You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SharePoint/SharePointOnline/sites/compliance-policy-blocking-site-deletion.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: An invalid policy blocks a SharePoint site deletion
2
+
title: An Invalid Policy Blocks a SharePoint Site Deletion
3
3
description: Provides a fix for errors that occur when you try to delete a SharePoint or OneDrive site, or delete documents on them.
4
4
author: Cloud-Writer
5
5
ms.author: meerak
6
6
manager: dcscontentpm
7
-
ms.date: 12/17/2023
7
+
ms.date: 07/22/2025
8
8
audience: Admin
9
9
ms.topic: troubleshooting
10
10
ms.custom:
@@ -36,36 +36,34 @@ You might experience one of the following scenarios.
36
36
37
37
> Versions of this item cannot be deleted because it is on hold or retention policy.
38
38
39
-
**Scenario 3:** You've excluded or removed a SharePoint or a OneDrive site from a retention policy. More than 24 hours after you make these updates, you try to delete the site or a version of a document on the site. However, the attempt is unsuccessful, and you receive one of the error messages that are mentioned in scenarios 1 and 2.
39
+
**Scenario 3:** You exclude or remove a SharePoint or a OneDrive site from a retention policy. More than 24 hours after you make these updates, you try to delete the site or a version of a document on the site. However, the attempt is unsuccessful, and you receive one of the error messages that are mentioned in scenarios 1 and 2.
40
40
41
-
**Scenario 4:** You've excluded or removed a SharePoint or a OneDrive site from an eDiscovery hold. When you try to delete the site, the attempt is unsuccessful, and you receive the error message that is mentioned in scenario 1.
41
+
**Scenario 4:** You exclude or remove a SharePoint or a OneDrive site from an eDiscovery hold. When you try to delete the site, the attempt is unsuccessful, and you receive the error message that's mentioned in scenario 1.
42
42
43
43
## Cause
44
44
45
-
Each of these error messages is generated when you try to delete a SharePoint or OneDrive site in either of the following situations:
45
+
These error messages are generated when you try to delete a SharePoint or OneDrive site in either of the following situations:
46
46
- You exclude or remove the site from a retention policy. However, the retention policy is invalid.
47
47
- The eDiscovery hold is within a 30-day grace period that prevents the site from being deleted.
48
48
49
49
## Resolution
50
50
51
-
Verify the validity of the retention policy or determine whether the eDiscovery hold is within the grace period. To do this, run the following test in the Microsoft 365 admin center. You must have **Global** or **Compliance** administrator permissions to use these steps.
51
+
Verify the validity of the retention policy or determine whether the eDiscovery hold is within the grace period. To take this action, run the following diagnostic in the Microsoft 365 admin center. You must have at least Compliance Administrator permissions to use these steps.
52
52
53
53
> [!NOTE]
54
54
> This diagnostic isn't available for the GCC High or DoD environments, or for Microsoft 365 operated by 21Vianet.
55
55
56
-
1. Select the **Run Tests: Invalid Retention or grace eDiscovery Hold** button to populate the associated test in the Microsoft 365 admin center:
56
+
1. Select the **Run Tests: Invalid Retention or grace eDiscovery Hold** button to populate the associated diagnostic in the Microsoft 365 admin center:
57
57
58
58
> [!div class="nextstepaction"]
59
59
> [Run Tests: Invalid Retention or grace eDiscovery Hold](https://aka.ms/PillarInvalidRetention)
60
60
61
-
2. In the **Run diagnostics** section, either type or copy and paste the URL of the SharePoint or OneDrive site that you want to delete.
61
+
2. In the **Run diagnostics** section, enter the URL of the SharePoint or OneDrive site that you want to delete.
62
62
63
63
3. Select **Run Tests**.
64
64
65
-
If the test finds an invalid retention policy that might be blocking the deletion, you can choose to remove the policy.
65
+
If the diagnostic finds an invalid retention policy that might be blocking the deletion, you can choose to remove the policy.
66
66
67
67
If the test finds that the eDiscovery hold is within the 30-day grace period, you can choose to remove the hold.
68
68
69
-
## More information
70
-
71
-
To resolve the error in Scenario 4, you can use either the diagnostic or the [Invoke-HoldRemovalAction](/powershell/module/exchange/invoke-holdremovalaction) command. This command can remove eDiscovery holds that are invalid, legacy, or within the 30-day grace period.
69
+
**Note**: To manage holds and resolve the error in Scenario 4, use the [Get-CaseHoldPolicy](/powershell/module/exchange/get-caseholdpolicy) command or the Microsoft Purview portal. Make sure that the location is released from the case hold policy before you try to delete the site. If the hold isn't released, use the [Set-CaseHoldPolicy](/powershell/module/exchange/set-caseholdpolicy) command to release it. If the policy can't be found by using the `Get-CaseHoldPolicy` command or the Purview portal, use the [Invoke-HoldRemovalAction](/powershell/module/exchange/invoke-holdremovalaction) command to clean up the orphan hold.
#Customer intent: As an Azure Kubernetes user, I want to perform basic troubleshooting of outbound connections from an Azure Kubernetes Service (AKS) cluster so that I don't experience connection issues when I use AKS.
@@ -24,13 +24,13 @@ This article discusses how to do basic troubleshooting of outbound connections f
24
24
25
25
## Scenarios for outbound traffic in Azure Kubernetes Service
26
26
27
-
Traffic that originates from within the AKS cluster, whether it's from a pod or a worker node, is considered the outbound traffic from the cluster. What if there's an issue in the outbound flow for an AKS cluster? Before you troubleshoot, first look at the scenarios for outbound traffic flow.
27
+
Traffic that originates from within the AKS cluster, whether it's from a pod or a worker node, is considered as outbound traffic from the cluster. If there's an issue in the outbound flow for an AKS cluster, before you troubleshoot, first look at the scenarios for outbound traffic flow.
28
28
29
29
The outbound traffic from an AKS cluster can be classified into the following categories:
30
30
31
31
1.[Traffic to a pod or service in the same cluster (internal traffic)](#internal-traffic).
32
32
33
-
1. Traffic to a device or endpoint in the same virtual network or a different virtual network that uses virtual network peering.
33
+
1. Traffic to a network resource or endpoint in the same virtual network or a different virtual network that uses virtual network peering.
34
34
35
35
1. Traffic to an on-premises environment through a VPN connection or an Azure ExpressRoute connection.
36
36
@@ -40,7 +40,7 @@ The outbound traffic from an AKS cluster can be classified into the following ca
40
40
41
41
#### Internal traffic
42
42
43
-
A basic request flow for internal traffic from an AKS cluster resembles the flow that's shown in the following diagram.
43
+
A basic request flow for internal traffic from an AKS cluster resembles the flow shown in the following diagram.
44
44
45
45
:::image type="content" source="./media/basic-troubleshooting-outbound-connections/internal-traffic-aks-cluster.svg" alt-text="Diagram of a basic request flow for internal traffic from an AKS cluster." lightbox="./media/basic-troubleshooting-outbound-connections/internal-traffic-aks-cluster.svg" border="false":::
46
46
@@ -62,37 +62,37 @@ It's important to understand the nature of egress flow for your cluster so that
62
62
63
63
## Considerations when troubleshooting
64
64
65
-
#### Check your egress device
65
+
#### Check your network resources within traffic flow
66
66
67
-
When you troubleshoot outbound traffic in AKS, it's important to know what your egress device is (that is, the device through which the traffic passes). Here, the egress device could be one of the following components:
67
+
When you troubleshoot outbound traffic in AKS, it's important to know what network resources are present (that is, the hops through which the traffic passes). Here, the network resource could be one of the following components:
68
68
69
69
- Azure Load Balancer
70
70
- Azure Firewall or a custom firewall
71
71
- A network address translation (NAT) gateway
72
72
- A proxy server
73
+
- Network security group (NSG)
74
+
- Network policy
73
75
74
-
The flow could also differ based on the destination. For example, internal traffic (that is, within the cluster) doesn't go through the egress device. The internal traffic would use only the cluster networking. For public outbound traffic, determine if there's an egress device passing through and check that device.
76
+
The flow could also differ based on the destination. For example, internal traffic (that is, within the cluster) doesn't go through the external network resources and only uses the cluster networking. For public outbound traffic, determine which network resources are implemented for your cluster.
75
77
76
-
#### Check each hop within traffic flow
78
+
#### Check outbound connectivity path and blockers with Azure Virtual Network Verifier (Preview)
79
+
To check where traffic is blocked within your network resources to specific endpoints (for example, `mcr.microsoft.com`), you can use the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier) tool. By running a connectivity analysis, you can visualize the hops within the traffic flow and any misconfigurations within Azure networking resources that are blocking traffic. We recommend using the Virtual Network Verifier tool as a first step in troubleshooting outbound connectivity issues to isolate the issue and detect problematic network configuration. For more instructions, [check if Azure network resources are blocking traffic to the endpoint using Azure Virtual Network Verifier (Preview)](#check-if-azure-network-resources-are-blocking-traffic-to-the-endpoint).
77
80
78
-
After identifying the egress device, check the following factors:
81
+
#### Manual troubleshooting
82
+
For manual troubleshooting, we recommend you check the following items:
79
83
80
84
- The source and the destination for the request.
81
85
- The hops in between the source and the destination.
82
86
- The request-response flow.
83
-
- The hops that are enhanced by extra security layers, such as the following layers:
87
+
- The hops enhanced by extra security layers, such as the following layers:
84
88
85
89
- Firewall
86
90
- Network security group (NSG)
87
91
- Network policy
88
92
89
-
To identify a problematic hop, check the response codes before and after it. To check whether the packets arrive properly in a specific hop, you can proceed with packet captures.
93
+
To identify a problematic hop, [check the HTTP response codes before and after it](get-and-analyze-http-response-codes.md). These codes are useful to identify the nature of the issue. The codes are especially helpful in scenarios in which the application responds to HTTP requests. To check whether the packets arrive properly in a specific hop, you can proceed with packet captures.
90
94
91
-
##### Check HTTP response codes
92
-
93
-
When you check each component, [get and analyze HTTP response codes](get-and-analyze-http-response-codes.md). These codes are useful to identify the nature of the issue. The codes are especially helpful in scenarios in which the application responds to HTTP requests.
94
-
95
-
##### Take packet captures from the client and server
95
+
#### Take packet captures from the client and server
96
96
97
97
If other troubleshooting steps don't provide any conclusive outcome, take packet captures from the client and server. Packet captures are also useful when non-HTTP traffic is involved between the client and server. For more information about how to collect packet captures for AKS environment, see the following articles in the data collection guide:
98
98
@@ -106,7 +106,9 @@ If other troubleshooting steps don't provide any conclusive outcome, take packet
106
106
107
107
For basic troubleshooting for egress traffic from an AKS cluster, follow these steps:
108
108
109
-
1.[Make sure that the Domain Name System (DNS) resolution for the endpoint works correctly](#check-whether-the-pod-and-node-can-reach-the-endpoint).
109
+
1.[Check if Azure network resources are blocking traffic to the endpoint using Azure Virtual Network Verifier (Preview)](#check-if-azure-network-resources-are-blocking-traffic-to-the-endpoint).
110
+
111
+
1.[Make sure that the Domain Name System (DNS) resolution for the endpoint works correctly](#check-that-the-domain-name-service-dns-resolution-for-the-endpoint-works-correctly).
110
112
111
113
1. Make sure that you can reach the endpoint through an IP address.
112
114
@@ -128,19 +130,45 @@ For basic troubleshooting for egress traffic from an AKS cluster, follow these s
128
130
>
129
131
> Assumes no service mesh when you do basic troubleshooting. If you use a service mesh such as Istio, it produces unusual outcomes for TCP based traffic.
130
132
131
-
#### Check whether the pod and node can reach the endpoint
133
+
#### Check if Azure network resources are blocking traffic to the endpoint
134
+
135
+
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier#supported-features-of-the-reachability-analysis) tool. The connectivity analysis covers the following resources:
136
+
137
+
- Azure Load Balancer
138
+
- Azure Firewall
139
+
- A network address translation (NAT) gateway
140
+
- Network security group (NSG)
141
+
- Network policy
142
+
- User defined routes (route tables)
143
+
- Virtual network peering
144
+
145
+
> [!NOTE]
146
+
>
147
+
> Azure Virtual Network Verifier (Preview) can't access any external or third-party networking resources, such as a custom firewall. If the connectivity analysis doesn't detect any blocked traffic, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
148
+
>
149
+
> Currently, clusters using Azure CNI Overlay aren't supported for this feature. Support for CNI Overlay is planned for August 2025.
150
+
151
+
1. Navigate to your cluster in the Azure portal. In the sidebar, navigate to the Settings -> Node pools blade.
152
+
2. Identify the nodepool you want to run a connectivity analysis from. Click on the nodepool to select it as the scope.
153
+
3. Select "Connectivity analysis (Preview)" from the toolbar at the top of the page. If you don't see it, click on the three dots "..." in the toolbar at the top of the page to open the expanded menu. <imgwidth="626"alt="image"src="https://github.com/user-attachments/assets/b2f05947-f753-49b9-9536-98d0b998ab52" />
154
+
4. Select a Virtual Machine Scale Set (VMSS) instance as the source. The source IP addresses are populated automatically.
155
+
5. Select a public domain name/endpoint as the destination for the analysis, one example is `mcr.microsoft.com`. The destination IP addresses are also populated automatically.
156
+
6. Run the analysis and wait up to 2 minutes for the results. In the resulting diagram, identify the associated Azure network resources and where traffic is blocked. To view the detailed analysis output, click on the "JSON output" tab or click into the arrows in the diagram.
157
+
158
+
159
+
#### Check that the Domain Name Service (DNS) resolution for the endpoint works correctly
132
160
133
-
From within the pod, you can run a DNS lookup to the endpoint.
161
+
You can run a DNS lookup to the endpoint by running a debugging pod on one of your AKS nodes. If the issue is isolated to a specific problematic pod or namespace, run the DNS lookup from within the same namespace where you notice the problem.
134
162
135
-
What if you can't run the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command to connect to the pod and install the DNS Utils package? In this situation, you can [start a test pod in the same namespace as the problematic pod](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/#create-a-simple-pod-to-use-as-a-test-environment), and then run the tests.
163
+
If you can't run the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command to connect to an existing pod, you can [start a test pod in the same namespace as the problematic pod](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/#create-a-simple-pod-to-use-as-a-test-environment) to run the tests.
136
164
137
165
> [!NOTE]
138
166
>
139
167
> If the DNS resolution or egress traffic doesn't let you install the necessary network packages, you can use the `rishasi/ubuntu-netutil:1.0` docker image. In this image, the required packages are already installed.
140
168
141
-
##### Example procedure for checking DNS resolution of a Linux pod
169
+
##### Example procedure for checking DNS resolution
142
170
143
-
1. Start a test pod in the same namespace as the problematic pod:
@@ -198,9 +226,9 @@ Sometimes, there's a problem with the endpoint itself rather than a cluster DNS.
198
226
curl -Ivm5 https://kubernetes.io
199
227
```
200
228
201
-
To verify that the endpoint is reachable from the node where the problematic pod is in and then verify the DNS settings, follow these steps:
229
+
To verify that the endpoint is reachable and DNS is functioning from the node hosting the problematic pod, follow these steps:
202
230
203
-
1. Enter the node where the problematic pod is in through the debug pod. For more information about how to do this, see [Connect to Azure Kubernetes Service (AKS) cluster nodes for maintenance or troubleshooting](/azure/aks/node-access).
231
+
1. Enter the node hosting the problematic pod using the debug pod. For more information, see [Connect to Azure Kubernetes Service (AKS) cluster nodes for maintenance or troubleshooting](/azure/aks/node-access).
0 commit comments