Skip to content

Commit 393ef63

Browse files
authored
Merge pull request #222604 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents a9eb298 + e262890 commit 393ef63

File tree

43 files changed

+249
-123
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+249
-123
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27757,7 +27757,72 @@
2775727757
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sapase.md",
2775827758
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapase",
2775927759
"redirect_document_id": false
27760+
},
27761+
{
27762+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_general.md",
27763+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-general",
27764+
"redirect_document_id": false
2776027765
},
27766+
{
27767+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_ibm.md",
27768+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-ibm",
27769+
"redirect_document_id": false
27770+
},
27771+
{
27772+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_maxdb.md",
27773+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-maxdb",
27774+
"redirect_document_id": false
27775+
},
27776+
{
27777+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_oracle.md",
27778+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-oracle",
27779+
"redirect_document_id": false
27780+
},
27781+
{
27782+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sqlserver.md",
27783+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sqlserver",
27784+
"redirect_document_id": false
27785+
},
27786+
{
27787+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-supported-product-on-azure.md",
27788+
"redirect_url": "/azure/virtual-machines/workloads/sap/supported-product-on-azure",
27789+
"redirect_document_id": false
27790+
},
27791+
{
27792+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-rise-integration.md",
27793+
"redirect_url": "/azure/virtual-machines/workloads/sap/rise-integration",
27794+
"redirect_document_id": false
27795+
},
27796+
{
27797+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-proximity-placement-scenarios.md",
27798+
"redirect_url": "/azure/virtual-machines/workloads/sap/proximity-placement-scenarios",
27799+
"redirect_document_id": false
27800+
},
27801+
{
27802+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-planning-supported-configurations.md",
27803+
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-supported-configurations",
27804+
"redirect_document_id": false
27805+
},
27806+
{
27807+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-iq-deployment-guide.md",
27808+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapiq",
27809+
"redirect_document_id": false
27810+
},
27811+
{
27812+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-certifications.md",
27813+
"redirect_url": "/azure/virtual-machines/workloads/sap/certifications",
27814+
"redirect_document_id": false
27815+
},
27816+
{
27817+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-ha-availability-zones.md",
27818+
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-zones",
27819+
"redirect_document_id": false
27820+
},
27821+
{
27822+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-deployment-checklist.md",
27823+
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
27824+
"redirect_document_id": false
27825+
},
2776127826
{
2776227827
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2776327828
"redirect_url": "scale-hyper-v-assessment",

articles/automation/automation-runbook-execution.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Runbook execution in Azure Automation
33
description: This article provides an overview of the processing of runbooks in Azure Automation.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 09/15/2021
6+
ms.date: 12/28/2022
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell
99
---
@@ -30,38 +30,39 @@ The following diagram shows the lifecycle of a runbook job for [PowerShell runbo
3030

3131
Runbooks in Azure Automation can run on either an Azure sandbox or a [Hybrid Runbook Worker](automation-hybrid-runbook-worker.md).
3232

33-
When runbooks are designed to authenticate and run against resources in Azure, they run in an Azure sandbox. Azure Automation assigns a worker to run each job during runbook execution in the sandbox. While workers are shared by many Automation accounts, jobs from different Automation accounts are isolated from one another. Jobs using the same sandbox are bound by the resource limitations of the sandbox. The Azure sandbox environment does not support interactive operations. It prevents access to all out-of-process COM servers, and it does not support making [WMI calls](/windows/win32/wmisdk/wmi-architecture) to the Win32 provider in your runbook.  These scenarios are only supported by running the runbook on a Windows Hybrid Runbook Worker.
33+
When runbooks are designed to authenticate and run against resources in Azure, they run in an Azure sandbox. Azure Automation assigns a worker to run each job during runbook execution in the sandbox. While workers are shared by many Automation accounts, jobs from different Automation accounts are isolated from one another. Jobs using the same sandbox are bound by the resource limitations of the sandbox. The Azure sandbox environment doesn't support interactive operations. It prevents access to all out-of-process COM servers, and it doesn't support making [WMI calls](/windows/win32/wmisdk/wmi-architecture) to the Win32 provider in your runbook.  These scenarios are only supported by running the runbook on a Windows Hybrid Runbook Worker.
3434

3535
You can also use a [Hybrid Runbook Worker](automation-hybrid-runbook-worker.md) to run runbooks directly on the computer that hosts the role and against local resources in the environment. Azure Automation stores and manages runbooks and then delivers them to one or more assigned computers.
3636

37-
Enabling the Azure Firewall on [Azure Storage](../storage/common/storage-network-security.md), [Azure Key Vault](../key-vault/general/network-security.md), or [Azure SQL](/azure/azure-sql/database/firewall-configure) blocks access from Azure Automation runbooks for those services. Access will be blocked even when the firewall exception to allow trusted Microsoft services is enabled, as Automation is not a part of the trusted services list. With an enabled firewall, access can only be made by using a Hybrid Runbook Worker and a [virtual network service endpoint](../virtual-network/virtual-network-service-endpoints-overview.md).
37+
Enabling the Azure Firewall on [Azure Storage](../storage/common/storage-network-security.md), [Azure Key Vault](../key-vault/general/network-security.md), or [Azure SQL](/azure/azure-sql/database/firewall-configure) blocks access from Azure Automation runbooks for those services. Access will be blocked even when the firewall exception to allow trusted Microsoft services is enabled, as Automation isn't a part of the trusted services list. With an enabled firewall, access can only be made by using a Hybrid Runbook Worker and a [virtual network service endpoint](../virtual-network/virtual-network-service-endpoints-overview.md).
3838

3939
>[!NOTE]
40-
>To run on a Linux Hybrid Runbook Worker, your scripts must be signed and the worker configured accordingly. Alternatively, [signature validation must be turned off](automation-linux-hrw-install.md#turn-off-signature-validation).
40+
>- To run on a Linux Hybrid Runbook Worker, your scripts must be signed and the worker configured accordingly. Alternatively, [signature validation must be turned off](automation-linux-hrw-install.md#turn-off-signature-validation).
41+
>- Runbook execution shouldn't depend on timezone of the sandbox.
4142
4243
The following table lists some runbook execution tasks with the recommended execution environment listed for each.
4344

4445
|Task|Recommendation|Notes|
4546
|---|---|---|
4647
|Integrate with Azure resources|Azure Sandbox|Hosted in Azure, authentication is simpler. If you're using a Hybrid Runbook Worker on an Azure VM, you can [use runbook authentication with managed identities](automation-hrw-run-runbooks.md#runbook-auth-managed-identities).|
4748
|Obtain optimal performance to manage Azure resources|Azure Sandbox|Script is run in the same environment, which has less latency.|
48-
|Minimize operational costs|Azure Sandbox|There is no compute overhead and no need for a VM.|
49+
|Minimize operational costs|Azure Sandbox|There's no compute overhead and no need for a VM.|
4950
|Execute long-running script|Hybrid Runbook Worker|Azure sandboxes have [resource limits](../azure-resource-manager/management/azure-subscription-service-limits.md#automation-limits).|
5051
|Interact with local services|Hybrid Runbook Worker|Directly access the host machine, or resources in other cloud environments or the on-premises environment. |
5152
|Require third-party software and executables|Hybrid Runbook Worker|You manage the operating system and can install software.|
5253
|Monitor a file or folder with a runbook|Hybrid Runbook Worker|Use a [Watcher task](./automation-scenario-using-watcher-task.md) on a Hybrid Runbook Worker.|
5354
|Run a resource-intensive script|Hybrid Runbook Worker| Azure sandboxes have [resource limits](../azure-resource-manager/management/azure-subscription-service-limits.md#automation-limits).|
5455
|Use modules with specific requirements| Hybrid Runbook Worker|Some examples are:</br> WinSCP - dependency on winscp.exe </br> IIS administration - dependency on enabling or managing IIS|
5556
|Install a module with an installer|Hybrid Runbook Worker|Modules for sandbox must support copying.|
56-
|Use runbooks or modules that require .NET Framework version different from 4.7.2|Hybrid Runbook Worker|Azure sandboxes support .NET Framework 4.7.2, and upgrading to a different version is not supported.|
57+
|Use runbooks or modules that require .NET Framework version different from 4.7.2|Hybrid Runbook Worker|Azure sandboxes support .NET Framework 4.7.2, and upgrading to a different version isn't supported.|
5758
|Run scripts that require elevation|Hybrid Runbook Worker|Sandboxes don't allow elevation. With a Hybrid Runbook Worker, you can turn off UAC and use [Invoke-Command](/powershell/module/microsoft.powershell.core/invoke-command) when running the command that requires elevation.|
5859
|Run scripts that require access to Windows Management Instrumentation (WMI)|Hybrid Runbook Worker|Jobs running in sandboxes in the cloud can't access WMI provider. |
5960

6061
## Temporary storage in a sandbox
6162

62-
If you need to create temporary files as part of your runbook logic, you can use the Temp folder (that is, `$env:TEMP`) in the Azure sandbox for runbooks running in Azure. The only limitation is you cannot use more than 1 GB of disk space, which is the quota for each sandbox. When working with PowerShell workflows, this scenario can cause a problem because PowerShell workflows use checkpoints and the script could be retried in a different sandbox.
63+
If you need to create temporary files as part of your runbook logic, you can use the Temp folder (that is, `$env:TEMP`) in the Azure sandbox for runbooks running in Azure. The only limitation is you can't use more than 1 GB of disk space, which is the quota for each sandbox. When working with PowerShell workflows, this scenario can cause a problem because PowerShell workflows use checkpoints and the script could be retried in a different sandbox.
6364

64-
With the hybrid sandbox, you can use `C:\temp` based on the availability of storage on a Hybrid Runbook Worker. However, per Azure VM recommendations, you should not use the [temporary disk](../virtual-machines/managed-disks-overview.md#temporary-disk) on Windows or Linux for data that needs to be persisted.
65+
With the hybrid sandbox, you can use `C:\temp` based on the availability of storage on a Hybrid Runbook Worker. However, per Azure VM recommendations, you shouldn't use the [temporary disk](../virtual-machines/managed-disks-overview.md#temporary-disk) on Windows or Linux for data that needs to be persisted.
6566

6667
## Resources
6768

@@ -72,7 +73,7 @@ Your runbooks must include logic to deal with [resources](/rest/api/resources/re
7273
Azure Automation uses the [Microsoft Defender for Cloud](../defender-for-cloud/defender-for-cloud-introduction.md) to provide security for your resources and detect compromise in Linux systems. Security is provided across your workloads, whether resources are in Azure or not. See
7374
[Introduction to authentication in Azure Automation](automation-security-overview.md).
7475

75-
Defender for Cloud places constraints on users who can run any scripts, either signed or unsigned, on a VM. If you are a user with root access to a VM, you must explicitly configure the machine with a digital signature or turn it off. Otherwise, you can only run a script to apply operating system updates after creating an Automation account and enabling the appropriate feature.
76+
Defender for Cloud places constraints on users who can run any scripts, either signed or unsigned, on a VM. If you're a user with root access to a VM, you must explicitly configure the machine with a digital signature or turn it off. Otherwise, you can only run a script to apply operating system updates after creating an Automation account and enabling the appropriate feature.
7677

7778
## Subscriptions
7879

@@ -121,7 +122,7 @@ Your runbooks can use self-signed certificates, which are not signed by a certif
121122

122123
## Jobs
123124

124-
Azure Automation supports an environment to run jobs from the same Automation account. A single runbook can have many jobs running at one time. The more jobs you run at the same time, the more often they can be dispatched to the same sandbox.
125+
Azure Automation supports an environment to run jobs from the same Automation account. A single runbook can have many jobs running at one time. The more jobs you run at the same time, the more often they can be dispatched to the same sandbox. A maximum of 10 jobs can run in a sandbox. A sandbox will be removed when no jobs are executing in it; hence, it shouldn't be used to save files.
125126

126127
Jobs running in the same sandbox process can affect each other. One example is running the [Disconnect-AzAccount](/powershell/module/az.accounts/disconnect-azaccount) cmdlet. Execution of this cmdlet disconnects each runbook job in the shared sandbox process. For an example of working with this scenario, see [Prevent concurrent jobs](manage-runbooks.md#prevent-concurrent-jobs).
127128

@@ -170,7 +171,7 @@ Write-Output "This message will not show"
170171

171172
### Try Catch Finally
172173

173-
[Try Catch Finally](/powershell/module/microsoft.powershell.core/about/about_try_catch_finally) is used in PowerShell scripts to handle terminating errors. The script can use this mechanism to catch specific exceptions or general exceptions. The `catch` statement should be used to track or try to handle errors. The following example tries to download a file that does not exist. It catches the `System.Net.WebException` exception and returns the last value for any other exception.
174+
[Try Catch Finally](/powershell/module/microsoft.powershell.core/about/about_try_catch_finally) is used in PowerShell scripts to handle terminating errors. The script can use this mechanism to catch specific exceptions or general exceptions. The `catch` statement should be used to track or try to handle errors. The following example tries to download a file that doesn't exist. It catches the `System.Net.WebException` exception and returns the last value for any other exception.
174175

175176
```powershell-interactive
176177
try

articles/automation/automation-runbook-types.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Automation runbook types
33
description: This article describes the types of runbooks that you can use in Azure Automation and considerations for determining which type to use.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 10/28/2022
6+
ms.date: 12/28/2022
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell, references_regions
99
---
@@ -86,6 +86,9 @@ The following are the current limitations and known issues with PowerShell runbo
8686
- PowerShell 7.x does not support workflows. See [this](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
8787
- PowerShell 7.x currently does not support signed runbooks.
8888
- Source control integration doesn't support PowerShell 7.1 (preview) Also, PowerShell 7.1 (preview) runbooks in source control gets created in Automation account as Runtime 5.1.
89+
- PowerShell 7.1 module management is not supported through `Get-AzAutomationModule` cmdlets.
90+
- Runbook will fail with no log trace if the input value contains the character '.
91+
8992

9093
**Known issues**
9194

@@ -122,6 +125,7 @@ The following are the current limitations and known issues with PowerShell runbo
122125
- Currently, PowerShell 7.2 (preview) runbooks are only supported from Azure portal. Rest API and PowerShell is not supported.
123126
- Az module 8.3.0 is installed by default and cannot be managed at the automation account level. Use custom modules to override the Az module to the desired version.
124127
- The imported PowerShell 7.2 (preview) module would be validated during job execution. Ensure that all dependencies for the selected module are also imported for successful job execution.
128+
- PowerShell 7.2 module management is not supported through `Get-AzAutomationModule` cmdlets.
125129

126130
**Known issues**
127131

articles/automation/automation-windows-hrw-install.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy an agent-based Windows Hybrid Runbook Worker in Automation
33
description: This article tells how to deploy an agent-based Hybrid Runbook Worker that you can use to run runbooks on Windows-based machines in your local datacenter or cloud environment.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 10/06/2021
6+
ms.date: 12/29/2022
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell
99
---
@@ -38,7 +38,6 @@ The Hybrid Runbook Worker role requires the [Log Analytics agent](../azure-monit
3838

3939
The Hybrid Runbook Worker feature supports the following operating systems:
4040

41-
* Windows Server 2022 (including Server Core)
4241
* Windows Server 2019 (including Server Core)
4342
* Windows Server 2016, version 1709 and 1803 (excluding Server Core)
4443
* Windows Server 2012, 2012 R2

0 commit comments

Comments
 (0)