Elastic.elasticsearch template in azure marketplace is giving error while deploying custom scripts

Created all VMs and infra part of the template after creating VMs failing at Datanode/custom scripts exicution.

{ "id": "/subscriptions/425d7347-3ff5-4474-be64-653fa/resourceGroups/AZRDEVLOGSTASH-RG/providers/Microsoft.Resources/deployments/LOGSTdata-0-vm-creation/operations/365F2FA4EF34EF61", "operationId": "365F2FA4EF34EF61", "properties": { "provisioningOperation": "Create", "provisioningState": "Failed", "timestamp": "2019-08-27T14:13:01.3011527Z", "duration": "PT2M24.4439873S", "trackingId": "ac9767a0-c8b3-4513-9029-3cd143af7b1e", "statusCode": "Conflict", "statusMessage": { "status": "Failed", "error": { "code": "ResourceDeploymentFailure", "message": "The resource operation completed with terminal provisioning state 'Failed'.", "details": [ { "code": "VMExtensionProvisioningError", "message": "VM has reported a failure when processing extension 'script'. Error message: "Enable failed: failed to execute command: command terminated with exit status=12\n[stdout]\n0?\u0006\t�H��\r\u0001\t\u001412\u001e0wc_academicpartnerships070\u001f0\u0007\u0006\u0005+\u000e\u0003\u0002\u001a\u0004\u0014Q��\u0017x��\yP#�D\u0019��!),p\u0004\u0014j�m�\u0019���Dy缄t��%-K~[27082019-14:12:48] [configure_http_tls] configuring SSL/TLS for HTTP layer\n[27082019-14:12:48] [configure_http_tls] configure HTTP key password in keystore\n[27082019-14:12:53] [configure_http_tls] configured SSL/TLS for HTTP layer\n[27082019-14:12:53] [configure_transport_tls] save Transport CA blob to file\n0�\r�\u0002\u0001\u00030�\r�\u0006\t�H��\r\u0001\u0007\u0001��\r�\u0004�\r�0�\r�0�\u0006\u0013\u0006\t�H��\r\u0001\u0007\u0001��\u0006\u0004\u0004�\u00060�\u0005�0�\u0005�\u0006\u000b�H��\r\u0001\f\n\u0001\u0002��\u0004�0�\u0004�0\u001c\u0006\n�H��\r\u0001\f\u0001\u00030\u000e\u0004\bL\u0u000e\u0006\u0003U\u0004\b\u0013\u0007Arizona1\u00130\u0011\u0006\u0003U\u0004\u0007\u0013\nScottsdale1\u001a0\u0018\u0006\u0003U\u0004\n\u0013\u0011GoDaddy.com, Inc.1-0+\u0006\u0003U\u0004\u000b\u0013$http://certs.godaddy.com/repository/1301\u0006\u0003U\u0004\u0003\u0013Go Daddy Secure Certificate Authority - G20\u001e\u0017\r190501173422Z\u0017\r210727173422Z0H1!0\u001f\u0006\u0003U\u0004\u000b\u0013\u0018Domain Control Validated1#0!\u0006\u0003U\u0004\u0003\f\u001a*.academicpartnerships.com0�\u0001"0\r\u0006\t�H��\r\u0001\u0001\u0001\u0005\u0003�\u0001\u000f0�\u0001\n\u0002�\u0001\u0001� �'Rc0G\u0004���Y�0�\u0017�7�+Պ���\�/��J��g G'\fm\u000btY\u0016�/�{�4�B��Ob�Z<�3w4�O�'n���vSHG!�hg����\u0005Ü�\u0004����\bJE��֬lTZ%^�B�N�����C�T)�sh$��23��\u0013L�\u00127t\u0013c���\u001a\u0016ϵ�\u001b���\u0001���Z8���\u001d&\n��)��B\u000f\rBsl\u0005\u000f$kE�~����P�)@2�\u000f�FE�;\u000b����Xɀ�.h9K\u0004��f�\u0018\u0016X#?i�W|�T\u0007����]����v�\u000b��{���\u0014�%\u0003��\u000b���\b�/\u0003\u0002\u0003\u0001\u0001��\u0003T0�\u0003P0\f\u0006\u0003U\u001d\u0013\u0001\u0001�\u0004\u000200\u001d\u0006\u0003U\u001d%\u0004\u00160\u0014\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0003\u0001\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0003\u00020\u000e\u0006\u0003U\u001d\u000f\u0001\u0001�\u0004\u0004\u0003\u0002\u0005�08\u0006\u0003U\u001d\u001f\u000410/0-�+�)�'http://crl.godaddy.com/gdig2s1-1086.crl0]\u0006\u0003U\u001d \u0004V0T0H\u0006\u000b�H\u0001��m\u0001\u0007\u0017\u00010907\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0002\u0001\u0016+http://certificates.godaddy.com/repository/0\b\u0006\u0006g�\f\u0001\u0002\u00010v\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0001\u0001\u0004j0h0$\u0006\b+\u0006\u0001\u0005\u0005\u00070\u0001�\u0018http://ocsp.godaddy.com/0@\u0006\b+\u0006\u0001\u0005\u0005\u00070\u0002�4http://certificates.godaddy.com/repository/gdig2.crt0\u001f\u0006\u0003U\u001d#\u0004\u00180\u0016�\u0014@½'��4�0�3��l���,��0?\u0006\u0003U\u001d\u0011\u0004806�\u001a*.academicpartnerships.com�\u0018academicpartnerships.com0\u001d\u0006\u0003U\u001d\u000e\u0004\u0016\u0004\u0014+D;�\u0011㱮�ʷ=�\u0005=�e(\n0�\u0001}\u0006\n+\u0006\u0001\u0004\u0001�y\u0002\u0004\u0002\u0004�\u0001m\u0004�\u0001i\u0001gu��\t��\u0018X\u0014��\u0013��gp\n<5�\u0004�\u001b߸�w�\u000e�\r�\u0010\u0001jtv0�\u0004\u0003F0D\u0002 [��\u001b|�v�\u000f��2��\u0019N'���l��Bq�\t?�z\u000f\u0002 \u001cAn�_���\u0015\u0001�Hq�\o�c\u001f�ܲ��n�$\u0003�K��v�K��u�`��Bi\u001f���f�\u000f~_�r؃�{�z���\u0001jtv3G\u0004\u0003G0E\u0002!ɓcH\u0005C5��\u000e�|���.��<i3�y�]�\u001f�@���\u0002 r\u0003a�"�\u0001\fJ��;\u001b���"B=�!�"�O��y2֎EvD�e.��ί�@\u0007ب�(��悾��1�?�3�����\u0001jtv8(\u0004\u0003G0E\u0002!�)O����Z�����{�4�\u000e�Y\u000f⇡n�\u0012��XZ�\u0002 \u000e���G"\u000e�\r.�\u0014u\u0012i٪���\u001bXa̓txs�Djf0\r\u0006\t�H��\r\u0001\u0001\u000b\u0005\u0003�\u0001\u0001\u0014M�D˛��\u0018o��eX���M����g\u0011Tm'Ie�����or7Y�C\u0014������_98�\u0017�X\u000f,��[%Yω��}[�(\u0003�+n\u001a�|_T&X~\u000b$��ٙ��Dt���)�9a��z9\u0016�\u001e\u0015t��Th�u9����A��x0��߹��U�~��\u0012j�\u0017B8/\u0002)g\u001eYÅ��a�xO+)\u001d\u0004ǵ�\u000e������U�\u0001\u0004���,���qwY�5�H�����9�:����0x}F\u000fhZ�sv����Q��\u0017�S(Y��b�\u0018,g\u0012�\u0012ְ\u0001c\u0015\u0004+�����\u0006�\t���\u0016�m�1V0\u0013\u0006\t�H��\r\u0001\t\u00151\u0006\u0004\u0004\u00010?\u0006\t�H��\r\u0001\t\u001412\u001e0wc_academicpartnerships070\u001f0\u0007\u0006\u0005+\u000e\u0003\u0002\u001a\u0004\u0014Q��\u0017x��\yP#�D\u0019��!),p\u0004\u0014j�m�\u0019���Dy缄t��%-K~[27082019-14:12:53] [configure_transport_tls] Transport CA blob is not a Certificate Authority (CA)\n\n[stderr]\nmke2fs 1.42.13 (17-May-2015)\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nMAC verified OK\n"." } ] } }, "targetResource": { "id": "/subscriptions/425d7347-3ff5-4474-be64-65/resour

ceGroups/AZRDEVLOGSTASH-RG/providers/Microsoft.Compute/virtualMachines/LOGSTdata-0/extensions/script", "resourceType": "Microsoft.Compute/virtualMachines/extensions", "resourceName": "LOGSTdata-0/script" } }}

It looks like the CA certificate passed to secure the Elasticsearch transport layer is not a Certificate Authority (CA) certificate. This CA certificate is used to generate a certificate for each node in the cluster to secure the Transport layer

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.