Skip to content

Commit 6b3db3b

Browse files
authored
Adding minor changes
1 parent 4aef4b0 commit 6b3db3b

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

articles/virtual-machines/linux/image-builder-troubleshoot.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,17 +180,22 @@ The Azure Image Builder build fails with an authorization error that looks like
180180
#### Error
181181

182182
```text
183-
Attempting to deploy created Image template in Azure fails with an 'The client '64667524-efd0-4530-884c-96dd20bae591' with object id '64667524-efd0-4530-884c-96dd20bae591' does not have authorization to perform action 'Microsoft.Compute/disks/write' over scope '/subscriptions/<subscriptionID>/resourceGroups/<resourceGroupName>/providers/Microsoft.Compute/disks/proxyVmDiskWin_<timestamp>' or the scope is invalid. If access was recently granted, please refresh your credentials.'
183+
Attempting to deploy created Image template in Azure fails with an 'The client '6df325020-fe22-4e39-bd69-10873965ac04' with object id '48466419-6398-4a8b-a234-6a5842bfa566' does not have authorization to perform action 'Microsoft.Compute/disks/write' over scope '/subscriptions/<subscriptionID>/resourceGroups/<resourceGroupName>/providers/Microsoft.Compute/disks/proxyVmDiskWin_<timestamp>' or the scope is invalid. If access was recently granted, please refresh your credentials.'
184184
```
185185
#### Cause
186186

187187
This error is caused when trying to specify a pre-existing resource group and VNet to the Azure Image Builder service with a Windows source image.
188188

189189
#### Solution
190190

191-
You will need to assign the contributor role to the resource group for the service principal by using the CLI command or portal instructions below.
191+
You will need to assign the contributor role to the resource group for the service principal corresponding to Azure Image Builder's first party app by using the CLI command or portal instructions below.
192192

193-
To implement this solution using CLI, use the following command:
193+
First, validate that the service principal is associated with Azure Image Builder's first party app by using the following CLI command:
194+
```azurecli-interactive
195+
az ad sp show --id {servicePrincipalName, or objectId}
196+
```
197+
198+
Then, to implement this solution using CLI, use the following command:
194199
```azurecli-interactive
195200
az role assignment create -g {ResourceGroupName} --assignee {AibrpSpOid} --role Contributor
196201
```

0 commit comments

Comments
 (0)