Skip to content

Commit 3deb758

Browse files
committed
add troubleshooting
1 parent 95609bb commit 3deb758

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

articles/app-service/tutorial-networking-isolate-vnet.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,14 @@ The two private endpoints are only accessible to clients inside the VNet you cre
167167
168168
1. In the browser, navigate to `<app-name>.azurewebsites.net` again and wait for the integration to take effect. If you get an HTTP 500 error, wait a few minutes and try again. If you can load the page and get detection results, then you're connecting to the Cognitive Services endpoint with key vault references.
169169
170+
>[!NOTE]
171+
> If keep getting HTTP 500 errors after a long time, it may help to force a re-fetch of the [key vault references](app-service-key-vault-references.md) again, like so:
172+
>
173+
> ```azurecli-interactive
174+
> az webapp config appsettings set --resource-group $groupName --name $appName --settings CS_ACCOUNT_NAME="@Microsoft.KeyVault(SecretUri=$csResourceKVUri)" CS_ACCOUNT_KEY="@Microsoft.KeyVault(SecretUri=$csKeyKVUri)"
175+
> ```
176+
177+
170178
## Manage the locked down resources
171179
172180
Depending on your scenarios, you may not be able to manage the private endpoint protected resources through the Azure portal, Azure CLI, or Azure PowerShell (for example, Key Vault). These tools all make REST API calls to access the resources through the public internet, and are blocked by your configuration. Here are a few options for accessing the locked down resources:

0 commit comments

Comments
 (0)