Skip to content

Conversation

@zooba
Copy link
Member

@zooba zooba commented Feb 17, 2016

Provides initial structure for the tool.

zooba added a commit that referenced this pull request Feb 17, 2016
@zooba zooba merged commit 549f1be into Azure:master Feb 17, 2016
johanste added a commit that referenced this pull request Feb 29, 2016
hiaga pushed a commit to hiaga/azure-cli that referenced this pull request Jul 16, 2021
@italukder italukder mentioned this pull request Jan 28, 2022
lakshmikotturu pushed a commit to lakshmikotturu/azure-cli that referenced this pull request Apr 7, 2022
Jing-song referenced this pull request in zhoxing-ms/azure-cli Feb 16, 2023
sturrent added a commit to sturrent/azure-cli that referenced this pull request Oct 21, 2025
…gnostics

Issue Azure#1: Duplicate 'Found route table' messages
- RouteTableAnalyzer was called twice: once in Phase 3, once in Phase 4
- Outbound analyzer now receives pre-computed route_table_analysis from orchestrator
- Removed redundant _analyze_node_subnet_udrs() method
- Result: Route tables analyzed once, cleaner execution output

Issue Azure#2: Misleading API server connectivity failure recommendation
- CONNECTIVITY_API_SERVER_FAILURE always recommended DNS fixes
- Now checks if DNS test passed before recommending DNS troubleshooting
- If DNS passed but API server failed: recommends firewall/NSG/port 443 checks
- If DNS failed or no DNS test: recommends DNS configuration fixes
- Result: More accurate, context-aware recommendations

User-reported issues from aks-fw cluster (userDefinedRouting with blocked firewall):
1. 'az aks net-diagnostics -n aks-fw -g aks-fw-rg' showed 3x 'Found route table'
2. Probe test with working DNS but blocked HTTPS incorrectly suggested DNS issues

Both issues now resolved and validated.
sturrent added a commit to sturrent/azure-cli that referenced this pull request Oct 21, 2025
Issue Azure#1: Silent test execution
- Phase 9 (connectivity tests) was silent - users saw no feedback during test execution
- Changed logger.info() to logger.warning() for test execution messages
- Now shows: '  Running test: X' followed by '[PASSED]' or '[FAILED] - reason'
- Provides immediate feedback as each test completes

Issue Azure#2: Noisy summary with 'Errors: 0'
- Summary always showed 'Passed: X, Failed: Y, Errors: Z' even when Z=0
- Modified breakdown to only show non-zero components
- Example: 'Passed: 2, Failed: 2' instead of 'Passed: 2, Failed: 2, Errors: 0'
- Cleaner, less cluttered output

User feedback from testing aks-fw cluster (userDefinedRouting with firewall):
1. '[9/9] Running connectivity tests...' followed by silence was confusing
2. 'Errors: 0' in summary was noise and didn't add value

Both issues now resolved. Test execution is visible and summary is cleaner.
sturrent added a commit to sturrent/azure-cli that referenced this pull request Oct 24, 2025
Bug Azure#1: Severity Display Inconsistency
- Fixed report_generator.py to map severity correctly in summary mode
- Now shows [CRITICAL] vs [ERROR] labels based on actual severity
- Before: All critical findings showed as [ERROR]
- After: Critical findings show as [CRITICAL], errors as [ERROR]

Bug Azure#2: Missing VNet Link Detection
- Implemented _get_cluster_vnets_with_dns() method in misconfiguration_analyzer.py
- Was stub method that always returned empty list
- Now parses agent pool VNet subnet IDs and queries VNet DNS configuration
- Fixed parameter passing - cluster_info now passed to helper methods
- Updated method signatures:
  * _analyze_private_dns_issues()
  * _check_system_private_dns_issues()
  * _check_dns_server_vnet_links()
  * _get_cluster_vnets_with_dns()

Test Results:
- Severity labels now display correctly in summary mode
- VNet link detection works for private clusters with custom DNS
- Successfully detects when DNS server host VNet is not linked to private DNS zone

Updated PHASE7-PROGRESS.md with detailed bug reports and fixes
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant