An Azure service that provides a general-purpose, serverless container platform.
Hi @Ronny Lerch
Thank you for reaching out to Microsoft Q&A.
When an Azure App Service for Containers remains in the “Pulling image” state for an extended period without producing any meaningful logs, this typically indicates a platform‑level issue during the image pull phase rather than an application startup problem. By default, Azure App Service does not surface detailed errors related to container image pulls unless container logging is explicitly enabled. As a result, issues such as registry authentication failures, DNS resolution problems, network connectivity restrictions (for example, private endpoints or VNet‑restricted registries), or stale image‑pull workers can cause the platform to repeatedly retry the pull operation silently. Standard actions like restarting the app service, restarting or replacing instances, or switching images may not resolve the issue because the underlying image pull process itself is blocked or misconfigured.
Refer below points to resolve this issue or use them as a workaround:
Enable container logging and review image pull logs By default, image pull errors are not visible in standard App Service logs. Enable Docker container logging so that authentication, DNS, or network‑related failures during the pull operation can be identified.
az webapp log config \
--name <app-name> \
--resource-group <resource-group> \
--docker-container-logging filesystem
You can then stream logs using:
az webapp log tail \
--name <app-name> \
--resource-group <resource-group>
Alternatively, review logs directly via:
https://<app-name>.scm.azurewebsites.net/api/logs/docker
Verify registry access and network configuration If the container image is hosted in a private registry (such as Azure Container Registry with private endpoint or firewall rules), ensure that the App Service can reach the registry. This includes validating DNS resolution and network paths. If the registry is accessible only through a VNet, the App Service must be configured to pull images via that VNet.
Enable VNet image pull for private registries When using a VNet‑restricted registry, explicitly enable image pulling over the VNet for the App Service:
az resource update \
--resource-group <resource-group> \
--name <app-name> \
--resource-type "Microsoft.Web/sites" \
--set properties.vnetImagePullEnabled=true
Without this setting, the App Service may continuously retry pulling the image without success.
Validate authentication to the container registry Confirm that the App Service is correctly authenticated to the registry. If using Managed Identity, ensure the identity is enabled and has the AcrPull role assigned. If using username and password, verify that the credentials configured in the App Service settings are correct and not expired.
Force a platform reset using a known‑good image As a workaround, temporarily configure the App Service to use a public, known‑good container image. Once the app starts successfully, switch back to the original image. This action often forces Azure to reinitialize the image pull pipeline and clear any stuck state.