You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/automation/troubleshooting.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ This section describes how to troubleshoot issues that you can encounter when pe
44
44
45
45
### Unable to access keyvault: XXXXX error
46
46
47
-
If you see an error similar to the following when running the deployment:
47
+
If you see an error similar to the following error when running the deployment:
48
48
49
49
```text
50
50
Unable to access keyvault: XXXXYYYYDEP00userBEB
@@ -55,7 +55,7 @@ This error indicates that the specified key vault doesn't exist or that the depl
55
55
56
56
Depending on the deployment stage, you can resolve this issue in the following ways:
57
57
58
-
You can either add the IP of the environment from which you're executing the deployment (recommended) or you can allow public access to the key vault. See [Allow public access to a key vault](/azure/key-vault/general/network-security#allow-public-access-to-a-key-vault) for more information.
58
+
You can either add the IP of the environment from which you're executing the deployment (recommended) or you can allow public access to the key vault. For more information about controlling access to the key vault, see [Allow public access to a key vault](/azure/key-vault/general/network-security#allow-public-access-to-a-key-vault).
59
59
60
60
The following variables are used to configure the key vault access:
If you see an error similar to the following when running the deployment:
69
+
If you see an error similar to the following error when running the deployment:
70
70
71
71
```text
72
72
Error: : Error retrieving keys for Storage Account "mgmtweeutfstate###": azure.BearerAuthorizer#WithAuthorization: Failed to refresh the Token for request to
This error indicates that the credentials used to do the deployment doesn't have access to the storage account. To resolve this issue, assign the 'Storage Account Contributor' role to the deployment credential on the terraform state storage account, the resource group or the subscription (if feasible).
79
79
80
-
You can verify if the deployment is being performed using a service principal or a managed identity by checking the output of the deployment. If the deployment is using a service principal, the output will contain the following:
80
+
You can verify if the deployment is being performed using a service principal or a managed identity by checking the output of the deployment. If the deployment is using a service principal, the output contains the following section:
81
81
82
82
```text
83
83
[set_executing_user_environment_variables]: Identifying the executing user and client
@@ -96,7 +96,7 @@ You can verify if the deployment is being performed using a service principal or
96
96
97
97
Look for the following line in the output: "ARM_USE_MSI: false"
98
98
99
-
If the deployment is using a managed identity, the output will contain the following:
99
+
If the deployment is using a managed identity, the output contains the following section:
100
100
101
101
```text
102
102
@@ -125,7 +125,7 @@ az role assignment create --assignee ${appId} \
You may also need to assign the reader role to the deployment credential on the subscription containing the resource group with the Terrafrom state file. You can do that with the following command:
128
+
You may also need to assign the reader role to the deployment credential on the subscription containing the resource group with the Terraform state file. You can do that with the following command:
129
129
130
130
```cloudshell-interactive
131
131
export appId="<ARM_CLIENT_ID>"
@@ -137,7 +137,7 @@ az role assignment create --assignee ${appId} \
137
137
138
138
139
139
### OverconstrainedAllocationRequest error
140
-
If you see an error similar to the following when running the deployment:
140
+
If you see an error similar to the following error when running the deployment:
141
141
142
142
```text
143
143
Virtual Machine Name: "devsap01app01": Code="OverconstrainedAllocationRequest" Message="Allocation failed. VM(s) with the following constraints cannot be allocated, because the condition is too restrictive. Please remove some constraints and try again. Constraints applied are:
@@ -170,7 +170,7 @@ If you see an error similar to the following message when running the deployment
170
170
ERROR! this task 'ansible.builtin.command' has extra params, which is only allowed in the following modules: set_fact, shell, include_tasks, win_shell, import_tasks, import_role, include, win_command, command, include_role, meta, add_host, script, group_by, raw, include_vars
171
171
```
172
172
173
-
This error indicates that the task isn't supported by the version of Ansible that is installed. To resolve this issue, upgrade to the latest version of Ansible on the agent virtual machine.
173
+
This error indicates that the task isn't supported by the version of Ansible installed on the agent. To resolve this issue, upgrade to the latest version of Ansible on the agent virtual machine.
174
174
175
175
## Software download
176
176
@@ -193,7 +193,7 @@ If you see an error similar to the following message when running the Azure Pipe
193
193
##[error]Bash exited with code '2'.
194
194
```
195
195
196
-
This error indicates that the configured personal access token doesn't have permissions to access the variable group. Ensure that the personal access token has the **Read & manage** permission for the variable group and that it hasn't expired. The personal access token is configured in the Azure DevOps pipeline variable groups either as 'PAT' in the control plane variable group or as WZ_PAT in the workload zone variable group.
196
+
This error indicates that the configured personal access token doesn't have permissions to access the variable group. Ensure that the personal access token has the **Read & manage** permission for the variable group and that it's still valid. The personal access token is configured in the Azure DevOps pipeline variable groups either as 'PAT' in the control plane variable group or as 'WZ_PAT' in the workload zone variable group.
0 commit comments