You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-explorer/vnet-deployment.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -267,7 +267,7 @@ In this section you learn how to troubleshoot connectivity, operational, and clu
267
267
268
268
If you have an issue while accessing cluster using the public (cluster.region.kusto.windows.net) or private (private-cluster.region.kusto.windows.net) endpoint and you suspect it's related to virtual network setup, perform the following steps to troubleshoot the issue.
269
269
270
-
1. Check TCP connectivity
270
+
####Check TCP connectivity
271
271
272
272
The first step includes checking TCP connectivity using Windows or Linux OS.
273
273
@@ -302,45 +302,45 @@ The first step includes checking TCP connectivity using Windows or Linux OS.
302
302
303
303
If the test isn't successful, proceed with the following steps. If the test is successful, the issue isn't due to a TCP connectivity issue. Go to [operational issues](#cluster-creation-and-operations-issues) to troubleshoot further.
304
304
305
-
2. Check the Network Security Group (NSG)
305
+
#### Check the Network Security Group (NSG)
306
306
307
307
Check that the [Network Security Group](/azure/virtual-network/security-overview) (NSG) attached to the cluster's subnet, has an inbound rule that allows access from the client machine's IP for port 443.
308
308
309
-
3. Check route table
309
+
#### Check route table
310
310
311
311
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0'), make sure that the machine IP address has a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview) to VirtualNetwork/Internet. This is required to prevent asymmetric route issues.
312
312
313
313
### Ingestion issues
314
314
315
315
If you're experiencing ingestion issues and you suspect it's related to virtual network setup, perform the following steps.
316
316
317
-
1. Check ingestion health
317
+
#### Check ingestion health
318
318
319
319
Check that the [cluster ingestion metrics](/azure/data-explorer/using-metrics#ingestion-health-and-performance-metrics) indicate a healthy state.
320
320
321
-
2. Check security rules on data source resources
321
+
#### Check security rules on data source resources
322
322
323
-
If the metrics indicate that no events were processed from the data source (*Events processed* (for Event/IoT Hubs) metric), make sure that the data source resources (Event Hub or Storage) allow access from cluster's subnet in the firewall rules or service endpoints.
323
+
If the metrics indicate that no events were processed from the data source (*Events processed* (for Event/IoT Hubs) metric), make sure that the data source resources (Event Hub or Storage) allow access from cluster's subnet in the firewall rules or service endpoints.
324
324
325
-
3. Check security rules configured on cluster's subnet
325
+
#### Check security rules configured on cluster's subnet
326
326
327
-
Make sure cluster's subnet has NSG, UDR and firewall rules are properly configured. In addition, test network connectivity for all dependent endpoints.
327
+
Make sure cluster's subnet has NSG, UDR, and firewall rules are properly configured. In addition, test network connectivity for all dependent endpoints.
328
328
329
329
## Cluster creation and operations issues
330
330
331
331
If you're experiencing cluster creation or operation issues and you suspect it's related to virtual network setup, follow these steps to troubleshoot the issue.
332
332
333
-
1. Diagnose the virtual network with the REST API.
333
+
#### Diagnose the virtual network with the REST API.
334
334
335
335
The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the REST API using PowerShell.
336
336
337
-
1. Log in with ARMClient
337
+
1. Log in with ARMClient
338
338
339
339
```powerShell
340
340
armclient login
341
341
```
342
342
343
-
1. Invoke diagnose operation
343
+
1. Invoke diagnose operation
344
344
345
345
```powershell
346
346
$subscriptionId = '<subscription id>'
@@ -351,7 +351,7 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
351
351
armclient post "https://management.azure.com/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Kusto/clusters/$clusterName/diagnoseVirtualNetwork?api-version=$apiversion" -verbose
352
352
```
353
353
354
-
1. Check the response
354
+
1. Check the response
355
355
356
356
```powershell
357
357
HTTP/1.1 202 Accepted
@@ -360,7 +360,7 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
360
360
...
361
361
```
362
362
363
-
1. Wait for operation completion
363
+
1. Wait for operation completion
364
364
365
365
```powershell
366
366
armclient get https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Kusto/locations/{location}/operationResults/{operation-id}?api-version=2019-11-09
@@ -390,16 +390,16 @@ The [ARMClient](https://chocolatey.org/packages/ARMClient) is used to call the R
390
390
}
391
391
```
392
392
393
-
If the *Findings* property shows an empty result, it means that all network tests passed and no connections are broken. If it shows an error as follows *Outbound dependency '{dependencyName}:{port}' might be not satisfied (Outbound)*, the cluster can't reach the dependent service endpoints. Proceed with the following steps to troubleshoot.
393
+
If the *Findings* property shows an empty result, it means that all network tests passed and no connections are broken. If it shows an error as follows: *Outbound dependency '{dependencyName}:{port}' might be not satisfied (Outbound)*, the cluster can't reach the dependent service endpoints. Proceed with the following steps to troubleshoot.
394
394
395
-
2. Check Network Security Group (NSG)
395
+
#### Check Network Security Group (NSG)
396
396
397
-
Make sure that the [Network Security Group](/azure/virtual-network/security-overview) is configured properly per the instuctions in [Dependencies for VNet deployment](/azure/data-explorer/vnet-deployment#dependencies-for-vnet-deployment)
397
+
Make sure that the [Network Security Group](/azure/virtual-network/security-overview) is configured properly per the instructions in [Dependencies for VNet deployment](/azure/data-explorer/vnet-deployment#dependencies-for-vnet-deployment)
398
398
399
-
3. Check route table
399
+
#### Check route table
400
400
401
-
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
401
+
If the cluster's subnet has force-tunneling set up to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
402
402
403
-
4. Check firewall rules
403
+
#### Check firewall rules
404
404
405
-
If you force tunnel subnet outbound traffic to a firewall, make sure all dependencies FQDN (e.g. **.blob.core.windows.net*) are allowed in the firewall configuration as described in [securing outbound traffic with firewall](/azure/data-explorer/vnet-deployment#securing-outbound-traffic-with-firewall).
405
+
If you force tunnel subnet outbound traffic to a firewall, make sure all dependencies FQDN (for example, *.blob.core.windows.net*) are allowed in the firewall configuration as described in [securing outbound traffic with firewall](/azure/data-explorer/vnet-deployment#securing-outbound-traffic-with-firewall).
0 commit comments