Skip to content

Commit 073a032

Browse files
authored
Merge pull request #261177 from rpsqrd/arc-server-updates
Arc server updates
2 parents 792b281 + 6eb741f commit 073a032

File tree

4 files changed

+23
-1
lines changed

4 files changed

+23
-1
lines changed

articles/azure-arc/servers/agent-release-notes.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Download for [Windows](https://download.microsoft.com/download/f/6/4/f64c574f-d3
2727

2828
### Fixed
2929

30+
- Restored access to servers with Windows Admin Center in Azure
3031
- Improved detection logic for Microsoft SQL Server
3132
- Agents connected to sovereign clouds should now see the correct cloud and portal URL in [azcmagent show](azcmagent-show.md)
3233
- The installation script for Linux now automatically approves the request to import the packages.microsoft.com signing key to ensure a silent installation experience
@@ -38,6 +39,10 @@ Download for [Windows](https://download.microsoft.com/download/f/6/4/f64c574f-d3
3839

3940
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
4041

42+
### Known issues
43+
44+
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
45+
4146
### New features
4247

4348
- [azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
@@ -57,6 +62,10 @@ Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2e
5762

5863
Download for [Windows](https://download.microsoft.com/download/e/7/0/e70b1753-646e-4aea-bac4-40187b5128b0/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
5964

65+
### Known issues
66+
67+
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.35. Upgrade to version 1.37 or later to use this feature.
68+
6069
### New features
6170

6271
- The Linux installation script now downloads supporting assets with either wget or curl, depending on which tool is available on the system

articles/azure-arc/servers/license-extended-security-updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ An additional scenario (scenario 1, below) is a candidate for VM/Virtual core li
3939
4040
### License limits
4141

42-
Each WS2012 ESU license can cover up to and including 10,000 cores. If you need ESUs for more than 10,000 cores, split the total number of cores across multiple licenses.
42+
Each WS2012 ESU license can cover up to and including 10,000 cores. If you need ESUs for more than 10,000 cores, split the total number of cores across multiple licenses. Additionally, only 800 licenses can be created in a single resource group. Use additional resource groups if you need to create more than 800 license resources.
4343

4444
### SA/SPLA conformance
4545

110 KB
Loading

articles/azure-arc/servers/prerequisites.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,18 @@ Linux operating systems:
8282
* openssl
8383
* gnupg (Debian-based systems, only)
8484

85+
## Local user logon right for Windows systems
86+
87+
The Azure Hybrid Instance Metadata Service runs under a low-privileged virtual account, `NT SERVICE\himds`. This account needs the "log on as a service" right in Windows to run. In most cases, there's nothing you need to do because this right is granted to virtual accounts by default. However, if your organization uses Group Policy to customize this setting, you will need to add `NT SERVICE\himds` to the list of accounts allowed to log on as a service.
88+
89+
You can check the current policy on your machine by opening the Local Group Policy Editor (`gpedit.msc`) from the Start menu and navigating to the following policy item:
90+
91+
Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment > Log on as a service
92+
93+
Check if any of `NT SERVICE\ALL SERVICES`, `NT SERVICE\himds`, or `S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083` (the static security identifier for NT SERVICE\\himds) are in the list. If none are in the list, you'll need to work with your Group Policy administrator to add `NT SERVICE\himds` to any policies that configure user rights assignments on your servers. The Group Policy administrator will need to make the change on a computer with the Azure Connected Machine agent installed so the object picker resolves the identity correctly. The agent doesn't need to be configured or connected to Azure to make this change.
94+
95+
:::image type="content" source="media/prerequisites/arc-server-user-rights-assignment.png" alt-text="Screen capture of the Local Group Policy Editor showing which users have permissions to log on as a service." border="true":::
96+
8597
## Required permissions
8698

8799
You'll need the following Azure built-in roles for different aspects of managing connected machines:
@@ -104,6 +116,7 @@ To use Azure Arc-enabled servers, the following [Azure resource providers](../..
104116
* **Microsoft.GuestConfiguration**
105117
* **Microsoft.HybridConnectivity**
106118
* **Microsoft.AzureArcData** (if you plan to Arc-enable SQL Servers)
119+
* **Microsoft.Compute** (for Azure Update Manager and automatic extension upgrades)
107120

108121
You can register the resource providers using the following commands:
109122

0 commit comments

Comments
 (0)