Skip to content

Commit 6fae9a9

Browse files
authored
Merge pull request #15694 from MicrosoftDocs/main
8/19/2024 PM Publish
2 parents 171a755 + b4e53cb commit 6fae9a9

File tree

7 files changed

+139
-52
lines changed

7 files changed

+139
-52
lines changed

AKS-Hybrid/aks-edge-howto-setup-machine.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to prepare your machines for AKS Edge Essentials clusters
44
author: rcheeran
55
ms.author: rcheeran
66
ms.topic: how-to
7-
ms.date: 02/13/2024
7+
ms.date: 08/19/2024
88
ms.custom: template-how-to
99
---
1010

@@ -111,6 +111,5 @@ This command displays output similar to the following list:
111111

112112
## Next steps
113113

114-
- Create a [simple deployment](aks-edge-howto-single-node-deployment.md)
115-
- Create a [full deployment](aks-edge-howto-multi-node-deployment.md)
116-
114+
- [Create a single machine deployment](aks-edge-howto-single-node-deployment.md)
115+
- [Create a full Kubernetes deployment](aks-edge-howto-multi-node-deployment.md)

azure-stack/hci/concepts/physical-network-requirements.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,21 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
220220
> [!NOTE]
221221
> Guest RDMA requires both Compute (Standard) and Storage.
222222
223-
---
223+
# [SuperMicro](#tab/SuperMicro)
224+
### 23H2
225+
226+
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
227+
|----- |---| :-: | :-: | :-: | :-: |
228+
| [SSE-C4632](https://www.supermicro.com/datasheet/datasheet_SSE-C4632.pdf) <br>(10, 25, 100 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
229+
> [!NOTE]
230+
> Guest RDMA requires both Compute (Standard) and Storage.
231+
### 22H2
232+
233+
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
234+
|----- |---| :-: | :-: | :-: | :-: |
235+
| [SSE-C4632](https://www.supermicro.com/datasheet/datasheet_SSE-C4632.pdf) <br>(10, 25, 100 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
236+
> [!NOTE]
237+
> Guest RDMA requires both Compute (Standard) and Storage.
224238
225239
---
226240

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
title: Collect log files for Azure Arc VM on Azure Stack HCI
3+
description: Learn how to collect log files for an Azure Arc VM on your Azure Stack HCI system.
4+
author: alkohli
5+
ms.topic: how-to
6+
ms.date: 08/16/2024
7+
ms.author: alkohli
8+
ms.reviewer: vlakshmanan
9+
---
10+
11+
# Collect log files for Azure Arc VM on your Azure Stack HCI system
12+
13+
[!INCLUDE [hci-applies-to-23h2](../../includes/hci-applies-to-23h2.md)]
14+
15+
Collect logs and other files to identify and troubleshoot issues with Arc virtual machines (VMs) in your Azure Stack HCI system.
16+
17+
## Collect files when VM provisioning fails
18+
19+
Use these files to gather key information about a VM provisioning failure before you contact Microsoft Support for more help.
20+
21+
### Windows VMs
22+
23+
The Windows Panther folder contains Windows setup, installation, and upgrade log files. This folder also includes logs for all scripts used to customize the VM.
24+
25+
| File | Directory | Description |
26+
|-------------------|-----------------|-------------|
27+
| agent-log-0 | C:\ProgramData\mocguestagent\log\ | Operational logs |
28+
| SetupAct.log | C:\Windows\panther\ | Contains information about setup actions during the installation. |
29+
| SetupErr.log | C:\Windows\panther\ | Contains information about setup errors during the installation. |
30+
| SetupComplete.log | C:\Windows\panther\ | Contains custom scripts that run during or after the Windows Setup process. For HCI, includes enabling WinRM, enabling ssh, and installing Microsoft On-premises Cloud (MOC) guest agent. |
31+
| Script files | C:\Windows\setup\scripts\ | Scripts from ISO |
32+
| System.evtx | C:\Windows\system32\winevt\logs\ | Windows event logs |
33+
34+
### Linux VMs
35+
36+
Examine these log files to investigate a VM provisioning failure:
37+
38+
| File | Directory | Description |
39+
|-------------------|-----------------|-------------|
40+
| cloud-init-output.log | /var/log/ | Captures the output from each stage of cloud-init when it runs. |
41+
| cloud-init.log | /var/log/ | A detailed log with debugging output, detailing each action taken. |
42+
| log files | /run/cloud-init/ | Contains logs about how cloud-init decided to enable or disable itself, and what platforms/datasources were detected. These logs are most useful when trying to determine what cloud-init ran or didn't run. |
43+
44+
## Collect guest logs
45+
46+
Collect guest logs to gather information on Arc VM issues before you contact Microsoft Support.
47+
48+
### Logs inside the VM
49+
50+
Windows VM domain join and extension logs:
51+
52+
| File | Directory | Description |
53+
|-------------------|-----------------|-------------|
54+
| Netsetup.log | C:\Windows\debug\ | Netlogon logs are used for domain join failure. If you don't see a domain join error, this log is optional. |
55+
| Extension logs | C:\ProgramData\GuestConfig\extension_logs\ | Extension logs |
56+
57+
For more information, see [Active Directory domain join troubleshooting guidance](/troubleshoot/windows-server/active-directory/active-directory-domain-join-troubleshooting-guidance).
58+
59+
### MOC guest agent logs
60+
61+
MOC guest agent logs are useful when Arc VM provisioning fails with the following error:
62+
63+
`Could not establish HyperV connection for VM ID...`
64+
65+
Example error:
66+
67+
`{"code":"moc-operator virtualmachine serviceClient returned an error while reconciling: rpc error: code = Unknown desc = Could not establish HyperV connection for VM ID [E5BF0FC3-DB6D-40AA-BB46-DD94E4E0719A] within [900] seconds, error: [<nil>]","message":"moc-operator virtualmachine serviceClient returned an error while reconciling: rpc error: code = Unknown desc = Could not establish HyperV connection for VM ID [E5BF0FC3-DB6D-40AA-BB46-DD94E4E0719A] within [900] seconds, error: [<nil>]","additionalInfo":[{"type":"ErrorInfo","info":{"category":"Uncategorized","recommendedAction":"","troubleshootingURL":""}}]}`
68+
69+
#### Windows VMs
70+
71+
Examine these MOC guest agent log files:
72+
73+
| File | Directory | Description |
74+
|-------------------|-----------------|-------------|
75+
| mocguestagent.log | C:\ProgramData\mocguestagent\log\ | Critical logs |
76+
| agent-log-0 | C:\ProgramData\mocguestagent\log\ | Operational logs |
77+
78+
#### Linux VMs
79+
80+
Examine these MOC guest agent log files:
81+
82+
| File | Directory | Description |
83+
|-------------------|-----------------|-------------|
84+
| mocguestagent.service | sudo journalctl -u | Critical logs |
85+
| agent-log-0 | /opt/mocguestagent/log/ | Operational logs |
86+
87+
## Next steps
88+
89+
- [Collect logs](./collect-logs.md).

azure-stack/hci/manage/troubleshoot-arc-enabled-vms.md

Lines changed: 7 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Arc VM management
33
description: Learn how to troubleshoot Azure Arc VM management
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 07/10/2024
6+
ms.date: 07/26/2024
77
ms.author: alkohli
88
ms.reviewer: vlakshmanan
99
---
@@ -14,46 +14,17 @@ ms.reviewer: vlakshmanan
1414

1515
This article provides guidance on how to collect logs and troubleshoot issues with Azure Arc virtual machines (VMs) in your Azure Stack HCI cluster. It also lists the limitations and known issues that currently exist with Azure Arc VM management.
1616

17-
18-
## Collect logs
19-
20-
You can collect logs to identify and troubleshoot issues with Arc VMs in your Azure Stack HCI system. Use these logs to gather key information before you contact Microsoft support for additional help.
21-
22-
Make sure you have the latest PowerShell module for log collection. To update the PowerShell module, run the following command:
23-
24-
```PowerShell
25-
#Update the PowerShell module
26-
Install-Module -Name ArcHci -Force -Confirm:$false -SkipPublisherCheck -AcceptLicense
27-
```
28-
29-
To collect logs for Arc VMs in your Azure Stack HCI cluster, run the following command:
30-
31-
```PowerShell
32-
$csv_path="<input-from-admin>"
33-
$VMIP_1="<input-from-admin>"
34-
az login --use-device-code
35-
Get-ArcHCILogs -workDirectory $csv_path\ResourceBridge -kvaTokenPath $csv_path\ResourceBridge\kvatoken.tok -ip $VMIP_1
36-
```
37-
38-
Where:
39-
40-
- **$csv_path** is the full path of the cluster shared volume provided for creating Arc Resource Bridge.
41-
42-
- **$VMIP_1** is the IP address of the Arc Resource Bridge VM.
43-
44-
- Optionally, set the `-logDir` parameter to specify the path to the directory where the generated logs are stored. If you don't specify the path or the parameter, by default the logs are stored in your current working directory.
45-
4617
## Troubleshoot Azure Arc VMs
4718

4819
This section describes the errors related to Azure Arc VM management and their recommended resolutions.
4920

50-
### Failure when trying to enable guest management
21+
## Failure when trying to enable guest management
5122

5223
When trying to run the command to enable guest management, you see the following error:
5324

5425
**Error:** `Deployment failed. Correlation ID: 5d0c4921-78e0-4493-af16-dffee5cbf9d8. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
5526

56-
The above failure is because the managed identity wasn't created for this VM. System-assigned Managed Identity is required to enable guest management.
27+
This failure is because the managed identity wasn't created for this VM. System-assigned Managed Identity is required to enable guest management.
5728

5829
**Resolution:**
5930

@@ -104,13 +75,13 @@ Follow these steps to verify that the Managed Identity isn't created for this VM
10475
10576
:::image type="content" source="./media/troubleshoot-arc-enabled-vms/managed-identity-missing-3.png" alt-text="Screenshot of JSON view when Managed Identity is enabled." lightbox="./media/troubleshoot-arc-enabled-vms/managed-identity-missing-3.png":::
10677
107-
### Failure deploying an Arc VM
78+
## Failure deploying an Arc VM
10879
10980
You see the following error when trying to deploy an Arc VM on your Azure Stack HCI cluster:
11081
11182
**Error:** `{"code":"ConflictingOperation","message":"Unable to process request 'Microsoft.AzureStackHCI/virtualMachineInstances'. There is already a previous running operation for resource '/subscriptions/<subscription ID>/resourceGroups/<Resource group name>/providers/Microsoft.HybridCompute/machines/<VM name>/providers/Microsoft.AzureStackHCI/virtualMachineInstances/default'. Please wait for the previous operation to complete."}`
11283
113-
The above failure is because the `SystemAssigned` managed identity object isn't under the `Microsoft.HybridCompute/machines` resource type.
84+
This failure is because the `SystemAssigned` managed identity object isn't under the `Microsoft.HybridCompute/machines` resource type.
11485
11586
**Resolution:**
11687
@@ -120,7 +91,7 @@ The `SystemAssigned` managed identity object is under `Microsoft.HybridCompute/m
12091
12192
The deployment template should match the provided sample template. For more information, see the sample template in [Create Arc virtual machines on Azure Stack HCI](./create-arc-virtual-machines.md).
12293
123-
### Failure deleting storage path
94+
## Failure deleting storage path
12495
12596
When trying to delete a storage path on your Azure Stack HCI cluster, you might see an error similar to the following message. Resource numbers and versions may vary in your scenario.
12697
@@ -140,7 +111,7 @@ Follow these steps before trying to remove a storage path:
140111
1. Remove the associated workloads and the images present on the storage path you want to delete. Look for the following prefixes on the image names: `linux-cblmariner`, `windows-windows2019`, `windows-windows2022`, `windows_k8s`, `aks-image-merged`, `linux-K8s`.
141112
1. File a [support ticket in the Azure portal](/azure/azure-portal/supportability/how-to-create-azure-support-request).
142113
143-
### Azure CLI installation isn't recognized
114+
## Azure CLI installation isn't recognized
144115
145116
If your environment fails to recognize Azure CLI after installing it, run the following code block to add the Azure CLI installation path to the environment path.
146117

azure-stack/hci/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,8 @@ items:
291291
- name: Extended Security Updates (ESUs)
292292
href: manage/azure-benefits-esu.md
293293

294+
- name: Collect log files for Azure Arc VM
295+
href: manage/collect-log-files-arc-enabled-vms.md
294296
- name: Troubleshoot
295297
href: manage/troubleshoot-arc-enabled-vms.md
296298
- name: FAQs

azure-stack/hci/upgrade/install-solution-upgrade.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,3 +120,15 @@ Follow these steps to verify that the upgrade was successful:
120120
Here is a screenshot of the resources in the resource group:
121121

122122
:::image type="content" source="./media/install-solution-upgrade/verify-upgrade-portal.png" alt-text="Screenshot of Upgrade Azure Stack HCI resource health." lightbox="./media/install-solution-upgrade/verify-upgrade-portal.png":::
123+
124+
## Post solution upgrade tasks
125+
126+
After the solution upgrade is complete, you may need to perform additional tasks to secure your system and ensure it's ready for workloads.
127+
128+
- You may need to connect to the system via Remote Desktop Protocol (RDP) to deploy workloads. For more information, see [Enable RDP](../deploy/deploy-via-portal.md#enable-rdp).
129+
- To prevent the accidental deletion of resources, you can lock resources. We recommend that you lock the Arc Resource Bridge. For more information, see [Lock Arc Resource Bridge](../deploy/deploy-via-portal.md#lock-arc-resource-bridge).
130+
- You may need to create workloads and storage paths for each volume. For details, see [Create volumes on Azure Stack HCI](../manage/create-volumes.md) and [Create storage path for Azure Stack HCI](../manage/create-storage-path.md).
131+
132+
## Next steps
133+
134+
If you run into issues during the upgrade process, see [Troubleshoot solution upgrade on Azure Stack HCI](./troubleshoot-upgrade-to-azure-stack-hci-23h2.md).

azure-stack/hci/upgrade/validate-solution-upgrade-readiness.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Follow these steps to set up the Environment Checker on a server node of your Az
8282
1. Install the Environment Checker on the server. Run the following PowerShell command from the PSGallery:
8383

8484
```powershell
85-
Install-Module -Name AzStackHci.EnvironmentChecker -allowclobber
85+
Install-Module -Name AzStackHci.EnvironmentChecker -AllowClobber
8686
```
8787

8888
### Run the validation
@@ -98,7 +98,7 @@ Follow these steps to set up the Environment Checker on a server node of your Az
9898
1. To validate other servers in the cluster, run the following PowerShell command:
9999

100100
```powershell
101-
$PsSession=New-Pssession -computername "MyRemoteMachine"
101+
$PsSession=New-Pssession -ComputerName "MyRemoteMachine"
102102
Invoke-AzStackHciUpgradeValidation -PsSession $PsSession
103103
```
104104

@@ -159,7 +159,7 @@ $windowsFeature = @(
159159
)
160160
foreach ($feature in $windowsFeature)
161161
{
162-
install-windowsfeature -name $feature -IncludeAllSubFeature -IncludeManagementTools
162+
Install-WindowsFeature -Name $feature -IncludeAllSubFeature -IncludeManagementTools
163163
}
164164
165165
#Install requires optional Windows features
@@ -223,7 +223,7 @@ $windowsOptionalFeature = @(
223223
)
224224
foreach ($featureName in $windowsOptionalFeature)
225225
{
226-
enable-windowsoptionalfeature -featurename $featurename -all -online
226+
Enable-WindowsOptionalFeature -FeatureName $featurename -All -Online
227227
}
228228
```
229229

@@ -234,7 +234,7 @@ Ensure that all the cluster members are up and that the cluster is *Online*. Use
234234
To verify all members of the cluster are online, run the following PowerShell command:
235235

236236
```powershell
237-
Get-ClusterNode -cluster "mycluster"
237+
Get-ClusterNode -Cluster "mycluster"
238238
```
239239

240240
## Remediation 3: Suspend BitLocker
@@ -295,7 +295,7 @@ Follow these steps to confirm the storage pool configuration:
295295
1. To confirm the storage pool size and allocated size, run the following PowerShell command:
296296

297297
```powershell
298-
Get-storagepool -IsPrimordial $false
298+
Get-StoragePool -IsPrimordial $false
299299
```
300300

301301
<details>
@@ -310,7 +310,7 @@ Follow these steps to confirm the storage pool configuration:
310310
1. To list all volumes in the storage pool, run the following PowerShell command:
311311

312312
```powershell
313-
Get-storagepool -IsPrimordial $false|Get-VirtualDisk
313+
Get-StoragePool -IsPrimordial $false | Get-VirtualDisk
314314
```
315315

316316
<details>
@@ -341,10 +341,10 @@ Follow these steps to confirm the storage pool configuration:
341341
1. To convert the volume to thin provisioned, run the following PowerShell command:
342342

343343
```powershell
344-
Set-virtualdisk -FriendlyName TestVolume -ProvisioningType Thin
344+
Set-VirtualDisk -FriendlyName TestVolume -ProvisioningType Thin
345345
```
346346

347-
1. To convert the volume to thin provisioned, run the following PowerShell command. Make sure you adjust the CSV name to match your system:
347+
1. To finish the convertion, the volume must be restarted. To do this, run the following PowerShell command. Make sure you adjust the CSV name to match your system:
348348

349349
```powershell
350350
Get-ClusterSharedVolume -Name "Cluster Disk 1" | Stop-ClusterResource
@@ -362,7 +362,7 @@ Follow these steps to confirm the storage pool configuration:
362362

363363
| FriendlyName | ResiliencySettingName | FaultDomainRedundancy | OperationalStatus | HealthStatus | Size | FootprintOnPool | StorageEfficiency |
364364
|--------------|-----------------------|-----------------------|------------------|--------------|------|-----------------|------------------|
365-
|ClusterPerformanceHistory | Mirror | 1 | OK | Healthy | 21 GB | 43 GB | 48.84% |
365+
| ClusterPerformanceHistory | Mirror | 1 | OK | Healthy | 21 GB | 43 GB | 48.84% |
366366
| TestVolume | Mirror | 0 | OK | Healthy | 1 TB | 36.5 GB | 98.63% |
367367
| TestVolume2 | Mirror | 0 | OK | Healthy | 750 GB | 28.5 GB | 98.25% |
368368

@@ -404,7 +404,7 @@ Make sure that the cluster functional level and storage pool version are up to d
404404
$SubscriptionId = "Your Subscription ID"
405405
Login-AzAccount –UseDeviceAuthentication –tenantid $tenantid –subscriptionid $SubscriptionId
406406
Install-module az.connectedmachine
407-
New-AzConnectedMachineExtension -Name "AzureEdgeLifecycleManager" -ResourceGroupName $ResourceGroup -MachineName $env:COMPUTERNAME -Location $Region -Publisher "Microsoft.AzureStack.Orchestration" -ExtensionType "LcmController" -NoWait
407+
New-AzConnectedMachineExtension -Name "AzureEdgeLifecycleManager" -ResourceGroupName $ResourceGroup -MachineName $env:COMPUTERNAME -Location $Region -Publisher "Microsoft.AzureStack.Orchestration" -ExtensionType "LcmController" -NoWait
408408
```
409409

410410
## Remediation 10: Check the MOC install state

0 commit comments

Comments
 (0)