I have used this link and tried to setup grafana to fetch data from azure monitoring datasource.
But the dashboard provided not showing any details.
I did even tested when creating data source.
Any suggestions on monitoring aks clusters.
I have used this link and tried to setup grafana to fetch data from azure monitoring datasource.
But the dashboard provided not showing any details.
I did even tested when creating data source.
Any suggestions on monitoring aks clusters.
We have azure kubernetes cluster and database managed service in postgres azure flexible servers.
Created terraform templates to automate environment setup. But there is no option in azure devops to spin up a new cluster build job. So kept a single pipeline at present which just manages a single cluster
After that, need to manually create a service connection to this cluster which can be used in release pipelines added.
Is there anyway to automate the service connection creation part also?
And is there any architecture you can suggest for the automation
If I create a VM directly with azure portal and create new vnet,subnet and allow RDP from it. It is working.
But if I follow below process, I am getting issue.
I have created a vnet using below command.
az network vnet create -g TestingTFCLI -n myVNET --address-prefixes 10.0.0.0/8
Then created NSG using below command.
az network nsg create -g TestingTFCLI -n MyNsg --tags super_secure no_80 no_22
Then subnet using below command.
az network vnet subnet create -n mySubNet -g TestingTFCLI --vnet-name myVNET --address-prefixes 10.240.0.0/16 --network-security-group MyNsg
After that, when I try to add NSG rule with below command I am getting error as shown below.
az network nsg rule create -g TestingTFCLI --nsg-name MyNsg -n MyNsgRule --destination-port-ranges 3389 --access Allow --protocol Tcp --description "Allow RDP" --priority 500
Failed to create security rule 'Port_8080'. Error: Resource 'Port_8080' was disallowed by policy. Policy identifiers: '[{"policyAssignment":{"name":"Deny-RDP-from-Internet","id":"/providers/Microsoft.Management/managementGroups/QSFT-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-RDP-from-internet"},"policyDefinition":{"name":"RDP access from the Internet should be blocked","id":"/providers/Microsoft.Management/managementGroups/QSFT/providers/Microsoft.Authorization/policyDefinitions/Deny-RDP-From-Internet"}}]'.
So, I did'nt add this rule and created VM directly from azure portal. But this time, I didn't select this NSG for VM, instead created another at VM creation screen.
But still can't able to access it.
So, I tried to add ICMP rule to test there from the network section of VM. But getting below error again.
I am installing applications as part of OS task sequence in windows 10 and got below message and the installation is skipped.
My application:
The OS filter is not kept, how to fix this?
I have kept vbscript with just messagebox in mdt after validate section and it got executed.
Similarly I kept another vbscript after that calling an API and able to retrieve the result from it also.
Is there anyway to exit the complete task sequence based on the value of this api result?
If possible to set an exact message there also like we wantedly exited the MDT.
My script.
Option Explicit
MsgBox("from 2 psdsss")
Dim restReq, url, userName, password
Set restReq = CreateObject("Microsoft.XMLHTTP")
' Replace <node> with the address of your INSTEON device
' Additionally, any REST command will work here
url = "http://20.117.158.5:80/machines/1"
' If auth is required, replace the userName and password values
' with the ones you use on your ISY
userName = "admin"
password = "<yourpassword>"
restReq.open "GET", url, false, userName, password
restReq.send
MsgBox(restReq.responseText)
WScript.echo restReq.responseText
My task sequence snap for reference: snap
In mdt task sequence as first step (before OS install), with system macaddress/machine serial number can we do API call and check task seqnce to continue or stop based on its value retruned from API?
Able to call API as post configuration step after OS install but not before it
We have a docker swarm setup on four aws ec2 ubuntu machines. Two of them acting as managers.
Now, instead of managing ourselves, we want to port to a managed service like aks/eks for kubernetes.
I am not able to find any so far, so thought to migrate our work loads to kubernetes.
As part of that, we are running docker service command for different databases so that whenever a test database is required(postgres,oracle,mysql,etc) we run a command in docker swarm to create a service and we get a random port which we connect using the manager public ip.
Example:
for postgres:
docker service create --name postgres_31 -p target=5432 -e POSTGRES_PASSWORD=mysecretpassword -e POSTGRES_USER=admin -e POSTGRES_DB=testdb -d postgres:9.6.18
The above will create a random port for postgres for 5432 port
like below it generated 30048
So, the user connects with public ip of manager node and port 30048 which will redirect to 5432 port of database.
docker service ls
p45fazswicxc postgres_31 replicated 1/1 postgres:13 *:30048->5432/tcp
In this way, we used to create multiple databases of postgres (or other databases) on swarm (for testing purposes for dev team).
How to replicate this environment on kubernetes?
In kubernetes, it seems it generates separate public IP for the load balancer type service for each deployment, but we need a single one. I thought of keeping an azure load balancer externally and redirect all, but the configuration is for http only I guess and can be only for a single port not with multiple random ports, correct me if I am wrong.
I have created a linux centos machine on azure cloud using terraform.
I tried to see the content of private key so I can connect later using output variable.
But, I got error as I need to set it as sensitive and I did the same and the outputs is shown as below.
Apply complete! Resources: 15 added, 0 changed, 0 destroyed.
Outputs:
tls_private_key = <sensitive>
How to get the private key content then? My terraform files link
It seems I can retrieve that from state file but it has all the lines kept with \n and I need to manually replace all of them one by one with new line from editor like vscode.
Any other suugestions?
I followed the steps provided in this link.
I ran below commands on my ubuntu machine docker installed.
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 20.04.3 LTS
Release: 20.04
Codename: focal
To setup cluster:
docker run -d --name="rabbit1" --hostname="rabbit1" -e RABBITMQ_ERLANG_COOKIE="secret string" -e RABBITMQ_NODENAME="rabbit1" --volume=/home/userone/rabbitmq.config:/etc/rabbitmq/rabbitmq.config --volume=/home/userone/definitions.json:/etc/rabbitmq/definitions.json --publish="4369:4369" --publish="5671:5671" --publish="5672:5672" --publish="15671:15671" --publish="15672:15672" --publish="25672:25672" rabbitmq:3-management
docker run -d --name="rabbit2" --hostname="rabbit2" -e RABBITMQ_ERLANG_COOKIE="secret string" -e RABBITMQ_NODENAME="rabbit2" --volume=/home/userone/rabbitmq.config:/etc/rabbitmq/rabbitmq.config --volume=/home/userone/definitions.json:/etc/rabbitmq/definitions.json --link="rabbit1:rabbit1" rabbitmq:3-management
docker run -d --name="rabbit3" --hostname="rabbit3" -e RABBITMQ_ERLANG_COOKIE="secret string" -e RABBITMQ_NODENAME="rabbit3" --volume=/home/userone/rabbitmq.config:/etc/rabbitmq/rabbitmq.config --volume=/home/userone/definitions.json:/etc/rabbitmq/definitions.json --link="rabbit1:rabbit1" --link="rabbit2:rabbit2" rabbitmq:3-management
But it is showing single node in the rabbitmq page.
We have a kubernetes cluster running in our environment, I have used the export template option and got the json file.
But the template is not usable as it is having hard coded values of subscription and resoure ids.
Can anyone please suggest how to make it usable. I am completely new to azure ARM templates.
My template:
{
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"resourceName": {
"type": "string",
"metadata": {
"description": "The name of the Managed Cluster resource."
}
},
"location": {
"type": "string",
"metadata": {
"description": "The location of AKS resource."
}
},
"dnsPrefix": {
"type": "string",
"metadata": {
"description": "Optional DNS prefix to use with hosted Kubernetes API server FQDN."
}
},
"osDiskSizeGB": {
"type": "int",
"defaultValue": 0,
"metadata": {
"description": "Disk size (in GiB) to provision for each of the agent pool nodes. This value ranges from 0 to 1023. Specifying 0 will apply the default disk size for that agentVMSize."
},
"minValue": 0,
"maxValue": 1023
},
"kubernetesVersion": {
"type": "string",
"defaultValue": "1.7.7",
"metadata": {
"description": "The version of Kubernetes."
}
},
"networkPlugin": {
"type": "string",
"allowedValues": [
"azure",
"kubenet"
],
"metadata": {
"description": "Network plugin used for building Kubernetes network."
}
},
"enableRBAC": {
"type": "bool",
"defaultValue": true,
"metadata": {
"description": "Boolean flag to turn on and off of RBAC."
}
},
"vmssNodePool": {
"type": "bool",
"defaultValue": false,
"metadata": {
"description": "Boolean flag to turn on and off of virtual machine scale sets"
}
},
"windowsProfile": {
"type": "bool",
"defaultValue": false,
"metadata": {
"description": "Boolean flag to turn on and off of virtual machine scale sets"
}
},
"enablePrivateCluster": {
"type": "bool",
"defaultValue": false,
"metadata": {
"description": "Enable private network access to the Kubernetes cluster."
}
},
"enableHttpApplicationRouting": {
"type": "bool",
"defaultValue": true,
"metadata": {
"description": "Boolean flag to turn on and off http application routing."
}
},
"enableAzurePolicy": {
"type": "bool",
"defaultValue": false,
"metadata": {
"description": "Boolean flag to turn on and off Azure Policy addon."
}
},
"enableOmsAgent": {
"type": "bool",
"defaultValue": true,
"metadata": {
"description": "Boolean flag to turn on and off omsagent addon."
}
},
"workspaceRegion": {
"type": "string",
"defaultValue": "East US",
"metadata": {
"description": "Specify the region for your OMS workspace."
}
},
"workspaceName": {
"type": "string",
"metadata": {
"description": "Specify the name of the OMS workspace."
}
},
"omsWorkspaceId": {
"type": "string",
"metadata": {
"description": "Specify the resource id of the OMS workspace."
}
},
"omsSku": {
"type": "string",
"defaultValue": "standalone",
"allowedValues": [
"free",
"standalone",
"pernode"
],
"metadata": {
"description": "Select the SKU for your workspace."
}
},
"networkPolicy": {
"type": "string",
"metadata": {
"description": "Network policy used for building Kubernetes network."
}
},
"vnetSubnetID": {
"type": "string",
"metadata": {
"description": "Resource ID of virtual network subnet used for nodes and/or pods IP assignment."
}
},
"serviceCidr": {
"type": "string",
"metadata": {
"description": "A CIDR notation IP range from which to assign service cluster IPs."
}
},
"dnsServiceIP": {
"type": "string",
"metadata": {
"description": "Containers DNS server IP address."
}
},
"dockerBridgeCidr": {
"type": "string",
"metadata": {
"description": "A CIDR notation IP for Docker bridge."
}
}
},
"resources": [
{
"apiVersion": "2021-02-01",
"dependsOn": [
"[concat('Microsoft.Resources/deployments/', 'WorkspaceDeployment-20211130231648')]",
"Microsoft.Network/virtualNetworks/trst-vnet"
],
"type": "Microsoft.ContainerService/managedClusters",
"location": "[parameters('location')]",
"name": "[parameters('resourceName')]",
"properties": {
"kubernetesVersion": "[parameters('kubernetesVersion')]",
"enableRBAC": "[parameters('enableRBAC')]",
"dnsPrefix": "[parameters('dnsPrefix')]",
"agentPoolProfiles": [
{
"name": "agentpool",
"osDiskSizeGB": "[parameters('osDiskSizeGB')]",
"count": 1,
"enableAutoScaling": true,
"minCount": 1,
"maxCount": 2,
"vmSize": "Standard_B4ms",
"osType": "Linux",
"storageProfile": "ManagedDisks",
"type": "VirtualMachineScaleSets",
"mode": "System",
"maxPods": 110,
"availabilityZones": [
"1",
"2",
"3"
],
"vnetSubnetID": "[parameters('vnetSubnetID')]"
}
],
"networkProfile": {
"loadBalancerSku": "standard",
"networkPlugin": "[parameters('networkPlugin')]",
"networkPolicy": "[parameters('networkPolicy')]",
"serviceCidr": "[parameters('serviceCidr')]",
"dnsServiceIP": "[parameters('dnsServiceIP')]",
"dockerBridgeCidr": "[parameters('dockerBridgeCidr')]"
},
"apiServerAccessProfile": {
"enablePrivateCluster": "[parameters('enablePrivateCluster')]"
},
"addonProfiles": {
"httpApplicationRouting": {
"enabled": "[parameters('enableHttpApplicationRouting')]"
},
"azurepolicy": {
"enabled": "[parameters('enableAzurePolicy')]"
},
"omsAgent": {
"enabled": "[parameters('enableOmsAgent')]",
"config": {
"logAnalyticsWorkspaceResourceID": "[parameters('omsWorkspaceId')]"
}
}
}
},
"tags": {
"Owner": "[email protected]",
"purpose": "automation of mart server"
},
"identity": {
"type": "SystemAssigned"
}
},
{
"type": "Microsoft.Resources/deployments",
"name": "SolutionDeployment-20211130231648",
"apiVersion": "2017-05-10",
"resourceGroup": "[split(parameters('omsWorkspaceId'),'/')[4]]",
"subscriptionId": "[split(parameters('omsWorkspaceId'),'/')[2]]",
"properties": {
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"apiVersion": "2015-11-01-preview",
"type": "Microsoft.OperationsManagement/solutions",
"location": "[parameters('workspaceRegion')]",
"name": "[concat('ContainerInsights', '(', split(parameters('omsWorkspaceId'),'/')[8], ')')]",
"properties": {
"workspaceResourceId": "[parameters('omsWorkspaceId')]"
},
"plan": {
"name": "[concat('ContainerInsights', '(', split(parameters('omsWorkspaceId'),'/')[8], ')')]",
"product": "[concat('OMSGallery/', 'ContainerInsights')]",
"promotionCode": "",
"publisher": "Microsoft"
}
}
]
}
},
"dependsOn": [
"[concat('Microsoft.Resources/deployments/', 'WorkspaceDeployment-20211130231648')]"
]
},
{
"type": "Microsoft.Resources/deployments",
"name": "WorkspaceDeployment-20211130231648",
"apiVersion": "2017-05-10",
"resourceGroup": "[split(parameters('omsWorkspaceId'),'/')[4]]",
"subscriptionId": "[split(parameters('omsWorkspaceId'),'/')[2]]",
"properties": {
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"apiVersion": "2015-11-01-preview",
"type": "Microsoft.OperationalInsights/workspaces",
"location": "[parameters('workspaceRegion')]",
"name": "[parameters('workspaceName')]",
"properties": {
"sku": {
"name": "[parameters('omsSku')]"
}
}
}
]
}
}
},
{
"type": "Microsoft.Resources/deployments",
"name": "ClusterMonitoringMetricPulisherRoleAssignmentDepl-20211130231648",
"apiVersion": "2017-05-10",
"resourceGroup": "trst",
"subscriptionId": "ae642de8-dea6-4c85-887e-6b6c2ea9a2db",
"properties": {
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"type": "Microsoft.ContainerService/managedClusters/providers/roleAssignments",
"apiVersion": "2018-01-01-preview",
"name": "trstcluster/Microsoft.Authorization/8d6b2f7b-830e-4a4d-a644-084673fbee7a",
"properties": {
"roleDefinitionId": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '3913510d-42f4-4e42-8a64-420c390055eb')]",
"principalId": "[reference(parameters('resourceName')).addonProfiles.omsAgent.identity.objectId]",
"scope": "/subscriptions/ae642de8-dea6-4c85-887e-6b6c2ea9a2db/resourceGroups/trst/providers/Microsoft.ContainerService/managedClusters/trstcluster"
}
}
]
}
},
"dependsOn": [
"/subscriptions/ae642de8-dea6-4c85-887e-6b6c2ea9a2db/resourceGroups/trst/providers/Microsoft.ContainerService/managedClusters/trstcluster"
]
},
{
"apiVersion": "2020-11-01",
"name": "trst-vnet",
"type": "Microsoft.Network/virtualNetworks",
"location": "centralindia",
"properties": {
"subnets": [
{
"name": "default",
"id": "/subscriptions/ae642de8-dea6-4c85-887e-6b6c2ea9a2db/resourceGroups/trst/providers/Microsoft.Network/virtualNetworks/trst-vnet/subnets/default",
"properties": {
"addressPrefix": "10.240.0.0/16"
}
}
],
"addressSpace": {
"addressPrefixes": [
"10.0.0.0/8"
]
}
},
"tags": {}
},
{
"type": "Microsoft.Resources/deployments",
"name": "ClusterSubnetRoleAssignmentDeployment-20211130231648",
"apiVersion": "2017-05-10",
"resourceGroup": "trst",
"subscriptionId": "ae642de8-dea6-4c85-887e-6b6c2ea9a2db",
"properties": {
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {},
"variables": {},
"resources": [
{
"type": "Microsoft.Network/virtualNetworks/subnets/providers/roleAssignments",
"apiVersion": "2018-09-01-preview",
"name": "trst-vnet/default/Microsoft.Authorization/47b6d7b9-cf3c-4b8c-890f-6e938f052be9",
"properties": {
"roleDefinitionId": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Authorization/roleDefinitions/', '4d97b98b-1d4f-4787-a291-c67834d212e7')]",
"principalId": "[reference(parameters('resourceName'),'2021-02-01','Full').identity.principalId]",
"scope": "/subscriptions/ae642de8-dea6-4c85-887e-6b6c2ea9a2db/resourceGroups/trst/providers/Microsoft.Network/virtualNetworks/trst-vnet/subnets/default"
}
}
]
}
},
"dependsOn": [
"Microsoft.Network/virtualNetworks/trst-vnet"
]
}
],
"outputs": {
"controlPlaneFQDN": {
"type": "string",
"value": "[reference(concat('Microsoft.ContainerService/managedClusters/', parameters('resourceName'))).fqdn]"
}
}
}
We have an API server hosted containing device serial numbers and the other details related to business units and all.
Is it possible to get data from the API server during MDT deployment of OS on a device. It should send the device serial number as API request and in return based on the result, it should pick the machine name, OS type or task sequence from the list and even assigning admin groups and all other configurations.
Please suggest how to setup this.
We have our database either in aws rds or azure postgres or even on a different online server based on customer.
But our product will be running in azure kubernetes as a pod and service with database details in configmap.
Before we launch our app, it is mandatory that an sql file should be running in the database as preconfiguration.
What is the best approach we can set it so that we can automate this?
I have setup a private cluster in azure kubernetes.
Due to which, the helm charts are failing to install.
error details:
Error: INSTALLATION FAILED: Kubernetes cluster unreachable: Get "https://testingcluster-dns-827dc1c4.10357f00-62ec-4f3f-a2b0-6d86ccd26901.privatelink.centralindia.azmk8s.io:443/version?timeout=32s": dial tcp: lookup testingcluster-dns-827dc1c4.10357f00-62ec-4f3f-a2b0-6d86ccd26901.privatelink.centralindia.azmk8s.io: no such host
How to deploy helm charts to this private cluster of azure kubernetes?
I am trying to connect to cluster and create a namespace using github actions. And then doing the deployment using the yaml files saved in repository. Also, the acr container registry is being used here and creating a tag everytime using the short-ID of github commit. How to update the deployment to use the new tag once the push is completed.
The below run task is using static yaml files only.
name: Deploy to Cluster
uses: azure/k8s-deploy@v1
with:
manifests: |
manifests/deployment.yml
manifests/service.yml
images: |
${{ env.REGISTRY_NAME }}.azurecr.io/${{ env.APP_NAME }}:${{ github.sha }}
imagepullsecrets: |
${{ env.SECRET }}
namespace: ${{ env.NAMESPACE }}
the deployment.yaml file:
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: testingservice
spec:
replicas: 1
selector:
matchLabels:
service: testingservice
app: testingservice
template:
metadata:
labels:
service: testingservice
app: testingservice
annotations:
consul.hashicorp.com/connect-inject: "true"
consul.hashicorp.com/enable-metrics-merging: "false"
spec:
imagePullSecrets:
- name: acr-cred
containers:
- name: testingservice
image: testingserverlinux.azurecr.io/testingservice:1.8
ports:
- containerPort: 8080
name: vault-port
The image I am using above is: testingserverlinux.azurecr.io/testingservice:1.8
How to change the id from static 1.8 value to github short id everytime I build.
I am trying to connect to cluster and create a namespace using github actions. For that, I tried these steps.
In the link shared above, I first retrieved the azure service principal for connecting aks.
az ad sp create-for-rbac --name "myApp" --role contributor --scopes /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP> --sdk-auth
And then, proceeded with the steps. But, during namespace creation, I am getting error as below.
W1102 12:06:42.227952 3700 helpers.go:555] --dry-run is deprecated and can be replaced with --dry-run=client.
The connection to the server localhost:8080 was refused - did you specify the right host or port?
Error: Process completed with exit code 1.
Below is the github job failing.
> - name: Set the target Azure Kubernetes Service (AKS) cluster. uses: azure/aks-set-context@v1 with:
> creds: '${{ secrets.AZURE_CREDENTIALS }}'
> cluster-name: ${{ env.CLUSTER_NAME }}
> resource-group: ${{ env.CLUSTER_RESOURCE_GROUP }}
>
> - name: Deploy to Cluster uses: azure/k8s-deploy@v1 with:
> manifests: |
> manifests/deployment.yml
> manifests/service.yml
> images: |
> ${{ env.REGISTRY_NAME }}.azurecr.io/${{ env.APP_NAME }}:${{ github.sha }}
> imagepullsecrets: |
> ${{ env.SECRET }}
> namespace: ${{ env.NAMESPACE }}
We are creating eks clusters and other resources from terraform.
What are the policies to be given to that user account?
With terraform or cloudformation, we can apply individual permissions while creating a policy.
But how to select default predefined policies like AWSRDSReadyOnlyAccess, like these to the terraform template
I have installed consul helm repository to default namespace. Now, want to change it to a custom namespace.
So, deleted the help chart using helm uninstall command. Now, when I try to install again, getting error as CRDs are already configured earlier, need to cleanup them.
So, ran the below command to check the CRDs.
kubectl get CustomResourceDefinition --all-namespaces
NAME CREATED AT
healthstates.azmon.container.insights 2021-09-24T14:19:01Z
ingressgateways.consul.hashicorp.com 2021-09-26T13:17:13Z
servicedefaults.consul.hashicorp.com 2021-09-26T13:17:13Z
serviceintentions.consul.hashicorp.com 2021-09-26T13:17:13Z
servicerouters.consul.hashicorp.com 2021-09-26T13:17:13Z
The above CRDs, I need to cleanup all with consul as subtext.
So, I tried deleting one by one.But it got stuck there without deleting them when I ran any command below.
kubectl delete crd serviceintentions.consul.hashicorp.com
customresourcedefinition.apiextensions.k8s.io "serviceintentions.consul.hashicorp.com" deleted
I waited for 1 hour, but no response so entered ctrl+c to cancel and ran get command again, seems they are not deleted.
Please suggest how to fix this?
I have created a storage account and set in private but kept accessible to all networks. I am able to upload files there from azure portal with my account and created a container also there and uploaded a tar.gz file. tar file
But when I am trying to access this in a azure pipeline task with my account.I am getting this error when selecting the container, even after authorization of storage account and selecting the relevant storage account.
Failed to query service connection API: 'https://martserverdependencies.blob.core.windows.net/?comp=list'. Status Code: 'Forbidden', Response from server: '
AuthenticationFailed
Server failed to authenticate the request. Make sure the value of Authorization header is formed correctly including the signature. RequestId:6a53a4b6-201e-006f-4357-c6af56000000 Time:2021-10-21T08:43:27.6754851ZThe MAC signature found in the HTTP request 'xrVvrgIUTVQjAEGCEcGonVrfpq9JzVRHRo9toNwVbOs=' is not the same as any computed signature. Server used following string to sign: 'GET x-ms-date:Thu, 21 Oct 2021 08:43:27 GMT x-ms-version:2017-04-17 /martserverdependencies/ comp:list'.'
Provided a read access policy also in that container section. 142405-image.png
When I try to import windows 11/10 operating system in MDT, getting below error.
And the details: errordetail1
So, I converted install.esd to install.wim using these steps
But still getting error as below.
The same not coming on another test machine.Is there any configuration I missed. On another test machine, I am able to use install.esd itself to import OS.