Skip to content

Commit 7176629

Browse files
Merge pull request #199066 from rpsqrd/agent-1-18-relnotes
1.18 relnotes
2 parents 5ebb2f9 + 3f382ec commit 7176629

File tree

4 files changed

+73
-22
lines changed

4 files changed

+73
-22
lines changed

articles/azure-arc/servers/agent-release-notes-archive.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Archive for What's new with Azure Arc-enabled servers agent
33
description: The What's new release notes in the Overview section for Azure Arc-enabled servers agent contains six months of activity. Thereafter, the items are removed from the main article and put into this article.
44
ms.topic: overview
5-
ms.date: 04/15/2022
5+
ms.date: 05/24/2022
66
ms.custom: references_regions
77
---
88

@@ -16,6 +16,24 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. Thi
1616
- Known issues
1717
- Bug fixes
1818

19+
## Version 1.13 - November 2021
20+
21+
### Known issues
22+
23+
- Extensions may get stuck in transient states (creating, deleting, updating) on Windows machines running the 1.13 agent in certain conditions. Microsoft recommends upgrading to agent version 1.14 as soon as possible to resolve this issue.
24+
25+
### Fixed
26+
27+
- Improved reliability when installing or upgrading the agent.
28+
29+
### New features
30+
31+
- Local configuration of agent settings now available using the [azcmagent config command](manage-agent.md#config).
32+
- Proxy server settings can be [configured using agent-specific settings](manage-agent.md#update-or-remove-proxy-settings) instead of environment variables.
33+
- Extension operations will execute faster using a new notification pipeline. You may need to adjust your firewall or proxy server rules to allow the new network addresses for this notification service (see [networking configuration](network-requirements.md)). The extension manager will fall back to the existing behavior of checking every 5 minutes when the notification service cannot be reached.
34+
- Detection of the AWS account ID, instance ID, and region information for servers running in Amazon Web Services.
35+
36+
1937
## Version 1.12 - October 2021
2038

2139
### Fixed

articles/azure-arc/servers/agent-release-notes.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What's new with Azure Arc-enabled servers agent
33
description: This article has release notes for Azure Arc-enabled servers agent. For many of the summarized issues, there are links to more details.
44
ms.topic: overview
5-
ms.date: 04/18/2022
5+
ms.date: 05/24/2022
66
ms.custom: references_regions
77
---
88

@@ -16,6 +16,20 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. To
1616

1717
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Arc-enabled servers agent](agent-release-notes-archive.md).
1818

19+
## Version 1.18 - May 2022
20+
21+
### New features
22+
23+
- The agent can now be configured to operate in [monitoring mode](security-overview.md#agent-modes), which simplifies configuration of the agent for scenarios where you only want to use Arc for monitoring and security scenarios. This mode disables other agent functionality and prevents use of extensions that could make changes to the system (for example, the Custom Script Extension).
24+
- VMs and hosts running on Azure Stack HCI now report the cloud provider as "HCI" when [Azure benefits are enabled](/azure-stack/hci/manage/azure-benefits#enable-azure-benefits).
25+
26+
### Fixed
27+
28+
- `systemd` is now an official prerequisite on Linux and your package manger will alert you if you try to install the Azure Connected Machine agent on a server without systemd.
29+
- Guest configuration policies no longer create unnecessary files in the `/tmp` directory on Linux servers
30+
- Improved reliability when extracting extensions and guest configuration policy packages
31+
- Improved reliability for guest configuration policies that have child processes
32+
1933
## Version 1.17 - April 2022
2034

2135
### New features
@@ -75,23 +89,6 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
7589

7690
- A state corruption issue in the extension manager that could cause extension operations to get stuck in transient states has been fixed. Customers running agent version 1.13 are encouraged to upgrade to version 1.14 as soon as possible. If you continue to have issues with extensions after upgrading the agent, [submit a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
7791

78-
## Version 1.13 - November 2021
79-
80-
### Known issues
81-
82-
- Extensions may get stuck in transient states (creating, deleting, updating) on Windows machines running the 1.13 agent in certain conditions. Microsoft recommends upgrading to agent version 1.14 as soon as possible to resolve this issue.
83-
84-
### Fixed
85-
86-
- Improved reliability when installing or upgrading the agent.
87-
88-
### New features
89-
90-
- Local configuration of agent settings now available using the [azcmagent config command](manage-agent.md#config).
91-
- Proxy server settings can be [configured using agent-specific settings](manage-agent.md#update-or-remove-proxy-settings) instead of environment variables.
92-
- Extension operations will execute faster using a new notification pipeline. You may need to adjust your firewall or proxy server rules to allow the new network addresses for this notification service (see [networking configuration](network-requirements.md)). The extension manager will fall back to the existing behavior of checking every 5 minutes when the notification service cannot be reached.
93-
- Detection of the AWS account ID, instance ID, and region information for servers running in Amazon Web Services.
94-
9592
## Next steps
9693

9794
- Before evaluating or enabling Azure Arc-enabled servers across multiple hybrid machines, review [Connected Machine agent overview](agent-overview.md) to understand requirements, technical details about the agent, and deployment methods.

articles/azure-arc/servers/prerequisites.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connected Machine agent prerequisites
33
description: Learn about the prerequisites for installing the Connected Machine agent for Azure Arc-enabled servers.
4-
ms.date: 05/10/2022
4+
ms.date: 05/24/2022
55
ms.topic: conceptual
66
---
77

@@ -50,9 +50,16 @@ The following versions of the Windows and Linux operating system are officially
5050
5151
## Software requirements
5252

53+
Windows operating systems:
54+
5355
* NET Framework 4.6 or later is required. [Download the .NET Framework](/dotnet/framework/install/guide-for-developers).
5456
* Windows PowerShell 5.1 is required. [Download Windows Management Framework 5.1.](https://www.microsoft.com/download/details.aspx?id=54616).
5557

58+
Linux operating systems:
59+
60+
* systemd
61+
* wget (to download the installation script)
62+
5663
## Required permissions
5764

5865
The following Azure built-in roles are required for different aspects of managing connected machines:

articles/azure-arc/servers/security-overview.md

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Security overview
33
description: Security information about Azure Arc-enabled servers.
44
ms.topic: conceptual
5-
ms.date: 04/15/2022
5+
ms.date: 05/24/2022
66
---
77

88
# Azure Arc-enabled servers security overview
@@ -158,9 +158,38 @@ sudo azcmagent config set extensions.allowlist "Microsoft.EnterpriseCloud.Monito
158158
sudo azcmagent config set guestconfiguration.enabled true
159159
```
160160

161+
## Agent modes
162+
163+
A simpler way to configure local security controls for monitoring and security scenarios is to use the *monitor mode*, available with agent version 1.18 and newer. Modes are pre-defined configurations of the extension allowlist and guest configuration agent maintained by Microsoft. As new extensions become available that enable monitoring scenarios, Microsoft will update the allowlist and agent configuration to include or exclude the new functionality, as appropriate.
164+
165+
There are two modes to choose from:
166+
167+
1. **full** - the default mode. This allows all agent functionality.
168+
1. **monitor** - a restricted mode that disables the guest configuration policy agent and only allows the use of extensions related to monitoring and security.
169+
170+
To enable monitor mode, run the following command:
171+
172+
```bash
173+
azcmagent config set config.mode monitor
174+
```
175+
176+
You can check the current mode of the agent and allowed extensions with the following command:
177+
178+
```bash
179+
azcmagent config list
180+
```
181+
182+
While in monitor mode, you cannot modify the extension allowlist or blocklist. If you need to change either list, change the agent back to full mode and specify your own allowlist and blocklist.
183+
184+
To change the agent back to full mode, run the following command:
185+
186+
```bash
187+
azcmagent config set config.mode full
188+
```
189+
161190
## Using a managed identity with Azure Arc-enabled servers
162191

163-
By default, the Azure Active Directory system assigned identity used by Arc can only be used to update the status of the Azure Arc-enabled server in Azure. For example, the *last seen* heartbeat status. You can optionally assign other roles to the identity if an application on your server uses the system assigned identity to access other Azure services. To learn more about configuring a system-assigned managed identity to access Azure resources, see [Authenticate against Azure resources with Azure Arc-enabled servers](managed-identity-authentication.md).
192+
By default, the Azure Active Directory system assigned identity used by Arc can only be used to update the status of the Azure Arc-enabled server in Azure. For example, the *last seen* heartbeat status. You can optionally assign other roles to the identity if an application on your server uses the system assigned identity to access other Azure services. To learn more about configuring a system-assigned managed identity to access Azure resources, see [Authenticate against Azure resources with Azure Arc-enabled servers](managed-identity-authentication.md).
164193

165194
While the Hybrid Instance Metadata Service can be accessed by any application running on the machine, only authorized applications can request an Azure AD token for the system assigned identity. On the first attempt to access the token URI, the service will generate a randomly generated cryptographic blob in a location on the file system that only trusted callers can read. The caller must then read the file (proving it has appropriate permission) and retry the request with the file contents in the authorization header to successfully retrieve an Azure AD token.
166195

0 commit comments

Comments
 (0)