Skip to content

Commit 05fc1bc

Browse files
authored
Merge pull request #9075 from MicrosoftDocs/main
Auto push to live 2025-06-06 02:32:57
2 parents 8871bdd + 883b0a0 commit 05fc1bc

File tree

3 files changed

+65
-5
lines changed

3 files changed

+65
-5
lines changed

support/azure/azure-kubernetes/extensions/cannot-pull-image-from-acr-to-aks-cluster.md

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Can't pull images from Azure Container Registry to Kubernetes
33
description: This article helps you troubleshoot the most common errors that you may encounter when pulling images from a container registry to an AKS cluster.
4-
ms.date: 03/25/2025
4+
ms.date: 06/05/2025
55
author: genlin
66
ms.author: genli
7-
ms.reviewer: chiragpa, andbar, v-weizhu, v-leedennis
7+
ms.reviewer: chiragpa, andbar, albarqaw, v-weizhu, v-leedennis
88
ms.service: azure-kubernetes-service
99
ms.custom: sap:Extensions, Policies and Add-Ons, devx-track-azurecli
1010
---
@@ -349,6 +349,40 @@ spec:
349349
nodeSelector:
350350
"kubernetes.io/os": linux
351351
```
352+
## Cause 6: Kubelet exceeds the default image pull rate limit
353+
354+
When multiple jobs pull the same images, the Kubelet default pull rate limit might be exceeded. In this case, an error message like the following one is displayed:
355+
356+
> Failed to pull image "acrname.azurecr.io/repo/nginx:latest": **pull QPS exceeded**. This occurred for pod \<podname\> at 4/22/2025, 12:48:32.000 PM UTC.
357+
358+
For more information about the limit, see the [registryPullQPS configuration](https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/#kubelet-config-k8s-io-v1beta1-KubeletConfiguration).
359+
360+
### Solution: Change the value of imagePullPolicy to IfNotPresent
361+
362+
To resolve this issue, change the value of [imagePullPolicy](https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy) from `Always` to `IfNotPresent` in the deployment YAML file to prevent unnecessary pulls. `IfNotPresent` ensures that the image is pulled from the registry only if it's not already present on the node.
363+
364+
Here's an example of the deployment YAML file:
365+
366+
```yaml
367+
apiVersion: apps/v1
368+
kind: Deployment
369+
metadata:
370+
name: my-deployment
371+
spec:
372+
replicas: 3
373+
selector:
374+
matchLabels:
375+
app: my-app
376+
template:
377+
metadata:
378+
labels:
379+
app: my-app
380+
spec:
381+
containers:
382+
- name: my-container
383+
image: myacr.azurecr.io/my-image:latest
384+
imagePullPolicy: IfNotPresent
385+
```
352386
353387
## More information
354388

support/azure/azure-storage/files/file-sync/file-sync-troubleshoot-managed-identities.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure File Sync managed identity issues
33
description: Troubleshoot common issues when your Azure File Sync deployment is configured to use managed identities.
44
ms.service: azure-file-storage
55
ms.topic: troubleshooting
6-
ms.date: 04/02/2025
6+
ms.date: 06/05/2025
77
author: khdownie
88
ms.author: kendownie
99
---
@@ -65,6 +65,28 @@ When you try to delete a Storage Sync Service, you might get the following error
6565
6666
This issue occurs when your file share has unused Azure File Sync snapshots. To reduce your cost, the unused snapshots are deleted before removing the Storage Sync Service. The snapshot count varies with the dataset size. If you can't delete the Storage Sync Service after a few hours, try again the next day.
6767

68+
## Error "Failed to perform resource identity operation" when creating Storage Sync Service
69+
70+
When creating a Storage Sync Service, you might get the following error: "Failed to perform resource identity operation." This error occurs when you delete a Storage Sync Service and then attempt to recreate it using the same name within the same tenant.
71+
72+
To resolve this issue, you can create a new name for the Storage Sync Service, investigate the conflicting app in Microsoft Entra ID (and delete it manually if needed), or wait for the system to auto-clean up the app.
73+
74+
- **Use a different Storage Sync Service name**
75+
Create the Storage Sync Service with a different name than the one previously used.
76+
77+
- **How to investigate the conflicting service principal in Microsoft Entra ID**
78+
A conflicting service principal app might still exist in Microsoft Entra ID (formerly Azure AD). This app was likely created during the initial provisioning of the Storage Sync Service.
79+
80+
- **Choose manual deletion (optional)**
81+
If you need immediate resolution, you can manually delete the conflicting app:
82+
1. Go to the Microsoft Entra admin center.
83+
1. Navigate to **Enterprise applications**.
84+
1. Search for the app name that matches the Storage Sync Service.
85+
1. Select the app and then select **Delete**.
86+
87+
- **Wait for automatic cleanup**
88+
If the app was created by the Storage Sync Service provisioning process, the system will automatically delete it within 24 hours. If the service isn't urgently needed, you may choose to wait for this automatic cleanup to complete.
89+
6890
## Permissions required to access a storage account and Azure file share
6991

7092
When Azure File Sync is configured to use a managed identity, your cloud and server endpoints need the following permissions to access a storage account and Azure file share:

support/power-platform/dataverse/email-exchange-synchronization/error-code-8005e274.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Error code 8005E274 when you test and enable a mailbox
33
description: Provides a resolution for error code 8005E274 that occurs when you test and enable a mailbox for server-side synchronization.
4-
ms.date: 04/29/2024
4+
ms.date: 06/06/2025
55
ms.custom: sap:Email and Exchange Synchronization\Set up and configuration of server-side synchronization
66
author: rahulmital
77
ms.author: rahulmital
@@ -14,9 +14,13 @@ This article provides a resolution for error code 8005E274 that occurs when you
1414

1515
When a user tries to [test and enable a mailbox](/power-platform/admin/connect-exchange-online#test-the-configuration-of-mailboxes) in Microsoft Dataverse, the test fails with error code 8005E274.
1616

17+
You might also see the following error message in the [Alerts](/power-platform/admin/monitor-email-processing-errors#view-alerts) section of the mailbox record:
18+
19+
> **Email Server Error Code:** MailboxNotEnabledForRESTAPI
20+
1721
## Cause
1822

19-
This issue occurs because the associated Exchange mailbox isn't enabled for the REST API. The mailbox associated with the email address isn't enabled for the REST API connectivity in the Microsoft 365 tenant associated with an email server profile. This issue can occur if the mailbox doesn't have an Exchange Online license, is disabled, or exists in an Exchange on-premises hybrid deployment.
23+
This issue occurs because the Exchange mailbox associated with the email address isn't enabled for REST API connectivity in the Microsoft 365 tenant relative to the configured email server profile. This issue can occur if the mailbox doesn't have an Exchange Online license, is disabled, or exists in an Exchange on-premises hybrid deployment.
2024

2125
## Resolution
2226

0 commit comments

Comments
 (0)