Skip to content

Commit cbe74e8

Browse files
Merge branch 'MicrosoftDocs:main' into main
2 parents 40f05f9 + dcbe33a commit cbe74e8

File tree

7 files changed

+135
-36
lines changed

7 files changed

+135
-36
lines changed

articles/iot-operations/troubleshoot/known-issues.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,14 @@ description: Known issues for the MQTT broker, Layered Network Management (previ
44
author: dominicbetts
55
ms.author: dobett
66
ms.topic: troubleshooting-known-issue
7-
ms.date: 04/16/2025
7+
ms.date: 05/07/2025
88
---
99

1010
# Known issues: Azure IoT Operations
1111

12-
This article lists the current known issues for Azure IoT Operations.
12+
This article lists the current known issues you might encounter when using Azure IoT Operations. The guidance helps you identify these issues and provides workarounds where available.
13+
14+
For general troubleshooting guidance, see [Troubleshoot Azure IoT Operations](troubleshoot.md).
1315

1416
## Deploy, update, and uninstall issues
1517

@@ -45,13 +47,13 @@ Log signature: `"This codespace is currently running in recovery mode due to a c
4547

4648
If you deploy Azure IoT Operations in GitHub Codespaces, shutting down and restarting the Codespace causes a `This codespace is currently running in recovery mode due to a configuration error` issue.
4749

48-
Currently, there's no workaround for the issue. If you need a cluster that supports shutting down and restarting, choose one of the options in [Prepare your Azure Arc-enabled Kubernetes cluster](../deploy-iot-ops/howto-prepare-cluster.md).
50+
There's no workaround for this issue. If you need a cluster that supports shutting down and restarting, select one of the options in [Prepare your Azure Arc-enabled Kubernetes cluster](../deploy-iot-ops/howto-prepare-cluster.md).
4951

5052
## MQTT broker issues
5153

5254
This section lists current known issues for the MQTT broker.
5355

54-
### MQTT broker resources aren't visible in Azure portal
56+
### MQTT broker resources aren't visible in the Azure portal
5557

5658
---
5759

articles/iot-operations/troubleshoot/troubleshoot.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,20 @@ ms.author: sonialopez
66
ms.topic: troubleshooting-general
77
ms.custom:
88
- ignite-2023
9-
ms.date: 03/07/2025
9+
ms.date: 05/07/2025
1010
---
1111

1212
# Troubleshoot Azure IoT Operations
1313

1414
This article contains troubleshooting tips for Azure IoT Operations.
1515

16+
The troubleshooting guidance helps you diagnose and resolve issues you might encounter when deploying, configuring, or running Azure IoT Operations by:
17+
18+
- Collecting diagnostic information from the Azure IoT Operations service and the Azure IoT Operations components running on your cluster.
19+
- Providing solutions to common issues such as insufficient security permissions, missing secrets, or incorrect configuration settings.
20+
21+
For information about known issues and temporary workarounds, see [Known issues: Azure IoT Operations](known-issues.md).
22+
1623
## Troubleshoot Azure IoT Operations deployment
1724

1825
For general deployment and configuration troubleshooting, you can use the Azure CLI IoT Operations `check` and `support` commands.
@@ -31,7 +38,7 @@ If you see the following error message, you either didn't enable the required Az
3138
Message: Microsoft.ExtendedLocation resource provider does not have the required permissions to create a namespace on the cluster.
3239
```
3340

34-
To resolve, follow [this guidance](/azure/azure-arc/kubernetes/custom-locations#enable-custom-locations-on-your-cluster) for enabling the custom locations feature with the correct OID.
41+
To resolve the issue, follow [this guidance](/azure/azure-arc/kubernetes/custom-locations#enable-custom-locations-on-your-cluster) to enable the custom locations feature with the correct OID.
3542

3643
### You see a MissingResourceVersionOnHost error message
3744

@@ -62,7 +69,7 @@ To resolve the issue, either elevate principal permissions, or don't deploy reso
6269
6370
### Deployment of MQTT broker fails
6471

65-
A deployment can fail if the cluster doesn't have sufficient resources for the specified MQTT broker cardinality and memory profile. To resolve this situation, adjust the replica count, workers, sharding, and memory profile settings to appropriate values for your cluster.
72+
A deployment might fail if the cluster doesn't have sufficient resources for the specified MQTT broker cardinality and memory profile. To resolve this situation, adjust the replica count, workers, sharding, and memory profile settings to appropriate values for your cluster.
6673

6774
> [!WARNING]
6875
> Setting the replica count to one can result in data loss in node failure scenarios.
@@ -78,7 +85,7 @@ Currently, you can't use the `az iot ops` command to enable resource sync rules
7885

7986
To create the device registry rule:
8087

81-
1. Create a file called *rsr_device_registry.json* with the following content. Replace the `<placeholder>` values with your own values:
88+
1. Create a file called *rsr_device_registry.json* with the following content. Replace the `<placeholder>` values with your values:
8289

8390
```json
8491
{
@@ -95,7 +102,7 @@ To create the device registry rule:
95102
}
96103
```
97104

98-
1. Run the following command to create the device registry resource sync rule. Replace the `<placeholder>` values with your own values:
105+
1. Run the following command to create the device registry resource sync rule. Replace the `<placeholder>` values with your values:
99106

100107
```azcli
101108
az rest --url /subscriptions/<subscription Id>/resourceGroups/<resource group name>/providers/Microsoft.ExtendedLocation/customLocations/<custom location name>/resourceSyncRules/<rule name>?api-version=2021-08-31-preview --method PUT --body "@rsr_device_registry.json"
@@ -128,7 +135,7 @@ To create the instance rule:
128135

129136
## Troubleshoot Azure Key Vault secret management
130137

131-
If you see the following error message related to secret management, you need to update your Azure Key Vault contents:
138+
If you see the following error message related to secret management, update your Azure Key Vault contents:
132139

133140
```output
134141
rpc error: code = Unknown desc = failed to mount objects, error: failed to get objectType:secret,
@@ -138,7 +145,7 @@ If you recently deleted this secret you may be able to recover it using the corr
138145
For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125182" }
139146
```
140147

141-
This error occurs when Azure IoT Operations tries to synchronize a secret from Azure Key Vault that doesn't exist. To resolve this issue, you need to add the secret in Azure Key Vault before you create resources such as a secret provider class.
148+
This error occurs when Azure IoT Operations tries to synchronize a secret from Azure Key Vault that doesn't exist. To resolve this issue, add the secret in Azure Key Vault before you create resources such as a secret provider class.
142149

143150
## Troubleshoot OPC UA server connections
144151

articles/managed-grafana/quickstart-managed-grafana-cli.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: azure-managed-grafana
55
ms.topic: quickstart
66
author: maud-lv
77
ms.author: malev
8-
ms.date: 12/17/2024
8+
ms.date: 03/14/2025
99
ms.devlang: azurecli
1010
ms.custom: engagement-fy23, devx-track-azurecli
1111
# customer intent: As a developer or a data analyst, I want to create a new Azure Managed Grafana workspace using the Azure CLI.
@@ -16,17 +16,20 @@ ms.custom: engagement-fy23, devx-track-azurecli
1616
Get started using Azure Managed Grafana by creating an Azure Managed Grafana workspace using the Azure CLI.
1717

1818
>[!NOTE]
19-
> Azure Managed Grafana has [two pricing plans](overview.md#service-tiers). This guides takes you through creating a new workspace in the Standard plan. To generate a workspace in the Essential (preview) plan, [use the Azure portal](quickstart-managed-grafana-portal.md).
19+
> Azure Managed Grafana has [two pricing plans](overview.md#service-tiers). This guide takes you through creating a new workspace in the Standard plan. To create a workspace in the Essential (preview) plan, [use the Azure portal](quickstart-managed-grafana-portal.md).
2020

2121
## Prerequisites
2222

2323
- An Azure account for work or school with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
2424
- Minimum required role to create a workspace: resource group Contributor.
2525
- Minimum required role to access the Grafana UI: resource group Owner.
26-
>[!NOTE]
27-
> If you don't meet this requirement, once you've created a new Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role on the workspace.
2826

29-
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
27+
> [!NOTE]
28+
> If you're not a resource group Owner:
29+
> - once you've created the Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role
30+
> - or consider creating the workspace using the **Creator can admin (Preview)** feature available from the Azure portal. Refer to the [Azure portal quickstart](quickstart-managed-grafana-portal.md) for more information.
31+
32+
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
3033

3134
## Sign in to Azure
3235

articles/managed-grafana/quickstart-managed-grafana-portal.md

Lines changed: 23 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,6 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
1818

1919
- An Azure account for work or school and an active subscription. [Create an account for free](https://azure.microsoft.com/free).
2020
- Minimum required role to create a workspace: resource group Contributor.
21-
- Minimum required role to access the Grafana UI: resource group Owner.
22-
>[!NOTE]
23-
> If you don't meet this requirement, once you've created a new Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role on the workspace.
2421

2522
## Create an Azure Managed Grafana workspace
2623

@@ -48,17 +45,26 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
4845
- **Enable API key creation** is set to **Disable** by default.
4946
- If you've opted for the Standard plan, optionally enable the **Deterministic outbound IP** feature, which is set to **Disable** by default.
5047

51-
1. Select **Next : Permission >** to control access rights for your Grafana workspace and data sources:
52-
1. **System assigned managed identity** is set to **On**.
48+
1. Select **Next : Permission >** to control access rights for your Grafana instance and data sources:
49+
- **System assigned managed identity** is set to **On**.
5350

54-
>[!NOTE]
55-
>You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
51+
> [!NOTE]
52+
> You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. For more information, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
5653

57-
1. The box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default.
54+
- If you're a subscription Owner or a User Access Administrator:
55+
- the box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default. This role assignment allows Azure Managed Grafana to access and display monitoring data from various Azure services.
56+
- the box **Include myself** under **Grafana administrator role** is checked. This option grants you the Grafana administrator role, and lets you manage access rights. Optionally select **Add** to share this right with team members.
57+
- If you're not a subscription Owner or a User Access Administrator, you can either:
58+
- ask a subscription Owner or a User Access Administrator to assign you the Grafana Admin role
59+
- or enable **Creator can admin (Preview)**. This option available in preview grants you the required permissions to access and manage the Grafana resource.
5860

59-
1. The box **Include myself** under **Grafana administrator role** is checked. This option grants you the Grafana administrator role, and lets you manage access rights. You can give this right to more members by selecting **Add**. If this option grays out for you, ask someone with the Owner role on the subscription to assign you the Grafana Admin role.
60-
61-
1. If you've opted for the Standard plan, optionally disable public access and create a private endpoint that can access your resource.
61+
> [!NOTE]
62+
> The **Creator can admin (Preview)** option can only be enabled when creating the workspace. Later on, it can be disabled from the **Configuration** menu if the workspace creator doesn't need this level of access anymore. Once disabled, it cannot be enabled again. If this option is disabled and the user needs to access this Grafana instance again, they will need [a Grafana role](how-to-manage-access-permissions-users-identities.md).
63+
64+
> [!NOTE]
65+
> The **Creator can admin (Preview)** option may not be available in some specific scenarios. For example, it doesn't support workspaces managed by Cloud Solution Providers (CSPs). In CSP scenarios, the necessary information about the individual creator of the resource is not accessible. As a result, the feature cannot grant administrative privileges to the creator.
66+
67+
1. If you've opted for the Standard plan, in the **Networking** tab, optionally disable public access and create a private endpoint that can access your resource.
6268

6369
1. Optionally select **Next : Tags** and add tags to categorize resources.
6470

@@ -68,13 +74,16 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
6874

6975
1. Once the deployment is complete, select **Go to resource** to open your resource.
7076

71-
1. In the **Overview** tab's Essentials section, select the **Endpoint** URL. Single sign-on via Microsoft Entra ID has been configured for you automatically. If prompted, enter your Azure account.
77+
1. In the **Overview** tab, select the **Endpoint** URL. Single sign-on via Microsoft Entra ID has been configured for you automatically. If prompted, enter your Azure account.
7278

7379
:::image type="content" source="media/quickstart-portal/grafana-overview.png" alt-text="Screenshot of the Azure portal. Endpoint URL display.":::
7480

81+
You can now start interacting with the Grafana application to configure data sources, create dashboards, reports and alerts. Suggested read: [Monitor Azure services and applications using Grafana](/azure/azure-monitor/visualize/grafana-plugin).
82+
7583
:::image type="content" source="media/quickstart-portal/grafana-ui.png" alt-text="Screenshot of an Azure Managed Grafana workspace.":::
7684

77-
You can now start interacting with the Grafana application to configure data sources, create dashboards, reports and alerts. Suggested read: [Monitor Azure services and applications using Grafana](/azure/azure-monitor/visualize/grafana-plugin).
85+
> [!IMPORTANT]
86+
> The **Creator can admin (Preview)** option is designed to be used for testing purposes. Whenever possible, we recommend assigning a [Grafana role](how-to-manage-access-permissions-users-identities.md) to all team members who need to access the Grafana portal and disabling the **Creator can edit** option.
7887

7988
## Clean up resources
8089

@@ -84,7 +93,7 @@ In the preceding steps, you created an Azure Managed Grafana workspace in a new
8493
1. In the **Overview** page, make sure that the listed resources are the ones you want to delete.
8594
1. Select **Delete**, type the name of your resource group in the text box, and then select **Delete**.
8695

87-
## Next steps
96+
## Next step
8897

8998
> [!div class="nextstepaction"]
9099
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)

articles/managed-grafana/toc.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,12 @@ items:
102102
href: grafana-settings.md
103103
- name: Upgrade to Grafana 11
104104
href: how-to-upgrade-grafana-11.md
105-
- name: Troubleshoot common issues
106-
href: troubleshoot-managed-grafana.md
105+
- name: Troubleshoot issues
106+
items:
107+
- name: Troubleshoot common issues
108+
href: troubleshoot-managed-grafana.md
109+
- name: Troubleshoot connecting managed private endpoint to a private link service
110+
href: troubleshoot-mpe-connection.md
107111
- name: Reference
108112
items:
109113
- name: Azure CLI

articles/managed-grafana/troubleshoot-managed-grafana.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-managed-grafana
88
ms.date: 04/16/2025
99
---
1010

11-
# Troubleshoot issues for Azure Managed Grafana
11+
# Troubleshoot common Azure Managed Grafana issues
1212

1313
This article guides you to troubleshoot errors with Azure Managed Grafana, and suggests solutions to resolve them.
1414

@@ -200,7 +200,7 @@ After disabling System-Assigned Managed Identity, the data source that has been
200200

201201
Data sources configured with a managed identity may still be able to access data from Azure services for up to 24 hours. When a role assignment is updated in a managed identity for Azure Managed Grafana, this change can take up to 24 hours to be effective, due to limitations of managed identities.
202202

203-
## Next step
203+
## Related content
204204

205-
> [!div class="nextstepaction"]
206-
> [Support](./find-help-open-support-ticket.md)
205+
- [Support](find-help-open-support-ticket.md)
206+
- [Troubleshoot connecting managed private endpoint to a private link service](troubleshoot-mpe-connection.md)

0 commit comments

Comments
 (0)