Hi ShawnO i review urs issue and all comments so that’s a huge catch! and yep, u’re totally right sometimes the docs don’t keep up with reality :)
so turns out port 80 is in play after all, at least for some ubuntu repos like azure.archive.ubuntu.com. that’s wild because the official docs swear up and down it’s all 443. but hey, real-world troubleshooting wins again! what this means for u
firewall rules gotta allow both 80 and 443 outbound. some repos (especially linux ones) still use http for package metadata before switching to https for downloads.
route tables if u’re still forcing traffic through the fortigate, make sure it’s not blocking or inspecting port 80 traffic. sometimes firewalls get too aggressive and kill plain http even when it’s needed.
double-check ur logs next time something times out, peek at the firewall logs or run a tcpdump on the vm. u’ll see real fast if it’s dying on port 80.
why this happens some linux distros (like ubuntu) still use http for repo metadata (the "what’s new?" list) before downloading packages over https. azure’s docs probably assume everything’s https-only now, but… surprise! legacy stuff hangs around forever )
final fix update firewall rules allow outbound 80/tcp to at least
- azure.archive.ubuntu.com
- any other repo urls ur vms use (check /etc/apt/sources.list if ur on ubuntu). test with curl from inside the vm, try curl -v http://azure.archive.ubuntu.com if it works, u’re golden. if not, the firewall’s still blocking something.
u just saved urself (and probably a bunch of other folks) a ton of headache. nice work spotting that
(and hey, maybe someone should file a doc bug… just sayin’)))))
Best regards,
Alex
and "yes" if you would follow me at Q&A - personaly thx.
P.S. If my answer help to you, please Accept my answer
PPS That is my Answer and not a Comment