azure-docs icon indicating copy to clipboard operation
azure-docs copied to clipboard

How do "MS-SR-Update-MobilityServiceForA2AVirtualMachines" jobs get updated to use managed identities?

Open davidsandbrand opened this issue 2 years ago • 1 comments

When a recovery services vault has been configured to hold ASR-replicated VMs, Site Recovery leverages an automation account to manage Site Recovery extensions on all your replicated items and keeps them up-to-date, as seen here:

image


This job, inside the linked automation account, runs every 24 hours, as seen here:

image


However, the job itself is not made visible in the list of runbooks, as seen here:

image


But it can be seen in the job output that these jobs require a RunAs account in the automation account, as seen here:

image


My issue/question is: How do these critically important jobs that fail without a RunAs account, get converted to using system managed identities? No information is provided on this page or any other. It almost seems that perhaps this aspect of RunAs accounts being depricated was not considered or accounted for.


Document Details

Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.

davidsandbrand avatar Dec 02 '22 19:12 davidsandbrand

@davidsandbrand Thanks for your feedback! We will investigate and update as appropriate.

Naveenommi-MSFT avatar Dec 03 '22 06:12 Naveenommi-MSFT

@davidsandbrand, thank you for reporting this. I am reaching out to the respective teams regarding this query and will get back to you soon.

These runbooks are like system runbooks hidden from end user view in Azure Automation Account. Therefore, I have reached out to the ASR team for getting clarification on timeline when these will be migrated to managed identity.

AnuragSingh-MSFT avatar Dec 11 '22 06:12 AnuragSingh-MSFT

Hey @davidsandbrand, we are working on the migration plan for the same. A manual way with a script will be available sometime this month, and a single-click way to do the same will be available by end of April. Would request you to please bear with us until then.

rishjai-msft avatar Dec 12 '22 05:12 rishjai-msft

Guys, please could you advise if the manual script is available yet?

Deland01 avatar Jan 25 '23 16:01 Deland01

What is the update here please @rishjai-msft ?

silverl avatar Mar 02 '23 16:03 silverl

@AnuragSingh-MSFT removed the 'escalated-product-team' tag and closed this ticket almost 3 moths ago, without answering any questions or linking to any solutions, and this issue still exists.

'we are working on this' is not a solution.

@rishjai-msft, where is this manual script that you said would be available "sometime this month" - a month that ended almost 9 weeks ago?

I missed that this was closed, at the time it was closed, and if it's not obvious, I'm pissed-off. How does this ticket get reopened, and escalated?.

This isn't one customer having unrealistic expectations or demands; This issue will affect millions of Azure users.

Please respond @Naveenommi-MSFT , @rishjai-msft , and @AnuragSingh-MSFT .

davidsandbrand avatar Mar 03 '23 14:03 davidsandbrand

Hi folks,

We are in the process of deploying the feature, which would be available in 2 weeks' time. Meanwhile if you'd like to do it manually, please follow the following steps: ASR - Migrate authentication type of automation accounts to Managed Identity.pdf

rishjai-msft avatar Mar 06 '23 06:03 rishjai-msft

Ran through this process @rishjai-msft - doesnt seem to work. Disable Job Successful: image Enable Job Successful: image Following day, still using RunAsAccount image

birdnathan avatar Mar 08 '23 09:03 birdnathan

I'm just going to leave this here through complete frustration, and would welcome other peoples' opinions.

I initially responded to the Microsoft "Migrate your runbooks to managed identities " email by trying unsuccessfully to follow the instructions on the Learn portal. Our entire Site Recovery Services infrastructure depends on this working, so we opened a premium support ticket via our CSP.

They agreed that the documentation was inadequate, and we worked together to migrate as required.

Then we get the same error as the OP above along with multiple Site Recovery failures, and once again the CSP steps to assist. They tell me that you knew all along it wouldn't work and the automated patch won't be ready for 2 weeks.

While at the same time you kindly inform us of your 9% price increase for UK customers.

There truly are no words to describe this. No amount of cups of tea are going to work for me here.

ThinkElevenDave avatar Mar 08 '23 11:03 ThinkElevenDave

To be fair I doubt it was the ASR product group that have increased prices but what does frustrate me is they send out notifications about RunAsAccount retirements ahead of core ASR functionality not being supported by this change and you can guarantee the date for these retirements will be pushed out the further we get to September anyway.

birdnathan avatar Mar 08 '23 13:03 birdnathan

@Naveenommi-MSFT , @rishjai-msft , and @AnuragSingh-MSFT . please reopen this ticket. This issue is not solved, and if a solution is released in 2 weeks, the ticket can be closed then.

If unwilling to reopen, please point me to the process of filling formal complaints against Microsoft employees/contractors.

davidsandbrand avatar Mar 08 '23 14:03 davidsandbrand

@davidsandbrand, I am sorry for the inconvenience for this issue. I have reopened it and will work with the team for its resolution.

AnuragSingh-MSFT avatar Mar 09 '23 03:03 AnuragSingh-MSFT

We have fixed the issue by updating the script. This was due to an incorrect API version. Please retry the steps in the same doc again. I'm sorry for the trouble here.

https://github.com/MicrosoftDocs/azure-docs/files/10895175/ASR.-.Migrate.authentication.type.of.automation.accounts.to.Managed.Identity.pdf

I acknowledge that it could've been better handled from Microsoft's end, where the deprecation and migration path could've come in sooner than it is coming. We want you to know that we commit to taking this instance as feedback and improving on it.

@davidsandbrand @birdnathan @ThinkElevenDave @silverl @Deland01 I'd like to speak with each of you to better understand your ASR experience which will be an input to our semester planning. Please drop me a note at [email protected] and we can take it ahead from there.

Thanks, Rishabh

rishjai-msft avatar Mar 10 '23 10:03 rishjai-msft

Worked for me @rishjai-msft. Thanks!

birdnathan avatar Mar 11 '23 13:03 birdnathan

Hi @rishjai-msft. Is there a powershell or AZ CLI commands to get the Automation account used by each Recover Service vault? or the other way around. We have a lot of recovery service vaults, and it will be a hussle to map it to the correct automation account and add the needed role. We hope we can script as much as possible. [Update] I guess such commands are not available. So for whom instrested, using the "UpdateAutomationAccount.ps1" provided by MS as a template I have modified it to be able to make an inventory for the Recovery Service Vaults mapping to Automation Accounts and Schedules. GetRecoveryServiceVaultToAutomationAccountMapping.ps1 You just have to:

  • Add the script as a 5.1 powershell Runbook
  • In the Automation account hosting this inventory runbook, Add Az.Accounts & Az.RecoveryServices modules under the shared resources modules
  • The Runbook will be using System Assighned Identity, so make sure you have enabled it and gave it Roles necessary to read all subscriptions.
  • The Script will make a very primitive csv output with all details

wbsoul avatar Mar 14 '23 07:03 wbsoul

Hi folks,

We are in the process of deploying the feature, which would be available in 2 weeks' time. Meanwhile if you'd like to do it manually, please follow the following steps: ASR - Migrate authentication type of automation accounts to Managed Identity.pdf

Have the feature been released yesterday (March 20th) as 2 weeks have been passed?

horvatal avatar Mar 21 '23 17:03 horvatal

@horvatal, the deployment is expected to be completed by March 27th, based on the current update.

AnuragSingh-MSFT avatar Mar 24 '23 07:03 AnuragSingh-MSFT

@AnuragSingh-MSFT thanks for the deployment date. The feature is coming at the right moment, if the creation of Run-as-accounts will not work after 1. of April ;-) https://learn.microsoft.com/en-us/azure/automation/automation-managed-identity-faq#:~:text=starting%2001%20April%202023%2C%20creation%20of%20new%20Run%20As%20accounts%20in%20Azure%20Automation%20will%20not%20be%20possible

Is it correct, that after this release no manual hacking of the Automation Account scheduler is needed anymore, and the integration will work out of the box? So I have only to create role assignments to the system assigned Managed Identity to grant the access rights for the Automation Account?

horvatal avatar Mar 24 '23 09:03 horvatal

@horvatal - After this release, just a single click operation will migrate the authentication types of your existing automation account in use. Also, any new enable replications will by default use system assigned managed identities as the authentication type.

rishjai-msft avatar Mar 24 '23 11:03 rishjai-msft

@AnuragSingh-MSFT, given the past commitments of "A manual way with a script will be available sometime this month" that was over 70 days late (and didn't work when 1st provided), and already missing the "We are in the process of deploying the feature, which would be available in 2 weeks' time" - you are not filling me with confidence.

I hope to be proven wrong, but history would indicate this is yet another empty promise meant to simply stop your customers from asking about this feature which should have already been ready when this announcement was made over 4 months ago.

But sure, let's wait one more business day and see if everything is provisioned and functional; One more day seems like a reasonable promise here, with no preview being offered to those of us that are the most vocal; Leaving a 5-day cushion for one of the most significant parts of one of the most foundational services in Azure...

smh.

davidsandbrand avatar Mar 24 '23 14:03 davidsandbrand

Hey @davidsandbrand , the last quarter has been a bit turbulent for us due to an Azure region outage and a few other livesite incidents, which led us to push our timelines of the feature ahead. We did intend to stay on track, but some surprises threw us off-track :) Feedback taken - sticking with our communicated timelines is of utmost importance to keep our customers happy!

The feature is deployed as I write this, however, the announcement and updates shall go out in PST morning. I decided to go ahead without a preview because adding a preview would push the general availability (GA) by another couple of weeks. Given the scope of the feature, directly going to GA was the right path.

We do have a few private previews coming up for ASR, please let me know if you'd like to enroll for any of them:

  1. Shared Disks DR (For Windows Server Failover Clusters on Azure) - April end
  2. Converged BCDR for Trusted Launch enabled VMs on Azure - Sep end

rishjai-msft avatar Mar 27 '23 05:03 rishjai-msft

@davidsandbrand, the announcement went out yesterday about this - Generally available: Migrate from a Run As account to Managed Identities using Azure Site Recovery  Hope that you were able to use the feature for migrating to Managed Identity. Please let us know if you have any questions, else we will close this issue out. Thank you all for your continuous feedback and help.

AnuragSingh-MSFT avatar Mar 28 '23 04:03 AnuragSingh-MSFT

@AnuragSingh-MSFT , The option you guys rolled out is not visible on our tenant:

Screenshot 2023-03-28 160426

deepdarshansingrodia avatar Mar 28 '23 10:03 deepdarshansingrodia

Hey @deepdarshansingrodia - This means you're already leveraging Managed Identities as an authentication type for your automation account. Please verify the same and let us know otherwise :)

Thanks, Rishabh

rishjai-msft avatar Mar 29 '23 05:03 rishjai-msft

Hi @rishjai-msft Thanks for your comment, it means I can go ahead and de-associate my Run as Account directly and no more changes required? 2 weeks ago when I tried to do so my jobs started failing.

deepdarshansingrodia avatar Mar 29 '23 08:03 deepdarshansingrodia

Hi @rishjai-msft Thanks for your comment, it means I can go ahead and de-associate my Run as Account directly and no more changes required? 2 weeks ago when I tried to do so my jobs started failing.

Let me know if you need a screen grab please to demonstrate how things are currently configured. Rishabh's reply seems to contradict what we saw in the portal.

ThinkElevenDave avatar Mar 29 '23 08:03 ThinkElevenDave

Any update here @rishjai-msft ?

deepdarshansingrodia avatar Mar 30 '23 08:03 deepdarshansingrodia

Hey @deepdarshansingrodia - This means you're already leveraging Managed Identities as an authentication type for your automation account. Please verify the same and let us know otherwise :)

Thanks, Rishabh

@deepdarshansingrodia is our premium MS support engineer trying to get some facts. In addition to his screen grab, we are definitely not leveraging Managed Identities. I am happy to speak on a call as you previously mentioned if you can schedule with @deepdarshansingrodia.

image

ThinkElevenDave avatar Mar 30 '23 08:03 ThinkElevenDave

@ThinkElevenDave @deepdarshansingrodia - Please try toggling the following button. After this, next day onward it should use System Assigned Identity.

image

rishjai-msft avatar Apr 03 '23 05:04 rishjai-msft

@ThinkElevenDave @deepdarshansingrodia, I hope the solution provided by rishjai-msft helped, and you were able to successfully migrate the auth from RunAs account to ManagedIdentity.

AnuragSingh-MSFT avatar Apr 05 '23 04:04 AnuragSingh-MSFT