Created on
11-25-2021
04:02 AM
Edited on
02-05-2024
01:12 AM
By
Jean-Philippe_P
Description |
This article describes, the issue with Floating IP not shift from FortiGate previous Master VM, to the new active firewall, during the HA failover.
The debug logs from AZD process on the new active firewall VM during the time of failover, shows, azd api failed with error: 403 'AuthorizationFailed':
- AZD debug on the Slave VM, during the HA Failover:
FGT-HA-Slave # diag debug application azd -1 <-----Debug messages will be on for 30 minutes. https://management.azure.com/subscriptions/<Removed String>/resourceGroups/FGT-HA-RG/providers/Microsoft.Network/publicIPAddres
|
Scope | FortiOS. |
Solution |
In case the Azure SDN connector configured with service principal, make sure to have assigned the 'Contributor' role to the service principal account, under the IAM settings of Microsoft Azure.
If the Azure SDN connector has managed identity enabled instead of service principal, make sure the system assigned managed identity is enabled for the VMs. |