You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/automation-create-standalone-account.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ The following table describes the fields on the **Basics** tab.
48
48
|---|---|---|
49
49
|Subscription|Required |From the drop-down list, select the Azure subscription for the account.|
50
50
|Resource group|Required |From the drop-down list, select your existing resource group, or select **Create new**.|
51
-
|Automation account name|Required |Enter a name unique for it's location and resource group. Names for Automation accounts that have been deleted might not be immediately available. You can't change the account name once it has been entered in the user interface. |
51
+
|Automation account name|Required |Enter a name unique for its location and resource group. Names for Automation accounts that have been deleted might not be immediately available. You can't change the account name once it has been entered in the user interface. |
52
52
|Region|Required |From the drop-down list, select a region for the account. For an updated list of locations that you can deploy an Automation account to, see [Products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=automation®ions=all).|
53
53
54
54
The following image shows a standard configuration for a new Automation account.
@@ -68,7 +68,7 @@ The following table describes the fields on the **Advanced** tab.
68
68
|System-assigned |Optional |A Microsoft Entra identity that is tied to the lifecycle of the Automation account. |
69
69
|User-assigned |Optional |A managed identity represented as a standalone Azure resource that is managed separately from the resources that use it.|
70
70
71
-
You can chose to enable managed identities later, and the Automation account is created without one. To enable a managed identity after the account is created, see [Enable managed identity](enable-managed-identity-for-automation.md). If you select both options, for the user-assigned identity, select the **Add user assigned identities** option. On the **Select user assigned managed identity** page, select a subscription and add one or more user-assigned identities created in that subscription to assign to the Automation account.
71
+
You can choose to enable managed identities later, and the Automation account is created without one. To enable a managed identity after the account is created, see [Enable managed identity](enable-managed-identity-for-automation.md). If you select both options, for the user-assigned identity, select the **Add user assigned identities** option. On the **Select user assigned managed identity** page, select a subscription and add one or more user-assigned identities created in that subscription to assign to the Automation account.
72
72
73
73
The following image shows a standard configuration for a new Automation account.
74
74
@@ -109,7 +109,7 @@ When the Automation account is successfully created, several resources are autom
109
109
110
110
## Manage Automation account keys
111
111
112
-
When you create an Automation account, Azure generates two 512-bit automation account access keys for that account. These keys are shared access keys that are used as registration keys for registering [DSC nodes](./automation-dsc-onboarding.md#use-dsc-metaconfiguration-to-register-hybrid-machines)as well as [Windows](./automation-windows-hrw-install.md#manual-deployment) and [Linux](./automation-linux-hrw-install.md#manually-run-powershell-commands) Hybrid runbook workers. These keys are only used while registering DSC nodes and Hybrid workers. Existing machines configured as DSC nodes or hybrid workers won’t be affected after rotation of these keys.
112
+
When you create an Automation account, Azure generates two 512-bit automation account access keys for that account. These keys are shared access keys that are used as registration keys for registering [DSC nodes](./automation-dsc-onboarding.md#use-dsc-metaconfiguration-to-register-hybrid-machines) These keys are only used while registering DSC nodes. Existing machines configured as DSC nodes or hybrid workers won’t be affected after rotation of these keys.
113
113
114
114
### View Automation account keys
115
115
@@ -124,7 +124,7 @@ You can use any of the two keys to access your Automation account. However, we r
124
124
125
125
We recommend that you rotate your access keys periodically to keep the Automation account secure. As you have two access keys, you can rotate them using Azure portal or Azure PowerShell cmdlet.
Copy file name to clipboardExpand all lines: articles/automation/automation-disaster-recovery.md
-19Lines changed: 0 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,30 +47,12 @@ If the Windows or Linux Hybrid Runbook worker is deployed using the extension-ba
47
47
1.[Add](extension-based-hybrid-runbook-worker-install.md?tabs=windows#create-hybrid-worker-group) the same Hybrid Runbook worker to a Hybrid Worker group in the Automation account in the secondary region. The Hybrid worker extension is installed on the machine in the replica of the Automation account.
48
48
1. Execute the jobs on the Hybrid Runbook worker created in Step 2.
49
49
50
-
For Hybrid Runbook worker deployed using the agent-based approach, choose from below:
If the Windows Hybrid Runbook worker is deployed using an agent-based approach in a region different from the primary region of failure, follow the steps to continue executing Hybrid jobs:
55
-
1.[Uninstall](automation-windows-hrw-install.md#remove-windows-hybrid-runbook-worker) the agent from the Hybrid Runbook worker present in the Automation account in the primary region.
56
-
1.[Re-install](automation-windows-hrw-install.md#installation-options) the agent on the same machine in the replica Automation account in the secondary region.
57
-
1. You can now execute jobs on the Hybrid Runbook worker created in Step 2.
If the Linux Hybrid Runbook worker is deployed using agent-based approach in a region different from the primary region of failure, follow the below steps to continue executing Hybrid jobs:
62
-
1.[Uninstall](automation-linux-hrw-install.md#remove-linux-hybrid-runbook-worker) the agent from the Hybrid Runbook worker present in Automation account in the primary region.
63
-
1.[Re-install](automation-linux-hrw-install.md#install-a-linux-hybrid-runbook-worker) the agent on the same machine in the replica Automation account in the secondary region.
64
-
1. You can now execute jobs on the Hybrid Runbook worker created in Step 2.
65
-
66
50
---
67
51
68
52
### Scenario: Execute jobs on Hybrid Runbook Worker deployed in the primary region of failure
69
53
If the Hybrid Runbook worker is deployed in the primary region, and there's a compute failure in that region, the machine won't be available for executing Automation jobs. You must provision a new virtual machine in an alternate region and register it as Hybrid Runbook Worker in Automation account in the secondary region.
70
54
71
55
- See the installation steps in [how to deploy an extension-based Windows or Linux User Hybrid Runbook Worker](extension-based-hybrid-runbook-worker-install.md?tabs=windows#create-hybrid-worker-group).
72
-
- See the installation steps in [how to deploy an agent-based Windows Hybrid Worker](automation-windows-hrw-install.md#installation-options).
73
-
- See the installation steps in [how to deploy an agent-based Linux Hybrid Worker](automation-linux-hrw-install.md#install-a-linux-hybrid-runbook-worker).
74
56
75
57
## Script to migrate Automation account assets from one region to another
76
58
@@ -83,7 +65,6 @@ You can use these scripts for migration of Automation account assets from the ac
83
65
1. Ensure that the system assigned managed identities of the primary Automation account have contributor access to the subscription it belongs to.
84
66
1. Ensure that the primary Automation account's managed identity has Contributor access with read and write permissions to the Automation account in secondary region. To enable, provide the necessary permissions in secondary Automation account's managed identities. [Learn more](../role-based-access-control/quickstart-assign-role-user-portal.md).
85
67
1. Ensure that the script has access to the Automation account assets in primary region. Hence, it should be executed as a runbook in that Automation account for successful migration.
86
-
1. If the primary Automation account is deployed using a Run as account, then it must be switched to Managed Identity before migration. [Learn more](migrate-run-as-accounts-managed-identity.md).
|Either | For user Hybrid Runbook Workers, see [Deploy an extension-based Windows or Linux user Hybrid Runbook Worker in Automation](./extension-based-hybrid-runbook-worker-install.md). This is the recommended method. |
94
+
To install, see [Deploy an extension-based Windows or Linux user Hybrid Runbook Worker in Automation](./extension-based-hybrid-runbook-worker-install.md).
101
95
102
96
>[!NOTE]
103
-
> Hybrid Runbook Worker is currently not supported on VM Scale Sets.
97
+
> Hybrid Runbook Worker is currently not supported on Azure Virtual Machine Scale Sets.
104
98
105
99
## <aname="network-planning"></a>Network planning
106
100
@@ -120,8 +114,8 @@ Azure Automation supports Azure virtual network service tags, starting with the
120
114
121
115
The service tag for the Azure Automation service only provides IPs used for the following scenarios:
122
116
123
-
* Trigger webhooks from within your virtual network
124
-
* Allow Hybrid Runbook Workers or State Configuration agents on your VNet to communicate with the Automation service
117
+
* Trigger webhooks from within your virtual network.
118
+
* Allow Hybrid Runbook Workers or State Configuration agents on your VNet to communicate with the Automation service.
125
119
126
120
>[!NOTE]
127
121
>The service tag **GuestAndHybridManagement** currently doesn't support runbook job execution in an Azure sandbox, only directly on a Hybrid Runbook Worker.
0 commit comments