Skip to content

Commit 037a419

Browse files
authored
Update unable-connect-azure-fleet-manager.md
Edit review per CI 8945
1 parent 942e21c commit 037a419

1 file changed

Lines changed: 13 additions & 17 deletions

File tree

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Unable to connect to Azure Fleet Manager
3-
description: This article provides guidance for when you’re unable to connect to Azure Fleet Manager.
2+
title: Can't connect to Azure Fleet Manager
3+
description: This article provides guidance for actions to take when you can't connect to Azure Fleet Manager.
44
ms.date: 01/13/2026
55
ms.author: jarrettr
66
ms.reviewer: chiragpa, v-ryanberg
@@ -9,46 +9,42 @@ ms.custom: sap:Other issue or questions related to Fleet manager
99
---
1010
# Unable to connect to Azure Fleet Manager
1111

12-
This article provides guidance for when you’re unable to connect to Azure Fleet Manager.
12+
This article helps you resolve an issue that prevents you from connecting to Azure Fleet Manager.
1313

1414
## Symptoms
1515

16-
You try to connect to Azure Fleet Manager by retrieving the kubeconfig file for the Fleet Manager hub cluster. You initially run this command: 
16+
You try to connect to Azure Fleet Manager by retrieving the kubeconfig file for the Fleet Manager hub cluster. You initially run the following command: 
1717

1818
```powershell
19-
2019
az fleet get-credentials --resource-group \${GROUP} --name
21-
2220
```
2321

24-
You then run this command:
22+
Then, you run the following command:
2523

2624
```powershell
27-
2825
kubectl get pods
29-
3026
```
3127

32-
On the Fleet Manager API server, you see a prompt asking you to enter a device code in another browser to authenticate.
28+
On the Fleet Manager API server, you're prompted to enter a device code in another browser to authenticate your identity.
3329

34-
If your organization enforces Conditional Access policies that block device code flows, you might see something like the following message: “Your sign-in was successful but does not meet the criteria to access this resource. For example, you might be signing in from a browser, app, location, or an authentication flow that is restricted by your admin.”
30+
If your organization enforces Conditional Access policies that block device code flows, you might receive a message that resembles the following message:
3531

36-
The following is an example of such a message:
32+
> Your sign-in was successful but does not meet the criteria to access this resource. For example, you might be signing in from a browser, app, location, or an authentication flow that is restricted by your admin.
33+
34+
The following screenshot shows an example of this kind of message.
3735

3836
:::image type="content" source="../media/unable-connect-azure-fleet-manager/no-access-message.png" alt-text="Example of Conditional Access blocking device code flow." lightbox="../media/unable-connect-azure-fleet-manager/no-access-message.png":::
3937

4038
## Cause
4139

42-
The kubeconfig generated by `az fleet get-credentials` defaults to device code authentication. Conditional Access policies can block this flow, preventing access to the Fleet Manager API server.
40+
The kubeconfig file that's generated by the `az fleet get-credentials` command defaults to device code authentication. Conditional Access policies can block this flow and prevent access to the Fleet Manager API server.
4341

4442
## Resolution
4543

46-
Convert the kubeconfig to use Azure CLI authentication instead of device code authentication with the following command:
44+
To resolve this issue, modify kubeconfig to use Azure CLI authentication instead of device code authentication. To make this change, run the following command:
4745

4846
```powershell
49-
5047
kubelogin convert-kubeconfig -l azurecli
51-
5248
```
5349

54-
This updates the kubeconfig so that it authenticates using your existing Azure CLI sign-in session, bypassing the device code prompt.
50+
This command updates the kubeconfig file so that it authenticates by using your existing Azure CLI sign-in session. This action bypasses the device code prompt.

0 commit comments

Comments
 (0)