Skip to content

Commit f27b65d

Browse files
committed
markdown fixes
1 parent 1f7a2b0 commit f27b65d

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

docs/infrastructure/infra-faq.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ terraform -chdir=infrastructure/terraform import -var-file ../environments/${EN
2828

2929
This happens when running terraform commands accessing the state file like [import](#import-into-terraform-state-file), `state list` or `force-unlock`.
3030

31-
```
31+
```shell
3232
Failed to load state: blobs.Client#Get: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code="KeyBasedAuthenticationNotPermitted" Message="Key based authentication is not permitted on this storage account.
3333
```
3434
@@ -44,7 +44,7 @@ ARM_USE_AZUREAD=true terraform force-unlock xxx-yyy
4444
4545
Example:
4646
47-
```
47+
```shell
4848
Running Azure CLI Login.
4949
...
5050
Attempting Azure CLI login by using OIDC...
@@ -60,7 +60,7 @@ The managed identity does not exist or Github secrets are not set correctly
6060
6161
Example:
6262
63-
```
63+
```shell
6464
Running Azure CLI Login.
6565
...
6666
Attempting Azure CLI login by using OIDC...
@@ -76,7 +76,7 @@ Federated credentials are not configured.
7676
7777
Example:
7878
79-
```
79+
```shell
8080
Running Azure CLI Login.
8181
...
8282
Attempting Azure CLI login by using OIDC...
@@ -89,21 +89,21 @@ Give the managed identity Reader role on a subscription (normally Devops)
8989
9090
Examples:
9191
92-
```
92+
```shell
9393
ERROR: TF401444: Please sign-in at least once as ***\***\xxx in a web browser to enable access to the service.
9494
Error: Process completed with exit code 1.
9595
```
9696
9797
Or
9898
99-
```
99+
```shell
100100
ERROR: TF400813: The user 'xxx' is not authorized to access this resource.
101101
Error: Process completed with exit code 1.
102102
```
103103
104104
Or
105105
106-
```
106+
```shell
107107
ERROR: VS800075: The project with id 'vstfs:///Classification/TeamProject/' does not exist, or you do not have permission to access it.
108108
Error: Process completed with exit code 1.
109109
```
@@ -120,7 +120,7 @@ The ADO group must have the "View project-level information" permission.
120120
121121
Example:
122122
123-
```
123+
```shell
124124
The pipeline is not valid. Job DeployApp: Step input azureSubscription references service connection lungrc-review which could not be found. The service connection does not exist, has been disabled or has not been authorized for use. For authorization details, refer to https://aka.ms/yamlauthz. Job DeployApp: Step input azureSubscription references service connection lungrc-review which could not be found. The service connection does not exist, has been disabled or has not been authorized for use. For authorization details, refer to https://aka.ms/yamlauthz.
125125
```
126126
@@ -132,7 +132,7 @@ The Azure service connection lungrc-[environment] is missing
132132
133133
Example:
134134
135-
```
135+
```shell
136136
ERROR: {"status":"Failed","error":{"code":"DeploymentFailed","target":"/subscriptions/xxx/providers/Microsoft.Resources/deployments/main","message":"At least one reson failed. Please list deployment operations for details. Please see https://aka.ms/arm-deployment-operations for usage details.","details":[{"code":"RoleAssignmentUpdateNotPermitted","message":"Tenprincipal ID, and scope are not allowed to be updated."},{"code":"RoleAssignmentUpdateNotPermitted","message":"Tenant ID, application ID, principal ID, and scope are not allowed to be updated."},{"cteNotPermitted","message":"Tenant ID, application ID, principal ID, and scope are not allowed to be updated."}]}}
137137
```
138138
@@ -146,7 +146,7 @@ If you can't find the right scope, follow this process:
146146
147147
- Find the role assignment id. Here: abcd-123
148148
149-
```
149+
```shell
150150
 ~ Microsoft.Authorization/roleAssignments/abcd-123 [2022-04-01]
151151
    ~ properties.principalId: "xxx" => "[reference('/subscriptions/xxx/resourceGroups/rg-mi-review-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/mi-lungrc-ado-review-uks', '2024-11-30').principalId]"
152152
```
@@ -160,15 +160,15 @@ If you can't find the right scope, follow this process:
160160
161161
Example:
162162
163-
```
163+
```shell
164164
ERROR: {"status":"Failed","error":{"code":"DeploymentFailed","target":"/subscriptions/exxx/providers/Microsoft.Resources/deployments/main","message":"At least one reson failed. Please list deployment operations for details. Please see https://aka.ms/arm-deployment-operations for usage details.","details":[{"code":"PrincipalNotFound","message":"Principal xxx does not exist in the directory xxx. Check that you have the correct principal ID. If you are creating this principal and then immediately assigning a role, this era replication delay. In this case, set the role assignment principalType property to a value, such as ServicePrincipal, User, or Group.  See https://aka.ms/docs-principaltype"}...
165165
```
166166
167167
Race condition: the managed identity is not created in time for the resources that depend on it. Solution: rerun the command.
168168
169169
### The client does not have permission
170170
171-
```
171+
```shell
172172
{"code": "InvalidTemplateDeployment", "message": "Deployment failed with multiple errors: 'Authorization failed for template resource 'xxx' of type 'Microsoft.Authorization/roleAssignments'. The client 'xxx' with object id 'xxx' does not have permission to perform action 'Microsoft.Authorization/roleAssignments/write' at scope '/subscriptions/xxx/providers/Microsoft.Authorization/roleAssignments/xxx'...
173173
```
174174
@@ -205,13 +205,13 @@ When initially creating the terraform; the pipeline will try to create a state f
205205
206206
Example:
207207
208-
```
208+
```shell
209209
Failed to get existing workspaces: containers.Client#ListBlobs: Failure sending request: StatusCode=0 -- Original Error: Get "https://salungrcpreprodtfstate.blob.core.windows.net/terraform-state?comp=list&prefix=preprod.tfstateenv%3A&restype=container": dial tcp: lookup salungrcpreprodtfstate.blob.core.windows.net on *.*.*.*:53: no such host
210210
```
211211
212212
You can check to see if the blobstorage is accessible via logging into the VDI machine and trying to do an nslookup on the blob storage account: -
213213
214-
```
214+
```shell
215215
$ nslookup salungrcpreprodtfstate.blob.core.windows.net
216216
Server: UnKnown
217217
Address: _._._._

0 commit comments

Comments
 (0)