You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/troubleshoot/known-issues.md
-53Lines changed: 0 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -217,20 +217,6 @@ Log signature: N/A
217
217
218
218
The subject name and application URI must exactly match the provided certificate. Because there's no cross-validation, any errors could cause the OPC UA servers to reject the application certificate.
219
219
220
-
### Connection errors after adding a new certificate
221
-
222
-
---
223
-
224
-
Issue ID: 8446
225
-
226
-
---
227
-
228
-
Log signature: N/A
229
-
230
-
---
231
-
232
-
Providing a new invalid OPC UA application instance certificate after a successful installation of AIO can lead to connection errors. To resolve the issue, delete your Azure IoT Operations instances and restart the installation.
233
-
234
220
## Connector for media and connector for ONVIF issues
235
221
236
222
This section lists current known issues for the connector for media and the connector for ONVIF.
@@ -303,45 +289,6 @@ To work around this issue, you need to manually delete the CRD and finish the un
303
289
304
290
This section lists current known issues for the OPC PLC simulator.
305
291
306
-
### The simulator doesn't send data to the MQTT broker after you create an asset endpoint
307
-
308
-
---
309
-
310
-
Issue ID: 8616
311
-
312
-
---
313
-
314
-
Log signature: N/A
315
-
316
-
---
317
-
318
-
The OPC PLC simulator doesn't send data to the MQTT broker after you create an asset endpoint for the OPC PLC simulator.
319
-
320
-
To work around this issue, run the following command to set `autoAcceptUntrustedServerCertificates=true` for the asset endpoint:
> Don't use this configuration in production or preproduction environments. Exposing your cluster to the internet without proper authentication might lead to unauthorized access and even DDOS attacks.
332
-
333
-
You can patch all your asset endpoints with the following command:
334
-
335
-
```bash
336
-
ENDPOINTS=$(kubectl get AssetEndpointProfile -n azure-iot-operations --no-headers -o custom-columns=":metadata.name")
> Don't use this configuration in production or preproduction environments. Exposing your cluster to the internet without proper authentication might lead to unauthorized access and even DDOS attacks.
106
+
107
+
You can patch all your asset endpoints with the following command:
108
+
109
+
```bash
110
+
ENDPOINTS=$(kubectl get AssetEndpointProfile -n azure-iot-operations --no-headers -o custom-columns=":metadata.name")
The troubleshooting guidance in this section is specific to Azure IoT Operations when using the Layered Network Management component. For more information, see [How does Azure IoT Operations work in layered network?](../manage-layered-network/concept-iot-operations-in-layered-network.md).
0 commit comments