Skip to content

Commit e0843e0

Browse files
committed
reformatted file
1 parent 73d1b71 commit e0843e0

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/data-explorer/vnet-deployment.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ In this section you learn how to troubleshoot connectivity, operational, and clu
267267

268268
If you have an issue while accessing cluster using the public (cluster.region.kusto.windows.net) or private (private-cluster.region.kusto.windows.net) endpoint and you suspect it's related to virtual network setup, perform the following steps to troubleshoot the issue.
269269

270-
1. Check TCP connectivity
270+
#### Check TCP connectivity
271271

272272
The first step includes checking TCP connectivity using Windows or Linux OS.
273273

@@ -302,45 +302,45 @@ The first step includes checking TCP connectivity using Windows or Linux OS.
302302
303303
If the test isn't successful, proceed with the following steps. If the test is successful, the issue isn't due to a TCP connectivity issue. Go to [operational issues](#cluster-creation-and-operations-issues) to troubleshoot further.
304304
305-
2. Check the Network Security Group (NSG)
305+
#### Check the Network Security Group (NSG)
306306
307307
Check that the [Network Security Group](/azure/virtual-network/security-overview) (NSG) attached to the cluster's subnet, has an inbound rule that allows access from the client machine's IP for port 443.
308308
309-
3. Check route table
309+
#### Check route table
310310
311311
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0'), make sure that the machine IP address has a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview) to VirtualNetwork/Internet. This is required to prevent asymmetric route issues.
312312
313313
### Ingestion issues
314314
315315
If you're experiencing ingestion issues and you suspect it's related to virtual network setup, perform the following steps.
316316
317-
1. Check ingestion health
317+
#### Check ingestion health
318318
319319
Check that the [cluster ingestion metrics](/azure/data-explorer/using-metrics#ingestion-health-and-performance-metrics) indicate a healthy state.
320320
321-
2. Check security rules on data source resources
321+
#### Check security rules on data source resources
322322
323-
If the metrics indicate that no events were processed from the data source (*Events processed* (for Event/IoT Hubs) metric), make sure that the data source resources (Event Hub or Storage) allow access from cluster's subnet in the firewall rules or service endpoints.
323+
If the metrics indicate that no events were processed from the data source (*Events processed* (for Event/IoT Hubs) metric), make sure that the data source resources (Event Hub or Storage) allow access from cluster's subnet in the firewall rules or service endpoints.
324324
325-
3. Check security rules configured on cluster's subnet
325+
#### Check security rules configured on cluster's subnet
326326
327-
Make sure cluster's subnet has NSG, UDR and firewall rules are properly configured. In addition, test network connectivity for all dependent endpoints.
327+
Make sure cluster's subnet has NSG, UDR, and firewall rules are properly configured. In addition, test network connectivity for all dependent endpoints.
328328
329329
## Cluster creation and operations issues
330330
331331
If you're experiencing cluster creation or operation issues and you suspect it's related to virtual network setup, follow these steps to troubleshoot the issue.
332332
333-
1. Diagnose the virtual network with the REST API.
333+
#### Diagnose the virtual network with the REST API.
334334
335335
The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the REST API using PowerShell.
336336
337-
1. Log in with ARMClient
337+
1. Log in with ARMClient
338338
339339
```powerShell
340340
armclient login
341341
```
342342

343-
1. Invoke diagnose operation
343+
1. Invoke diagnose operation
344344

345345
```powershell
346346
$subscriptionId = '<subscription id>'
@@ -351,7 +351,7 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
351351
armclient post "https://management.azure.com/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Kusto/clusters/$clusterName/diagnoseVirtualNetwork?api-version=$apiversion" -verbose
352352
```
353353
354-
1. Check the response
354+
1. Check the response
355355
356356
```powershell
357357
HTTP/1.1 202 Accepted
@@ -360,7 +360,7 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
360360
...
361361
```
362362
363-
1. Wait for operation completion
363+
1. Wait for operation completion
364364
365365
```powershell
366366
armclient get https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Kusto/locations/{location}/operationResults/{operation-id}?api-version=2019-11-09
@@ -390,16 +390,16 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
390390
}
391391
```
392392
393-
If the *Findings* property shows an empty result, it means that all network tests passed and no connections are broken. If it shows an error as follows *Outbound dependency '{dependencyName}:{port}' might be not satisfied (Outbound)*, the cluster can't reach the dependent service endpoints. Proceed with the following steps to troubleshoot.
393+
If the *Findings* property shows an empty result, it means that all network tests passed and no connections are broken. If it shows an error as follows: *Outbound dependency '{dependencyName}:{port}' might be not satisfied (Outbound)*, the cluster can't reach the dependent service endpoints. Proceed with the following steps to troubleshoot.
394394
395-
2. Check Network Security Group (NSG)
395+
#### Check Network Security Group (NSG)
396396
397-
Make sure that the [Network Security Group](/azure/virtual-network/security-overview) is configured properly per the instuctions in [Dependencies for VNet deployment](/azure/data-explorer/vnet-deployment#dependencies-for-vnet-deployment)
397+
Make sure that the [Network Security Group](/azure/virtual-network/security-overview) is configured properly per the instructions in [Dependencies for VNet deployment](/azure/data-explorer/vnet-deployment#dependencies-for-vnet-deployment)
398398
399-
3. Check route table
399+
#### Check route table
400400
401-
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
401+
If the cluster's subnet has force-tunneling set up to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
402402
403-
4. Check firewall rules
403+
#### Check firewall rules
404404
405-
If you force tunnel subnet outbound traffic to a firewall, make sure all dependencies FQDN (e.g. **.blob.core.windows.net*) are allowed in the firewall configuration as described in [securing outbound traffic with firewall](/azure/data-explorer/vnet-deployment#securing-outbound-traffic-with-firewall).
405+
If you force tunnel subnet outbound traffic to a firewall, make sure all dependencies FQDN (for example, *.blob.core.windows.net*) are allowed in the firewall configuration as described in [securing outbound traffic with firewall](/azure/data-explorer/vnet-deployment#securing-outbound-traffic-with-firewall).

0 commit comments

Comments
 (0)