Back to All Scenarios
PASSEDcloud / azure_blob

Azure: Azure Blob Storage SAS Token Expired

Shared Access Signature tokens for blob storage have expired. Application cannot read or write to storage containers.

Pattern
AZURE_CLOUD
Expected: AZURE_AUTH_EXPIRED
Severity
HIGH
Confidence
68%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionAZURE_AUTH_EXPIREDAZURE_CLOUD
Severity AssessmentCRITICALHIGH
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

Azure Blob Storage account 'prodstorage'. SAS token generated 30 days ago with 30-day expiry. Application uses SAS token for all blob operations. All reads/writes failing.

Injected Error Messages (1)

Azure Blob Storage SAS expired — all blob operations returning 403 AuthorizationFailure, SAS token expired 2 hours ago, application cannot read/write to container 'documents'

Neural Engine Root Cause Analysis

Azure cloud infrastructure event detected — an Azure resource may be failing, an App Service is unhealthy, Azure AD authentication is disrupted, or a Service Bus queue is backed up. Azure outages can cascade across dependent services and affect both cloud-hosted applications and hybrid on-premises integrations relying on Azure AD.

Remediation Plan

1. Check Azure Service Health (status.azure.com) for any active incidents in your region. 2. Review Azure Monitor alerts and resource health for the affected service. 3. For App Service issues, check the Kudu console for application logs and restart the app if needed. 4. For Azure AD issues, verify conditional access policies and check the Azure AD sign-in logs for failure reasons. 5. For Service Bus, check dead-letter queues and verify the sending/receiving applications are connected and processing messages.

Improvements Applied

  • Pattern classified as AZURE_CLOUD (expected AZURE_AUTH_EXPIRED)
  • Severity: HIGH (expected CRITICAL)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr9bk09c5lig7lfjg8fit