Blog Post

Azure Integration Services Blog
3 MIN READ

Network Connectivity Check APIs for Logic App Standard

Mohammed_Barqawi's avatar
Apr 19, 2026

Introduction

When your Logic App Standard is integrated with a Virtual Network (VNET), you can use these APIs to troubleshoot connectivity issues to downstream resources like SQL databases, Storage Accounts, Service Bus, Key Vault, and more. The checks run directly from the worker hosting your Logic App, so the results reflect the actual network path your workflows use.

API Overview

APIHTTP MethodRoute SuffixPurpose
ConnectivityCheckPOST/connectivityCheckValidates end-to-end connectivity to an Azure resource (SQL, Key Vault, Storage, Service Bus, etc.)
DnsCheckPOST/dnsCheckPerforms DNS resolution for a hostname
TcpPingCheckPOST/tcpPingCheckPerforms a TCP ping to a host and port

How to Call Using Azure  API Playground

  1. Sign in with your Azure account.

    https://portal.azure.com/#view/Microsoft_Azure_Resources/ArmPlayground.ReactView

     

  2. Use POST method with the URLs below.

     

    Instead of API playground you can also use PowerShell or Az Rest

URL Pattern

Production slot:

POST https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{logicAppName}/connectivityCheck?api-version=2026-03-01-preview

Deployment slot:

POST https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{logicAppName}/slots/{slotName}/connectivityCheck?api-version=2026-03-01-preview

Replace connectivityCheck with dnsCheck or tcpPingCheck as needed.

all the requests should be Json 

 

1. ConnectivityCheck

Tests end-to-end connectivity from your Logic App to an Azure resource. This validates DNS, TCP, and authentication in a single call.

Supported Provider Types

ProviderTypeUse For
KeyVaultAzure Key Vault
SQLAzure SQL Database / SQL Server
ServiceBusAzure Service Bus
EventHubsAzure Event Hubs
BlobStorageAzure Blob Storage
FileShareAzure File Share (see Port 445 limitation)
only tese 443 
QueueStorageAzure Queue Storage
TableStorageAzure Table Storage
WebAny HTTP/HTTPS endpoint

Credential Types

CredentialTypeWhen to Use
ConnectionStringYou have a connection string to provide directly
AuthenticationYou have an endpoint URL with username and password
CredentialReferenceYou want to reference an existing connection string or app setting by name
AppSettingYou want to reference an app setting configured on the Logic App
ManagedIdentityYour Logic App uses Managed Identity to authenticate

Sample Request — Connection String (SQL Database)

POST https://management.azure.com/subscriptions/{subId}/resourceGroups/{rg}/providers/Microsoft.Web/sites/{logicAppName}/connectivityCheck?api-version=2026-03-01-preview Content-Type: application/json 

{
  "properties": {
    "providerType": "SQL",
    "credentials": {
      "credentialType": "ConnectionString",
      "connectionString": "Server=tcp:myserver.database.windows.net,1433;Database=mydb;User ID=myuser;Password=mypassword;Encrypt=True;TrustServerCertificate=False;"
    },
    "resourceMetadata": {
      "entityName": ""
    }
  }
}

 

Sample Request — App Setting Reference (Service Bus)

Use this when your connection string is stored in an app setting on the Logic App (e.g., ServiceBusConnection).

{
  "properties": {
    "providerType": "ServiceBus",
    "credentials": {
      "credentialType": "AppSetting",
      "appSetting": "ServiceBusConnection"
    },
    "resourceMetadata": {
      "entityName": "myqueue"
    }
  }
}

 

Sample Request — Managed Identity (Blob Storage)

Use this when your Logic App authenticates using Managed Identity.

{
  "properties": {
    "providerType": "BlobStorage",
    "credentials": {
      "credentialType": "ManagedIdentity",
      "managedIdentity": {
        "targetResourceUrl": "https://mystorageaccount.blob.core.windows.net",
        "clientId": ""
      }
    },
    "resourceMetadata": {
      "entityName": ""
    }
  }
}

Tip: Leave clientId empty to use the system-assigned managed identity. Provide a client ID to use a specific user-assigned managed identity.

2. DnsCheck

Tests whether a hostname can be resolved from your Logic App's worker. This is useful for verifying private DNS zones and private endpoints are configured correctly.

Sample Request

POST https://management.azure.com/subscriptions/{subId}/resourceGroups/{rg}/providers/Microsoft.Web/sites/{logicAppName}/dnsCheck?api-version=2026-03-01-preview Content-Type: application/json 

{
  "properties": {
    "dnsName": "myserver.database.windows.net"
  }
}

3. TcpPingCheck

Tests whether a TCP connection can be established from your Logic App to a specific host and port. This is useful for checking if a port is open and reachable through your VNET.

Sample Request

POST https://management.azure.com/subscriptions/{subId}/resourceGroups/{rg}/providers/Microsoft.Web/sites/{logicAppName}/tcpPingCheck?api-version=2026-03-01-preview Content-Type: application/json 

{
  "properties": {
    "host": "myserver.database.windows.net",
    "port": "1433"
  }
}

 

Port 445 (SMB / Azure File Share) — Known Limitation

Port 445 cannot be reliably tested using TcpPingCheck or ConnectivityCheck with the FileShare provider type.

Restricted Outgoing Ports

Regardless of address, applications cannot connect to anywhere using ports 445, 137, 138, and 139. In other words, even if connecting to a non-private IP address or the address of a virtual network, connections to ports 445, 137, 138, and 139 are not permitted.

 

Updated Apr 19, 2026
Version 1.0
No CommentsBe the first to comment