Hello Satyajit,
Greetings! Welcome to Microsoft Q&A Platform.
I understand that you're trying to access Storage account from different Azure VM. While doing this, you're getting an error that "Failed to access the service endpoint "https://ooooo.blob.core.windows.net/" (status code: 0, status text: "error"). This failure could be due to your network blocking access to the endpoint, for instance through a firewall. Click on this box to open the endpoint in a new tab. If the page fails to load, make sure your network allows access to the endpoint".
Private endpoints provide a secure way to access Azure services such as Azure Storage Accounts over a private connection within a virtual network (VNet), rather than over the public internet.
Try clearing your browser’s cache can resolve unexpected issues and also please ensure that the service principal or user has the necessary permissions on the virtual network in the subscription level. Specifically, they need the ‘Microsoft.Network/virtualNetworks/subnets/join/action permission’. This is typically included in the Network Contributor role also make sure that the user account which accesses the storage account coming from the subnet has an eligible role assignment to access the storage account. So for example, if the user should be able to read and write blob data, add a Storage Blob Data Contributor role for your user.
Browser extensions can sometimes interfere with the Azure portal. Try disabling them temporarily to see if that helps. Some users have reported that disabling certain accessibility settings in Edge can help. You can try going to edge://accessibility and unchecking "Web Accessibility".
If you’ve recently granted permissions or made changes, try refreshing your credentials by signing out and signing back in to the Azure portal. Sometimes, cached credentials can cause issues.
Also, a similar issue is discussed in the Answer section of the following SO thread: https://stackoverflow.com/questions/68988514/azure-storage-account-firewall-permissions-for-vulnerability-assessment.
Please consider checking the below troubleshooting steps to resolve the issue,
- By default, storage accounts accept connections from clients on any network. However, for limiting the access to selected networks, first step is to you must first change the default action.
- Azure Storage provides a layered security model allowing you to secure your storage accounts to a specific set of allowed networks. When network rules are configured specifically, then only applications from allowed networks can access a storage account.
- When you do "Select Networks" -> Which by default means access is blocked from all networks irrespective of whether same VNET.
- The term "Select Network" , itself means provide access from Selected Networks. (So If you don't select the network - then It can't be accessed from any where)
- Now open up access by adding the specific VNET -> Again in that VNET -> If you observe we can select to which subnet access needs to be given i.e. you are configuring storage accounts to allow access only from specific subnets
- To summarize : If the source request is coming from an Azure VM in the same Azure VNet and from same region, then the Azure storage firewall should be configured to allow the traffic by adding the VNet/Subnet within the “Virtual networks” section.
- The main use of Private Endpoints for your Azure Storage accounts to allow clients on a virtual network (VNet) to securely access data over a Private Link . The private endpoint uses an IP address from the VNet address space for your storage account service. Network traffic between the clients on the VNet and the storage account traverses over the VNet and a private link on the Microsoft backbone network, eliminating exposure from the public internet
- Basically , using private endpoints for your storage account enables you to: a) Secure your storage account by configuring the storage firewall to block all connections on the public endpoint for the storage service. b) Increases security for the virtual network (VNet), by enabling you to block exfiltration of data from the VNet. c) Securely connect to storage accounts from on-premises networks that connect to the VNet using VPN or ExpressRoutes with private-peering.
reference: https://learn.microsoft.com/en-us/azure/private-link/tutorial-private-endpoint-storage-portal?tabs=dynamic-ip
refer troubleshooting article and doc for more detailed guidance - https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal, https://learn.microsoft.com/en-us/azure/storage/common/network-routing-preference, https://techcommunity.microsoft.com/t5/azure-paas-blog/troubleshooting-storage-firewall-issues/ba-p/1944730.
Hope this answer helps! Please let us know if you have any further queries. I’m happy to assist you further.
Please "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.