You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/azure-kubernetes/extensions/cannot-pull-image-from-acr-to-aks-cluster.md
+36-2Lines changed: 36 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Can't pull images from Azure Container Registry to Kubernetes
3
3
description: This article helps you troubleshoot the most common errors that you may encounter when pulling images from a container registry to an AKS cluster.
ms.custom: sap:Extensions, Policies and Add-Ons, devx-track-azurecli
10
10
---
@@ -349,6 +349,40 @@ spec:
349
349
nodeSelector:
350
350
"kubernetes.io/os": linux
351
351
```
352
+
## Cause 6: Kubelet exceeds the default image pull rate limit
353
+
354
+
When multiple jobs pull the same images, the Kubelet default pull rate limit might be exceeded. In this case, an error message like the following one is displayed:
355
+
356
+
> Failed to pull image "acrname.azurecr.io/repo/nginx:latest": **pull QPS exceeded**. This occurred for pod \<podname\> at 4/22/2025, 12:48:32.000 PM UTC.
357
+
358
+
For more information about the limit, see the [registryPullQPS configuration](https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/#kubelet-config-k8s-io-v1beta1-KubeletConfiguration).
359
+
360
+
### Solution: Change the value of imagePullPolicy to IfNotPresent
361
+
362
+
To resolve this issue, change the value of [imagePullPolicy](https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy) from `Always` to `IfNotPresent` in the deployment YAML file to prevent unnecessary pulls. `IfNotPresent` ensures that the image is pulled from the registry only if it's not already present on the node.
description: Troubleshoot common issues when your Azure File Sync deployment is configured to use managed identities.
4
4
ms.service: azure-file-storage
5
5
ms.topic: troubleshooting
6
-
ms.date: 04/02/2025
6
+
ms.date: 06/05/2025
7
7
author: khdownie
8
8
ms.author: kendownie
9
9
---
@@ -65,6 +65,28 @@ When you try to delete a Storage Sync Service, you might get the following error
65
65
66
66
This issue occurs when your file share has unused Azure File Sync snapshots. To reduce your cost, the unused snapshots are deleted before removing the Storage Sync Service. The snapshot count varies with the dataset size. If you can't delete the Storage Sync Service after a few hours, try again the next day.
67
67
68
+
## Error "Failed to perform resource identity operation" when creating Storage Sync Service
69
+
70
+
When creating a Storage Sync Service, you might get the following error: "Failed to perform resource identity operation." This error occurs when you delete a Storage Sync Service and then attempt to recreate it using the same name within the same tenant.
71
+
72
+
To resolve this issue, you can create a new name for the Storage Sync Service, investigate the conflicting app in Microsoft Entra ID (and delete it manually if needed), or wait for the system to auto-clean up the app.
73
+
74
+
-**Use a different Storage Sync Service name**
75
+
Create the Storage Sync Service with a different name than the one previously used.
76
+
77
+
-**How to investigate the conflicting service principal in Microsoft Entra ID**
78
+
A conflicting service principal app might still exist in Microsoft Entra ID (formerly Azure AD). This app was likely created during the initial provisioning of the Storage Sync Service.
79
+
80
+
-**Choose manual deletion (optional)**
81
+
If you need immediate resolution, you can manually delete the conflicting app:
82
+
1. Go to the Microsoft Entra admin center.
83
+
1. Navigate to **Enterprise applications**.
84
+
1. Search for the app name that matches the Storage Sync Service.
85
+
1. Select the app and then select **Delete**.
86
+
87
+
-**Wait for automatic cleanup**
88
+
If the app was created by the Storage Sync Service provisioning process, the system will automatically delete it within 24 hours. If the service isn't urgently needed, you may choose to wait for this automatic cleanup to complete.
89
+
68
90
## Permissions required to access a storage account and Azure file share
69
91
70
92
When Azure File Sync is configured to use a managed identity, your cloud and server endpoints need the following permissions to access a storage account and Azure file share:
Copy file name to clipboardExpand all lines: support/power-platform/dataverse/email-exchange-synchronization/error-code-8005e274.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Error code 8005E274 when you test and enable a mailbox
3
3
description: Provides a resolution for error code 8005E274 that occurs when you test and enable a mailbox for server-side synchronization.
4
-
ms.date: 04/29/2024
4
+
ms.date: 06/06/2025
5
5
ms.custom: sap:Email and Exchange Synchronization\Set up and configuration of server-side synchronization
6
6
author: rahulmital
7
7
ms.author: rahulmital
@@ -14,9 +14,13 @@ This article provides a resolution for error code 8005E274 that occurs when you
14
14
15
15
When a user tries to [test and enable a mailbox](/power-platform/admin/connect-exchange-online#test-the-configuration-of-mailboxes) in Microsoft Dataverse, the test fails with error code 8005E274.
16
16
17
+
You might also see the following error message in the [Alerts](/power-platform/admin/monitor-email-processing-errors#view-alerts) section of the mailbox record:
18
+
19
+
> **Email Server Error Code:** MailboxNotEnabledForRESTAPI
20
+
17
21
## Cause
18
22
19
-
This issue occurs because the associated Exchange mailbox isn't enabled for the REST API. The mailbox associated with the email address isn't enabled for the REST API connectivity in the Microsoft 365 tenant associated with an email server profile. This issue can occur if the mailbox doesn't have an Exchange Online license, is disabled, or exists in an Exchange on-premises hybrid deployment.
23
+
This issue occurs because the Exchange mailbox associated with the email address isn't enabled for REST API connectivity in the Microsoft 365 tenant relative to the configured email server profile. This issue can occur if the mailbox doesn't have an Exchange Online license, is disabled, or exists in an Exchange on-premises hybrid deployment.
0 commit comments