An Azure machine learning service for building and deploying models.
The customer is facing a storage mount failure with the error:
Failed to mount storage due to permissions issue Make sure the identity has the right permissions like Storage File Privileged Contributor
This error occurs during compute/container creation and leads to repeated retries, even though the service returns HTTP 500 errors.
Findings:
The storage mount failure initially appeared to be an RBAC permission issue.
- The identity is a Managed Identity (MSI).
- The required role Storage File Privileged Contributor is a data‑plane role, which is often not granted by default to customer user identities.
- Customers typically only have control‑plane roles, so both of the following must be verified:
- The workspace Managed Identity (MSI) has the data‑plane role.
- The customer’s user identity also has the same role assigned on the storage account (via IAM).
Further investigation revealed the actual blocking factor was Network Security Perimeter (NSP) restrictions on the storage account.
- Error observed: Microsoft.Azure.Storage.StorageException: This request is not authorized by network security perimeter to perform this operation
- Even with correct RBAC permissions, NSP rules were denying access from the workspace Managed Identity.
- As a result, container creation kept retrying continuously, amplifying the issue.
Customer Actionability
- The customer can fully self‑serve:
- Verify RBAC (data‑plane roles) on the storage account.
- Review and adjust NSP rules using diagnostics.
NSP creation link :
Quickstart - Create a network security perimeter - Azure portal - Azure Private Link | Microsoft Le…
Diagnostic logs :
Diagnostic logs for Network Security Perimeter - Azure Private Link | Microsoft Learn.
Thanks,
Manish.