Skip to content

Commit 8d92ab6

Browse files
committed
Acrolinx
1 parent d505585 commit 8d92ab6

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/cloud-shell/faq-troubleshooting.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ command that requires elevated permissions.
125125

126126
- **Details**: Cloud Shell uses Azure Relay for terminal connections. Cloud Shell can fail to
127127
request a terminal due to DNS resolution problems. This failure can be caused when you launch a
128-
Cloud Shell session from a host in a network that has a private DNS Zone for the servicebus
128+
Cloud Shell session from a host in a network that has a private DNS Zone for the `servicebus`
129129
domain. This error can also occur if you're using a private on-premises DNS server.
130130

131131
- **Resolution**: You can add a DNS record for the Azure Relay instance that Cloud Shell uses.
@@ -192,20 +192,20 @@ command that requires elevated permissions.
192192
### Terminal output - Sorry, your Cloud Shell failed to provision: {"code":"TenantDisabled" ...}
193193

194194

195-
- **Details**: In rare cases, Azure may detect fraudulent activity based on out-of-the-ordinary
196-
resource consumption based on the payload being submitted from Cloud Shell. When this occurs,
197-
Azure disables Cloud Shell at the tenant level and you see the following error message:
195+
- **Details**: In rare cases, Azure might flag out-of-the-ordinary resource consumption based in
196+
from Cloud Shell as fraudulent activity. When this occurs, Azure disables Cloud Shell at the
197+
tenant level and you see the following error message:
198198

199199
> Sorry, your Cloud Shell failed to provision: {"code":"TenantDisabled","message":"Cloud Shell has
200200
> been disabled in directory<>."} Please refresh the page.
201201

202-
There can be legitimate use cases where CPU usage within your Azure Cloud Shell instances exceeds
203-
the thresholds that trigger fraud prevention and block your tenant. Large AZCopy jobs could be
202+
There can be legitimate use cases where CPU usage in your Azure Cloud Shell instance exceeds the
203+
thresholds that trigger fraud prevention and block your tenant. Large AZCopy jobs could be the
204204
cause this event. The Microsoft Azure engineering team can help to figure out why the tenant was
205-
disabled and reenable it, if required.
205+
disabled and re-enable it.
206206

207-
- **Resolution**: Open a new Microsoft Azure support request to investigate the cause and reenable
208-
Cloud Shell for your tenant. Include the following details:
207+
- **Resolution**: To investigate the cause and re-enable Cloud Shell for your tenant, open a new
208+
Azure support request. Include the following details:
209209

210210
1. Tenant ID
211211
2. The business justification and a description of how you use Cloud Shell.

0 commit comments

Comments
 (0)