Skip to content

Commit 40fc5ec

Browse files
committed
Acrolinx
1 parent 8f91e70 commit 40fc5ec

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/managed-grafana/troubleshoot-mpe-connection.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,17 @@ This article guides you to troubleshoot and fix issues related to connecting a m
1515

1616
## Symptom
1717

18-
Connection from services running on an AKS cluster to Managed Grafana using a Managed Private Endpoint is not working. Users may encounter errors such as **"504 Gateway Time-out"** when attempting to connect.
18+
Connection from services running on an Azure Kubernetes Service (AKS) cluster to Azure Managed Grafana using a Managed Private Endpoint isn't working. Users may encounter errors such as **"504 Gateway Time-out"** when attempting to connect.
1919

2020
## Possible causes
2121

2222
The issue may occur due to one or more of the following reasons:
2323

24-
- The managed private endpoint is not approved.
25-
- The private DNS zone is not configured correctly, leading to DNS resolution failures.
24+
- The managed private endpoint isn't approved.
25+
- The private DNS zone isn't configured correctly, leading to DNS resolution failures.
2626
- Network security group (NSG) rules are blocking the connection.
27-
- The AKS cluster does not have the correct outbound internet access configuration.
28-
- The private link service is not properly configured to accept connections from the managed private endpoint.
27+
- The AKS cluster doesn't have the correct outbound internet access configuration.
28+
- The private link service isn't properly configured to accept connections from the managed private endpoint.
2929

3030
## Resolution
3131

@@ -44,43 +44,43 @@ Follow these steps to resolve the issue:
4444
### Step 2: check private DNS zone configuration
4545

4646
1. Verify that the private DNS zone is linked to the virtual network where the AKS cluster or other service is deployed.
47-
1. Ensure the DNS zone contains the correct records for the private link service (e.g., `privatelink.<service>.azure.com`).
47+
1. Ensure the DNS zone contains the correct records for the private link service (for example, `privatelink.<service>.azure.com`).
4848
1. Test DNS resolution from the AKS cluster or other service to confirm it resolves to the private IP address of the private link service.
4949
1. For more information, see [Create and manage private DNS zones using the Azure portal](/azure/dns/private-dns-portal).
5050

5151
### Step 3: Review Network Security Group (NSG) rules
5252

53-
1. Check the NSG rules applied to the subnet where your resource (e.g., AKS cluster or other service) is deployed.
53+
1. Check the NSG rules applied to the subnet where your resource (for example, AKS cluster or other service) is deployed.
5454
1. Ensure there are no rules blocking outbound traffic to the private link service.
5555
1. Add an allow rule if necessary to permit traffic to the private endpoint.
5656

5757
### Step 4: Validate outbound configuration
5858

59-
1. Confirm that your resource (e.g., AKS cluster or other service) has outbound internet access configured correctly.
59+
1. Confirm that your resource (for example, AKS cluster or other service) has outbound internet access configured correctly.
6060
1. If using a custom route table, ensure it allows traffic to the private endpoint.
6161
1. Test connectivity from your resource to the private endpoint using tools like `curl` or `ping`.
6262

6363
### Step 5: Verify private link service configuration
6464

6565
1. Ensure the private link service is configured to accept connections from the managed private endpoint.
66-
1. Check the private link service's settings to confirm it is correctly associated with the target resource.
66+
1. Check the private link service's settings to confirm it's correctly associated with the target resource.
6767
1. Verify that the private link service is healthy and operational.
6868

6969
### Step 6: Analyze Port Configuration for AKS Clusters
7070

71-
If you are working with an AKS cluster, ensure that the port configuration is consistent across the monitored service, the load balancer, and the private link service. Incorrect port configurations can lead to data source connection failures.
71+
If you're working with an AKS cluster, ensure that the port configuration is consistent across the monitored service, the load balancer, and the private link service. Incorrect port configurations can lead to data source connection failures.
7272

7373
For example, for a self-managed Prometheus server running on an AKS cluster:
7474

75-
- The port configuration for the monitored service should follow the structure : access port + protocol + port name (target port). This can be verified in the **Services and ingresses** page of the AKS cluster in the Azure portal.
75+
- The port configuration for the monitored service should follow the structure: access port + protocol + port name (target port). This can be verified in the **Services and ingresses** page of the AKS cluster in the Azure portal.
7676

7777
- The load balancer created for the service should have a matching port configuration: access port + protocol + port number (target port).
7878

79-
If the port configurations do not match:
79+
If the port configurations don't match:
8080

8181
1. Edit the YAML file for the load balancer to ensure the port configuration matches the monitored service.
8282
1. Apply the updated configuration to the AKS cluster.
83-
1. Test the Grafana data source connection to confirm it is successful.
83+
1. Test the Grafana data source connection to confirm it's successful.
8484

8585
## Related content
8686

0 commit comments

Comments
 (0)