Running PowerShell Inline with Azure Standard Logic Apps: Because Sometimes, No-Code is Too Much Work

Azure Logic Apps are fantastic—until you need to do something slightly complex. The built-in workflow language is powerful but, let’s be honest, sometimes writing expressions in that JSON-esque nightmare is more painful than debugging a spaghetti-coded PowerShell script written by an intern.

Enter PowerShell in Azure Logic Apps (Standard Edition)—where you can run inline PowerShell scripts, skipping the need for convoluted @{json_expression} gymnastics.

Why?

Readability: Ever tried debugging a concat(split(base64(binary), ',')) expression? Yeah, me neither. PowerShell is just easier to read and debug.

Flexibility: You can manipulate JSON, handle dates, perform string operations, and even call APIs—all in a single PowerShell script instead of chaining actions together.

Less Clicks, More Code: Instead of adding multiple Compose, Condition, and Parse JSON actions, you can just run a PowerShell script inline and return exactly what you need.

How to Run PowerShell in Azure Standard Logic Apps

Step 1: Add the Inline Code Action

  1. Open your Azure Logic App (Standard Edition).
  2. Click “Add an action” in your workflow.
  3. Search for Inline Code and select it.

Note: This works only in Standard Logic Apps, not Consumption-based ones.

Step 2: Write Your PowerShell Script

The Inline Code action lets you use PowerShell directly inside the workflow.

Here’s a simple example:

param ($inputData)

# Convert input JSON into a PowerShell object
$data = $inputData | ConvertFrom-Json

# Get current timestamp in ISO format
$timestamp = Get-Date -Format "yyyy-MM-ddTHH:mm:ssZ"

# Concatenate values (because Logic Apps JSON expressions are a pain)
$fullName = "$($data.firstName) $($data.lastName)"

# Return an object
@{
    fullName = $fullName
    timestamp = $timestamp
} | ConvertTo-Json -Compress

Step 3: Pass Data Into the Script

  1. Click the “Parameters” section in the Inline Code action.
  2. Add a new parameter (e.g., inputData).
  3. Pass data from a previous action (like an HTTP request, a database call, or another Logic App action).

When executed, the script will return a structured JSON response—without needing multiple Logic App actions for transformation.

Real-World Use Cases

Date Manipulation: Logic Apps date functions are limited, but PowerShell handles them easily.

Complex String Operations: Need to extract a value from a string? Regex it in PowerShell.

API Calls & Data Formatting: Fetch data, process it, and return the exact structure you need.

PowerShell in Logic Apps Standard is a game-changer. Instead of wrestling with the built-in workflow language, you can just script it. It’s faster, cleaner, and doesn’t require chaining a dozen actions together just to manipulate a date or merge strings.

So next time you’re staring at an ugly @concat expression, ask yourself: “Could I just do this in PowerShell?” The answer is yes—and your future self will thank you.

Happy Birthday PowerShell!!

Today – November 14, 2024, PowerShell officially became an adult and celebrating its 18th birthday. From its humble beginnings as “Monad” to becoming a cross-platform automation powerhouse, PowerShell has come a long way. Take a moment to appreciate the journey and the community that has grown around this versatile tool.

October PowerShell Updates

October was a busy month this time! Lots of updates!

Azure PowerShell 12.5.0

October 2024 saw the release of Azure PowerShell 12.5.0, introducing several enhancements and fixes:

  • Az.AnalysisServices 1.1.6: Migrated the AnalysisServices SDK to a generated SDK, streamlining development and maintenance. Additionally, references to ‘Microsoft.Azure.Management.AnalysisServices’ were removed, reducing potential conflicts.
  • Az.Storage 7.2.0: Upgraded ‘Microsoft.Azure.Storage.DataMovement’ to version 2.0.5, improving data transfer capabilities and performance.
  • Az.StorageSync 2.3.0: Addressed issues with ‘Register-AzStorageSyncServer’ when using Azure FileSync Agent v17 and enhanced performance for Managed Identity migration cmdlets.
  • Az.Accounts 3.0.1: Introduced several fixes, including disabling WAM for device code flow or username/password (ROPC) flow to prevent potential token cache issues, resolving ‘KeyNotFoundException’ warnings, and limiting promotional messages to interactive scenarios only.
  • Az.Resources: Added properties ‘Condition’, ‘ConditionVersion’, and ‘Description’ to ‘New-AzRoleAssignment’, providing more granular control over role assignments.

For a comprehensive list of updates, refer to the official release notes.

PowerShell Universal 5.0.x

The team at Ironman Software was on a roll in October 2024, releasing multiple updates to PowerShell Universal – these folks are machines!

  • Version 5.0.10 (October 8, 2024): Introduced various enhancements and bug fixes, improving overall stability and performance.
  • Version 5.0.11 (October 15, 2024): Continued the trend with additional improvements, addressing user-reported issues and refining existing features.
  • Version 5.0.12 (October 18, 2024): Focused on performance optimizations and minor feature enhancements, ensuring a smoother user experience.
  • Version 5.0.13 (October 22, 2024): Addressed specific bugs and introduced minor feature updates, further stabilizing the platform.
  • Version 5.0.14 (October 31, 2024): Wrapped up the month with a release that included various enhancements and bug fixes, setting the stage for future developments.

September PowerShell Updates

Azure PowerShell 12.3.0

September saw the release of Azure PowerShell 12.3.0, packed with updates that made managing Azure resources feel like a breeze:

  • Az.Accounts 3.0.4: Introduced a customized UserAgent for ARM telemetry and fixed some documentation snafus where secrets were unintentionally exposed.
  • Az.Resources 7.5.0: Added ‘ResourceSelector’ and ‘Override’ parameters to ‘New/Update-AzPolicyAssignment’, giving you more control over policy assignments. Because who doesn’t like more knobs to turn?
  • Az.Storage 7.4.0: Issued a heads-up about an upcoming breaking change involving the removal of references to ‘Microsoft.Azure.Storage.File’ in ‘Start-AzStorageFileCopy’.

PowerShell Universal 5.0.7

Added an index to the database. If your service took its sweet time starting during the install, a manual schema update might have been in order.

PnP.PowerShell 2.12.0

SharePoint enthusiasts, rejoice! September 2024 brought us PnP.PowerShell 2.12.0, featuring:

  • WAM Login Support: For Windows users, this means support for Windows Hello, FIDO keys, and Conditional Access policies.
  • -SkipCertCreation Parameter: Added to ‘Register-PnPAzureADApp’, allowing you to prevent the creation and uploading of certificates in the Entra ID app.

PowerShell’s Pseudo-Terminal Support: A Hidden Gem for the Command Line

Ah, PowerShell—the Swiss Army knife of scripting languages. Just when you think you’ve explored all its tools, it unveils a new feature that makes you wonder how you ever lived without it. Today, we’re diving into one such feature that might have flown under your radar: pseudo-terminal support. If you’re moderately skilled in PowerShell, prepare to have your command-line experience elevated.

What on Earth Is Pseudo-Terminal Support?

In the realm of command-line interfaces, a pseudo-terminal (PTY) acts as a mediator between a user and the system, emulating a physical terminal. This allows for more sophisticated interactions with native commands, enhancing how input and output are handled within PowerShell.

Why Should You Care?

Traditionally, PowerShell has had limitations in capturing and managing the output of native commands. This often led to challenges in scripting and automation, especially when dealing with complex command-line tools. With pseudo-terminal support, these limitations are addressed, offering:

  • Improved Output Handling
  • Enhanced Interactivity
  • Streamlined Automation

How Does It Work?

Pseudo-terminal support allows PowerShell to create a virtual terminal session for native commands. This means that when you execute a command, PowerShell can interact with it as if it were running in a standalone terminal, capturing all output and managing input more effectively.

Before Pseudo-Terminal Support

Imagine trying to run a command that requires interactive input, like ssh or cmd.exe /c pause. Before PTY support, PowerShell struggled to manage interactive commands cleanly. Here’s an example:

# Before PTY Support
Start-Process -FilePath "cmd.exe" -ArgumentList "/c pause" -NoNewWindow -Wait

In this case, interactive prompts might not behave as expected, or the output could be garbled, making automation difficult.

After Pseudo-Terminal Support

With PTY support enabled, PowerShell now handles such scenarios seamlessly, making it much more robust for interactive use cases. Here’s the improved approach:

# After PTY Support (Requires PowerShell 7.5+ and PTY enabled)
$session = New-Object System.Management.Automation.Host.PseudoTerminalSession
$session.StartProcess("cmd.exe", "/c pause")
$session.WaitForExit()

Now, PowerShell interacts directly with the pseudo-terminal, meaning smooth execution and proper handling of inputs and outputs.


Enabling Pseudo-Terminal Support

As of PowerShell 7.5, pseudo-terminal support is available as an experimental feature. To enable it:

  1. Update PowerShell: Ensure you’re running PowerShell 7.5 or later.
  2. Enable the Feature: Use the following command to turn on PTY support:
Enable-ExperimentalFeature -Name PseudoTerminalSupport

3. Restart PowerShell: Close and reopen your PowerShell session to apply the changes.

By leveraging pseudo-terminal support, PowerShell scripts become more capable of managing interactive commands and complex workflows, unlocking new possibilities for automation. Experiment with it and see how it fits into your toolkit!

PowerShell 7.5.0 Preview 2 Changes

Preview 2 has dropped! Let’s look at some of the major things that are coming in this preview.

First – let’s look at the breaking changes:

Breaking Changes

  • Adjustments have been made to the -OlderThan and -NewerThan parameters for Test-Path, addressing issues when used with PathType and a date range​
  • The default CatalogVersion for New-FileCatalog has been changed to 2​​
  • Restrictions have been added to block help from network locations in restricted remoting sessions​

And now to the improvements:

Tab Completion Improvements

  • Efforts led by contributors like @ArmaanMcleod have refined tab completion, including preventing fallback to file completion when tab completing type names and adding argument completers for various cmdlets like Set-StrictMode, Get-Verb, Start-Process, and more​

Web Cmdlets Improvements

  • Fixes have been made to Invoke-WebRequest to ensure accurate size reporting when the -Resume parameter is specified​
  • Web Cmdlets have been adjusted to allow WinForm applications to work correctly​

Other Cmdlet Improvements

  • A range of cmdlet improvements and fixes, including for Test-Connection, Get-Service, and adding new parameters to New-Guid. For instance, New-Guid now supports -Empty and -InputObject parameters​

Engine Improvements

  • Enhancements in the engine include telemetry for module imports, adjustments to module load telemetry, and fixes for regressions introduced by the WDAC logging feature​

Experimental Features

  • Introduction of tilde expansion for Windows native executables, demonstrating PowerShell’s ongoing evolution and adaptation​

​.

PowerShell, GitHub, and the GH Cli

Here’s another quick one – using the GitHub CLI to copy a repository from GitHub, bring it down to your local machine, and then copy it to a remote server. Great for quickly setting up a new automation server or re-baseline an existing box.

Before running the script, ensure:

  • You have permissions to access the remote server and write to the target directory.
  • PowerShell Remoting is enabled on the remote server if you’re using a PowerShell session for the transfer.
  • The GitHub CLI is installed and configured on your machine.

Here’s the script!

# Define variables
$repoUrl = "https://github.com/username/repository" # Replace with your GitHub repository URL
$tempDir = Join-Path -Path $env:TEMP -ChildPath "github_repo_temp"
$remoteServer = "\\remote-server\share" # Replace with your remote server share path
$remotePath = "path\to\destination\folder" # Replace with your remote destination path, relative to the share

# Ensure the temp directory does not already exist
if (Test-Path -Path $tempDir) {
    Remove-Item -Path $tempDir -Recurse
}

# Clone the repository to the temporary directory
gh repo clone $repoUrl $tempDir

# Assuming the remote server is accessible via a network share
$fullRemotePath = Join-Path -Path $remoteServer -ChildPath $remotePath

# Ensure the remote directory exists
if (-not (Test-Path -Path $fullRemotePath)) {
    New-Item -Path $fullRemotePath -ItemType Directory
}

# Copy the contents to the remote server
Copy-Item -Path "$tempDir\*" -Destination $fullRemotePath -Recurse

# Clean up the temporary directory
Remove-Item -Path $tempDir -Recurse

Write-Host "Repository contents have been copied to the remote server."

And that’s it! Consider putting it in a scheduler to always ensure that your remote automation servers are up to date and using your latest code.

Enjoy!

Running PowerShell from a Logic App

Hola! Today let’s look at a simple way to get PowerShell scripts to run from a Logic App. It will involve a single extra tool, but this really adds versatility to an already versatile tool.

Start by creating a PowerShell script for your specific task. This script will be uploaded to an Azure Automation Runbook. For instance, if you aim to manage VMs, ensure the script includes Azure RM or Az module commands to start, stop, or monitor VM states. Here is an example:

# Sample PowerShell Script to Start a Specific Azure VM
Param(
    [string]$vmName,
    [string]$resourceGroupName
)

Connect-AzAccount -Identity
Start-AzVM -Name $vmName -ResourceGroupName $resourceGroupName

Obviously this is a short script that we can do with just Logic Apps (and not involve pwsh at all), but you get the point.

Now – Upload and publish your PowerShell script in an Azure Automation Runbook.

  1. In your Azure Automation Account, create a new Runbook.
  2. Choose “PowerShell” as the Runbook type.
  3. Import your script and publish the Runbook.

Go ahead test the runbook if you want.

Next – create a Logic App to trigger the Runbook. You might use a schedule, an HTTP request, or another event in Azure as a trigger.

  1. In the Logic App Designer, add a new step and search for the “Azure Automation” connector.
  2. Select “Create job” action.
  3. Fill in the necessary details: Automation Account, Runbook Name, and parameters (if your script requires them). In our example we might dynamically pass the VM name, or maybe look for only VMs that are off and loop through them.

For more complex scenarios, you might need to integrate with other Azure services before or after executing your PowerShell script:

  • Azure Functions: For custom logic that cannot be implemented directly in PowerShell or needs a specific runtime environment.
  • Azure Event Grid: To trigger your Logic App based on events from various Azure services.
  • Azure Monitor: To analyze logs and metrics from your Logic App and Automation Runbooks, enabling proactive management and optimization of your automated tasks.

And there you go! Go put PowerShell everywhere!

Quick Code – Install AMA and Assign a DCR with PowerShell

Happy Holidays! Here’s a quick post to share some code that will inventory Azure VMs, install the AMA if necessary, and then assign a DCR to the VM.

# Ensure you're logged in to Azure
Connect-AzAccount

# Define the Data Collection Rule (DCR) resource ID
$dcrResourceId = "<Your-DCR-Resource-ID>"

# Get all VMs in the subscription
$vms = Get-AzVM

# Use ForEach-Object with -Parallel to process VMs concurrently
$vms | ForEach-Object -Parallel {
    $vm = $_
    $osType = $vm.StorageProfile.OsDisk.OsType
    $extensionName = if ($osType -eq "Windows") { "AzureMonitorWindowsAgent" } else { "AzureMonitorLinuxAgent" }
    $extensionPublisher = "Microsoft.Azure.Monitor"
    $vmResourceId = "/subscriptions/$using:vm.SubscriptionId/resourceGroups/$using:vm.ResourceGroupName/providers/Microsoft.Compute/virtualMachines/$using:vm.Name"

    try {
        # Check if the Azure Monitor Agent extension is installed
        $amaExtension = Get-AzVMExtension -ResourceGroupName $using:vm.ResourceGroupName -VMName $using:vm.Name -Name $extensionName -ErrorAction SilentlyContinue

        if (-not $amaExtension) {
            try {
                # Install the Azure Monitor Agent extension
                Set-AzVMExtension -ResourceGroupName $using:vm.ResourceGroupName -VMName $using:vm.Name -Name $extensionName -Publisher $extensionPublisher -ExtensionType $extensionName -TypeHandlerVersion "1.0" -Location $using:vm.Location
                Write-Host "Installed Azure Monitor Agent on $($using:vm.Name)"
            } catch {
                Write-Host "Failed to install Azure Monitor Agent on $($using:vm.Name): $_"
            }
        } else {
            Write-Host "Azure Monitor Agent is already installed on $($using:vm.Name)"
        }
    } catch {
        Write-Host "Error checking Azure Monitor Agent on $($using:vm.Name): $_"
    }

    try {
        # Assign the DCR to the VM
        $settings = @{ "dataCollectionRuleResourceIds" = @($using:dcrResourceId) }
        Set-AzVMExtension -ResourceGroupName $using:vm.ResourceGroupName -VMName $using:vm.Name -Name "AzureMonitorVmExtension" -Publisher $extensionPublisher -ExtensionType $extensionName -Settings $settings -Location $using:vm.Location
        Write-Host "Assigned DCR to $($using:vm.Name)"
    } catch {
        Write-Host "Failed to assign DCR to $($using:vm.Name): $_"
    }
} -ThrottleLimit 5 # Adjust the ThrottleLimit as necessary

Setting up Azure OpenAI with PowerShell

If haven’t been living under a rock, you know that Azure OpenAI is a powerful tool that brings the cutting-edge capabilities of OpenAI’s models to the cloud, offering scalability, reliability, and integration with Azure’s vast ecosystem.

Because I am who I am we will use PowerShell to setup our Azure OpenAI instance. Whether you’re automating deployment or integrating Azure OpenAI into your existing infrastructure, PowerShell scripts can simplify the process. Let’s get started with a step-by-step guide to setting up your Azure OpenAI instance using PowerShell.

Prerequisites

Before we dive into the commands, ensure you have the following:

  • An Azure subscription. If you don’t have one, you can create a free account.
  • PowerShell installed on your system. If you’re on Windows, you’re probably already set. For Mac and Linux users, check out PowerShell Core.
  • The Azure PowerShell module installed. You can install it by running Install-Module -Name Az -AllowClobber -Scope CurrentUser in your PowerShell terminal.

Step 1: Log in to Azure

First things first, let’s log into Azure. Open your PowerShell terminal and run:

Connect-AzAccount

This command opens a login window where you can enter your Azure credentials. Once authenticated, you’re ready to proceed.

Step 2: Create a Resource Group

Azure OpenAI instances need to reside in a resource group, a container that holds related resources for an Azure solution. To create a new resource group, use:

New-AzResourceGroup -Name 'MyResourceGroup' -Location 'EastUS'

Replace 'MyResourceGroup' with your desired resource group name and 'EastUS' with your preferred location.

Step 3: Register the OpenAI Resource Provider

Before deploying Azure OpenAI, ensure your subscription is registered to use the OpenAI resource provider. Register it with:

powershell

Register-AzResourceProvider -ProviderNamespace 'Microsoft.OpenAI'

This command might take a few minutes. To check the status, you can run Get-AzResourceProvider -ProviderNamespace 'Microsoft.OpenAI'.

Step 4: Create an Azure OpenAI Instance

Now, the exciting part—creating your Azure OpenAI instance. Use the following command:

powershell

New-AzResource -ResourceGroupName 'MyResourceGroup' -ResourceType 'Microsoft.OpenAI/workspaces' -Name 'MyOpenAIInstance' -Location 'EastUS' -PropertyObject @{ sku = 'S0'; properties = @{ description = 'My Azure OpenAI instance for cool AI projects'; } }

Make sure to replace 'MyResourceGroup', 'MyOpenAIInstance', and 'EastUS' with your resource group name, desired OpenAI instance name, and location, respectively.

Step 5: Confirm Your Azure OpenAI Instance

To ensure everything went smoothly, you can list all OpenAI instances in your resource group:

powershell

Get-AzResource -ResourceGroupName 'MyResourceGroup' -ResourceType 'Microsoft.OpenAI/workspaces'

This command returns details about the OpenAI instances in your specified resource group, confirming the successful creation of your instance. Enjoy your brand new OpenAI instance!