Skip to content

Commit f55c840

Browse files
author
Simonx Xu
authored
Merge pull request #9406 from MicrosoftDocs/main
Auto push to live 2025-07-24 02:40:32
2 parents c796de0 + 091b8b7 commit f55c840

File tree

8 files changed

+217
-55
lines changed

8 files changed

+217
-55
lines changed

SharePoint/SharePointOnline/sites/compliance-policy-blocking-site-deletion.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: An invalid policy blocks a SharePoint site deletion
2+
title: An Invalid Policy Blocks a SharePoint Site Deletion
33
description: Provides a fix for errors that occur when you try to delete a SharePoint or OneDrive site, or delete documents on them.
44
author: Cloud-Writer
55
ms.author: meerak
66
manager: dcscontentpm
7-
ms.date: 12/17/2023
7+
ms.date: 07/22/2025
88
audience: Admin
99
ms.topic: troubleshooting
1010
ms.custom:
@@ -36,36 +36,34 @@ You might experience one of the following scenarios.
3636

3737
> Versions of this item cannot be deleted because it is on hold or retention policy.
3838
39-
**Scenario 3:** You've excluded or removed a SharePoint or a OneDrive site from a retention policy. More than 24 hours after you make these updates, you try to delete the site or a version of a document on the site. However, the attempt is unsuccessful, and you receive one of the error messages that are mentioned in scenarios 1 and 2.
39+
**Scenario 3:** You exclude or remove a SharePoint or a OneDrive site from a retention policy. More than 24 hours after you make these updates, you try to delete the site or a version of a document on the site. However, the attempt is unsuccessful, and you receive one of the error messages that are mentioned in scenarios 1 and 2.
4040

41-
**Scenario 4:** You've excluded or removed a SharePoint or a OneDrive site from an eDiscovery hold. When you try to delete the site, the attempt is unsuccessful, and you receive the error message that is mentioned in scenario 1.
41+
**Scenario 4:** You exclude or remove a SharePoint or a OneDrive site from an eDiscovery hold. When you try to delete the site, the attempt is unsuccessful, and you receive the error message that's mentioned in scenario 1.
4242

4343
## Cause
4444

45-
Each of these error messages is generated when you try to delete a SharePoint or OneDrive site in either of the following situations:
45+
These error messages are generated when you try to delete a SharePoint or OneDrive site in either of the following situations:
4646
- You exclude or remove the site from a retention policy. However, the retention policy is invalid.
4747
- The eDiscovery hold is within a 30-day grace period that prevents the site from being deleted.
4848

4949
## Resolution
5050

51-
Verify the validity of the retention policy or determine whether the eDiscovery hold is within the grace period. To do this, run the following test in the Microsoft 365 admin center. You must have **Global** or **Compliance** administrator permissions to use these steps.
51+
Verify the validity of the retention policy or determine whether the eDiscovery hold is within the grace period. To take this action, run the following diagnostic in the Microsoft 365 admin center. You must have at least Compliance Administrator permissions to use these steps.
5252

5353
> [!NOTE]
5454
> This diagnostic isn't available for the GCC High or DoD environments, or for Microsoft 365 operated by 21Vianet.
5555
56-
1. Select the **Run Tests: Invalid Retention or grace eDiscovery Hold** button to populate the associated test in the Microsoft 365 admin center:
56+
1. Select the **Run Tests: Invalid Retention or grace eDiscovery Hold** button to populate the associated diagnostic in the Microsoft 365 admin center:
5757

5858
> [!div class="nextstepaction"]
5959
> [Run Tests: Invalid Retention or grace eDiscovery Hold](https://aka.ms/PillarInvalidRetention)
6060
61-
2. In the **Run diagnostics** section, either type or copy and paste the URL of the SharePoint or OneDrive site that you want to delete.
61+
2. In the **Run diagnostics** section, enter the URL of the SharePoint or OneDrive site that you want to delete.
6262

6363
3. Select **Run Tests**.
6464

65-
If the test finds an invalid retention policy that might be blocking the deletion, you can choose to remove the policy.
65+
If the diagnostic finds an invalid retention policy that might be blocking the deletion, you can choose to remove the policy.
6666

6767
If the test finds that the eDiscovery hold is within the 30-day grace period, you can choose to remove the hold.
6868

69-
## More information
70-
71-
To resolve the error in Scenario 4, you can use either the diagnostic or the [Invoke-HoldRemovalAction](/powershell/module/exchange/invoke-holdremovalaction) command. This command can remove eDiscovery holds that are invalid, legacy, or within the 30-day grace period.
69+
**Note**: To manage holds and resolve the error in Scenario 4, use the [Get-CaseHoldPolicy](/powershell/module/exchange/get-caseholdpolicy) command or the Microsoft Purview portal. Make sure that the location is released from the case hold policy before you try to delete the site. If the hold isn't released, use the [Set-CaseHoldPolicy](/powershell/module/exchange/set-caseholdpolicy) command to release it. If the policy can't be found by using the `Get-CaseHoldPolicy` command or the Purview portal, use the [Invoke-HoldRemovalAction](/powershell/module/exchange/invoke-holdremovalaction) command to clean up the orphan hold.

support/azure/azure-kubernetes/connectivity/basic-troubleshooting-outbound-connections.md

Lines changed: 53 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Basic troubleshooting of outbound connections from an AKS cluster
33
description: Do basic troubleshooting of outbound connections that originate from an Azure Kubernetes Service (AKS) cluster.
4-
ms.date: 11/28/2024
5-
ms.reviewer: chiragpa, rissing, jopalhei, jaewonpark, v-leedennis, v-weizhu
4+
ms.date: 07/23/2025
5+
ms.reviewer: chiragpa, rissing, jopalhei, jaewonpark, v-leedennis, v-weizhu, juliayin, v-liuamson
66
editor: v-jsitser
77
ms.service: azure-kubernetes-service
88
#Customer intent: As an Azure Kubernetes user, I want to perform basic troubleshooting of outbound connections from an Azure Kubernetes Service (AKS) cluster so that I don't experience connection issues when I use AKS.
@@ -24,13 +24,13 @@ This article discusses how to do basic troubleshooting of outbound connections f
2424

2525
## Scenarios for outbound traffic in Azure Kubernetes Service
2626

27-
Traffic that originates from within the AKS cluster, whether it's from a pod or a worker node, is considered the outbound traffic from the cluster. What if there's an issue in the outbound flow for an AKS cluster? Before you troubleshoot, first look at the scenarios for outbound traffic flow.
27+
Traffic that originates from within the AKS cluster, whether it's from a pod or a worker node, is considered as outbound traffic from the cluster. If there's an issue in the outbound flow for an AKS cluster, before you troubleshoot, first look at the scenarios for outbound traffic flow.
2828

2929
The outbound traffic from an AKS cluster can be classified into the following categories:
3030

3131
1. [Traffic to a pod or service in the same cluster (internal traffic)](#internal-traffic).
3232

33-
1. Traffic to a device or endpoint in the same virtual network or a different virtual network that uses virtual network peering.
33+
1. Traffic to a network resource or endpoint in the same virtual network or a different virtual network that uses virtual network peering.
3434

3535
1. Traffic to an on-premises environment through a VPN connection or an Azure ExpressRoute connection.
3636

@@ -40,7 +40,7 @@ The outbound traffic from an AKS cluster can be classified into the following ca
4040

4141
#### Internal traffic
4242

43-
A basic request flow for internal traffic from an AKS cluster resembles the flow that's shown in the following diagram.
43+
A basic request flow for internal traffic from an AKS cluster resembles the flow shown in the following diagram.
4444

4545
:::image type="content" source="./media/basic-troubleshooting-outbound-connections/internal-traffic-aks-cluster.svg" alt-text="Diagram of a basic request flow for internal traffic from an AKS cluster." lightbox="./media/basic-troubleshooting-outbound-connections/internal-traffic-aks-cluster.svg" border="false":::
4646

@@ -62,37 +62,37 @@ It's important to understand the nature of egress flow for your cluster so that
6262

6363
## Considerations when troubleshooting
6464

65-
#### Check your egress device
65+
#### Check your network resources within traffic flow
6666

67-
When you troubleshoot outbound traffic in AKS, it's important to know what your egress device is (that is, the device through which the traffic passes). Here, the egress device could be one of the following components:
67+
When you troubleshoot outbound traffic in AKS, it's important to know what network resources are present (that is, the hops through which the traffic passes). Here, the network resource could be one of the following components:
6868

6969
- Azure Load Balancer
7070
- Azure Firewall or a custom firewall
7171
- A network address translation (NAT) gateway
7272
- A proxy server
73+
- Network security group (NSG)
74+
- Network policy
7375

74-
The flow could also differ based on the destination. For example, internal traffic (that is, within the cluster) doesn't go through the egress device. The internal traffic would use only the cluster networking. For public outbound traffic, determine if there's an egress device passing through and check that device.
76+
The flow could also differ based on the destination. For example, internal traffic (that is, within the cluster) doesn't go through the external network resources and only uses the cluster networking. For public outbound traffic, determine which network resources are implemented for your cluster.
7577

76-
#### Check each hop within traffic flow
78+
#### Check outbound connectivity path and blockers with Azure Virtual Network Verifier (Preview)
79+
To check where traffic is blocked within your network resources to specific endpoints (for example, `mcr.microsoft.com`), you can use the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier) tool. By running a connectivity analysis, you can visualize the hops within the traffic flow and any misconfigurations within Azure networking resources that are blocking traffic. We recommend using the Virtual Network Verifier tool as a first step in troubleshooting outbound connectivity issues to isolate the issue and detect problematic network configuration. For more instructions, [check if Azure network resources are blocking traffic to the endpoint using Azure Virtual Network Verifier (Preview)](#check-if-azure-network-resources-are-blocking-traffic-to-the-endpoint).
7780

78-
After identifying the egress device, check the following factors:
81+
#### Manual troubleshooting
82+
For manual troubleshooting, we recommend you check the following items:
7983

8084
- The source and the destination for the request.
8185
- The hops in between the source and the destination.
8286
- The request-response flow.
83-
- The hops that are enhanced by extra security layers, such as the following layers:
87+
- The hops enhanced by extra security layers, such as the following layers:
8488

8589
- Firewall
8690
- Network security group (NSG)
8791
- Network policy
8892

89-
To identify a problematic hop, check the response codes before and after it. To check whether the packets arrive properly in a specific hop, you can proceed with packet captures.
93+
To identify a problematic hop, [check the HTTP response codes before and after it](get-and-analyze-http-response-codes.md). These codes are useful to identify the nature of the issue. The codes are especially helpful in scenarios in which the application responds to HTTP requests. To check whether the packets arrive properly in a specific hop, you can proceed with packet captures.
9094

91-
##### Check HTTP response codes
92-
93-
When you check each component, [get and analyze HTTP response codes](get-and-analyze-http-response-codes.md). These codes are useful to identify the nature of the issue. The codes are especially helpful in scenarios in which the application responds to HTTP requests.
94-
95-
##### Take packet captures from the client and server
95+
#### Take packet captures from the client and server
9696

9797
If other troubleshooting steps don't provide any conclusive outcome, take packet captures from the client and server. Packet captures are also useful when non-HTTP traffic is involved between the client and server. For more information about how to collect packet captures for AKS environment, see the following articles in the data collection guide:
9898

@@ -106,7 +106,9 @@ If other troubleshooting steps don't provide any conclusive outcome, take packet
106106

107107
For basic troubleshooting for egress traffic from an AKS cluster, follow these steps:
108108

109-
1. [Make sure that the Domain Name System (DNS) resolution for the endpoint works correctly](#check-whether-the-pod-and-node-can-reach-the-endpoint).
109+
1. [Check if Azure network resources are blocking traffic to the endpoint using Azure Virtual Network Verifier (Preview)](#check-if-azure-network-resources-are-blocking-traffic-to-the-endpoint).
110+
111+
1. [Make sure that the Domain Name System (DNS) resolution for the endpoint works correctly](#check-that-the-domain-name-service-dns-resolution-for-the-endpoint-works-correctly).
110112

111113
1. Make sure that you can reach the endpoint through an IP address.
112114

@@ -128,19 +130,45 @@ For basic troubleshooting for egress traffic from an AKS cluster, follow these s
128130
>
129131
> Assumes no service mesh when you do basic troubleshooting. If you use a service mesh such as Istio, it produces unusual outcomes for TCP based traffic.
130132
131-
#### Check whether the pod and node can reach the endpoint
133+
#### Check if Azure network resources are blocking traffic to the endpoint
134+
135+
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier#supported-features-of-the-reachability-analysis) tool. The connectivity analysis covers the following resources:
136+
137+
- Azure Load Balancer
138+
- Azure Firewall
139+
- A network address translation (NAT) gateway
140+
- Network security group (NSG)
141+
- Network policy
142+
- User defined routes (route tables)
143+
- Virtual network peering
144+
145+
> [!NOTE]
146+
>
147+
> Azure Virtual Network Verifier (Preview) can't access any external or third-party networking resources, such as a custom firewall. If the connectivity analysis doesn't detect any blocked traffic, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
148+
>
149+
> Currently, clusters using Azure CNI Overlay aren't supported for this feature. Support for CNI Overlay is planned for August 2025.
150+
151+
1. Navigate to your cluster in the Azure portal. In the sidebar, navigate to the Settings -> Node pools blade.
152+
2. Identify the nodepool you want to run a connectivity analysis from. Click on the nodepool to select it as the scope.
153+
3. Select "Connectivity analysis (Preview)" from the toolbar at the top of the page. If you don't see it, click on the three dots "..." in the toolbar at the top of the page to open the expanded menu. <img width="626" alt="image" src="https://github.com/user-attachments/assets/b2f05947-f753-49b9-9536-98d0b998ab52" />
154+
4. Select a Virtual Machine Scale Set (VMSS) instance as the source. The source IP addresses are populated automatically.
155+
5. Select a public domain name/endpoint as the destination for the analysis, one example is `mcr.microsoft.com`. The destination IP addresses are also populated automatically.
156+
6. Run the analysis and wait up to 2 minutes for the results. In the resulting diagram, identify the associated Azure network resources and where traffic is blocked. To view the detailed analysis output, click on the "JSON output" tab or click into the arrows in the diagram.
157+
158+
159+
#### Check that the Domain Name Service (DNS) resolution for the endpoint works correctly
132160

133-
From within the pod, you can run a DNS lookup to the endpoint.
161+
You can run a DNS lookup to the endpoint by running a debugging pod on one of your AKS nodes. If the issue is isolated to a specific problematic pod or namespace, run the DNS lookup from within the same namespace where you notice the problem.
134162

135-
What if you can't run the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command to connect to the pod and install the DNS Utils package? In this situation, you can [start a test pod in the same namespace as the problematic pod](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/#create-a-simple-pod-to-use-as-a-test-environment), and then run the tests.
163+
If you can't run the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command to connect to an existing pod, you can [start a test pod in the same namespace as the problematic pod](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/#create-a-simple-pod-to-use-as-a-test-environment) to run the tests.
136164

137165
> [!NOTE]
138166
>
139167
> If the DNS resolution or egress traffic doesn't let you install the necessary network packages, you can use the `rishasi/ubuntu-netutil:1.0` docker image. In this image, the required packages are already installed.
140168
141-
##### Example procedure for checking DNS resolution of a Linux pod
169+
##### Example procedure for checking DNS resolution
142170

143-
1. Start a test pod in the same namespace as the problematic pod:
171+
1. Start a test pod in the problematic namespace:
144172

145173
```bash
146174
kubectl run -it --rm aks-ssh --namespace <namespace> --image=debian:stable --overrides='{"spec": { "nodeSelector": {"kubernetes.io/os": "linux"}}}'
@@ -198,9 +226,9 @@ Sometimes, there's a problem with the endpoint itself rather than a cluster DNS.
198226
curl -Ivm5 https://kubernetes.io
199227
```
200228

201-
To verify that the endpoint is reachable from the node where the problematic pod is in and then verify the DNS settings, follow these steps:
229+
To verify that the endpoint is reachable and DNS is functioning from the node hosting the problematic pod, follow these steps:
202230

203-
1. Enter the node where the problematic pod is in through the debug pod. For more information about how to do this, see [Connect to Azure Kubernetes Service (AKS) cluster nodes for maintenance or troubleshooting](/azure/aks/node-access).
231+
1. Enter the node hosting the problematic pod using the debug pod. For more information, see [Connect to Azure Kubernetes Service (AKS) cluster nodes for maintenance or troubleshooting](/azure/aks/node-access).
204232

205233
1. Test the DNS resolution to the endpoint:
206234

0 commit comments

Comments
 (0)