deleted-event-hub-automatically-recreated.md

support/azure/cosmos-db/index.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,10 @@ metadata:
66
title: Troubleshoot Azure Cosmos DB issues
77
description: Documentation for troubleshooting common issues with Azure Cosmos DB.
88
author: seesharprun
9-
editor: v-jsitser
109
ms.author: sidandrews
1110
ms.reviewer: ouryba, v-jayaramanp
11+
editor: v-jsitser
12+
ms.service: azure-cosmos-db
1213
ms.topic: landing-page
1314
ms.date: 01/18/2024
1415

support/azure/virtual-machines/linux/support-linux-open-source-technology.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Microsoft Azure supports the [Linux operating system](https://azure.microsoft.co
3333

3434
Microsoft Support provides assistance with the Azure platform or services. Microsoft also provides commercially viable support for Linux. A support plan is required to receive Microsoft Support.
3535

36-
- In Azure Marketplace, Linux distributions such as Rocky, AlmaLinux, Kali, and many others are available. Microsoft assists with these distributions but may require customers to engage with vendors to allow collaboration between organization. Vendors must provide distribution-specific fixes.
36+
- In Azure Marketplace, Linux distributions are available. Microsoft assists with these distributions but may require customers to engage with vendors to allow collaboration between organization. Vendors must provide distribution-specific fixes.
3737
- In Azure Marketplace, you may select a highly customized Linux image, such as a firewall appliance. Microsoft assists you with these images, but the Linux vendor must be engaged to troubleshoot specific system-related problems. Microsoft may collaborate with the vendor for those issues.
3838
- Microsoft Support doesn't assist with basic Linux administration, design, architecture, or deployment of applications or solutions on Azure.
3939
- The ability to customize Linux is one of the hallmarks of the operating system. We encourage you to use a Linux solution that benefits your organization. However, the Linux vendor may not support some modifications such as custom kernels or modules. For vendor support, you may be required to use stock kernels or libraries for your image.

support/azure/virtual-machines/windows/in-place-system-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 3/18/2025
55
ms.reviewer: joscon, scotro, azurevmcptcic, maulikshah, yogitagohel, v-weizhu
66
ms.service: azure-virtual-machines
77
ms.collection: windows
8-
ms.custom: sap: Windows Update, Guest Patching and OS Upgrades
8+
ms.custom: sap:Windows Update, Guest Patching and OS Upgrades
99
---
1010
# In-place upgrade for supported VMs running Windows in Azure
1111

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
---
2+
title: Error AADSTS50000 - There was an error issuing a token or an issue with our sign-in service
3+
description: Provides a solution to the AADSTS50000 error that occurs when you try to sign in to an Azure app by using Microsoft Entra ID.
4+
ms.service: entra-id
5+
ms.date: 03/12/2025
6+
ms.author: bachoang
7+
ms.custom: sap:Issues Signing In to Applications
8+
---
9+
10+
# Error AADSTS50000 getting a token or signing in to an Azure app
11+
12+
The AADSTS50000 error can occur during the authentication process or token acquisition flow that uses the token endpoint. These errors can have multiple causes. This article provides common scenarios and resolutions for this error.
13+
14+
## Symptoms
15+
16+
When a user tries to sign in to an application that's integrated into Microsoft Entra ID, the user receives the following error message:
17+
18+
> AADSTS50000: There was an error issuing a token or an issue with our sign-in service.
19+
20+
## Cause 1: The user password is expired, invalid, or out of sync
21+
22+
This issue is common in hybrid environments. The user's federated account password might be out of sync between the on-premises Active Directory and Microsoft Entra ID. Additionally, this issue can also occur when a user session is being revoked.
23+
24+
### Solution for cause 1
25+
26+
Reset the user password, and then verify that the new password can successfully authenticate to Microsoft Entra ID.
27+
28+
## Cause 2: Parameters are incorrectly configured in the token acquisition request
29+
30+
This problem commonly occurs in the on-behalf-of (OBO) flow. Certain parameters that are required for token acquisition might be missing or invalid.
31+
32+
### Solution for cause 2
33+
34+
Make sure that the client ID is valid and that other required parameters are configured correctly. For more information, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](/entra/identity-platform/v2-oauth2-on-behalf-of-flow).
35+
36+
## Cause 3: Consent-related issues
37+
38+
This issue can occur in an OAuth2 Device code grant flow to the token endpoint. After the user signs in to a browser window and accepts the consent dialog, this error occurs.
39+
40+
### Solution 3 for cause 3: Verify application consent settings
41+
42+
1. In the [Azure portal](https://portal.azure.com), make sure that the client application (Service Principal) exists on the tenant's **Enterprise Applications** page. You can search for the application by App ID.
43+
2. Verify that the user can consent to the application. Check the user settings on the **Enterprise Applications** page or review relevant policies that affect user consent.
44+
45+
## Cause 4: Symmetric signing key is used in the application or service principal object
46+
47+
Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate (asymmetric key). Errors might occur if a symmetric signing key is used.
48+
49+
### Solution for cause 4
50+
51+
#### Step 1: Check whether symmetric key is used in application object
52+
53+
1. In the Azure portal, go to the **App Registrations**.
54+
2. In the **Manage** section, select **Manifest**.
55+
3. Check whether an entry exists in the `keyCredentials` section that includes `type=Symmetric` and `usage=Sign`.
56+
57+
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code" lightbox="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
58+
59+
Alternatively, use the Microsoft Graph PowerShell cmdlet [Get-MgApplication](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
60+
61+
#### Step 2: Check whether symmetric key is used in service principal object
62+
63+
1. If the application is not found in the **App Registrations** page in the Azure portal, browse to the **Enterprise Applications** page.
64+
2. Locate the application, and then get the **Object ID** of the Service Principal.
65+
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal) to retrieve the key credentials.
66+
67+
#### Step 3: Remove symmetric signing key
68+
69+
If the symmetric key exists:
70+
71+
- Use [Remove-MgApplicationKey](/powershell/module/microsoft.graph.applications/remove-mgapplicationkey) to remove the symmetric key for the app registration.
72+
- Use [Remove-MgServicePrincipalKey](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipalkey) to remove the symmetric key for the service principal object.
73+
74+
If a signing key is required, use a signing certificate instead. For more information, see [SAML-based single sign-on: Configure a signing certificate](/graph/application-saml-sso-configure-api?tabs=http%2Cpowershell-script#step-6-configure-a-signing-certificate).
75+
76+
## Cause 5: No delegated permission exposed in the resource application (web API)
77+
78+
This error might occur in the following scenario:
79+
80+
- You have a multitenant resource application that's registered in Tenant A. This application exposes only the **Application Permission** type.
81+
- In Tenant B, you have a client application registered. In the **API permission** page for this application, you configure the permission for the resource application that's registered in Tenant A.
82+
- You use an OAuth 2 delegated grant flow (for instance auth code grant flow) to request an access token for the resource app that uses `/.default` as the value of the web API scope.
83+
84+
### Solution for cause 5
85+
86+
Configure the resource application to expose the delegated permission, and then consent to that delegated permission in the client application.
70.8 KB
Loading

0 commit comments

Comments
 (0)