You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A script running on a Windows Hybrid Runbook Worker can't connect as expected to Microsoft 365 on an Orchestrator sandbox. The script is using [Connect-MsolService](/powershell/module/msonline/connect-msolservice) for connection.
342
+
A script running on a Windows Hybrid Runbook Worker can't connect as expected to Microsoft 365 on an Orchestrator sandbox. The script is using [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands#using-connect-mggraph) for connection.
343
343
344
344
If you adjust **Orchestrator.Sandbox.exe.config** to set the proxy and the bypass list, the sandbox still doesn't connect properly. A **Powershell_ise.exe.config** file with the same proxy and bypass list settings seems to work as you expect. Service Management Automation (SMA) logs and PowerShell logs don't provide any information about proxy.
345
345
@@ -349,14 +349,14 @@ The connection to Active Directory Federation Services (AD FS) on the server can
349
349
350
350
#### Resolution
351
351
352
-
You can resolve the issue for the Orchestrator sandbox by migrating your script to use the Microsoft Entra modules instead of the MSOnline module for PowerShell cmdlets. For more information, see [Migrating from Orchestrator to Azure Automation (Beta)](../automation-orchestrator-migration.md).
352
+
You can resolve the issue for the Orchestrator sandbox by migrating your script to use the Microsoft Entra modules instead of the PowerShell cmdlets. For more information, see [Migrating from Orchestrator to Azure Automation (Beta)](../automation-orchestrator-migration.md).
353
353
354
-
If you want to continue to use the MSOnline module cmdlets, change your script to use [Invoke-Command](/powershell/module/microsoft.powershell.core/invoke-command). Specify values for the `ComputerName` and `Credential` parameters.
354
+
If you want to continue to use the module cmdlets, change your script to use [Invoke-Command](/powershell/module/microsoft.powershell.core/invoke-command). Specify values for the `ComputerName` and `Credential` parameters.
This code change starts an entirely new PowerShell session under the context of the specified credentials. It should enable the traffic to flow through a proxy server that's authenticating the active user.
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-dns-azure-vmware-solution.md
+3-8Lines changed: 3 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: Learn how to configure DNS forwarder for Azure VMware Solution usin
4
4
ms.topic: how-to
5
5
ms.custom: engagement-fy23
6
6
ms.service: azure-vmware
7
-
ms.date: 12/05/2023
8
-
#Customer intent: As an Azure service administrator, I want to <define conditional forwarding rules for a desired domain name to a desired set of private DNS servers via the NSX-T Data Center DNS Service.>
7
+
ms.date: 2/27/2024
8
+
#Customer intent: As an Azure service administrator, I want to <define conditional forwarding rules for a desired domain name to a desired set of private DNS servers via the NSX-T Data Center DNS Service.
9
9
---
10
10
11
11
# Configure a DNS forwarder in the Azure portal
@@ -25,14 +25,12 @@ This capability uses the DNS Forwarder Service in NSX-T Data Center. A DNS servi
25
25
>[!TIP]
26
26
>If desired, you can also use the conditional forwarding rules for workload segments by configuring virtual machines on those segments to use the NSX-T Data Center DNS Service IP address as their DNS server.
27
27
28
-
29
28
## Architecture
30
29
31
30
The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries to DNS systems hosted in Azure and on-premises environments.
32
31
33
32
:::image type="content" source="media/networking/dns/dns-forwarder-diagram.png" alt-text="Diagram showing that the NSX-T DNS Service can forward DNS queries to DNS systems hosted in Azure and on-premises environments." border="false":::
34
33
35
-
36
34
## Configure DNS forwarder
37
35
38
36
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones**. Then select **Add**.
@@ -60,7 +58,6 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
60
58
>[!TIP]
61
59
>For private clouds created on or after July 1, 2021, you can ignore the message about a default DNS zone as one is created for you during private cloud creation.
62
60
63
-
64
61
>[!IMPORTANT]
65
62
>While certain operations in your private cloud may be performed from NSX-T Manager, for private clouds created on or after July 1, 2021, you _must_ edit the DNS service from the Simplified Networking experience in the Azure portal for any configuration changes made to the default Tier-1 Gateway.
66
63
@@ -78,7 +75,6 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
78
75
1. In your Azure VMware Solution private cloud, under **Workload Networking**, select **DNS** > **DNS zones** > Check **TNT##-DNS-FORWARDER-ZONE**. Then select **Edit**.
2. Change DNS server entries to valid reachable IP addresses. Then select **OK**
84
80
@@ -91,7 +87,7 @@ The diagram shows that the NSX-T Data Center DNS Service can forward DNS queries
91
87
92
88
After you configure the DNS forwarder, you have some options available to verify name resolution operations.
93
89
94
-
### NSX-T Manager
90
+
### VMware NSX-T Manager
95
91
96
92
NSX-T Manager provides the DNS Forwarder Service statistics at the global service level and on a per zone basis.
97
93
@@ -105,7 +101,6 @@ NSX-T Manager provides the DNS Forwarder Service statistics at the global servic
105
101
106
102
:::image type="content" source="media/networking/dns/nsxt-manager-dns-services-statistics.png" alt-text="Screenshot showing the DNS Forwarder statistics.":::
107
103
108
-
109
104
### PowerCLI
110
105
111
106
The NSX-T Policy API lets you run nslookup commands from the NSX-T Data Center DNS Forwarder Service. The required cmdlets are part of the `VMware.VimAutomation.Nsxt` module in PowerCLI. The following example demonstrates output from version 12.3.0 of that module.
0 commit comments