Skip to content

Commit 4d4e8ca

Browse files
committed
Known issues updates
1 parent 6e8ecfa commit 4d4e8ca

File tree

2 files changed

+29
-53
lines changed

2 files changed

+29
-53
lines changed

articles/iot-operations/troubleshoot/known-issues.md

Lines changed: 0 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -217,20 +217,6 @@ Log signature: N/A
217217
218218
The subject name and application URI must exactly match the provided certificate. Because there's no cross-validation, any errors could cause the OPC UA servers to reject the application certificate.
219219
220-
### Connection errors after adding a new certificate
221-
222-
---
223-
224-
Issue ID: 8446
225-
226-
---
227-
228-
Log signature: N/A
229-
230-
---
231-
232-
Providing a new invalid OPC UA application instance certificate after a successful installation of AIO can lead to connection errors. To resolve the issue, delete your Azure IoT Operations instances and restart the installation.
233-
234220
## Connector for media and connector for ONVIF issues
235221
236222
This section lists current known issues for the connector for media and the connector for ONVIF.
@@ -303,45 +289,6 @@ To work around this issue, you need to manually delete the CRD and finish the un
303289
304290
This section lists current known issues for the OPC PLC simulator.
305291
306-
### The simulator doesn't send data to the MQTT broker after you create an asset endpoint
307-
308-
---
309-
310-
Issue ID: 8616
311-
312-
---
313-
314-
Log signature: N/A
315-
316-
---
317-
318-
The OPC PLC simulator doesn't send data to the MQTT broker after you create an asset endpoint for the OPC PLC simulator.
319-
320-
To work around this issue, run the following command to set `autoAcceptUntrustedServerCertificates=true` for the asset endpoint:
321-
322-
```bash
323-
ENDPOINT_NAME=<name-of-you-endpoint-here>
324-
kubectl patch AssetEndpointProfile $ENDPOINT_NAME \
325-
-n azure-iot-operations \
326-
--type=merge \
327-
-p '{"spec":{"additionalConfiguration":"{\"applicationName\":\"'"$ENDPOINT_NAME"'\",\"security\":{\"autoAcceptUntrustedServerCertificates\":true}}"}}'
328-
```
329-
330-
> [!CAUTION]
331-
> Don't use this configuration in production or preproduction environments. Exposing your cluster to the internet without proper authentication might lead to unauthorized access and even DDOS attacks.
332-
333-
You can patch all your asset endpoints with the following command:
334-
335-
```bash
336-
ENDPOINTS=$(kubectl get AssetEndpointProfile -n azure-iot-operations --no-headers -o custom-columns=":metadata.name")
337-
for ENDPOINT_NAME in `echo "$ENDPOINTS"`; do \
338-
kubectl patch AssetEndpointProfile $ENDPOINT_NAME \
339-
-n azure-iot-operations \
340-
--type=merge \
341-
-p '{"spec":{"additionalConfiguration":"{\"applicationName\":\"'"$ENDPOINT_NAME"'\",\"security\":{\"autoAcceptUntrustedServerCertificates\":true}}"}}'; \
342-
done
343-
```
344-
345292
### The simulator doesn't send data to the MQTT broker after you create an asset
346293
347294
---

articles/iot-operations/troubleshoot/troubleshoot.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,35 @@ An OPC UA server connection fails with a `BadSecurityModeRejected` error if the
8787

8888
- Add a secure endpoint to the OPC UA server and set up the certificate mutual trust to establish the connection.
8989

90+
## Troubleshoot OPC PLC simulator
91+
92+
### The OPC PLC simulator doesn't send data to the MQTT broker after you create an asset endpoint for it
93+
94+
To work around this issue, run the following command to set `autoAcceptUntrustedServerCertificates=true` for the asset endpoint:
95+
96+
```bash
97+
ENDPOINT_NAME=<name-of-you-endpoint-here>
98+
kubectl patch AssetEndpointProfile $ENDPOINT_NAME \
99+
-n azure-iot-operations \
100+
--type=merge \
101+
-p '{"spec":{"additionalConfiguration":"{\"applicationName\":\"'"$ENDPOINT_NAME"'\",\"security\":{\"autoAcceptUntrustedServerCertificates\":true}}"}}'
102+
```
103+
104+
> [!CAUTION]
105+
> Don't use this configuration in production or preproduction environments. Exposing your cluster to the internet without proper authentication might lead to unauthorized access and even DDOS attacks.
106+
107+
You can patch all your asset endpoints with the following command:
108+
109+
```bash
110+
ENDPOINTS=$(kubectl get AssetEndpointProfile -n azure-iot-operations --no-headers -o custom-columns=":metadata.name")
111+
for ENDPOINT_NAME in `echo "$ENDPOINTS"`; do \
112+
kubectl patch AssetEndpointProfile $ENDPOINT_NAME \
113+
-n azure-iot-operations \
114+
--type=merge \
115+
-p '{"spec":{"additionalConfiguration":"{\"applicationName\":\"'"$ENDPOINT_NAME"'\",\"security\":{\"autoAcceptUntrustedServerCertificates\":true}}"}}'; \
116+
done
117+
```
118+
90119
## Troubleshoot Azure IoT Layered Network Management (preview)
91120

92121
The troubleshooting guidance in this section is specific to Azure IoT Operations when using the Layered Network Management component. For more information, see [How does Azure IoT Operations work in layered network?](../manage-layered-network/concept-iot-operations-in-layered-network.md).

0 commit comments

Comments
 (0)