An Azure service that provides a general-purpose, serverless container platform.
Kaustubh Bhal hi,
given your diagnostics, this is almost certainly not APIM policy, not JWT, and not application code. It is either routing asymmetry or an ACA managed environment internal load balancer dataplane issue.
on the VM run az network nic show-effective-route-table and see if 10.0.7.118 shows as VNet local. If it points to a virtual appliance or anything else, u have a UDR / forced tunneling issue. Fix the route.
I would check effective NSG rules on both the APIM subnet and the VM NIC. Even if u think nothing blocks it, verify there is no outbound deny to 10.0.7.0/24 or 443. Use az network nic list-effective-nsg. Is container app ingress target port matches what u are hitting. If the app listens on 80 internally and u hit 443, ACA handles TLS at the environment level, but misconfigured ingress can still blackhole traffic. Double check ingress is internal and enabled.
I'm pretty sure u did but pls look if no firewall/NVA exists anywhere in the path. Even if ACA subnet has no UDR, another subnet with forced tunnel can break return path and cause SYN without SYN-ACK. If all routing and NSGs are clean and u still see SYN with no SYN-ACK from both VM and APIM, stop troubleshooting locally. That strongly indicates an ACA managed environment internal load balancer issue. So open a msft ticket. This is either asymmetric routing or an ACA internal dataplane issue. If routing is clean, its looks like a platform side and only msft can confirm and fix it.
rgds,
Alex