Skip to content

Commit 49c98db

Browse files
committed
fixed blocking issues
1 parent 1947c53 commit 49c98db

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

articles/automation/automation-hybrid-runbook-worker.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ The extension-based approach greatly simplifies the installation and management
3131
- **Ease of Manageability** – It offers native integration with ARM identity for Hybrid Runbook Worker and provides the flexibility for governance at scale through policies and templates.
3232
- **Azure Active Directory based authentication** – It uses a VM system-assigned managed identities provided by Azure Active Directory. This centralizes control and management of identities and resource credentials.
3333
- **Unified experience** – It offers an identical experience for managing Azure and off-Azure Arc-enabled machines.
34-
- **Multiple onboarding channels** – You can choose to onboard and manage extension-based workers through the Azure Portal, PowerShell cmdlets, Bicep, ARM templates, REST API and Azure CLI. You can also install the extension on an existing Azure VM or Arc-enabled server within the Azure Portal experience of that machine through the Extensions blade.
35-
- **Default Automatic upgrade** – It offers Automatic upgrade of minor versions by default, significantly reducing the manageability of staying updated on the latest version. We recommend enabling Automatic upgrades to take advantage of any security or feature updates without the manual overhead. You can also opt-out of automatic upgrades at any time. Any major version upgrades are currently not supported and should be managed manually.
34+
- **Multiple onboarding channels** – You can choose to onboard and manage extension-based workers through the Azure portal, PowerShell cmdlets, Bicep, ARM templates, REST API and Azure CLI. You can also install the extension on an existing Azure VM or Arc-enabled server within the Azure portal experience of that machine through the Extensions blade.
35+
- **Default Automatic upgrade** – It offers Automatic upgrade of minor versions by default, significantly reducing the manageability of staying updated on the latest version. We recommend enabling Automatic upgrades to take advantage of any security or feature updates without the manual overhead. You can also opt out of automatic upgrades at any time. Any major version upgrades are currently not supported and should be managed manually.
3636

3737
## Runbook Worker types
3838

@@ -77,7 +77,7 @@ To control the distribution of runbooks on Hybrid Runbook Workers and when or ho
7777
- To execute Azure Automation runbooks for in-guest VM management directly on an existing Azure virtual machine (VM) and off-Azure server registered as Azure Arc-enabled server or Azure Arc-enabled VMware VM (preview). Azure Arc-enabled servers can be Windows and Linux physical servers and virtual machines hosted outside of Azure, on your corporate network, or other cloud providers.
7878
- To overcome the Azure Automation sandbox limitation - the common scenarios include executing long-running operations beyond three-hour limit for cloud jobs, performing resource-intensive automation operations, interacting with local services running on-premises or in hybrid environment, run scripts that require elevated permissions.
7979
- To overcome organization restrictions to keep data in Azure for governance and security reasons - as you cannot execute Automation jobs on the cloud, you can run it on an on-premises machine that is onboarded as a User Hybrid Runbook Worker.
80-
- To automate operations on multiple —Off-Azure resources running on-premises or multi-cloud environments. You can onboard one of those machines as a User Hybrid Runbook Worker and target automation on the remaining machines in the local environment.
80+
- To automate operations on multiple —Off-Azure resources running on-premises or multicloud environments. You can onboard one of those machines as a User Hybrid Runbook Worker and target automation on the remaining machines in the local environment.
8181
- To access other services privately from the Azure Virtual Network (VNet) without opening an outbound internet connection, you can execute runbooks on a Hybrid Worker connected to the Azure VNet.
8282

8383

articles/automation/automation-linux-hrw-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ After you successfully deploy a runbook worker, review [Run runbooks on a Hybrid
2121
2222
## Prerequisites
2323

24-
Before you start, make sure that you have the following.
24+
Before you start, make sure that you've the following.
2525

2626
### A Log Analytics workspace
2727

@@ -161,7 +161,7 @@ To install and configure a Linux Hybrid Runbook Worker, perform the following st
161161
162162
- Using Azure Policy.
163163
164-
Using this approach, you use the Azure Policy [Deploy Log Analytics agent to Linux or Windows Azure Arc machines](../governance/policy/samples/built-in-policies.md#monitoring) built-in policy definition to audit if the Arc-enabled server has the Log Analytics agent installed. If the agent isn't installed, it automatically deploys it using a remediation task. If you plan to monitor the machines with Azure Monitor for VMs, instead use the [Enable Azure Monitor for VMs](../governance/policy/samples/built-in-initiatives.md#monitoring) initiative to install and configure the Log Analytics agent.
164+
Using this approach, you use the Azure Policy [Deploy Log Analytics agent to Linux or Microsoft Azure Arc machines](../governance/policy/samples/built-in-policies.md#monitoring) built-in policy definition to audit if the Arc-enabled server has the Log Analytics agent installed. If the agent isn't installed, it automatically deploys it using a remediation task. If you plan to monitor the machines with Azure Monitor for VMs, instead use the [Enable Azure Monitor for VMs](../governance/policy/samples/built-in-initiatives.md#monitoring) initiative to install and configure the Log Analytics agent.
165165
166166
We recommend installing the Log Analytics agent for Windows or Linux using Azure Policy.
167167

articles/automation/automation-windows-hrw-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ To install and configure a Windows Hybrid Runbook Worker, perform the following
185185
186186
- Using Azure Policy.
187187
188-
Using this approach, you use the Azure Policy [Deploy Log Analytics agent to Linux or Windows Azure Arc machines](../governance/policy/samples/built-in-policies.md#monitoring) built-in policy definition to audit if the Arc-enabled server has the Log Analytics agent installed. If the agent isn't installed, it automatically deploys it using a remediation task. If you plan to monitor the machines with Azure Monitor for VMs, instead use the [Enable Azure Monitor for VMs](../governance/policy/samples/built-in-initiatives.md#monitoring) initiative to install and configure the Log Analytics agent.
188+
Using this approach, you use the Azure Policy [Deploy Log Analytics agent to Linux or Microsoft Azure Arc machines](../governance/policy/samples/built-in-policies.md#monitoring) built-in policy definition to audit if the Arc-enabled server has the Log Analytics agent installed. If the agent isn't installed, it automatically deploys it using a remediation task. If you plan to monitor the machines with Azure Monitor for VMs, instead use the [Enable Azure Monitor for VMs](../governance/policy/samples/built-in-initiatives.md#monitoring) initiative to install and configure the Log Analytics agent.
189189
190190
We recommend installing the Log Analytics agent for Windows or Linux using Azure Policy.
191191
@@ -291,7 +291,7 @@ To check version of agent-based Windows Hybrid Runbook Worker, go to the followi
291291

292292
`C:\ProgramFiles\Microsoft Monitoring Agent\Agent\AzureAutomation\`
293293

294-
The *AzureAutomation* folder has a sub-folder with the version number as the name of the sub-folder.
294+
The *Azure Automation* folder has a sub-folder with the version number as the name of the sub-folder.
295295

296296
## Next steps
297297

articles/automation/troubleshoot/extension-based-hybrid-runbook-worker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ Place this file in the same folder as the executable file `OrchestratorSandbox.e
240240
`%ProgramFiles%\Microsoft Monitoring Agent\Agent\AzureAutomation\7.3.702.0\HybridAgent`
241241

242242

243-
### Scenario: Windows Azure VMs automatically dropped from a hybrid worker group
243+
### Scenario: Microsoft Azure VMs automatically dropped from a hybrid worker group
244244

245245
#### Issue
246246

articles/automation/troubleshoot/hybrid-runbook-worker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ You have two options for resolving this issue:
7878

7979
* Manually configure the worker machine to run in an Orchestrator sandbox. Then run a runbook created in the Azure Automation account on the worker to test the functionality.
8080

81-
### <a name="vm-automatically-dropped"></a>Scenario: Windows Azure VMs automatically dropped from a hybrid worker group
81+
### <a name="vm-automatically-dropped"></a>Scenario: Microsoft Azure VMs automatically dropped from a hybrid worker group
8282

8383
#### Issue
8484

0 commit comments

Comments
 (0)