You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes-archive.md
+19-1Lines changed: 19 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Archive for What's new with Azure Arc-enabled servers agent
3
3
description: The What's new release notes in the Overview section for Azure Arc-enabled servers agent contains six months of activity. Thereafter, the items are removed from the main article and put into this article.
4
4
ms.topic: overview
5
-
ms.date: 04/15/2022
5
+
ms.date: 05/24/2022
6
6
ms.custom: references_regions
7
7
---
8
8
@@ -16,6 +16,24 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. Thi
16
16
- Known issues
17
17
- Bug fixes
18
18
19
+
## Version 1.13 - November 2021
20
+
21
+
### Known issues
22
+
23
+
- Extensions may get stuck in transient states (creating, deleting, updating) on Windows machines running the 1.13 agent in certain conditions. Microsoft recommends upgrading to agent version 1.14 as soon as possible to resolve this issue.
24
+
25
+
### Fixed
26
+
27
+
- Improved reliability when installing or upgrading the agent.
28
+
29
+
### New features
30
+
31
+
- Local configuration of agent settings now available using the [azcmagent config command](manage-agent.md#config).
32
+
- Proxy server settings can be [configured using agent-specific settings](manage-agent.md#update-or-remove-proxy-settings) instead of environment variables.
33
+
- Extension operations will execute faster using a new notification pipeline. You may need to adjust your firewall or proxy server rules to allow the new network addresses for this notification service (see [networking configuration](network-requirements.md)). The extension manager will fall back to the existing behavior of checking every 5 minutes when the notification service cannot be reached.
34
+
- Detection of the AWS account ID, instance ID, and region information for servers running in Amazon Web Services.
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes.md
+15-18Lines changed: 15 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new with Azure Arc-enabled servers agent
3
3
description: This article has release notes for Azure Arc-enabled servers agent. For many of the summarized issues, there are links to more details.
4
4
ms.topic: overview
5
-
ms.date: 04/18/2022
5
+
ms.date: 05/24/2022
6
6
ms.custom: references_regions
7
7
---
8
8
@@ -16,6 +16,20 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. To
16
16
17
17
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Arc-enabled servers agent](agent-release-notes-archive.md).
18
18
19
+
## Version 1.18 - May 2022
20
+
21
+
### New features
22
+
23
+
- The agent can now be configured to operate in [monitoring mode](security-overview.md#agent-modes), which simplifies configuration of the agent for scenarios where you only want to use Arc for monitoring and security scenarios. This mode disables other agent functionality and prevents use of extensions that could make changes to the system (for example, the Custom Script Extension).
24
+
- VMs and hosts running on Azure Stack HCI now report the cloud provider as "HCI" when [Azure benefits are enabled](/azure-stack/hci/manage/azure-benefits#enable-azure-benefits).
25
+
26
+
### Fixed
27
+
28
+
-`systemd` is now an official prerequisite on Linux and your package manger will alert you if you try to install the Azure Connected Machine agent on a server without systemd.
29
+
- Guest configuration policies no longer create unnecessary files in the `/tmp` directory on Linux servers
30
+
- Improved reliability when extracting extensions and guest configuration policy packages
31
+
- Improved reliability for guest configuration policies that have child processes
32
+
19
33
## Version 1.17 - April 2022
20
34
21
35
### New features
@@ -75,23 +89,6 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
75
89
76
90
- A state corruption issue in the extension manager that could cause extension operations to get stuck in transient states has been fixed. Customers running agent version 1.13 are encouraged to upgrade to version 1.14 as soon as possible. If you continue to have issues with extensions after upgrading the agent, [submit a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
77
91
78
-
## Version 1.13 - November 2021
79
-
80
-
### Known issues
81
-
82
-
- Extensions may get stuck in transient states (creating, deleting, updating) on Windows machines running the 1.13 agent in certain conditions. Microsoft recommends upgrading to agent version 1.14 as soon as possible to resolve this issue.
83
-
84
-
### Fixed
85
-
86
-
- Improved reliability when installing or upgrading the agent.
87
-
88
-
### New features
89
-
90
-
- Local configuration of agent settings now available using the [azcmagent config command](manage-agent.md#config).
91
-
- Proxy server settings can be [configured using agent-specific settings](manage-agent.md#update-or-remove-proxy-settings) instead of environment variables.
92
-
- Extension operations will execute faster using a new notification pipeline. You may need to adjust your firewall or proxy server rules to allow the new network addresses for this notification service (see [networking configuration](network-requirements.md)). The extension manager will fall back to the existing behavior of checking every 5 minutes when the notification service cannot be reached.
93
-
- Detection of the AWS account ID, instance ID, and region information for servers running in Amazon Web Services.
94
-
95
92
## Next steps
96
93
97
94
- Before evaluating or enabling Azure Arc-enabled servers across multiple hybrid machines, review [Connected Machine agent overview](agent-overview.md) to understand requirements, technical details about the agent, and deployment methods.
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/security-overview.md
+31-2Lines changed: 31 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Security overview
3
3
description: Security information about Azure Arc-enabled servers.
4
4
ms.topic: conceptual
5
-
ms.date: 04/15/2022
5
+
ms.date: 05/24/2022
6
6
---
7
7
8
8
# Azure Arc-enabled servers security overview
@@ -158,9 +158,38 @@ sudo azcmagent config set extensions.allowlist "Microsoft.EnterpriseCloud.Monito
158
158
sudo azcmagent config set guestconfiguration.enabled true
159
159
```
160
160
161
+
## Agent modes
162
+
163
+
A simpler way to configure local security controls for monitoring and security scenarios is to use the *monitor mode*, available with agent version 1.18 and newer. Modes are pre-defined configurations of the extension allowlist and guest configuration agent maintained by Microsoft. As new extensions become available that enable monitoring scenarios, Microsoft will update the allowlist and agent configuration to include or exclude the new functionality, as appropriate.
164
+
165
+
There are two modes to choose from:
166
+
167
+
1.**full** - the default mode. This allows all agent functionality.
168
+
1.**monitor** - a restricted mode that disables the guest configuration policy agent and only allows the use of extensions related to monitoring and security.
169
+
170
+
To enable monitor mode, run the following command:
171
+
172
+
```bash
173
+
azcmagent config set config.mode monitor
174
+
```
175
+
176
+
You can check the current mode of the agent and allowed extensions with the following command:
177
+
178
+
```bash
179
+
azcmagent config list
180
+
```
181
+
182
+
While in monitor mode, you cannot modify the extension allowlist or blocklist. If you need to change either list, change the agent back to full mode and specify your own allowlist and blocklist.
183
+
184
+
To change the agent back to full mode, run the following command:
185
+
186
+
```bash
187
+
azcmagent config set config.mode full
188
+
```
189
+
161
190
## Using a managed identity with Azure Arc-enabled servers
162
191
163
-
By default, the Azure Active Directory system assigned identity used by Arc can only be used to update the status of the Azure Arc-enabled server in Azure. For example, the *last seen* heartbeat status. You can optionally assign other roles to the identity if an application on your server uses the system assigned identity to access other Azure services. To learn more about configuring a system-assigned managed identity to access Azure resources, see [Authenticate against Azure resources with Azure Arc-enabled servers](managed-identity-authentication.md).
192
+
By default, the Azure Active Directory system assigned identity used by Arc can only be used to update the status of the Azure Arc-enabled server in Azure. For example, the *last seen* heartbeat status. You can optionally assign other roles to the identity if an application on your server uses the system assigned identity to access other Azure services. To learn more about configuring a system-assigned managed identity to access Azure resources, see [Authenticate against Azure resources with Azure Arc-enabled servers](managed-identity-authentication.md).
164
193
165
194
While the Hybrid Instance Metadata Service can be accessed by any application running on the machine, only authorized applications can request an Azure AD token for the system assigned identity. On the first attempt to access the token URI, the service will generate a randomly generated cryptographic blob in a location on the file system that only trusted callers can read. The caller must then read the file (proving it has appropriate permission) and retry the request with the file contents in the authorization header to successfully retrieve an Azure AD token.
0 commit comments