You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/data/troubleshoot-managed-instance.md
+14-15Lines changed: 14 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,9 @@ kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.status}'
25
25
26
26
On each side, there are two replicas for one failover group. Check the value of `connectedState`, and `synchronizationState` for each replica.
27
27
28
-
If one of `connectedState`is not equal to `CONNECTED`, see the instructions under [Check parameters](#check-parameters).
28
+
If one of `connectedState`isn't equal to `CONNECTED`, see the instructions under [Check parameters](#check-parameters).
29
29
30
-
If one of `synchronizationState`is not equal to `HEALTHY`, please focus on the instance which `synchronizationState`is not equal to `HEALTHY`". Refer to [Can't connect to Arc-enabled SQL Managed Instance](#cant-connect-to-arc-enabled-sql-managed-instance) for how to debug.
30
+
If one of `synchronizationState`isn't equal to `HEALTHY`, focus on the instance which `synchronizationState`isn't equal to `HEALTHY`". Refer to [Can't connect to Arc-enabled SQL Managed Instance](#cant-connect-to-arc-enabled-sql-managed-instance) for how to debug.
31
31
32
32
### Check parameters
33
33
@@ -60,11 +60,11 @@ Compare the results from the remote instance with the results from the local ins
60
60
61
61
*`partnerMI` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` has to match with `$sqlmiName` from remote instance.
62
62
63
-
*`sharedName` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` is optional. If it is not presented, it is same as `sourceMI`. The `sharedName` from both site should be same if presented. If it is not presented, `sourceMI` from both site should be identical.
63
+
*`sharedName` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` is optional. If it'sn't presented, it's same as `sourceMI`. The `sharedName` from both site should be same if presented. If it'sn't presented, `sourceMI` from both site should be identical.
64
64
65
65
* Role from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` should be different between two sites. One side should be primary, other should be secondary.
66
66
67
-
If any one of above is not right, delete failover group on both sites and re-create them.
67
+
If any one of above isn't right, delete failover group on both sites and re-create them.
68
68
69
69
If nothing is wrong, follow the instructions under [Check mirroring endpoints for both sides](#check-mirroring-endpoints-for-both-sides).
70
70
@@ -80,11 +80,11 @@ kubectl -n test get services $sqlmiName-external-svc -o jsonpath-as-json='{.spec
80
80
81
81
*`port-mssql-mirroring` should be presented on the list. The port should be used by failover group `partnerMirroringURL` on other side.
82
82
83
-
If it is not, correct the mistake and retry from the beginning.
83
+
If it'sn't, correct the mistake and retry from the beginning.
84
84
85
85
### Verify SQL Server can reach external endpoint of another site
86
86
87
-
Although you cannot ping mirroring endpoint of another site directly, use the following command to reach another side external endpoint of the SQL Server tabular data stream (TDS) port.
87
+
Although you can't ping mirroring endpoint of another site directly, use the following command to reach another side external endpoint of the SQL Server tabular data stream (TDS) port.
@@ -98,9 +98,8 @@ If SQL server can use external endpoint TDS, there is a good chance it can reach
98
98
99
99
This section identifies specific steps you can take to troubleshoot connections to Azure Arc-enabled SQL managed instances.
100
100
101
-
To troubleshoot connections to resources in a failover group, see [Troubleshoot connection to Azure Arc-enabled SQL Managed Instance failover group](troubleshoot-managed-instance-connection.md).
102
-
103
-
You can't connect to an Azure Arc-enabled SQL Managed Instance if the instance license type is `DisasterRecovery`.
101
+
> [!NOTE]
102
+
> You can't connect to an Azure Arc-enabled SQL Managed Instance if the instance license type is `DisasterRecovery`.
The state should be `Ready`. If it is not, you need to wait. If state is error, get the message field, collect logs, and contact support. See [Collecting the logs](#collecting-the-logs).
114
+
The state should be `Ready`. If it'sn't, you need to wait. If state is error, get the message field, collect logs, and contact support. See [Collecting the logs](#collecting-the-logs).
116
115
117
116
### Check the routing label for stateful set
118
117
The routing label for stateful set is used to route external endpoint to a matched pod. The name of the label is `role.ag.mssql.microsoft.com`.
All replicas should be connected & healthy. Here is the detailed description of the query results [sys.dm_hadr_availability_replica_states](/sql/relational-databases/system-dynamic-management-views/sys-dm-hadr-availability-replica-states-transact-sql).
143
142
144
-
If you find it is not synchronized or not connected unexpectedly, try to kill the pod which has the problem. If problem persists, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
143
+
If you find it'sn't synchronized or not connected unexpectedly, try to kill the pod which has the problem. If problem persists, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
145
144
146
145
> [!NOTE]
147
146
> If there are some large database in the instance, the seeding process to secondary could take a while. If this happens, wait for seeding to complete.
You should get `ServerName` from `Listener` of SQL Server on each replicas, If you cannot, kill the pods which have the problem. If the problem persists after recovery, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
160
+
You should get `ServerName` from `Listener` of each replica. If you can't get `ServerName`, kill the pods which have the problem. If the problem persists after recovery, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
You should be able to reach any Cluster IP address for the pods of stateful set from another pod. If this is not the case, please refer to [Kubernetes documentation - Cluster networking](https://kubernetes.io/docs/concepts/cluster-administration/networking/) for detailed information or get service provider to resolve the issue.
173
+
You should be able to reach any Cluster IP address for the pods of stateful set from another pod. If this isn't the case, refer to [Kubernetes documentation - Cluster networking](https://kubernetes.io/docs/concepts/cluster-administration/networking/) for detailed information or get service provider to resolve the issue.
175
174
176
175
### Check the Kubernetes load balancer or `nodeport` services
You should be able to connect to exposed external port (which has been confirmed from internal at step 3). If you cannot connect to external port, please refer to [Kubernetes documentation - Create an external load balancer](https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/) and get service provider help on the issues.
187
+
You should be able to connect to exposed external port (which has been confirmed from internal at step 3). If you can't connect to external port, refer to [Kubernetes documentation - Create an external load balancer](https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/) and get service provider help on the issues.
189
188
190
189
You can use any client like `SqlCmd`, SQL Server Management Studio (SSMS), or Azure Data Studio (ADS) to test this out.
191
190
192
191
## Collecting the logs
193
192
194
-
If the previous steps all succeeded without any problem and you still cannot log in, collect the logs and contact support
193
+
If the previous steps all succeeded without any problem and you still can't log in, collect the logs and contact support
0 commit comments