Skip to content

Commit 23edf25

Browse files
Merge pull request #9440 from mbifeld/main
AB#6982: Added known issue about custom boot diagnostics and notice about moving off of boot diagnostics
2 parents 42b1c6b + d2e84c4 commit 23edf25

4 files changed

Lines changed: 20 additions & 6 deletions

File tree

support/azure/virtual-machines/linux/serial-console-linux.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection: linux
1212
ms.topic: article
1313
ms.tgt_pltfrm: vm-linux
1414
ms.workload: infrastructure-services
15-
ms.date: 03/11/2025
15+
ms.date: 07/29/2025
1616
ms.author: mbifeld
1717
---
1818

@@ -89,6 +89,13 @@ By default, all subscriptions have serial console access enabled. You can disabl
8989

9090
### Use Serial Console with custom boot diagnostics storage account firewall enabled
9191

92+
> [!CAUTION]
93+
> There is a known issue where Azure Serial Console may fail to connect when a custom boot diagnostics storage account has firewall restrictions. This occurs because Azure Serial Console runs in Microsoft’s internal tenant, and firewall rules on the customer-managed storage account may block its access, even with correct permissions.
94+
> To avoid connectivity issues, either [switch to managed boot diagnostics](../windows/boot-diagnostics.md#enable-boot-diagnostics-on-existing-virtual-machine) (recommended) or remove the firewall on the custom boot diagnostics storage account.
95+
96+
> [!IMPORTANT]
97+
> By the end of 2025, Azure Serial Console will no longer utilize boot diagnostics storage accounts for establishing a connection. No customer action is required for this change. This change does not affect serial logs or screenshots.
98+
9299
Serial Console uses the storage account configured for boot diagnostics in its connection workflow. When a firewall is enabled on this storage account, the Serial Console service IPs must be added as exclusions. To do this, follow these steps:
93100

94101
1. Navigate to the settings of the custom boot diagnostics storage account firewall you have enabled.

support/azure/virtual-machines/windows/serial-console-errors.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-virtual-machines
1010
ms.topic: article
1111
ms.tgt_pltfrm: vm
1212
ms.workload: infrastructure-services
13-
ms.date: 04/07/2025
13+
ms.date: 07/29/2025
1414
ms.author: jarrettr
1515
ms.custom: sap:VM Admin - Windows (Guest OS)
1616
---
@@ -33,7 +33,7 @@ Error | Mitigation
3333
"Azure Serial Console requires boot diagnostics to be enabled. Click here to configure boot diagnostics for your virtual machine." | Ensure that the virtual machine (VM) or virtual machine scale set has [boot diagnostics](boot-diagnostics.md) enabled. When using serial console on a virtual machine scale set instance, ensure that your instance has the latest model.
3434
"Azure Serial Console requires a virtual machine to be running. Use the Start button to start your virtual machine." | The VM or virtual machine scale set instance must be in a started state to access the serial console (your VM must not be stopped or deallocated). Ensure your VM or virtual machine scale set instance is running and try again.
3535
"Azure Serial Console is not enabled for this subscription, contact your subscription administrator to enable." | The Azure Serial Console can be disabled at a subscription level. If you're a subscription administrator, you may [enable and disable the Azure Serial Console](./serial-console-enable-disable.md). If you aren't a subscription administrator, you should reach out to your subscription administrator for next steps.
36-
A "Forbidden" response was encountered when accessing this VM's boot diagnostic storage account. | This error is often caused by enabling a storage account firewall on the custom boot diagnostics account. If you're using a storage account firewall on this account, follow [Storage Account firewall configuration instructions](../linux/serial-console-linux.md#serial-console-security).
36+
A "Forbidden" response was encountered when accessing this VM's boot diagnostic storage account. | There is a known issue where Azure Serial Console may fail to connect when a custom boot diagnostics storage account has firewall restrictions. This occurs because Azure Serial Console runs in Microsoft’s internal tenant, and firewall rules on the customer-managed storage account may block its access, even with correct permissions. To avoid connectivity issues, either [switch to managed boot diagnostics](boot-diagnostics.md#enable-boot-diagnostics-on-existing-virtual-machine) (recommended) or remove the firewall on the custom boot diagnostics storage account.
3737
You don't have the required permissions to use this VM with the serial console. Ensure you have at least Virtual Machine Contributor role permissions.| The serial console access requires you to have contributor level access on your VM or virtual machine scale set. For more information, see the [overview page](serial-console-overview.md).
3838
The storage account '' used for boot diagnostics on this VM couldn't be found. Verify that boot diagnostics is enabled for this VM, this storage account has not been deleted, and you have access to this storage account. | Double check that you have not deleted the boot diagnostics storage account for your VM or virtual machine scale set
3939
The serial console connection to the VM encountered an error: 'Bad Request' (400) | This can happen if your boot diagnostics URI is incorrect. For example, "http://" was used instead of "https://". The boot diagnostics URI can be fixed with this command: `az vm boot-diagnostics enable --name vmName --resource-group rgName --storage https://<storageAccountUri>.blob.core.windows.net/`

support/azure/virtual-machines/windows/serial-console-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: azure-virtual-machines
99
ms.topic: article
1010
ms.tgt_pltfrm: vm
1111
ms.workload: infrastructure-services
12-
ms.date: 07/23/2025
12+
ms.date: 07/29/2025
1313
ms.reviewer: mbifeld, v-weizhu
1414
ms.custom: sap:VM Admin - Windows (Guest OS)
1515
---
@@ -99,7 +99,7 @@ To access the Serial Console on your VM or virtual machine scale set instance, y
9999
- Serial Console is not supported when the storage account has **Allow storage account key access** disabled.
100100

101101
> [!IMPORTANT]
102-
> Serial Console is now compatible with [managed boot diagnostics storage accounts](boot-diagnostics.md) and custom storage account firewalls.
102+
> By the end of 2025, Azure Serial Console will no longer utilize boot diagnostics storage accounts for establishing a connection. This change does not affect serial logs or screenshots.
103103
104104
## Get started with Serial Console
105105

support/azure/virtual-machines/windows/serial-console-windows.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection: windows
1111
ms.topic: article
1212
ms.tgt_pltfrm: vm-windows
1313
ms.workload: infrastructure-services
14-
ms.date: 04/29/2025
14+
ms.date: 07/29/2025
1515
ms.author: mbifeld
1616
ms.custom: sap:VM Admin - Windows (Guest OS)
1717
---
@@ -142,6 +142,13 @@ By default, all subscriptions have serial console access enabled. You can disabl
142142

143143
### Use Serial Console with custom boot diagnostics storage account firewall enabled
144144

145+
> [!CAUTION]
146+
> There is a known issue where Azure Serial Console may fail to connect when a custom boot diagnostics storage account has firewall restrictions. This occurs because Azure Serial Console runs in Microsoft’s internal tenant, and firewall rules on the customer-managed storage account may block its access, even with correct permissions.
147+
> To avoid connectivity issues, either [switch to managed boot diagnostics](boot-diagnostics.md#enable-boot-diagnostics-on-existing-virtual-machine) (recommended) or remove the firewall on the custom boot diagnostics storage account.
148+
149+
> [!IMPORTANT]
150+
> By the end of 2025, Azure Serial Console will no longer utilize boot diagnostics storage accounts for establishing a connection. No customer action is required for this change. This change does not affect serial logs or screenshots.
151+
145152
Serial Console uses the storage account configured for boot diagnostics in its connection workflow. When a firewall is enabled on this storage account, the Serial Console service IPs must be added as exclusions. To do this, follow these steps:
146153

147154
1. Navigate to the settings of the custom boot diagnostics storage account firewall you have enabled.

0 commit comments

Comments
 (0)