Skip to content

Commit 8d39c16

Browse files
authored
Merge pull request #8082 from MicrosoftDocs/main
Auto push to live 2025-01-22 02:00:03
2 parents 7796fab + ba097d6 commit 8d39c16

50 files changed

Lines changed: 901 additions & 905 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

support/azure/.openpublishing.redirection.azure.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -665,6 +665,11 @@
665665
"redirect_url": "/troubleshoot/azure/virtual-machines/windows/activation-watermark-appears",
666666
"redirect_document_id": true
667667
},
668+
{
669+
"source_path": "virtual-machines/linux/linux-kernel-fails-restart-provision.md",
670+
"redirect_url": "/troubleshoot/azure/virtual-machines/linux/welcome-virtual-machines-linux",
671+
"redirect_document_id": false
672+
},
668673
{
669674
"source_path": "active-directory/adal-authenticate-android-devices-fail.md",
670675
"redirect_url": "/troubleshoot/azure/entra-id/mfa/adal-authenticate-android-devices-fail",

support/azure/azure-storage/files/security/files-troubleshoot-linux-nfs.md

Lines changed: 36 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -26,71 +26,71 @@ This article lists common issues related to NFS Azure file shares and provides p
2626

2727
## Use the Always-On Diagnostics tool
2828

29-
You can use the Always-On Diagnostics (AOD) tool to collect logs on NFSv4 and SMB Linux clients. The daemon runs in the background as a system service and can be configured to detect anomalies in a variety of sources such as dmesg logs, debug data, and error and latency metrics. It can capture data from tcpdump, nfsstat, mountstsat, and other sources, along with the system's CPU and memory usage. The tool can be useful for collecting debug information on field issues that can be hard to reproduce.
29+
You can use the Always-On Diagnostics (AOD) tool to collect logs on NFSv4 and SMB Linux clients. The daemon runs in the background as a system service and can be configured to detect anomalies in various sources, such as dmesg logs, debug data, error metrics, and latency metrics. It can capture data from tcpdump, nfsstat, mountstsat, and other sources, along with the system's CPU and memory usage. The tool is useful for collecting debug information on field issues that are difficult to reproduce.
3030

31-
AOD is currently compatible with systems running SUSE Linux Enterprise Server 15 (SLES15) and Red Hat Enterprise Linux 8 (RHEL8). Follow the appropriate installation steps.
31+
The Always-On Diagnostics tool is currently compatible with systems running SUSE Linux Enterprise Server 15 (SLES 15) and Red Hat Enterprise Linux 8 (RHEL 8). Follow the installation steps that correspond to your operating system:
3232

3333
### [RHEL](#tab/RHEL)
3434

35-
Follow these instructions to install the Always-On Diagnostics tool on Red Hat Enterprise Linux 8.
35+
In RHEL 8, follow these instructions to install the Always-On Diagnostics tool:
3636

3737
1. Download the repo config package.
38-
39-
```
40-
curl -ssl -O https://packages.microsoft.com/config/rhel/8/packages-microsoft-prod.rpm
41-
```
38+
39+
```bash
40+
curl -ssl -O https://packages.microsoft.com/config/rhel/8/packages-microsoft-prod.rpm
41+
```
4242

4343
2. Install the repo config package.
44-
45-
```
46-
sudo rpm -i packages-microsoft-prod.rpm
47-
```
44+
45+
```bash
46+
sudo rpm -i packages-microsoft-prod.rpm
47+
```
4848

4949
3. Delete the repo config package after installing and updating the package index files.
5050

51-
```
52-
rm packages-microsoft-prod.rpm
53-
sudo dnf update
54-
```
51+
```bash
52+
rm packages-microsoft-prod.rpm
53+
sudo dnf update
54+
```
5555

5656
4. Install the package.
5757

58-
```
59-
sudo dnf install aod
60-
```
58+
```bash
59+
sudo dnf install aod
60+
```
6161

6262
### [SLES](#tab/SLES)
6363

64-
Follow these instructions to install the Always-On Diagnostics tool on SUSE Linux Enterprise Server 15.
64+
In SLES 15, follow these instructions to install the Always-On Diagnostics tool:
6565

6666
1. Add the Microsoft repo. You might need to add the Microsoft repository key to your list of trusted keys.
6767

68-
```
69-
sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
70-
sudo zypper addrepo --check --refresh --name 'Microsoft' https://packages.microsoft.com/sles/15/prod microsoft
71-
```
68+
```bash
69+
sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
70+
sudo zypper addrepo --check --refresh --name 'Microsoft' https://packages.microsoft.com/sles/15/prod microsoft
71+
```
7272

7373
2. Refresh the repositories.
7474

75-
```
76-
sudo zypper refresh
77-
```
75+
```bash
76+
sudo zypper refresh
77+
```
7878

79-
3. Check if the repo has been added and the aod package is available for installation.
79+
3. Check if the repo has been added and the `aod` package is available for installation.
8080

81-
```
82-
zypper search aod
83-
```
81+
```bash
82+
zypper search aod
83+
```
8484

8585
4. Install the package.
8686

87-
```
88-
sudo zypper install aod
89-
```
87+
```bash
88+
sudo zypper install aod
89+
```
9090

9191
### [Ubuntu](#tab/Ubuntu)
9292

93-
The Always-On Diagnostics tool is not yet available for Ubuntu.
93+
The Always-On Diagnostics tool isn't currently available for Ubuntu.
9494
9595
---
9696
@@ -304,4 +304,6 @@ If you still need help, [contact support](https://portal.azure.com/?#blade/Micro
304304
- [Troubleshoot Azure Files authentication and authorization (SMB)](files-troubleshoot-linux-nfs.md)
305305
- [Troubleshoot Azure Files general SMB issues on Linux](files-troubleshoot-linux-smb.md)
306306

307+
[!INCLUDE [Third-party disclaimer](../../../../includes/third-party-disclaimer.md)]
308+
307309
[!INCLUDE [Azure Help Support](../../../../includes/azure-help-support.md)]

support/azure/azure-storage/files/security/files-troubleshoot-linux-smb.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files issues in Linux (SMB)
33
description: Troubleshooting Azure Files issues in Linux. See general issues related to SMB Azure file shares when you connect from Linux clients and possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, linux-related-content
6-
ms.date: 08/20/2024
6+
ms.date: 01/22/2025
77
ms.reviewer: kendownie, v-weizhu
88
---
99

@@ -24,75 +24,75 @@ This article lists common issues that can occur when using SMB Azure file shares
2424

2525
## Run diagnostics
2626

27-
Diagnostics tools can be helpful for ensuring that clients have the correct prerequisites and for collecting debug information on field issues that can be hard to reproduce.
27+
Diagnostics tools can help ensure that clients have the correct prerequisites and collect debug information on field issues that can be hard to reproduce.
2828

2929
### Use AzFileDiagnostics
3030

3131
You can use [AzFileDiagnostics](https://github.com/Azure-Samples/azure-files-samples/tree/master/AzFileDiagnostics/Linux) to automate symptom detection and ensure that the Linux client has the correct prerequisites. It helps set up your environment to get optimal performance.
3232

3333
### Use the Always-On Diagnostics tool
3434

35-
You can also use the Always-On Diagnostics (AOD) tool to collect logs on SMB and NFSv4 Linux clients. The daemon runs in the background as a system service and can be configured to detect anomalies in a variety of sources such as dmesg logs, debug data, and error and latency metrics. It can capture data from tcpdump, nfsstat, mountstsat, and other sources, along with the system's CPU and memory usage.
35+
You can also use the Always-On Diagnostics (AOD) tool to collect logs on SMB and NFSv4 Linux clients. The daemon runs in the background as a system service and can be configured to detect anomalies in various sources, such as dmesg logs, debug data, error metrics, and latency metrics. It can capture data from tcpdump, nfsstat, mountstsat, and other sources, along with the system's CPU and memory usage.
3636

37-
AOD is currently compatible with systems running SUSE Linux Enterprise Server 15 (SLES15) and Red Hat Enterprise Linux 8 (RHEL8). Follow the appropriate installation steps.
37+
The Always-On Diagnostics tool is currently compatible with systems running SUSE Linux Enterprise Server 15 (SLES 15) and Red Hat Enterprise Linux 8 (RHEL 8). Follow the installation steps that correspond to your operating system:
3838

3939
#### [SLES](#tab/SLES)
4040

41-
Follow these instructions to install the Always-On Diagnostics tool on SUSE Linux Enterprise Server 15.
41+
In SLES 15, follow these instructions to install the Always-On Diagnostics tool:
4242

4343
1. Add the Microsoft repo. You might need to add the Microsoft repository key to your list of trusted keys.
4444

45-
```
46-
sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
47-
sudo zypper addrepo --check --refresh --name 'Microsoft' https://packages.microsoft.com/sles/15/prod microsoft
48-
```
45+
```bash
46+
sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
47+
sudo zypper addrepo --check --refresh --name 'Microsoft' https://packages.microsoft.com/sles/15/prod microsoft
48+
```
4949

5050
2. Refresh the repositories.
5151

52-
```
53-
sudo zypper refresh
54-
```
52+
```bash
53+
sudo zypper refresh
54+
```
5555

56-
3. Check if the repo has been added and the aod package is available for installation.
56+
3. Check if the repo has been added and the `aod` package is available for installation.
5757

58-
```
59-
zypper search aod
60-
```
58+
```bash
59+
zypper search aod
60+
```
6161

6262
4. Install the package.
6363

64-
```
65-
sudo zypper install aod
66-
```
64+
```bash
65+
sudo zypper install aod
66+
```
6767

6868
#### [RHEL](#tab/RHEL)
6969

70-
Follow these instructions to install the Always-On Diagnostics tool on Red Hat Enterprise Linux 8.
70+
In RHEL 8, follow these instructions to install the Always-On Diagnostics tool:
7171

7272
1. Download the repo config package.
73-
74-
```
75-
curl -ssl -O https://packages.microsoft.com/config/rhel/8/packages-microsoft-prod.rpm
76-
```
73+
74+
```bash
75+
curl -ssl -O https://packages.microsoft.com/config/rhel/8/packages-microsoft-prod.rpm
76+
```
7777

7878
2. Install the repo config package.
79-
80-
```
81-
sudo rpm -i packages-microsoft-prod.rpm
82-
```
79+
80+
```bash
81+
sudo rpm -i packages-microsoft-prod.rpm
82+
```
8383

8484
3. Delete the repo config package after installing and updating the package index files.
8585

86-
```
87-
rm packages-microsoft-prod.rpm
88-
sudo dnf update
89-
```
86+
```bash
87+
rm packages-microsoft-prod.rpm
88+
sudo dnf update
89+
```
9090

9191
4. Install the package.
9292

93-
```
94-
sudo dnf install aod
95-
```
93+
```bash
94+
sudo dnf install aod
95+
```
9696

9797
---
9898

support/azure/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,10 +115,10 @@ productDirectory:
115115
- url: site-recovery/welcome-site-recovery.yml
116116
text: Troubleshooting articles for Site Recovery
117117
- title: Azure Virtual Desktop
118-
imageSrc: "https://learn.microsoft.com/static/ui/media/product/azure/virtual-desktop.svg"
118+
imageSrc: "https://static.docs.com/ui/media/product/azure/virtual-desktop.svg"
119119
links:
120120
- url: virtual-desktop/welcome-virtual-desktop.yml
121-
text: Troubleshoot common Azure Virtual Desktop issues
121+
text: Troubleshooting articles for Azure Virtual Desktop
122122
- title: Virtual Machines
123123
imageSrc: "https://static.docs.com/ui/media/product/azure/virtual-machine.svg"
124124
links:

support/azure/virtual-desktop/includes/include-troubleshoot-azure-ad-joined-connections-all.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,29 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Your account is configured to prevent you from using this device
97

10-
If you come across an error saying **Your account is configured to prevent you from using this device. For more information, contact your system administrator**, ensure the user account was given the [Virtual Machine User Login role](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#azure-role-not-assigned) on the VMs.
8+
If you come across an error saying:
9+
10+
> Your account is configured to prevent you from using this device. For more information, contact your system administrator.
11+
12+
Ensure the user account was given the [Virtual Machine User Login role](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#azure-role-not-assigned) on the virtual machines (VMs).
1113

1214
### The user name or password is incorrect
1315

1416
If you can't sign in and keep receiving an error message that says your credentials are incorrect, first make sure you're using the right credentials. If you keep seeing error messages, check to make sure you've fulfilled the following requirements:
1517

16-
- Have you assigned the **Virtual Machine User Login** role-based access control (RBAC) permission to the virtual machine (VM) or resource group for each user?
17-
- Does your Conditional Access policy exclude multifactor authentication requirements for the **Azure Windows VM sign-in** cloud application?
18+
- Have you assigned the Virtual Machine User Login role-based access control (RBAC) permission to the VM or resource group for each user?
19+
- Does your Conditional Access policy exclude multifactor authentication requirements for the Azure Windows VM sign-in cloud application?
1820

19-
If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms).
21+
If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms).
2022

21-
> [!IMPORTANT]
23+
> [!IMPORTANT]
2224
> VM sign-ins don't support per-user enabled or enforced Microsoft Entra multifactor authentication. If you try to sign in with multifactor authentication on a VM, you won't be able to sign in and will receive an error message.
2325
24-
If you have [integrated Microsoft Entra logs with Azure Monitor logs](/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs) to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID.
26+
If you have [integrated Microsoft Entra logs with Azure Monitor logs](/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs) to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID.
2527

2628
You can access your sign-in logs by running the following Kusto query:
2729

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Error code 2607 - We couldn't connect to the remote PC because your credentials did not work
97

10-
If you come across an error saying **We couldn't connect to the remote PC because your credentials did not work. The remote machine is AADJ joined.** with error code 2607 when using the Android client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
8+
If you come across the following error with error code 2607 when using the Android client:
9+
10+
> We couldn't connect to the remote PC because your credentials did not work. The remote machine is AADJ joined.
11+
12+
Ensure that you [enabled connections from other clients](/azure/virtual-desktop/deploy-azure-ad-joined-vm#connect-using-the-other-clients).
Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,20 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Sign in failed. Please check your username and password and try again
97

10-
If you come across an error saying **Oops, we couldn't connect to *NAME*. Sign in failed. Please check your username and password and try again.** when using the web client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
8+
If you come across the following error when using the web client:
9+
10+
> Oops, we couldn't connect to *NAME*. Sign in failed. Please check your username and password and try again.
11+
12+
Ensure that you [enabled connections from other clients](/azure/virtual-desktop/deploy-azure-ad-joined-vm#connect-using-the-other-clients).
1113

1214
### We couldn't connect to the remote PC because of a security error
1315

14-
If you come across an error saying **Oops, we couldn't connect to *NAME*. We couldn't connect to the remote PC because of a security error. If this keeps happening, ask your admin or tech support for help.**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
16+
If you come across an error:
17+
18+
> Oops, we couldn't connect to *NAME*. We couldn't connect to the remote PC because of a security error. If this keeps happening, ask your admin or tech support for help.
19+
20+
You have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,28 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### The logon attempt failed
97

10-
If you come across an error saying **The logon attempt failed** on the Windows Security credential prompt, verify the following:
8+
If you come across an error saying "The logon attempt failed" on the Windows Security credential prompt, verify the following:
119

1210
- You're using a device that is Microsoft Entra joined or Microsoft Entra hybrid joined to the same Microsoft Entra tenant as the session host.
1311
- The [PKU2U protocol is enabled](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities) on both the local PC and the session host.
14-
- [Per-user multifactor authentication is disabled](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) for the user account as it's not supported for Microsoft Entra joined VMs.
12+
- [Per-user multifactor authentication is disabled](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) for the user account as it's not supported for Microsoft Entra joined VMs.
1513

1614
### The sign-in method you're trying to use isn't allowed
1715

18-
If you come across an error saying **The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
16+
If you come across an error:
17+
18+
> The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator.
19+
20+
You have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
21+
22+
### A specified logon session does not exist. It may already have been terminated
23+
24+
If you come across an error:
1925

20-
### A specified logon session does not exist. It may already have been terminated.
26+
> An authentication error occurred. A specified logon session does not exist. It may already have been terminated.
2127
22-
If you come across an error that says, **An authentication error occurred. A specified logon session does not exist. It may already have been terminated**, verify that you properly created and configured the Kerberos server object when [configuring single sign-on](/azure/virtual-desktop/configure-single-sign-on).
28+
Verify that you properly created and configured the Kerberos server object when [configuring single sign-on](/azure/virtual-desktop/configure-single-sign-on).
-190 KB
Loading
-187 KB
Loading

0 commit comments

Comments
 (0)