Skip to content

Commit 0310837

Browse files
authored
Update troubleshoot-direct-connectivity-issues.md
1 parent 4f93da1 commit 0310837

File tree

1 file changed

+43
-1
lines changed

1 file changed

+43
-1
lines changed

support/power-platform/power-automate/desktop-flows/troubleshoot-direct-connectivity-issues.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,10 +48,14 @@ The Power Automate service runs under its own Windows account (NT Service\UIFlow
4848
4949
If the machine and Power Automate service have reliable access to the network, the next likeliest source of issues is the on-premises network blocking or interfering with Azure relay connections.
5050

51-
A common culprit in both scenarios is a network proxy that restricts outbound traffic. In particular, authenticated proxies that use the credentials of the connected Windows user, given that the Power Automate service runs under its own dedicated account.
51+
A common culprit in both scenarios is a network proxy or a firewall that restricts outbound traffic.
52+
53+
In particular, authenticated proxies that use the credentials of the connected Windows user, given that the Power Automate service runs under its own dedicated account.
5254

5355
You can refer to [Proxy setup](https://support.microsoft.com/topic/power-automate-for-desktop-proxy-setup-8a79d690-1c02-416f-8af1-f057df5fe9b7) if you determine that you need to override the default proxy settings used by the Power Automate service. You may also need to [change the on-premises service account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account).
5456

57+
Azure Relay requires to have all the relay gateways used by the primary and secondary namespaces allowed by the proxy and firewall configurations.
58+
5559
## How to investigate
5660

5761
1. To help you investigate these issues, make sure to engage your network administrators who will have the knowledge required to understand what is happening.
@@ -63,6 +67,44 @@ You can refer to [Proxy setup](https://support.microsoft.com/topic/power-automat
6367
4. Get WCF logs from the Power Automate service (UIFlowService). For more information, see the [Enable WCF tracing](#enable-wcf-tracing) section below.
6468

6569
5. Make sure your network configuration allows web socket traffic and long-running connections: a common pattern is proxies or other network devices killing connections after a set time.
70+
6. Make sure firewall allows connections to Azure Relay gateways by following below steps:
71+
72+
#### Step 1: identify the Azure relay namespaces
73+
74+
Two Azure relay namespaces can be used for the connecting a machine to the Power Automate cloud services.
75+
76+
To identify the namespaces used by a machine:
77+
78+
1. Launch the "Power Automate machine runtime" application and sign-in
79+
2. Locate the "Diagnose connectivity issues for runtime" section and click on "Launch diagnostic tool"
80+
3. Wait for the diagnostics to end
81+
4. Click on "Generate the report"
82+
5. Open the generated xls file
83+
6. Local the Data column and copy the 2 URLs corresponding to PrimaryRelay and SecondaryRelay
84+
7. Extract the namespace part from each PrimaryRelay and SecondaryRelay URL https://\<namespace>/guid_guid
85+
86+
#### Step 2: Configure the firewall with the DNS names required for both the primary and secondary relays
87+
88+
Configure your firewalls with the DNS names of all the Relay gateways, which can be found by running [this script](https://github.com/Azure/azure-relay-dotnet/blob/dev/tools/GetNamespaceInfo.ps1) .
89+
90+
This script will resolve the fully qualified domain names of all the gateways to which you need to establish a connection.
91+
92+
Change any rules that previously used the IP addresses to use the namespace DNS names for port 443.
93+
94+
#### Step 3: manual connectivity test can be done
95+
96+
WCF tracing can be enabled on the machine in case of cloud connectivity issue. Direct connectivity issues in Power Automate for desktop - Power Automate | Microsoft Learn
97+
98+
The log should contain exceptions related to connectivity for a specific DNS or IP address or point to missing proxy configuration.
99+
100+
The connection between the machine and the endpoint can be tested by running a TCP ping:
101+
102+
1. Open PowerShell and run the below command
103+
2. Test-netconnection \<ipaddress or dnsname> -port 443
104+
105+
The result will be displayed as the output of TcpTestSucceeded.
106+
107+
If not succeeding, this is likely that the firewall does not allow the connection. Thus engage your network team to understand if any proxy or firewall could prevent access. There could be several firewalls and proxies between the machine and the Azure Relay services, thus make sure to check each of the subnet configurations.
66108

67109
## What information to include when opening a support ticket
68110

0 commit comments

Comments
 (0)