Skip to content

Commit 62077cb

Browse files
author
Manika Dhiman
committed
Merge branch 'main' into md-arm-deployment
2 parents 93e9622 + 2507a02 commit 62077cb

18 files changed

+186
-92
lines changed

AKS-Arc/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,8 @@
181181
href: check-vm-sku.md
182182
- name: Connectivity issues with MetalLB
183183
href: load-balancer-issues.md
184+
- name: Troubleshoot general network validation errors
185+
href: network-validation-errors.md
184186
- name: Network validation error due to .local domain
185187
href: network-validation-error-local.md
186188
- name: Reference

AKS-Arc/disable-windows-nodepool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ az k8s-extension update --resource-group $resourceGroup --cluster-name $clusterN
9090
If for some reason you're not able to use Azure CloudShell or a machine with connectivity to Azure in order to disable Windows nodepool, you can disable Windows nodepool after connecting to any one of the Azure Local physical nodes with Remote Desktop. You must first sign in to Azure.
9191

9292
```powershell
93-
az login --use-device-code --tenant-id <Azure tenant ID>
93+
az login --use-device-code --tenant <Azure tenant ID>
9494
9595
az account set -s <subscription ID>
9696

AKS-Arc/network-validation-errors.md

Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,102 @@
1+
---
2+
title: Troubleshoot network validation errors
3+
description: Learn how to troubleshoot general network validation errors in AKS Arc.
4+
author: sethmanheim
5+
ms.author: sethm
6+
ms.topic: troubleshooting
7+
ms.date: 05/07/2025
8+
ms.reviewer: pradwivedi
9+
ms.lastreviewed: 05/06/2025
10+
11+
---
12+
13+
# Troubleshoot network validation errors
14+
15+
This article describes how to identify and resolve various network validation errors you might encounter during cluster creation. The article emphasizes the importance of pre-checks for early issue detection. These errors are detected by pre-checks designed to highlight issues early, allowing for easier resolution before the cluster is created.
16+
17+
The article summarizes error codes, their potential causes, and actionable mitigation steps to help you resolve issues effectively.
18+
19+
## CloudAgentConnectivityError
20+
21+
Error: Network validation failed during cluster creation.
22+
23+
### Description
24+
25+
Detailed message: `Not able to connect to http://cloudagent.contoso.local:50000. Error returned: action failed after 5 attempts: Get "http://cloudagent.contoso.local:50000": dial tcp: lookup http://cloudagent.contoso.local: Temporary failure in name resolution`
26+
27+
The MOC cloud agent is created using one of the IP addresses from the [Management IP pool](/azure/azure-local/plan/cloud-deployment-network-considerations#management-ip-pool) on port 5500 and the control plane node VM is given IP addresses from the Arc VM logical network. This error occurs when the MOC cloud agent is not reachable from the control plane VM, or when the DNS servers specified in the Arc VM logical network are unable to resolve the MOC cloud agent FQDN.
28+
29+
### Causes of failure
30+
31+
Logical network IP addresses can't connect to management IP pool addresses, due to:
32+
33+
- Incorrect DNS server resolution.
34+
- Firewall rules between the Arc VM logical network and the cloud agent endpoint.
35+
- The logical network is in a different VLAN than the management IP pool and there's no cross-VLAN connectivity.
36+
37+
### Mitigation
38+
39+
To resolve this error, you can take the following steps:
40+
41+
- Make sure that the DNS servers specified in the Arc VM logical network can resolve the MOC cloud agent FQDN.
42+
- Make sure that the logical network IP addresses can connect to all the management IP pool addresses on the required ports. For a detailed list of ports that need to be opened, see [AKS network port and cross-VLAN requirements](aks-hci-network-system-requirements.md#network-port-and-cross-vlan-requirements).
43+
44+
## InternetConnectivityError
45+
46+
Error: Network validation failed during cluster creation.
47+
48+
### Description
49+
50+
Detailed message: `Not able to connect to https://mcr.microsoft.com. Error returned: action failed after 5 attempts: Get "https://mcr.microsoft.com": dial tcp: lookup mcr.microsoft.com on <>: read udp <>: i/o timeout`.
51+
52+
This error indicates that the required URLs are not reachable from the AKS cluster control plane node VM.
53+
54+
### Causes of failure
55+
56+
- Control plane node VM has no outbound internet access.
57+
- Required URLs aren't allowed through the firewall.
58+
59+
### Mitigation
60+
61+
To resolve this error, ensure that the logical network IP addresses have outbound internet access. If there's a firewall, ensure that the [AKS required URLs](aks-hci-network-system-requirements.md#firewall-url-exceptions) are accessible from the Arc VM logical network.
62+
63+
## VMNotReachableError
64+
65+
Error: Network validation failed during cluster creation.
66+
67+
### Description
68+
69+
Detailed message: `VM IP : <> is not reachable from management cluster`.
70+
71+
This error indicates that the AKS cluster control plane VM is not reachable from the Arc Resource Bridge (ARB).
72+
73+
### Causes of failure
74+
75+
The Arc VM logical network is not reachable from management IP pool addresses.
76+
77+
### Mitigation
78+
79+
To resolve this error, you can take the following steps:
80+
81+
- Make sure that the management IP pool addresses can reach the logical network IP addresses.
82+
- For a detailed list of ports that need to be opened, see [AKS network port and cross-VLAN requirements](aks-hci-network-system-requirements.md#network-port-and-cross-vlan-requirements).
83+
84+
## DNSResolutionError
85+
86+
This error occurs when DNS servers specified in the Arc VM logical network can't resolve the MOC cloud FQDN or the required URLs.
87+
88+
### Causes of failure
89+
90+
DNS servers specified in a logical network can't resolve the MOC cloud FQDN or the required URLs.
91+
92+
### Mitigation
93+
94+
To resolve this error, check the DNS servers specified in the logical network so that they can resolve the MOC cloud FQDN or the required URLs.
95+
96+
## Contact Microsoft Support
97+
98+
If problems persist, [collect AKS cluster logs](get-on-demand-logs.md) before you [create a support request](aks-troubleshoot.md#open-a-support-request).
99+
100+
## Next steps
101+
102+
[Troubleshoot issues in AKS enabled by Azure Arc](aks-troubleshoot.md)

azure-local/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ items:
3535
- name: Virtual deployment
3636
href: deploy/deployment-virtual.md
3737
- name: Azure Local jumpstart
38-
href: https://arcjumpstart.com/azure_jumpstart_hcibox/getting_started
38+
href: https://jumpstart.azure.com/azure_jumpstart_localbox
3939

4040
- name: Plan
4141
items:
4242
- name: Review requirements
4343
items:
4444
- name: System requirements
4545
href: concepts/system-requirements-23h2.md
46-
- name: System requirements for Small Form Factor
46+
- name: System requirements for low capacity class
4747
href: concepts/system-requirements-small-23h2.md
4848
- name: Physical network requirements
4949
href: concepts/physical-network-requirements.md
@@ -527,9 +527,9 @@ items:
527527
- name: Migrate using SCVMM
528528
items:
529529
- name: For Hyper-V VMs
530-
href: /system-center/vmm/manage-azure-stack-hci?toc=/azure/azure-local/toc.json&bc=/azure/azure-local/breadcrumb/toc.json#migrate-vms-from-windows-server-to-azure-local-instance
530+
href: /system-center/vmm/manage-azure-stack-hci#migrate-vms-from-windows-server-to-azure-local-instance
531531
- name: For VMware VMs
532-
href: /system-center/vmm/vm-convert-vmware?toc=/azure/azure-local/toc.json&bc=/azure/azure-local/breadcrumb/toc.json
532+
href: /system-center/vmm/vm-convert-vmware
533533
- name: Migrate manually (v22H2 only)
534534
items:
535535
- name: To same hardware
@@ -711,9 +711,9 @@ items:
711711
- name: Migrate using SCVMM
712712
items:
713713
- name: For Hyper-V VMs
714-
href: /system-center/vmm/deploy-manage-azure-stack-hci?toc=/azure/azure-local/toc.json&bc=/azure/azure-local/breadcrumb/toc.json#step-8-migrate-vms-from-windows-server-to-azure-local-instance
714+
href: /system-center/vmm/deploy-manage-azure-stack-hci#step-8-migrate-vms-from-windows-server-to-azure-local-instance
715715
- name: For VMware VMs
716-
href: /system-center/vmm/deploy-manage-azure-stack-hci?toc=/azure/azure-local/toc.json&bc=/azure/azure-local/breadcrumb/toc.json#step-9-migrate-vmware-workloads-to-azure-local-instance-using-scvmm
716+
href: /system-center/vmm/deploy-manage-azure-stack-hci#step-9-migrate-vmware-workloads-to-azure-local-instance-using-scvmm
717717
- name: Concepts
718718
items:
719719
- name: Storage and systems

azure-local/concepts/firewall-requirements.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,11 @@ For a consolidated list of endpoints for Japan East that includes Azure Local, A
6565
For a consolidated list of endpoints for South Central US that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
6666
- [Required endpoints in South Central US for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/SouthCentralUSEndpoints/southcentralus-hci-endpoints.md)
6767

68+
## Required firewall URLs for Azure Local in Azure Government regions
69+
70+
For a consolidated list of endpoints for US Gov Virginia that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
71+
- [Required endpoints in US Gov Virginia for Azure Local](https://github.com/CristianEdwards/AzureStack-Tools/blob/master/HCI/usgovvirginia-hci-endpoints/usgovvirginia-hci-endpoints.md)
72+
6873
## Firewall requirements for OEMs
6974

7075
Depending on the OEM you are using for Azure Local you may need to open additional endpoints in your firewall.

azure-local/concepts/software-defined-networking.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: AnirbanPaul
55
ms.author: anpaul
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 04/17/2023
8+
ms.date: 05/06/2025
99
---
1010

1111
# Software Defined Networking (SDN) in Azure Stack HCI and Windows Server
@@ -21,7 +21,7 @@ Virtual network elements such as [Hyper-V Virtual Switch](/windows-server/virtua
2121
There are three major SDN components, and you can choose which you want to deploy: Network Controller, Software Load Balancer, and Gateway.
2222

2323
> [!NOTE]
24-
> SDN is not supported on stretched (multi-site) clusters.
24+
> SDN isn't supported on stretched (multi-site) clusters.
2525
2626
## Network Controller
2727

@@ -45,7 +45,7 @@ You have the option to [deploy SDN Network Controller using SDN Express](../mana
4545
Gateways are used for routing network traffic between a virtual network and another network, either local or remote. Gateways can be used to:
4646

4747
- Create secure site-to-site IPsec connections between SDN virtual networks and external customer networks over the internet.
48-
- Create Generic Routing Encapsulation (GRE) connections between SDN virtual networks and external networks. The difference between site-to-site connections and GRE connections is that the latter is not an encrypted connection. For more information about GRE connectivity scenarios, see [GRE Tunneling in Windows Server](/windows-server/remote/remote-access/ras-gateway/gre-tunneling-windows-server).
48+
- Create Generic Routing Encapsulation (GRE) connections between SDN virtual networks and external networks. The difference between site-to-site connections and GRE connections is that the latter isn't an encrypted connection. For more information about GRE connectivity scenarios, see [GRE Tunneling in Windows Server](/windows-server/remote/remote-access/ras-gateway/gre-tunneling-windows-server).
4949
- Create Layer 3 connections between SDN virtual networks and external networks. In this case, the SDN gateway simply acts as a router between your virtual network and the external network.
5050

5151
Gateways use [Border Gateway Protocol](/windows-server/remote/remote-access/bgp/border-gateway-protocol-bgp) to advertise GRE endpoints and establish point-to-point connections. SDN deployment creates a default gateway pool that supports all connection types. Within this pool, you can specify how many gateways are reserved on standby in case an active gateway fails.

0 commit comments

Comments
 (0)