-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set-AzureKeyVaultSecret does not recognize vaultName #1524
Comments
Any idea why this error message occurs? I'm also getting a "The remote name could not be resolved: '*.vault.azure.net", except I get it when running Set-AzureRmVMDiskEncryptionExtension. |
I'm seeing this as well, many months later. Did anyone ever try to resolve this? Is the key vault team in the know? |
Same here, this is very strange! works sometime and not the other time! @markcowl, could you please have a look here. Thanks, |
+1 |
4 similar comments
+1 |
+1 |
+1 |
+1 |
Same here, works one minute then not the other. |
+1 |
1 similar comment
+1 |
It was due to invalid dns cache for me. Flushing out dns cache fixed it. Command: ipconfig /flushdns |
I use this to trap it. Seems to be an intermittent problem
eventually it works :/ |
Closing in favor of #5326 |
Dont understand why this is closed, this is open since 2015, i just reinstated on another issue that it still exists face palm |
Also running into this. |
I run into strange stuff all the time related to DNS. I think it's deeper than these instances related to KeyVault. I often times get failures resolving the Let's Encrypt endpoint. One thing in common on all occurrences is the fact that it's .NET under the covers. |
For anyone that finds this problem @LukeDearden stated eventually the request will go through. Takes up to 10 min for me at times.
Not sure if increasing the frequency of the request would increase chances of a successful call. I also have an almost identical code block for Get-AzKeyVaultSecret. Unfortunately this module is necessary for my deployment automation so I have to make due. |
The keyvault cmdlets in powershell always had issues, instead of the api returning an object after the hostname have been propogated successfully the cmdlet have a sleep function, i know this by a fact as we opened a ticket to microsoft requesting this to be fixed and the product team only added a minute and a half sleep, stating why it is supposed to solve it. Part of that matter, keyvault and storage account endpoints have constant issues during the two and a half years i have been working with them, very unreliable infrastructure. p.s - the python libraries aren't any better ;) |
I know this issue is closed but I just ran into this error in July 2021 and found a pretty simple workaround that works consistently. Somewhere in my online troubleshooting travels, a poster mentioned that get-azkeyvault (without any parameters) worked even though get-azkeyvaultsecret failed to resolve the remote name. So I assigned get-azkeyvault to a variable and used the vaultname property ($varVault.VaultName). I used that for the get-azkeyvaultsecret -vaultname parameter and it works. Every time. Hopefully this helps someone. $varVault = get-azkeyvault |
this is embarrassing; I was using the -VaultName arg and for me the error was caused by the value I was giving it was just the wrong string. |
I have an old script I dusted off in the 1.0.2 release, Set-AzureKeyVaultSecret seems to have regressed:
Now the set cmdlet returns:
Set-AzureKeyVaultSecret : The remote name could not be resolved: '.vault.azure.net'
At line:1 char:1
Even though the vault was created just fine...
The text was updated successfully, but these errors were encountered: