automation-suite
2021.10
false
- Overview
- Requirements
- Installation
- Post-installation
- Cluster administration
- Monitoring and alerting
- Migration and upgrade
- Product-specific configuration
- Best practices and maintenance
- Troubleshooting
- How to Troubleshoot Services During Installation
- How to Uninstall the Cluster
- How to clean up offline artifacts to improve disk space
- How to disable TLS 1.0 and 1.1
- How to enable Istio logging
- How to manually clean up logs
- How to clean up old logs stored in the sf-logs bucket
- How to debug failed Automation Suite installations
- How to disable TX checksum offloading
- Unable to run an offline installation on RHEL 8.4 OS
- Error in Downloading the Bundle
- Offline installation fails because of missing binary
- Certificate issue in offline installation
- SQL connection string validation error
- Failure After Certificate Update
- Automation Suite Requires Backlog_wait_time to Be Set 1
- Cannot Log in After Migration
- Setting a timeout interval for the management portals
- Update the underlying directory connections
- Kinit: Cannot Find KDC for Realm <AD Domain> While Getting Initial Credentials
- Kinit: Keytab Contains No Suitable Keys for *** While Getting Initial Credentials
- GSSAPI Operation Failed With Error: An Invalid Status Code Was Supplied (Client's Credentials Have Been Revoked).
- Login Failed for User <ADDOMAIN><aduser>. Reason: The Account Is Disabled.
- Alarm Received for Failed Kerberos-tgt-update Job
- SSPI Provider: Server Not Found in Kerberos Database
- Failure to get the sandbox image
- Pods not showing in ArgoCD UI
- Redis Probe Failure
- RKE2 Server Fails to Start
- Secret Not Found in UiPath Namespace
- ArgoCD goes into progressing state after first installation
- Unexpected Inconsistency; Run Fsck Manually
- Missing Self-heal-operator and Sf-k8-utils Repo
- Degraded MongoDB or Business Applications After Cluster Restore
- Unhealthy Services After Cluster Restore or Rollback
- Using the Automation Suite Diagnostics Tool
- Using the Automation Suite support bundle
- Exploring Logs
Azure deployment architecture

OUT OF SUPPORT
Automation Suite installation guide
Last updated Feb 24, 2025
Azure deployment architecture
This page offers insight into the deployment architecture on Azure along with the required components.
- User Assigned Identity (
Microsoft.ManagedIdentity/userAssignedIdentities
) – configured on the server virtual machine scale set and used for the following:- to allow the server virtual machine scale set to query the VMSS and identify the first server where the installation will run;
- to validate if the hardware requirements and quotas on the subscription are met.
- Role assignment, reader (
Microsoft.Authorization/roleAssignments
) – used to allow the managed identity to perform the aforementioned operations. -
Deployment Scripts (
Microsoft.Resources/deploymentScripts
):- one executed at the beginning of the deployment to validate the configuration selected (quota, availability, etc.);
- one executed at the end of the deployment to validate the status of the deployment since some tasks are asyncronous.
- Key Vault (
Microsoft.KeyVault/vaults
) – used to store various usernames and secrets (e.g.: SQL username and password, ArgoCD password). - SQL Server (
Microsoft.Sql/servers
) – the server used to create the SQL databases. - SQL Databases (
Microsoft.Sql/servers/databases
) – the databases needed for each enabled service. -
Virtual machine scale sets (
Microsoft.Compute/virtualMachineScaleSets
) – the nodes of the cluster.- one scale set is used for server nodes (cluster control plane). Server nodes also run workloads and have a dedicated data
disk. They also have the Identity assigned (User Assigned Identity). Disks for each node:
- 256GiB OS disk (
Premium_LRS
) - 256GiB binaries disk (
Premium_LRS
) - 512GiB or 2TiB data disk (basic or complete,
Premium_LRS
) - 16GiB
UltraSSD_LRS
if enabled otherwisePremium_LRS
- 256GiB OS disk (
- one scale set is used for agent nodes. Designed to only run workloads (they have no control plane services). If the number
of desired Agent nodes is 0, an empty scale set is created. Disks for each node:
- 256GiB OS disk (
Premium_LRS
) - 256GiB binaries disk (
Premium_LRS
)
- 256GiB OS disk (
- GPU nodes. Optional. Nodes used specifically for ML models that have video cards. If the number of desired GPU nodes is 0, no scale set is created.
Disks for each node:
- 256GiB OS disk (
Premium_LRS
) - 256GiB binaries disk (
Premium_LRS
)
- 256GiB OS disk (
- Virtual Machine (
Microsoft.Compute/virtualMachines
) – Task Mining node (the size is the same as the agent VMSS node size). - VM Extension (
Microsoft.Compute/virtualMachines/extensions
) - used to install Automation Suite - Disks (
Microsoft.Compute/disks
):- 256GiB OS disk (
Premium_LRS
) - 256GiB binaries disk (
Premium_LRS
)
- 256GiB OS disk (
- Network interface (
Microsoft.Network/networkInterfaces
)
- one scale set is used for server nodes (cluster control plane). Server nodes also run workloads and have a dedicated data
disk. They also have the Identity assigned (User Assigned Identity). Disks for each node:
- Virtual network (
Microsoft.Network/virtualNetworks
) – virtual network used to deploy the node virtual machines.- Virtual Network Subnet (
Microsoft.Network/virtualNetworks/subnets
) – where all nodes reside; - Virtual Network Subnet (
Microsoft.Network/virtualNetworks/subnets
) – used for Azure Bastion (Optional, created if Azure Bastion is enabled, and you did not select an existing Virtual Network).
- Virtual Network Subnet (
- Public load balancer (
Microsoft.Network/loadBalancers
) – used to balance traffic to nodes:443
– HTTPS traffic to the cluster6443
– HTTPS traffic to Kubernetes API
- Internal load balancer (
Microsoft.Network/loadBalancers
) – used during installation for node registration. It has a fixed IP and allows traffic on all ports. - Bastion (
Microsoft.Network/bastionHosts
) – used as a jump box for accessing the nodes of the cluster. Optional. This is not deployed if you selected an existing Virtual Network. - Network security group (
Microsoft.Network/networkSecurityGroups
) – used to secure subnet traffic. It allows HTTPS (443) and internal VNet connections. - NAT (Network Address Translation) Gateway (
Microsoft.Network/natGateways
) – used for outbound connectivity during installation. If using an existing VNet outbound connectivity needs to be provided as this will not be deployed. - Public IP Addresses (
Microsoft.Network/publicIpAddresses
)- one used for Azure Bastion. This is deployed if you selected a new Virtual Network and if Azure Bastion is enabled.
- one used for the public load balancer
- one used for the NAT Gateway. If using an existing VNet outbound connectivity needs to be provided as this will not be deployed.
- Public IP Prefixes (
Microsoft.Network/publicIPPrefixes
) – used for the NAT Gateway. If using an existing VNet outbound connectivity needs to be provided as this will not be deployed. - Private DNS zone (
Microsoft.Network/privateDnsZones
) – since this deployment can also be used without a public DNS zone a private DNS zone is created.- DNS records as required
- Virtual network link
- Storage account (
Microsoft.Storage/storageAccounts
)- One used for installation orchestration and exposing logs.