Skip to content

Commit 82f55a9

Browse files
committed
acrolinx
1 parent c16b098 commit 82f55a9

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

articles/azure-arc/kubernetes/troubleshooting.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ For more information, see [Debugging DNS Resolution](https://kubernetes.io/docs/
8181

8282
Issues with outbound network connectivity from the cluster may arise for different reasons. First make sure all of the [network requirements](network-requirements.md) have been met.
8383

84-
If you encounter this issue, and your cluster is behind an outbound proxy server, make sure you have passed proxy parameters during the onboarding of your cluster and that the proxy is configured correctly. For more information, see [Connect using an outbound proxy server](quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server).
84+
If you encounter this issue, and your cluster is behind an outbound proxy server, make sure you've passed proxy parameters during the onboarding of your cluster and that the proxy is configured correctly. For more information, see [Connect using an outbound proxy server](quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server).
8585

8686
### Unable to retrieve MSI certificate
8787

8888
Problems retrieving the MSI certificate are usually due to network issues. Check to make sure all of the [network requirements](network-requirements.md) have been met, then try again.
8989

9090
### Insufficient cluster permissions
9191

92-
If the provided kubeconfig file doesn't have sufficient permissions to install the Azure Arc agents, the Azure CLI command will return an error.
92+
If the provided kubeconfig file doesn't have sufficient permissions to install the Azure Arc agents, the Azure CLI command returns an error.
9393

9494
```azurecli
9595
az connectedk8s connect --resource-group AzureArc --name AzureArcCluster
@@ -159,7 +159,7 @@ To resolve this issue, try the following steps.
159159
config-agent-65d5df564f-lffqm 1/2 CrashLoopBackOff 0 1m14s
160160
```
161161

162-
3. If the certificate below isn't present, the system assigned managed identity hasn't been installed.
162+
3. If the `azure-identity-certificate` isn't present, the system assigned managed identity hasn't been installed.
163163

164164
```console
165165
kubectl get secret -n azure-arc -o yaml | grep name:
@@ -169,7 +169,7 @@ To resolve this issue, try the following steps.
169169
name: azure-identity-certificate
170170
```
171171

172-
To resolve this issue, try deleting the Arc deployment by running the `az connectedk8s delete` command and reinstalling it. If the issue continues to happen, it could be an issue with your proxy settings. In that case, [try connecting your cluster to Azure Arc via a proxy](./quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server) to connect your cluster to Arc via a proxy. Please also verify if all the [network prerequisites](network-requirements.md) have been met.
172+
To resolve this issue, try deleting the Arc deployment by running the `az connectedk8s delete` command and reinstalling it. If the issue continues to happen, it could be an issue with your proxy settings. In that case, [try connecting your cluster to Azure Arc via a proxy](./quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server) to connect your cluster to Arc via a proxy. Also verify that all of the [network prerequisites](network-requirements.md) have been met.
173173

174174
4. If the `clusterconnect-agent` and the `config-agent` pods are running, but the `kube-aad-proxy` pod is missing, check your pod security policies. This pod uses the `azure-arc-kube-aad-proxy-sa` service account, which doesn't have admin permissions but requires the permission to mount host path.
175175

@@ -183,7 +183,7 @@ To resolve this issue, try the following steps.
183183
name: kube-aad-proxy-certificate
184184
```
185185

186-
If the certificate is missing, [delete the deployment](quickstart-connect-cluster.md#clean-up-resources) and re-onboard with a different name for the cluster. If the problem continues, please contact support.
186+
If the certificate is missing, [delete the deployment](quickstart-connect-cluster.md#clean-up-resources) and re-onboard with a different name for the cluster. If the problem continues, contact support.
187187

188188
### Helm validation error
189189

@@ -197,7 +197,7 @@ az connectedk8s connect -n AzureArcTest -g AzureArcTest
197197
Ensure that you have the latest helm version installed before proceeding.
198198
This operation might take a while...
199199
200-
Please check if the azure-arc namespace was deployed and run 'kubectl get pods -n azure-arc' to check if all the pods are in running state. A possible cause for pods stuck in pending state could be insufficientresources on the Kubernetes cluster to onboard to arc.
200+
Check if the azure-arc namespace was deployed, and run 'kubectl get pods -n azure-arc' to check if all the pods are in running state. A possible cause for pods stuck in pending state could be insufficientresources on the Kubernetes cluster to onboard to Azure Arc.
201201
ValidationError: Unable to install helm release: Error: customresourcedefinitions.apiextensions.k8s.io "connectedclusters.arc.azure.com" not found
202202
```
203203

@@ -262,7 +262,7 @@ For more information, see [How do I resolve `webhook does not support dry run` e
262262

263263
The `microsoft.flux` extension installs the Flux controllers and Azure GitOps agents into your Azure Arc-enabled Kubernetes or Azure Kubernetes Service (AKS) clusters. If the extension isn't already installed in a cluster and you create a GitOps configuration resource for that cluster, the extension will be installed automatically.
264264

265-
If you experience an error during installation, or if the extension is in a failed state, run a script to investigate. The cluster-type parameter can be set to `connectedClusters` for an Arc-enabled cluster or `managedClusters` for an AKS cluster. The name of the `microsoft.flux` extension will be "flux" if the extension was installed automatically during creation of a GitOps configuration. Look in the "statuses" object for information.
265+
If you experience an error during installation, or if the extension is in a failed state, run a script to investigate. The cluster-type parameter can be set to `connectedClusters` for an Arc-enabled cluster or `managedClusters` for an AKS cluster. The name of the `microsoft.flux` extension is "flux" if the extension was installed automatically during creation of a GitOps configuration. Look in the "statuses" object for information.
266266

267267
One example:
268268

@@ -324,15 +324,15 @@ kubectl delete namespaces flux-system
324324

325325
Some other aspects to consider:
326326

327-
* For an AKS cluster, assure that the subscription has the `Microsoft.ContainerService/AKS-ExtensionManager` feature flag enabled.
327+
* For an AKS cluster, ensure that the subscription has the `Microsoft.ContainerService/AKS-ExtensionManager` feature flag enabled.
328328

329329
```azurecli
330330
az feature register --namespace Microsoft.ContainerService --name AKS-ExtensionManager
331331
```
332332
333-
* Assure that the cluster doesn't have any policies that restrict creation of the `flux-system` namespace or resources in that namespace.
333+
* Ensure that the cluster doesn't have any policies that restrict creation of the `flux-system` namespace or resources in that namespace.
334334
335-
With these actions accomplished, you can either [recreate a flux configuration](./tutorial-use-gitops-flux2.md), which will install the flux extension automatically, or you can reinstall the flux extension manually.
335+
With these actions accomplished, you can either [recreate a flux configuration](./tutorial-use-gitops-flux2.md), which installs the flux extension automatically, or you can reinstall the flux extension manually.
336336
337337
### Flux v2 - Installing the `microsoft.flux` extension in a cluster with Azure AD Pod Identity enabled
338338
@@ -350,7 +350,7 @@ The extension status also returns as "Failed".
350350

351351
The extension-agent pod is trying to get its token from IMDS on the cluster in order to talk to the extension service in Azure, but the token request is intercepted by the [pod identity](../../aks/use-azure-ad-pod-identity.md)).
352352

353-
You can fix this issue by upgrading to the latest version of the `microsoft.flux` extension. For version 1.6.1 or earlier, the workaround is to create an `AzurePodIdentityException` that will tell Azure AD Pod Identity to ignore the token requests from flux-extension pods.
353+
You can fix this issue by upgrading to the latest version of the `microsoft.flux` extension. For version 1.6.1 or earlier, the workaround is to create an `AzurePodIdentityException` that tells Azure AD Pod Identity to ignore the token requests from flux-extension pods.
354354

355355
```console
356356
apiVersion: aadpodidentity.k8s.io/v1
@@ -379,17 +379,17 @@ The controllers installed in your Kubernetes cluster with the Microsoft Flux ext
379379

380380
| Container Name | CPU limit | Memory limit |
381381
| -------------- | ----------- | -------- |
382-
| fluxconfig-agent | 50m | 150Mi |
383-
| fluxconfig-controller | 100m | 150Mi |
384-
| fluent-bit | 20m | 150Mi |
385-
| helm-controller | 1000m | 1Gi |
386-
| source-controller | 1000m | 1Gi |
387-
| kustomize-controller | 1000m | 1Gi |
388-
| notification-controller | 1000m | 1Gi |
389-
| image-automation-controller | 1000m | 1Gi |
390-
| image-reflector-controller | 1000m | 1Gi |
391-
392-
If you have enabled a custom or built-in Azure Gatekeeper Policy, such as `Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits`, that limits the resources for containers on Kubernetes clusters, you will need to either ensure that the resource limits on the policy are greater than the limits shown above or the `flux-system` namespace is part of the `excludedNamespaces` parameter in the policy assignment.
382+
| fluxconfig-agent | 50 m | 150 Mi |
383+
| fluxconfig-controller | 100 m | 150 Mi |
384+
| fluent-bit | 20 m | 150 Mi |
385+
| helm-controller | 1000 m | 1 Gi |
386+
| source-controller | 1000 m | 1 Gi |
387+
| kustomize-controller | 1000 m | 1 i |
388+
| notification-controller | 1000 m | 1 Gi |
389+
| image-automation-controller | 1000 m | 1 Gi |
390+
| image-reflector-controller | 1000 m | 1 Gi |
391+
392+
If you've enabled a custom or built-in Azure Gatekeeper Policy that limits the resources for containers on Kubernetes clusters, such as `Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits`, ensure that either the resource limits on the policy are greater than the limits shown above or that the `flux-system` namespace is part of the `excludedNamespaces` parameter in the policy assignment.
393393

394394
### Flux v1
395395

@@ -511,7 +511,7 @@ This warning occurs when you use a service principal to log into Azure. The serv
511511
az ad sp show --id bc313c14-388c-4e7d-a58e-70017303ee3b --query objectId -o tsv
512512
```
513513
514-
1. Sign in into Azure CLI using the service principal. Use the `<objectId>` value from above step to enable custom locations on the cluster:
514+
1. Sign in into Azure CLI using the service principal. Use the `<objectId>` value from the previous step to enable custom locations on the cluster:
515515
516516
* To enable custom locations when connecting the cluster to Arc, run the following command:
517517
@@ -527,7 +527,7 @@ This warning occurs when you use a service principal to log into Azure. The serv
527527
528528
## Azure Arc-enabled Open Service Mesh
529529
530-
The steps below provide guidance on validating the deployment of all the Open Service Mesh (OSM) extension components on your cluster.
530+
This section shows how to validate the deployment of all the Open Service Mesh (OSM) extension components on your cluster.
531531
532532
### Check OSM Controller **Deployment**
533533
@@ -727,7 +727,7 @@ Example output:
727727
1845
728728
```
729729

730-
The number in the output indicates the number of bytes, or the size of the CA Bundle. If this is empty, 0, or a number under 1000, the CA Bundle is not correctly provisioned. Without a correct CA Bundle, the `ValidatingWebhook` will throw an error.
730+
The number in the output indicates the number of bytes, or the size of the CA Bundle. If the output is empty, 0, or a number under 1000, the CA Bundle isn't correctly provisioned. Without a correct CA Bundle, the `ValidatingWebhook` will throw an error.
731731

732732
### Check the `osm-mesh-config` resource
733733

@@ -819,7 +819,7 @@ metadata:
819819
### Check namespaces
820820

821821
>[!Note]
822-
>The arc-osm-system namespace will never participate in a service mesh and will never be labeled or annotated with the key/values below.
822+
>The arc-osm-system namespace will never participate in a service mesh and will never be labeled or annotated with the key/values shown here.
823823

824824
We use the `osm namespace add` command to join namespaces to a given service mesh. When a Kubernetes namespace is part of the mesh, confirm the following:
825825

@@ -851,7 +851,7 @@ The following label must be present:
851851
}
852852
```
853853

854-
If you aren't using `osm` CLI, you could also manually add these annotations to your namespaces. If a namespace isn't annotated with `"openservicemesh.io/sidecar-injection": "enabled"`, or isn't labeled with `"openservicemesh.io/monitored-by": "osm"`, the OSM Injector will not add Envoy sidecars.
854+
If you aren't using `osm` CLI, you could also manually add these annotations to your namespaces. If a namespace isn't annotated with `"openservicemesh.io/sidecar-injection": "enabled"`, or isn't labeled with `"openservicemesh.io/monitored-by": "osm"`, the OSM Injector won't add Envoy sidecars.
855855

856856
>[!Note]
857857
>After `osm namespace add` is called, only **new** pods will be injected with an Envoy sidecar. Existing pods must be restarted with `kubectl rollout restart deployment` command.

0 commit comments

Comments
 (0)