Skip to content

Commit 1cd03ba

Browse files
author
Kimmo Forss
committed
Acrolinc fixes
1 parent 7f29b64 commit 1cd03ba

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

articles/sap/automation/troubleshooting.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This section describes how to troubleshoot issues that you can encounter when pe
4444

4545
### Unable to access keyvault: XXXXX error
4646

47-
If you see an error similar to the following when running the deployment:
47+
If you see an error similar to the following error when running the deployment:
4848

4949
```text
5050
Unable to access keyvault: XXXXYYYYDEP00userBEB
@@ -55,7 +55,7 @@ This error indicates that the specified key vault doesn't exist or that the depl
5555

5656
Depending on the deployment stage, you can resolve this issue in the following ways:
5757

58-
You can either add the IP of the environment from which you're executing the deployment (recommended) or you can allow public access to the key vault. See [Allow public access to a key vault](/azure/key-vault/general/network-security#allow-public-access-to-a-key-vault) for more information.
58+
You can either add the IP of the environment from which you're executing the deployment (recommended) or you can allow public access to the key vault. For more information about controlling access to the key vault, see [Allow public access to a key vault](/azure/key-vault/general/network-security#allow-public-access-to-a-key-vault).
5959

6060
The following variables are used to configure the key vault access:
6161

@@ -66,7 +66,7 @@ public_network_access_enabled = true
6666

6767
### Failed to get existing workspaces error
6868

69-
If you see an error similar to the following when running the deployment:
69+
If you see an error similar to the following error when running the deployment:
7070

7171
```text
7272
Error: : Error retrieving keys for Storage Account "mgmtweeutfstate###": azure.BearerAuthorizer#WithAuthorization: Failed to refresh the Token for request to
@@ -77,7 +77,7 @@ http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&cli
7777

7878
This error indicates that the credentials used to do the deployment doesn't have access to the storage account. To resolve this issue, assign the 'Storage Account Contributor' role to the deployment credential on the terraform state storage account, the resource group or the subscription (if feasible).
7979

80-
You can verify if the deployment is being performed using a service principal or a managed identity by checking the output of the deployment. If the deployment is using a service principal, the output will contain the following:
80+
You can verify if the deployment is being performed using a service principal or a managed identity by checking the output of the deployment. If the deployment is using a service principal, the output contains the following section:
8181

8282
```text
8383
[set_executing_user_environment_variables]: Identifying the executing user and client
@@ -96,7 +96,7 @@ You can verify if the deployment is being performed using a service principal or
9696

9797
Look for the following line in the output: "ARM_USE_MSI: false"
9898

99-
If the deployment is using a managed identity, the output will contain the following:
99+
If the deployment is using a managed identity, the output contains the following section:
100100

101101
```text
102102
@@ -125,7 +125,7 @@ az role assignment create --assignee ${appId} \
125125
--scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/MGMT-WEEU-SAP_LIBRARY/providers/Microsoft.Storage/storageAccounts/mgmtweeutfstate###
126126
```
127127

128-
You may also need to assign the reader role to the deployment credential on the subscription containing the resource group with the Terrafrom state file. You can do that with the following command:
128+
You may also need to assign the reader role to the deployment credential on the subscription containing the resource group with the Terraform state file. You can do that with the following command:
129129

130130
```cloudshell-interactive
131131
export appId="<ARM_CLIENT_ID>"
@@ -137,7 +137,7 @@ az role assignment create --assignee ${appId} \
137137

138138

139139
### OverconstrainedAllocationRequest error
140-
If you see an error similar to the following when running the deployment:
140+
If you see an error similar to the following error when running the deployment:
141141

142142
```text
143143
Virtual Machine Name: "devsap01app01": Code="OverconstrainedAllocationRequest" Message="Allocation failed. VM(s) with the following constraints cannot be allocated, because the condition is too restrictive. Please remove some constraints and try again. Constraints applied are:
@@ -170,7 +170,7 @@ If you see an error similar to the following message when running the deployment
170170
ERROR! this task 'ansible.builtin.command' has extra params, which is only allowed in the following modules: set_fact, shell, include_tasks, win_shell, import_tasks, import_role, include, win_command, command, include_role, meta, add_host, script, group_by, raw, include_vars
171171
```
172172

173-
This error indicates that the task isn't supported by the version of Ansible that is installed. To resolve this issue, upgrade to the latest version of Ansible on the agent virtual machine.
173+
This error indicates that the task isn't supported by the version of Ansible installed on the agent. To resolve this issue, upgrade to the latest version of Ansible on the agent virtual machine.
174174

175175
## Software download
176176

@@ -193,7 +193,7 @@ If you see an error similar to the following message when running the Azure Pipe
193193
##[error]Bash exited with code '2'.
194194
```
195195

196-
This error indicates that the configured personal access token doesn't have permissions to access the variable group. Ensure that the personal access token has the **Read & manage** permission for the variable group and that it hasn't expired. The personal access token is configured in the Azure DevOps pipeline variable groups either as 'PAT' in the control plane variable group or as WZ_PAT in the workload zone variable group.
196+
This error indicates that the configured personal access token doesn't have permissions to access the variable group. Ensure that the personal access token has the **Read & manage** permission for the variable group and that it's still valid. The personal access token is configured in the Azure DevOps pipeline variable groups either as 'PAT' in the control plane variable group or as 'WZ_PAT' in the workload zone variable group.
197197

198198

199199
## Next step

0 commit comments

Comments
 (0)