Skip to content

Commit c143ad8

Browse files
authored
Merge pull request #8711 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/SupportArticles-docs (branch main)
2 parents 4c94d53 + aaaebaa commit c143ad8

4 files changed

Lines changed: 12 additions & 10 deletions

File tree

support/azure/azure-container-instances/configuration-setup/error-codes-spot-container-creation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Error codes for Spot container creation in Container Instances
33
description: Provides a solution to common Spot container errors.
4-
ms.date: 01/30/2024
4+
ms.date: 04/14/2025
55
author: tysonfms
66
ms.author: tysonfreeman
77
editor: v-jsitser
8-
ms.reviewer: v-weizhu, v-leedennis
8+
ms.reviewer: edneto, v-weizhu, v-leedennis
99
ms.service: azure-container-instances
1010
ms.custom: sap:Configuration and Setup
1111
#customer intent: As a user of Azure Container Instances, I want find details and solutions to common user errors that involve Spot containers so that I can create Spot containers successfully.

support/azure/azure-container-instances/configuration-setup/long-image-pulls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Image pull takes a long time to run
33
description: Learn about troubleshooting steps that you can take if an image pull takes a long time to run on Azure Container Instances.
4-
ms.date: 12/28/2023
4+
ms.date: 04/14/2025
55
ms.service: azure-container-instances
66
author: tysonfms
77
ms.author: tysonfreeman
88
editor: v-jsitser
9-
ms.reviewer: v-leedennis
9+
ms.reviewer: edneto, v-leedennis
1010
ms.custom: sap:Configuration and Setup
1111
#Customer intent: As a user of Azure Container Instances, I want to learn why an image pull takes a long time to run so that I can create and use container groups successfully.
1212
---

support/azure/azure-kubernetes/connectivity/cannot-view-resources-kubernetes-resource-viewer-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Can't view resources in Kubernetes resource viewer on Azure portal
33
description: Troubleshoot why you can't view resources in the Kubernetes resource viewer in the Azure portal for a cluster configured with API server-authorized IP ranges.
4-
ms.date: 11/12/2024
5-
ms.reviewer: chiragpa, nickoman, jaewonpark, v-leedennis
4+
ms.date: 04/14/2025
5+
ms.reviewer: edneto, chiragpa, nickoman, jaewonpark, v-leedennis
66
ms.service: azure-kubernetes-service
77
keywords:
88
#Customer intent: As an Azure Kubernetes user, I want to troubleshoot the inability to view resources in the Kubernetes resource viewer in the Azure portal so that I can use authorized IP address ranges to access my AKS cluster that's configured with an API server.

support/azure/azure-storage/blobs/connectivity/copy-blobs-between-storage-accounts-network-restriction.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,20 +67,22 @@ Here's the full process of this mechanism for the two scenarios:
6767
4. The client sends PutBlockList to the destination storage to commit the blocks and finish the process after receiving a success response code from the request.
6868
6969
## Copy blobs between storage accounts in a Hub-spoke architecture using private endpoints
70-
A 403 Error occurs when using AzCopy to copy blobs between Storage accounts connected to private endpoints in different Spoke VNets from a VM in a Hub VNet. You can find a "403 This request is not authorized to perform this operation - CannotVerfiyCopySource" error in the AzCopy logs or in the Azure Storage logs. The following architecture diagram shows the scenario in which the error occurs.
70+
A 403 Error occurs when using AzCopy to copy blobs between Storage accounts connected to private endpoints in different Spoke VNets from a VM in a Hub VNet. You can find a "403 This request is not authorized to perform this operation - CannotVerifyCopySource" error in the AzCopy logs or in the Azure Storage logs. The following architecture diagram shows the scenario in which the error occurs.
7171
7272
:::image type="content" source="media/copy-blobs-between-storage-accounts-network-restriction/hub-spoke-network-topology-architecture.png" alt-text="Diagram that shows the 403 error of copying blobs between storage accounts in a Hub & Spoke architecture using Private Endpoints.":::
7373
7474
### Workaround 1: Create a private endpoint for the destination storage account in the source VNet
75-
A Possible workaround is to create a private endpoint for the destination storage account in the source VNet. This configuration allows the VM to successfully copy the blobs between the storage accounts by using AzCopy. The following architecture diagram shows the process of copying blobs between storage accounts in the Workaround 1.
75+
A possible workaround is to create a private endpoint for the destination storage account in the source VNet. This configuration allows the VM to successfully copy the blobs between the storage accounts by using AzCopy. The following architecture diagram shows the process of copying blobs between storage accounts in Workaround 1.
7676
7777
:::image type="content" source="media/copy-blobs-between-storage-accounts-network-restriction/hub-spoke-network-topology-architecture-mitigation-1.png" alt-text="Diagram that shows the process of copying blobs between storage accounts in Workaround 1.":::
7878
79-
### Workaround 2: Place the VM in the same VNet as the source storage account and peer the VNet with the destination VNet
80-
Another option is to place the VM within the same VNet as the source storage account. Then, establish peering between this VNet and the destination VNet. The following architecture diagram shows the process of copying blobs between storage accounts in Workaround 2.
79+
### Workaround 2: Place the VM in the same VNet as the source storage account and configure VNet peering between the source and destination VNets
80+
Another option is to place the VM within the same VNet as the source storage account and set up [virtual network peering](/azure/virtual-network/virtual-network-peering-overview) between this VNet and the destination VNet. This peering needs to be directly between the two VNets and cannot be done through the hub VNet. The following architecture diagram shows the process of copying blobs between storage accounts in Workaround 2.
8181
8282
:::image type="content" source="media/copy-blobs-between-storage-accounts-network-restriction/hub-spoke-network-topology-architecture-mitigation-2.png" alt-text="Diagram that shows the process of copying blobs between storage accounts in Workaround 2.":::
8383
84+
More information, see [Virtual network peering FAQ](/azure/virtual-network/virtual-networks-faq#virtual-network-peering).
85+
8486
### Workaround 3: Use a temporary staging account to copy the data
8587
If you're unable to implement the previously mentioned workarounds or are restricted from changing the existing network configuration of the storage account or VNet, you can use a temporary staging account to copy the data:
8688

0 commit comments

Comments
 (0)