Skip to content

Commit 0a07280

Browse files
Merge pull request #296938 from dominicbetts/aio-linkauthorizationfailed
AIO: Remove duplicate troubleshooting entry
2 parents 2d18455 + 04a0b5c commit 0a07280

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/iot-operations/troubleshoot/troubleshoot.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,11 @@ For general deployment and configuration troubleshooting, you can use the Azure
2323

2424
- Use [az iot ops support create-bundle](/cli/azure/iot/ops/support#az-iot-ops-support-create-bundle) to collect logs and traces to help you diagnose problems. The `support create-bundle` command creates a standard support bundle zip archive you can review or provide to Microsoft Support.
2525

26-
### You see a `"code":"LinkedAuthorizationFailed"` error message
27-
If your deployment fails with the `"code":"LinkedAuthorizationFailed"` error, the messages indicates that you don't have the required permissions on the resource group containing the cluster.
28-
29-
To resolve this issue, ensure that you have **Microsoft.Authorization/roleAssignments/write** permissions at the resource group level.
30-
3126
### You see an UnauthorizedNamespaceError error message
3227

3328
If you see the following error message, you either didn't enable the required Azure-arc custom locations feature, or you enabled the custom locations feature with an incorrect custom locations RP OID.
3429

35-
```ouput
30+
```output
3631
Message: Microsoft.ExtendedLocation resource provider does not have the required permissions to create a namespace on the cluster.
3732
```
3833

@@ -44,21 +39,26 @@ If you see the following error message, your custom location resource associated
4439

4540
```output
4641
Message: The resource {resource Id} extended location {custom location resource Id} does not support the resource type {IoT Operations resource type} or api version {IoT Operations ARM API}. Please check with the owner of the extended location to ensure the host has the CRD {custom resource name} with group {api group name}.iotoperations.azure.com, plural {custom resource plural name}, and versions [{api group version}] installed.
47-
```
42+
```
4843

4944
To resolve, delete any provisioned resources associated with prior deployment(s) including custom locations. You can use `az iot ops delete` or alternative mechanism. Due to a potential caching issue, waiting a few minutes after deletion before re-deploying AIO or choosing a custom location name via `az iot ops create --custom-location` is recommended.
5045

5146
### You see a LinkedAuthorizationFailed error message
5247

53-
If you see the following error message, the logged-in principal doesn't have the required permissions to deploy resources to the resource group specified in the resource sync resource ID.
48+
If your deployment fails with the `"code":"LinkedAuthorizationFailed"` error, the messages indicates that you don't have the required permissions on the resource group containing the cluster.
49+
50+
The following message indicates that the logged-in principal doesn't have the required permissions to deploy resources to the resource group specified in the resource sync resource ID.
5451

5552
```output
5653
Message: The client {principal Id} with object id {principal object Id} has permission to perform action Microsoft.ExtendedLocation/customLocations/resourceSyncRules/write on scope {resource sync resource Id}; however, it does not have permission to perform action(s) Microsoft.Authorization/roleAssignments/write on the linked scope(s) {resource sync resource group} (respectively) or the linked scope(s) are invalid.
5754
```
5855

59-
Deployment of resource sync rules requires the logged-in principal to have the `Microsoft.Authorization/roleAssignments/write` permission against the resource group that resources are being deployed to. This is a necessary security constraint as edge to cloud resource hydration will create new resources in the target resource group.
56+
To deploy resource sync rules, the logged-in principal must have the `Microsoft.Authorization/roleAssignments/write` permission against the resource group that resources are being deployed to. This is a necessary security constraint as edge to cloud resource hydration creates new resources in the target resource group.
57+
58+
To resolve the issue, either elevate principal permissions, or don't deploy resource sync rules. The current AIO CLI has an opt-in mechanism to deploy resource sync rules by using the `--enable-rsync` flag. To stop the resource sync rules being deployed, omit the flag.
6059

61-
To resolve, either elevate principal permissions, or don't deploy resource sync rules. Current AIO CLI has an opt-in mechanism to deploy resource sync rules via `--enable-rsync`. Simply omit this flag. Legacy AIO CLIs had an opt-out mechanism via `--disable-rsync-rules`.
60+
> [!NOTE]
61+
> Legacy AIO CLIs had an opt-out mechanism by using the `--disable-rsync-rules`.
6262
6363
## Troubleshoot Azure Key Vault secret management
6464

0 commit comments

Comments
 (0)