Skip to content

Commit a902b2d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into agc-ga
2 parents 5dede6b + acd666a commit a902b2d

File tree

4 files changed

+11
-13
lines changed

4 files changed

+11
-13
lines changed

articles/automation/troubleshoot/hybrid-runbook-worker.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article tells how to troubleshoot and resolve issues that aris
44
services: automation
55
ms.date: 09/17/2023
66
ms.topic: troubleshooting
7-
ms.custom: linux-related-content, has-azure-ad-ps-ref
7+
ms.custom: linux-related-content, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
88
---
99

1010
# Troubleshoot agent-based Hybrid Runbook Worker issues in Automation
@@ -339,7 +339,7 @@ Hybrid workers send [Runbook output and messages](../automation-runbook-output-a
339339

340340
#### Issue
341341

342-
A script running on a Windows Hybrid Runbook Worker can't connect as expected to Microsoft 365 on an Orchestrator sandbox. The script is using [Connect-MsolService](/powershell/module/msonline/connect-msolservice) for connection.
342+
A script running on a Windows Hybrid Runbook Worker can't connect as expected to Microsoft 365 on an Orchestrator sandbox. The script is using [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands#using-connect-mggraph) for connection.
343343

344344
If you adjust **Orchestrator.Sandbox.exe.config** to set the proxy and the bypass list, the sandbox still doesn't connect properly. A **Powershell_ise.exe.config** file with the same proxy and bypass list settings seems to work as you expect. Service Management Automation (SMA) logs and PowerShell logs don't provide any information about proxy.​
345345

@@ -349,14 +349,14 @@ The connection to Active Directory Federation Services (AD FS) on the server can
349349

350350
#### Resolution
351351

352-
You can resolve the issue for the Orchestrator sandbox by migrating your script to use the Microsoft Entra modules instead of the MSOnline module for PowerShell cmdlets. For more information, see [Migrating from Orchestrator to Azure Automation (Beta)](../automation-orchestrator-migration.md).
352+
You can resolve the issue for the Orchestrator sandbox by migrating your script to use the Microsoft Entra modules instead of the PowerShell cmdlets. For more information, see [Migrating from Orchestrator to Azure Automation (Beta)](../automation-orchestrator-migration.md).
353353

354-
​If you want to continue to use the MSOnline module cmdlets, change your script to use [Invoke-Command](/powershell/module/microsoft.powershell.core/invoke-command). Specify values for the `ComputerName` and `Credential` parameters.
354+
​If you want to continue to use the module cmdlets, change your script to use [Invoke-Command](/powershell/module/microsoft.powershell.core/invoke-command). Specify values for the `ComputerName` and `Credential` parameters.
355355

356356
```powershell
357357
$Credential = Get-AutomationPSCredential -Name MyProxyAccessibleCredential​
358358
Invoke-Command -ComputerName $env:COMPUTERNAME -Credential $Credential
359-
{ Connect-MsolService … }​
359+
{ Connect-MgGraph … }​
360360
```
361361

362362
This code change starts an entirely new PowerShell session under the context of the specified credentials. It should enable the traffic to flow through a proxy server that's authenticating the active user.

articles/azure-functions/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -937,6 +937,9 @@
937937
- name: Output
938938
href: functions-bindings-service-bus-output.md
939939
displayName: Service Bus
940+
- name: Migrate version 4.x to 5.x
941+
href: migrate-service-bus-version-4-version-5.md
942+
displayName: Service Bus
940943
- name: SignalR Service
941944
items:
942945
- name: Overview

articles/azure-vmware/configure-dns-azure-vmware-solution.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn how to configure DNS forwarder for Azure VMware Solution usin
44
ms.topic: how-to
55
ms.custom: engagement-fy23
66
ms.service: azure-vmware
7-
ms.date: 12/05/2023
8-
#Customer intent: As an Azure service administrator, I want to <define conditional forwarding rules for a desired domain name to a desired set of private DNS servers via the NSX-T Data Center DNS Service.>
7+
ms.date: 2/27/2024
8+
#Customer intent: As an Azure service administrator, I want to <define conditional forwarding rules for a desired domain name to a desired set of private DNS servers via the NSX-T Data Center DNS Service.
99
---
1010

1111
# Configure a DNS forwarder in the Azure portal
@@ -25,14 +25,12 @@ This capability uses the DNS Forwarder Service in NSX-T Data Center. A DNS servi
2525
>[!TIP]
2626
>If desired, you can also use the conditional forwarding rules for workload segments by configuring virtual machines on those segments to use the NSX-T Data Center DNS Service IP address as their DNS server.
2727
28-
2928
## Architecture
3029

3130
The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries to DNS systems hosted in Azure and on-premises environments.
3231

3332
:::image type="content" source="media/networking/dns/dns-forwarder-diagram.png" alt-text="Diagram showing that the NSX-T DNS Service can forward DNS queries to DNS systems hosted in Azure and on-premises environments." border="false":::
3433

35-
3634
## Configure DNS forwarder
3735

3836
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones**. Then select **Add**.
@@ -60,7 +58,6 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
6058
>[!TIP]
6159
>For private clouds created on or after July 1, 2021, you can ignore the message about a default DNS zone as one is created for you during private cloud creation.
6260
63-
6461
>[!IMPORTANT]
6562
>While certain operations in your private cloud may be performed from NSX-T Manager, for private clouds created on or after July 1, 2021, you _must_ edit the DNS service from the Simplified Networking experience in the Azure portal for any configuration changes made to the default Tier-1 Gateway.
6663
@@ -78,7 +75,6 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
7875
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones** > Check **TNT##-DNS-FORWARDER-ZONE**. Then select **Edit**.
7976

8077
![AVS-DNS](https://user-images.githubusercontent.com/7501186/226980095-b0576824-e1b7-46dc-b726-58670e4e3096.png)
81-
8278

8379
2. Change DNS server entries to valid reachable IP addresses. Then select **OK**
8480

@@ -91,7 +87,7 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
9187

9288
After you configure the DNS forwarder, you have some options available to verify name resolution operations.
9389

94-
### NSX-T Manager
90+
### VMware NSX-T Manager
9591

9692
NSX-T Manager provides the DNS Forwarder Service statistics at the global service level and on a per zone basis.
9793

@@ -105,7 +101,6 @@ NSX-T Manager provides the DNS Forwarder Service statistics at the global servic
105101

106102
:::image type="content" source="media/networking/dns/nsxt-manager-dns-services-statistics.png" alt-text="Screenshot showing the DNS Forwarder statistics.":::
107103

108-
109104
### PowerCLI
110105

111106
The NSX-T Policy API lets you run nslookup commands from the NSX-T Data Center DNS Forwarder Service. The required cmdlets are part of the `VMware.VimAutomation.Nsxt` module in PowerCLI. The following example demonstrates output from version 12.3.0 of that module.
155 KB
Loading

0 commit comments

Comments
 (0)