Skip to content

Commit ec1382a

Browse files
author
Mike Ray (Microsoft)
committed
Update for acrolinx
1 parent f9fed05 commit ec1382a

File tree

1 file changed

+14
-15
lines changed

1 file changed

+14
-15
lines changed

articles/azure-arc/data/troubleshoot-managed-instance.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.status}'
2525

2626
On each side, there are two replicas for one failover group. Check the value of `connectedState`, and `synchronizationState` for each replica.
2727

28-
If one of `connectedState` is not equal to `CONNECTED`, see the instructions under [Check parameters](#check-parameters).
28+
If one of `connectedState` isn't equal to `CONNECTED`, see the instructions under [Check parameters](#check-parameters).
2929

30-
If one of `synchronizationState` is not equal to `HEALTHY`, please focus on the instance which `synchronizationState` is not equal to `HEALTHY`". Refer to [Can't connect to Arc-enabled SQL Managed Instance](#cant-connect-to-arc-enabled-sql-managed-instance) for how to debug.
30+
If one of `synchronizationState` isn't equal to `HEALTHY`, focus on the instance which `synchronizationState` isn't equal to `HEALTHY`". Refer to [Can't connect to Arc-enabled SQL Managed Instance](#cant-connect-to-arc-enabled-sql-managed-instance) for how to debug.
3131

3232
### Check parameters
3333

@@ -60,11 +60,11 @@ Compare the results from the remote instance with the results from the local ins
6060

6161
* `partnerMI` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` has to match with `$sqlmiName` from remote instance.
6262

63-
* `sharedName` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` is optional. If it is not presented, it is same as `sourceMI`. The `sharedName` from both site should be same if presented. If it is not presented, `sourceMI` from both site should be identical.
63+
* `sharedName` from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` is optional. If it'sn't presented, it's same as `sourceMI`. The `sharedName` from both site should be same if presented. If it'sn't presented, `sourceMI` from both site should be identical.
6464

6565
* Role from `kubectl -n $nameSpace get fog $fogName -o jsonpath-as-json='{.spec}'` should be different between two sites. One side should be primary, other should be secondary.
6666

67-
If any one of above is not right, delete failover group on both sites and re-create them.
67+
If any one of above isn't right, delete failover group on both sites and re-create them.
6868

6969
If nothing is wrong, follow the instructions under [Check mirroring endpoints for both sides](#check-mirroring-endpoints-for-both-sides).
7070

@@ -80,11 +80,11 @@ kubectl -n test get services $sqlmiName-external-svc -o jsonpath-as-json='{.spec
8080

8181
* `port-mssql-mirroring` should be presented on the list. The port should be used by failover group `partnerMirroringURL` on other side.
8282

83-
If it is not, correct the mistake and retry from the beginning.
83+
If it'sn't, correct the mistake and retry from the beginning.
8484

8585
### Verify SQL Server can reach external endpoint of another site
8686

87-
Although you cannot ping mirroring endpoint of another site directly, use the following command to reach another side external endpoint of the SQL Server tabular data stream (TDS) port.
87+
Although you can't ping mirroring endpoint of another site directly, use the following command to reach another side external endpoint of the SQL Server tabular data stream (TDS) port.
8888

8989
```console
9090
kubectl exec -ti -n $nameSpace $sqlmiName-0 -c arc-sqlmi -- /opt/mssql-tools/bin/sqlcmd -S $remotePrimaryEndpoint -U $remoteUser -P $remotePassword -Q "SELECT @@ServerName"
@@ -98,9 +98,8 @@ If SQL server can use external endpoint TDS, there is a good chance it can reach
9898

9999
This section identifies specific steps you can take to troubleshoot connections to Azure Arc-enabled SQL managed instances.
100100

101-
To troubleshoot connections to resources in a failover group, see [Troubleshoot connection to Azure Arc-enabled SQL Managed Instance failover group](troubleshoot-managed-instance-connection.md).
102-
103-
You can't connect to an Azure Arc-enabled SQL Managed Instance if the instance license type is `DisasterRecovery`.
101+
> [!NOTE]
102+
> You can't connect to an Azure Arc-enabled SQL Managed Instance if the instance license type is `DisasterRecovery`.
104103
105104
### Check the managed instance status
106105

@@ -112,7 +111,7 @@ kubectl -n $nameSpace get sqlmi $sqlmiName -o jsonpath-as-json='{.status}'
112111

113112
**Results**
114113

115-
The state should be `Ready`. If it is not, you need to wait. If state is error, get the message field, collect logs, and contact support. See [Collecting the logs](#collecting-the-logs).
114+
The state should be `Ready`. If it'sn't, you need to wait. If state is error, get the message field, collect logs, and contact support. See [Collecting the logs](#collecting-the-logs).
116115

117116
### Check the routing label for stateful set
118117
The routing label for stateful set is used to route external endpoint to a matched pod. The name of the label is `role.ag.mssql.microsoft.com`.
@@ -141,7 +140,7 @@ kubectl exec -ti -n $nameSpace $sqlmiName-2 -c arc-sqlmi -- /opt/mssql-tools/bin
141140

142141
All replicas should be connected & healthy. Here is the detailed description of the query results [sys.dm_hadr_availability_replica_states](/sql/relational-databases/system-dynamic-management-views/sys-dm-hadr-availability-replica-states-transact-sql).
143142

144-
If you find it is not synchronized or not connected unexpectedly, try to kill the pod which has the problem. If problem persists, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
143+
If you find it'sn't synchronized or not connected unexpectedly, try to kill the pod which has the problem. If problem persists, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
145144

146145
> [!NOTE]
147146
> If there are some large database in the instance, the seeding process to secondary could take a while. If this happens, wait for seeding to complete.
@@ -158,7 +157,7 @@ kubectl exec -ti -n $nameSpace $sqlmiName-2 -c arc-sqlmi -- /opt/mssql-tools/bin
158157

159158
**Results**
160159

161-
You should get `ServerName` from `Listener` of SQL Server on each replicas, If you cannot, kill the pods which have the problem. If the problem persists after recovery, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
160+
You should get `ServerName` from `Listener` of each replica. If you can't get `ServerName`, kill the pods which have the problem. If the problem persists after recovery, collect logs and contact support. See [Collecting the logs](#collecting-the-logs).
162161

163162
### Check Kubernetes network connection
164163

@@ -171,7 +170,7 @@ kubectl exec -ti -n $nameSpace $sqlmiName-0 -c arc-sqlmi -- /opt/mssql-tools/bin
171170

172171
**Results**
173172

174-
You should be able to reach any Cluster IP address for the pods of stateful set from another pod. If this is not the case, please refer to [Kubernetes documentation - Cluster networking](https://kubernetes.io/docs/concepts/cluster-administration/networking/) for detailed information or get service provider to resolve the issue.
173+
You should be able to reach any Cluster IP address for the pods of stateful set from another pod. If this isn't the case, refer to [Kubernetes documentation - Cluster networking](https://kubernetes.io/docs/concepts/cluster-administration/networking/) for detailed information or get service provider to resolve the issue.
175174

176175
### Check the Kubernetes load balancer or `nodeport` services
177176

@@ -185,13 +184,13 @@ kubectl -n $nameSpace expose pod $sqlmiName-2 --port=1533 --name=ha-$sqlmiName-
185184

186185
**Results**
187186

188-
You should be able to connect to exposed external port (which has been confirmed from internal at step 3). If you cannot connect to external port, please refer to [Kubernetes documentation - Create an external load balancer](https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/) and get service provider help on the issues.
187+
You should be able to connect to exposed external port (which has been confirmed from internal at step 3). If you can't connect to external port, refer to [Kubernetes documentation - Create an external load balancer](https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/) and get service provider help on the issues.
189188

190189
You can use any client like `SqlCmd`, SQL Server Management Studio (SSMS), or Azure Data Studio (ADS) to test this out.
191190

192191
## Collecting the logs
193192

194-
If the previous steps all succeeded without any problem and you still cannot log in, collect the logs and contact support
193+
If the previous steps all succeeded without any problem and you still can't log in, collect the logs and contact support
195194

196195
### Collection controller logs
197196

0 commit comments

Comments
 (0)