Created all VMs and infra part of the template after creating VMs failing at Datanode/custom scripts exicution.
{ "id": "/subscriptions/425d7347-3ff5-4474-be64-653fa/resourceGroups/AZRDEVLOGSTASH-RG/providers/Microsoft.Resources/deployments/LOGSTdata-0-vm-creation/operations/365F2FA4EF34EF61", "operationId": "365F2FA4EF34EF61", "properties": { "provisioningOperation": "Create", "provisioningState": "Failed", "timestamp": "2019-08-27T14:13:01.3011527Z", "duration": "PT2M24.4439873S", "trackingId": "ac9767a0-c8b3-4513-9029-3cd143af7b1e", "statusCode": "Conflict", "statusMessage": { "status": "Failed", "error": { "code": "ResourceDeploymentFailure", "message": "The resource operation completed with terminal provisioning state 'Failed'.", "details": [ { "code": "VMExtensionProvisioningError", "message": "VM has reported a failure when processing extension 'script'. Error message: "Enable failed: failed to execute command: command terminated with exit status=12\n[stdout]\n0?\u0006\t�H��\r\u0001\t\u001412\u001e0wc_academicpartnerships070\u001f0\u0007\u0006\u0005+\u000e\u0003\u0002\u001a\u0004\u0014Q��\u0017x��\yP#�D\u0019��!),p\u0004\u0014j�m�\u0019���Dy缄t��%-K~[27082019-14:12:48] [configure_http_tls] configuring SSL/TLS for HTTP layer\n[27082019-14:12:48] [configure_http_tls] configure HTTP key password in keystore\n[27082019-14:12:53] [configure_http_tls] configured SSL/TLS for HTTP layer\n[27082019-14:12:53] [configure_transport_tls] save Transport CA blob to file\n0�\r�\u0002\u0001\u00030�\r�\u0006\t�H��\r\u0001\u0007\u0001��\r�\u0004�\r�0�\r�0�\u0006\u0013\u0006\t�H��\r\u0001\u0007\u0001��\u0006\u0004\u0004�\u00060�\u0005�0�\u0005�\u0006\u000b�H��\r\u0001\f\n\u0001\u0002��\u0004�0�\u0004�0\u001c\u0006\n�H��\r\u0001\f\u0001\u00030\u000e\u0004\bL\u0u000e\u0006\u0003U\u0004\b\u0013\u0007Arizona1\u00130\u0011\u0006\u0003U\u0004\u0007\u0013\nScottsdale1\u001a0\u0018\u0006\u0003U\u0004\n\u0013\u0011GoDaddy.com, Inc.1-0+\u0006\u0003U\u0004\u000b\u0013$http://certs.godaddy.com/repository/1301\u0006\u0003U\u0004\u0003\u0013Go Daddy Secure Certificate Authority - G20\u001e\u0017\r190501173422Z\u0017\r210727173422Z0H1!0\u001f\u0006\u0003U\u0004\u000b\u0013\u0018Domain Control Validated1#0!\u0006\u0003U\u0004\u0003\f\u001a*.academicpartnerships.com0�\u0001"0\r\u0006\t�H��\r\u0001\u0001\u0001\u0005\u0003�\u0001\u000f0�\u0001\n\u0002�\u0001\u0001� �'Rc0G\u0004���Y�0�\u0017�7�+Պ���\�/��J��g G'\fm\u000btY\u0016�/�{�4�B��Ob�Z<�3w4�O�'n���vSHG!�hg����\u0005Ü�\u0004����\bJE��֬lTZ%^�B�N�����C�T)�sh$��23��\u0013L�\u00127t\u0013c���\u001a\u0016ϵ�\u001b���\u0001���Z8���\u001d&\n��)��B\u000f\rBsl\u0005\u000f$kE�~����P�)@2�\u000f�FE�;\u000b����Xɀ�.h9K\u0004��f�\u0018\u0016X#?i�W|�T\u0007����]����v�\u000b��{���\u0014�%\u0003��\u000b���\b�/\u0003\u0002\u0003\u0001\u0001��\u0003T0�\u0003P0\f\u0006\u0003U\u001d\u0013\u0001\u0001�\u0004\u000200\u001d\u0006\u0003U\u001d%\u0004\u00160\u0014\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0003\u0001\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0003\u00020\u000e\u0006\u0003U\u001d\u000f\u0001\u0001�\u0004\u0004\u0003\u0002\u0005�08\u0006\u0003U\u001d\u001f\u000410/0-�+�)�'http://crl.godaddy.com/gdig2s1-1086.crl0]\u0006\u0003U\u001d \u0004V0T0H\u0006\u000b�H\u0001��m\u0001\u0007\u0017\u00010907\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0002\u0001\u0016+http://certificates.godaddy.com/repository/0\b\u0006\u0006g�\f\u0001\u0002\u00010v\u0006\b+\u0006\u0001\u0005\u0005\u0007\u0001\u0001\u0004j0h0$\u0006\b+\u0006\u0001\u0005\u0005\u00070\u0001�\u0018http://ocsp.godaddy.com/0@\u0006\b+\u0006\u0001\u0005\u0005\u00070\u0002�4http://certificates.godaddy.com/repository/gdig2.crt0\u001f\u0006\u0003U\u001d#\u0004\u00180\u0016�\u0014@½'��4�0�3��l���,��0?\u0006\u0003U\u001d\u0011\u0004806�\u001a*.academicpartnerships.com�\u0018academicpartnerships.com0\u001d\u0006\u0003U\u001d\u000e\u0004\u0016\u0004\u0014+D;�\u0011㱮�ʷ=�\u0005=�e(\n0�\u0001}\u0006\n+\u0006\u0001\u0004\u0001�y\u0002\u0004\u0002\u0004�\u0001m\u0004�\u0001i\u0001gu��\t��\u0018X\u0014��\u0013��gp\n<5�\u0004�\u001b߸�w�\u000e�\r�\u0010\u0001jtv0�\u0004\u0003F0D\u0002 [�
�\u001b|�v�\u000f��2��\u0019N'���l��Bq�\t?�z\u000f\u0002 \u001cAn�_���\u0015\u0001�Hq�\o�c\u001f�ܲ��n�$\u0003�K��v�K��u�`��Bi\u001f���f�\u000f~_�r�{�z���\u0001jtv3G\u0004\u0003G0E\u0002!ɓcH\u0005C5��\u000e�|���.��<i3�y�]�\u001f�@���\u0002 r\u0003a�"�\u0001\fJ��;\u001b���"B=�!�"�O��y2֎EvD�e.��ί�@\u0007ب�(��悾��1�?�3�����\u0001jtv8(\u0004\u0003G0E\u0002!�)O����Z�����{�4�\u000e�Y\u000f⇡n�\u0012��XZ�\u0002 \u000e���G"\u000e�\r.�\u0014u\u0012i٪���\u001bXa̓txs�Djf0\r\u0006\t�H��\r\u0001\u0001\u000b\u0005\u0003�\u0001\u0001\u0014M�D˛��\u0018o��eX���M����g\u0011Tm'Ie�����or7Y�C\u0014������_98�\u0017�X\u000f,��[%Yω��}[�(\u0003�+n\u001a�|_T&X~\u000b$��ٙ��Dt���)�9a��z9\u0016�\u001e\u0015t��Th�u9����A��x0��߹��U�~��\u0012j�\u0017B8/\u0002)g\u001eYÅ��a�xO+)\u001d\u0004ǵ�\u000e������U�\u0001\u0004���,���qwY�5�H�����9�:����0x}F\u000fhZ�sv����Q��\u0017�S(Y��b�\u0018,g\u0012�\u0012ְ\u0001c\u0015\u0004+�����\u0006�\t���\u0016�m�1V0\u0013\u0006\t�H��\r\u0001\t\u00151\u0006\u0004\u0004\u00010?\u0006\t�H��\r\u0001\t\u001412\u001e0wc_academicpartnerships070\u001f0\u0007\u0006\u0005+\u000e\u0003\u0002\u001a\u0004\u0014Q��\u0017x��\yP#�D\u0019��!),p\u0004\u0014j�m�\u0019���Dy缄t��%-K~[27082019-14:12:53] [configure_transport_tls] Transport CA blob is not a Certificate Authority (CA)\n\n[stderr]\nmke2fs 1.42.13 (17-May-2015)\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nsent invalidate(passwd) request, exiting\nsent invalidate(group) request, exiting\nMAC verified OK\n"." } ] } }, "targetResource": { "id": "/subscriptions/425d7347-3ff5-4474-be64-65/resour