Skip to content

Commit 80df645

Browse files
authored
Update troubleshoot-direct-connectivity-issues.md
1 parent 94ef2a4 commit 80df645

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

support/power-platform/power-automate/desktop-flows/troubleshoot-direct-connectivity-issues.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Direct connectivity issues in Power Automate for desktop
33
description: Provides more information about how to solve the direct connectivity issues in Power Automate for desktop.
44
ms.reviewer: guco, madiazor, johndund, qliu
5-
ms.date: 05/15/2025
5+
ms.date: 05/19/2025
66
ms.custom: sap:Desktop flows
77
---
88
# Direct connectivity issues in Power Automate for desktop
@@ -27,7 +27,7 @@ When attempting to run your desktop flows from a cloud flow or manage your deskt
2727
#### Scenario 2
2828

2929
- Desktop flows run on a registered machine as long as a user session is running (attended runs) or even for some minutes after the last user signs out (unattended runs).
30-
- The connection to the machine is lost after some minutes (for example, 15 minutes.)
30+
- The connection to the machine is lost after some minutes (for example, 15 minutes).
3131
- The connection is re-established once a user signs back in to the machine.
3232

3333
#### Scenario 3
@@ -40,7 +40,7 @@ Direct to machine connectivity uses [Azure Windows Communication Foundation (WCF
4040

4141
The most common cause of relay connectivity issues is the machine losing connection to the network. This can be caused by your machine not being powered on or losing network when no user is signed in to the machine.
4242

43-
The Power Automate service runs under its own Windows account (NT Service\UIFlowService by default) which must have access to the network and be able to connect to _*.servicebus.windows.net_ (for more information, see [network requirements](/power-automate/ip-address-configuration#desktop-flows-services-required-for-runtime).)
43+
The Power Automate service runs under its own Windows account (NT Service\UIFlowService by default) which must have access to the network and be able to connect to _*.servicebus.windows.net_. For more information, see [network requirements](/power-automate/ip-address-configuration#desktop-flows-services-required-for-runtime).
4444

4545
> [!NOTE]
4646
> If you use an Azure virtual machine (VM) to run Power Automate for desktop, make sure the Microsoft.ServiceBus endpoint is turned off at the subnet level where the Azure VM is located. This is a known limitation. For more information, see [Azure Relay doesn't support network service endpoints](/azure/azure-relay/network-security).
@@ -51,9 +51,9 @@ A common culprit in both scenarios is a network proxy or a firewall that restric
5151

5252
In particular, authenticated proxies that use the credentials of the connected Windows user, given that the Power Automate service runs under its own dedicated account.
5353

54-
You can refer to [Proxy setup](/power-automate/desktop-flows/how-to/proxy-settings) if you determine that you need to override the default proxy settings used by the Power Automate service. You may also need to [change the on-premises service account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account).
54+
You can refer to [Proxy setup](/power-automate/desktop-flows/how-to/proxy-settings) if you determine that you need to override the default proxy settings used by the Power Automate service. You might also need to [change the on-premises service account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account).
5555

56-
Azure Relay requires to have all the relay gateways used by the primary and secondary namespaces allowed by the proxy and firewall configurations.
56+
For Azure Relay to function properly, it's necessary to configure the proxy and firewall settings to permit the relay gateways associated with both the primary and secondary namespaces. This ensures that the communication between these gateways isn't blocked by the network security settings.
5757

5858
## How to investigate
5959

@@ -63,14 +63,14 @@ Azure Relay requires to have all the relay gateways used by the primary and seco
6363

6464
2. Understand network topology.
6565

66-
- Trace the path of traffic through network devices (for example, NAT, firewalls, proxies) to the public internet.
66+
- Trace the path of traffic through network devices (for example, NAT, firewalls, and proxies) to the public internet.
6767
- Collect logs from devices during impacted runs and confirm traffic to _*.servicebus.windows.net_ successfully reaches the public internet.
6868

6969
3. If your network traffic runs though a proxy, consider [changing the on-premises account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account) used by the Power Automate service (UIFlowService).
7070

7171
4. Get WCF logs from the Power Automate service (UIFlowService). For more information, see [Enable WCF tracing](#enable-wcf-tracing).
7272

73-
5. Make sure your network configuration allows web socket traffic and long-running connections. Connections terminated after a set time may cause issues.
73+
5. Make sure your network configuration allows web socket traffic and long-running connections. Some network devices, like proxies, might automatically terminate connections after a certain period, which can disrupt the communication.
7474

7575
6. Make sure firewall allows connections to Azure Relay gateways:
7676

@@ -83,21 +83,21 @@ Azure Relay requires to have all the relay gateways used by the primary and seco
8383
3. Wait for the diagnostics to complete.
8484
4. Select **Generate the report**.
8585
5. Open the generated XLS file and locate the **Data** column.
86-
6. Extract the namespace part from the URLs of **PrimaryRelay** and **SecondaryRelay** (for example, https://\<namespace>/guid_guid.)
86+
6. Extract the namespace part from the URLs of **PrimaryRelay** and **SecondaryRelay**. For example, https://\<namespace>/guid_guid.
8787

8888
**Step 2: Configure the firewall with the DNS names required for both the primary and secondary relays**
8989

9090
1. Configure your firewalls with the Domain Name System (DNS) names of all the Relay gateways.
9191

92-
The DNS names can be found by running the [script](https://github.com/Azure/azure-relay-dotnet/blob/dev/tools/GetNamespaceInfo.ps1). This script will resolve the fully qualified domain names (FQDNs) of all the gateways to which you need to establish a connection.
92+
The DNS names can be found by running the [script](https://github.com/Azure/azure-relay-dotnet/blob/dev/tools/GetNamespaceInfo.ps1). This script resolves the fully qualified domain names (FQDNs) of all the gateways to which you need to establish a connection.
9393

9494
2. Configure firewall rules to allow the DNS names on port 443 instead of IP addresses.
9595

9696
**Step 3: Perform manual connectivity tests**
9797

98-
WCF tracing can be enabled on the machine if there's cloud connectivity issue. For more information, see [Enable WCF tracing](#enable-wcf-tracing).
98+
WCF tracing can be enabled on the machine if there's a cloud connectivity issue. For more information, see [Enable WCF tracing](#enable-wcf-tracing).
9999

100-
The WCF log should contain exceptions related to connectivity for a specific DNS or IP address or point to missing proxy configuration.
100+
The WCF log should contain exceptions related to connectivity for a specific DNS or IP address, or point to missing proxy configuration.
101101

102102
To test the connection between the machine and the endpoint, run a TCP ping from PowerShell using the following command:
103103

@@ -143,14 +143,14 @@ If the issue still persists, you can open a support ticket with Microsoft by pro
143143
</system.diagnostics>
144144
```
145145
146-
- You can substitute the `c:\logs\PADwcfTraces.svclog` value with any valid path you'd like but the folder (the `c:\logs` in this example) must exist, otherwise it won't be created and logs won't be written.
147-
- The Power Automate service must have permission to write in the chosen folder, granting the 'Everyone' user full control over the folder works. You can get the service user's Sid by running `sc showsid UIFlowService` in a command line if you want to give permissions to only that user.
146+
- You can substitute the `c:\logs\PADwcfTraces.svclog` value with any valid path you want, but the folder (`c:\logs` in this example) must exist. Otherwise, it isn't be created and logs aren't be written.
147+
- The Power Automate service needs permissions to write logs into the specified folder. You can grant full control to the `Everyone` user, allowing any user or service to write to the folder. Alternatively, to restrict permissions to only the Power Automate service, find the service user's Security Identifier (Sid) by running `sc showsid UIFlowService`, and then grant permissions to that user.
148148
149149
3. After saving the config file, restart the Power Automate service.
150150
151-
1. Open the Windows Services tool (search for "services" in the **Start** menu).
152-
2. Find **Power Automate service**, right-click, and select **Restart**.
151+
1. Search for "services" in the **Start** menu to open the Windows Services tool.
152+
2. Find **Power Automate service**, right-click it, and select **Restart**.
153153
154-
:::image type="content" source="media/direct-connectivity-troubleshooting/restart-power-automate-service.png" alt-text="Restart the Power Automate Service in the Services tool.":::
154+
:::image type="content" source="media/direct-connectivity-troubleshooting/restart-power-automate-service.png" alt-text="Screenshot of restarting the Power Automate Service in the Services tool.":::
155155
156-
Traces will be saved to the specified file, providing detailed logs to diagnose connectivity issues.
156+
Traces are saved to the specified file, providing detailed logs to diagnose connectivity issues.

0 commit comments

Comments
 (0)