Skip to content

Commit 240c48d

Browse files
authored
Merge pull request #100601 from jaysterp/patch-8
[ACR] Add Key Vault TSG for Transfer feature
2 parents ea4a7d6 + 3753ac7 commit 240c48d

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/container-registry/container-registry-transfer-troubleshooting.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ ms.topic: article
1212
* **Template deployment failures or errors**
1313
* If a pipeline run fails, look at the `pipelineRunErrorMessage` property of the run resource.
1414
* For common template deployment errors, see [Troubleshoot ARM template deployments](../azure-resource-manager/templates/template-tutorial-troubleshoot.md)
15+
* **Problems accessing Key Vault**<a name="problems-accessing-key-vault"></a>
16+
* If your pipelineRun deployment fails with a `403 Forbidden` error when accessing Azure Key Vault, verify that your pipeline managed identity has adequate permissions.
17+
* A pipelineRun uses the exportPipeline or importPipeline managed identity to fetch the SAS token secret from your Key Vault. ExportPipelines and importPipelines are provisioned with either a system-assigned or user-assigned managed identity. This managed identity is required to have `secret get` permissions on the Key Vault in order to read the SAS token secret. Ensure that an access policy for the managed identity was added to the Key Vault. For more information, reference [Give the ExportPipeline identity keyvault policy access](./container-registry-transfer-cli.md#give-the-exportpipeline-identity-keyvault-policy-access) and [Give the ImportPipeline identity keyvault policy access](./container-registry-transfer-cli.md#give-the-importpipeline-identity-keyvault-policy-access).
1518
* **Problems accessing storage**<a name="problems-accessing-storage"></a>
1619
* If you see a `403 Forbidden` error from storage, you likely have a problem with your SAS token.
1720
* The SAS token might not currently be valid. The SAS token might be expired or the storage account keys might have changed since the SAS token was created. Verify that the SAS token is valid by attempting to use the SAS token to authenticate for access to the storage account container. For example, put an existing blob endpoint followed by the SAS token in the address bar of a new Microsoft Edge InPrivate window or upload a blob to the container with the SAS token by using `az storage blob upload`.
@@ -54,4 +57,4 @@ ms.topic: article
5457
[az-deployment-group-show]: /cli/azure/deployment/group#az_deployment_group_show
5558
[az-acr-repository-list]: /cli/azure/acr/repository#az_acr_repository_list
5659
[az-acr-import]: /cli/azure/acr#az_acr_import
57-
[az-resource-delete]: /cli/azure/resource#az_resource_delete
60+
[az-resource-delete]: /cli/azure/resource#az_resource_delete

0 commit comments

Comments
 (0)