Skip to content

Commit 1a0dcf3

Browse files
authored
minor editorial change
1 parent a81ec2e commit 1a0dcf3

1 file changed

Lines changed: 20 additions & 18 deletions

File tree

support/azure/virtual-machines/linux/troubleshoot-vm-boot-error.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: infrastructure-services
1010
ms.tgt_pltfrm: vm-linux
1111
ms.custom: sap:My VM is not booting, linux-related-content
1212
ms.topic: troubleshooting
13-
ms.date: 02/25/2025
13+
ms.date: 02/26/2025
1414
ms.author: divargas
1515
ms.reviewer: ekpathak, v-leedennis, v-weizhu
1616
---
@@ -68,27 +68,27 @@ See the following sections for detailed errors, possible causes, and solutions.
6868
> [!NOTE]
6969
> In the commands mentioned in the following sections, replace `/dev/sdX` with the corresponding Operating System (OS) disk device.
7070
71-
### <a id="offline-troubleshooting"></a> Reinstall GRUB and regenerate GRUB configuration file using Auto Repair (ALAR)
71+
### <a id="offline-troubleshooting"></a> Reinstall GRUB and regenerate GRUB configuration file using Azure Linux Auto Repair
7272

7373
Azure Linux Auto Repair (ALAR) scripts are part of the VM repair extension described in [Use Azure Linux Auto Repair (ALAR) to fix a Linux VM](./repair-linux-vm-using-alar.md). ALAR covers the automation of multiple repair scenarios, including GRUB rescue issues.
7474

75-
The ALAR scripts use the repair extension `repair-button` to fix GRUB issues by specifying `--button-command grubfix` for Generation 1 VMs, or `--button-command efifix` for Generation 2 VMs. This parameter triggers the automated recovery. Implement the following commands to automate the fix of common GRUB errors that could be fixed by reinstalling GRUB and regenerating the corresponding configuration file:
75+
The ALAR scripts use the repair extension `repair-button` to fix GRUB issues by specifying `--button-command grubfix` for Generation 1 VMs, or `--button-command efifix` for Generation 2 VMs. This parameter triggers the automated recovery. Implement the following commands to automate the fix of common GRUB errors by reinstalling GRUB and regenerating the corresponding configuration file:
7676

7777
* **Linux VMs without UEFI (BIOS based - Gen1):**
7878

79-
```azurecli-interactive
80-
az extension add -n vm-repair
81-
az extension update -n vm-repair
82-
az vm repair repair-button --button-command 'grubfix' --verbose $RGNAME --name $VMNAME
83-
```
79+
```azurecli-interactive
80+
az extension add -n vm-repair
81+
az extension update -n vm-repair
82+
az vm repair repair-button --button-command 'grubfix' --verbose $RGNAME --name $VMNAME
83+
```
8484
8585
* **Linux VMs with UEFI (Gen2):**
8686
87-
```azurecli-interactive
88-
az extension add -n vm-repair
89-
az extension update -n vm-repair
90-
az vm repair repair-button --button-command 'efifix' --verbose $RGNAME --name $VMNAME
91-
```
87+
```azurecli-interactive
88+
az extension add -n vm-repair
89+
az extension update -n vm-repair
90+
az vm repair repair-button --button-command 'efifix' --verbose $RGNAME --name $VMNAME
91+
```
9292
9393
> [!IMPORTANT]
9494
> Replace the resource group name `$RGNAME` and VM name `$VMNAME` accordingly.
@@ -149,16 +149,18 @@ This error might be associated with one of the following issues:
149149
150150
To resolve this issue, follow the steps in [Fix /boot file system corruption](#fix-boot-file-system-corruption).
151151
152-
* GRUB boot loader is pointing to an invalid disk or partition.
152+
* GRUB boot loader points to an invalid disk or partition.
153153
154154
To resolve this issue, [reinstall GRUB and regenerate GRUB configuration file](#reinstall-grub-regenerate-grub-configuration-file).
155155
156-
* OS disk partition table issues caused by human error.
156+
* OS disk partition table issues caused by human errors.
157157
158-
To resolve such issues, follow the steps in [Error: No such partition](#no-such-partition) with recommendations to re-create the `/boot` partition if missing or created incorrectly.
158+
To resolve such issues, follow the steps in [Error: No such partition](#no-such-partition) to re-create the `/boot` partition if missing or created incorrectly.
159159
160160
### <a id="fix-boot-file-system-corruption"></a>Fix /boot file system corruption
161161
162+
To fix `/boot` file system corruption, follow these steps:
163+
162164
1. Check whether a rescue/repair VM was created. If it wasn't created, follow step 1 in [Troubleshoot GRUB rescue issue offline](#offline-troubleshooting) to create the VM.
163165
164166
2. Refer to [Troubleshoot file system corruption errors in Azure Linux](linux-recovery-cannot-start-file-system-errors.md) to resolve the corruption issues in the corresponding `/boot` partition.
@@ -338,7 +340,7 @@ If the `/boot` partition is missing, re-create it by following these steps:
338340
/dev/sdc1: UUID="<UUID>" TYPE="ext4"
339341
```
340342
341-
3. If the `/boot` file system isn't visible in `blkid` after you re-create the partition, this means that the /boot data no longer exists. You have to re-create the /boot file system (by using the same UUID and file system format that's in the `/etc/fstab` /boot entry), and then [restore its contents from a backup](/azure/backup/backup-azure-arm-restore-vms).
343+
3. If the `/boot` file system isn't visible in `blkid` after you re-create the partition, this means that the `/boot` data no longer exists. You have to re-create the `/boot` file system (by using the same UUID and file system format that's in the `/etc/fstab` `/boot` entry), and then [restore its contents from a backup](/azure/backup/backup-azure-arm-restore-vms).
342344
343345
#### <a id="re-create-boot-partition-in-gpt-systems"></a>Re-create /boot partition in GPT systems
344346
@@ -421,7 +423,7 @@ The following screenshot shows the error message:
421423
422424
:::image type="content" source="./media/troubleshoot-vm-boot-error/grub-efi-get-secure-boot-not-found.jpg" alt-text="Screenshot of grub error 'grub_efi_get_secure_boot' not found.":::
423425
424-
Linux kernel version `4.12.14`(that's used in SLES 12 SP5) doesn't support the [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) option. Therefore, if secure boot is enabled during the deployment of the VM (that is, the **Security type** field is set to [Trusted launch virtual machines](/azure/virtual-machines/trusted-launch)), the virtual machine generates the secure boot error through the console when you try to start by using this SUSE kernel version on a Gen2 VM image.
426+
Linux kernel version 4.12.14 (that's used in SLES 12 SP5) doesn't support the [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) option. Therefore, if secure boot is enabled during the deployment of the VM (that is, the **Security type** field is set to [Trusted launch virtual machines](/azure/virtual-machines/trusted-launch)), the virtual machine generates the secure boot error through the console when you try to start by using this SUSE kernel version on a Gen2 VM image.
425427
426428
### Solution
427429

0 commit comments

Comments
 (0)