Azure compute resources that are used to create and manage groups of heterogeneous load-balanced virtual machines.
Asmita Yadav - Please check extension logs inside one affected VMSS instance
Review logs at: C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\<version> to identify the exact failure during service start
Please verify managed identity and Key Vault permissions
- Ensure the VMSS identity has Key Vault Secrets User (or equivalent) role assigned at the vault scope.
- Missing permissions cause the extension to timeout -https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/key-vault-windows
Validate network connectivity to Key Vault - Confirm the VMSS can reach the Key Vault endpoint (especially if using Private Endpoint, NSGs, or Azure Firewall).
Reinstall or upgrade the extension Remove the failed extension and redeploy it with autoUpgradeMinorVersion = true after the VMSS reaches a stable state.
Key Vault VM Extension for Windows https://learn.microsoft.com/azure/virtual-machines/extensions/key-vault-windows
Finally, the issue has been resolved by deleting and redeploying the VMSS after draining traffic from the affected region. The service is now functioning as expected.