Skip to content

Commit 8191fd0

Browse files
authored
Merge pull request #276040 from rpsqrd/azcmagent-1-41
azcmagent 1.41 relnotes
2 parents fe05c05 + cf4f63e commit 8191fd0

File tree

5 files changed

+104
-41
lines changed

5 files changed

+104
-41
lines changed

articles/azure-arc/servers/agent-release-notes-archive.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. Thi
1919
- Known issues
2020
- Bug fixes
2121

22+
## Version 1.36 - November 2023
23+
24+
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
25+
26+
### Known issues
27+
28+
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
29+
30+
### New features
31+
32+
- [azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
33+
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
34+
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
35+
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
36+
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
37+
38+
### Bug fixes
39+
40+
- [azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
41+
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
42+
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
43+
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
44+
2245
## Version 1.35 - October 2023
2346

2447
Download for [Windows](https://download.microsoft.com/download/e/7/0/e70b1753-646e-4aea-bac4-40187b5128b0/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)

articles/azure-arc/servers/agent-release-notes.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. To
1616

1717
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Connected Machine agent](agent-release-notes-archive.md).
1818

19+
## Version 1.41 - May 2024
20+
21+
### New features
22+
23+
- Certificate-based authentication is now supported when using a service principal to connect or disconnect the agent. For more information, see [authentication options for the azcmagent CLI](azcmagent-connect.md#authentication-options).
24+
- [azcmagent check](azcmagent-check.md) now allows you to also check for the endpoints used by the SQL Server enabled by Azure Arc extension using the new `--extensions` flag. This can help you troubleshoot networking issues for both the OS and SQL management components. You can try this out by running `azcmagent check --extensions sql --location eastus` on a server, either before or after it is connected to Azure Arc.
25+
26+
### Fixed
27+
28+
- Fixed a memory leak in the Hybrid Instance Metadata service
29+
- Better handling when IPv6 local loopback is disabled
30+
- Improved reliability when upgrading extensions
31+
- Improved reliability when enforcing CPU limits on Linux extensions
32+
- PowerShell telemetry is now disabled by default for the extension manager and policy services
33+
- The extension manager and policy services now support OpenSSL 3
34+
- Colors are now disabled in the onboarding progress bar when the `--no-color` flag is used
35+
- Improved detection and reporting for Windows machines that have custom [logon as a service rights](prerequisites.md#local-user-logon-right-for-windows-systems) configured.
36+
- Improved accuracy when obtaining system metadata on Windows:
37+
- VMUUID is now obtained from the Win32 API
38+
- Physical memory is now checked using WMI
39+
- Fixed an issue that could prevent the region selector in the [Windows GUI installer](onboard-windows-server.md) from loading
40+
- Fixed permissions issues that could prevent the "himds" service from accessing necessary directories on Windows
41+
1942
## Version 1.40 - April 2024
2043

2144
Download for [Windows](https://download.microsoft.com/download/2/1/0/210f77ca-e069-412b-bd94-eac02a63255d/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
@@ -93,29 +116,6 @@ Download for [Windows](https://download.microsoft.com/download/f/6/4/f64c574f-d3
93116
- Removed the scheduled tasks for automatic agent upgrades (introduced in agent version 1.30). We'll reintroduce this functionality when the automatic upgrade mechanism is available.
94117
- Resolved [Azure Connected Machine Agent Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624)
95118

96-
## Version 1.36 - November 2023
97-
98-
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
99-
100-
### Known issues
101-
102-
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
103-
104-
### New features
105-
106-
- [azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
107-
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
108-
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
109-
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
110-
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
111-
112-
### Bug fixes
113-
114-
- [azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
115-
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
116-
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
117-
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
118-
119119
## Next steps
120120

121121
- Before evaluating or enabling Azure Arc-enabled servers across multiple hybrid machines, review [Connected Machine agent overview](agent-overview.md) to understand requirements, technical details about the agent, and deployment methods.

articles/azure-arc/servers/azcmagent-check.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: azcmagent check CLI reference
33
description: Syntax for the azcmagent check command line tool
44
ms.topic: reference
5-
ms.date: 04/20/2023
5+
ms.date: 05/22/2024
66
---
77

88
# azcmagent check
@@ -17,7 +17,7 @@ azcmagent check [flags]
1717

1818
## Examples
1919

20-
Check connectivity with the agent's currently configured cloud and region.
20+
Check connectivity with the agent's configured cloud and region.
2121

2222
```
2323
azcmagent check
@@ -29,6 +29,13 @@ Check connectivity with the East US region using public endpoints.
2929
azcmagent check --location "eastus"
3030
```
3131

32+
Check connectivity for supported extensions (SQL Server enabled by Azure Arc) using public endpoints:
33+
34+
```
35+
azcmagent check --extensions all
36+
```
37+
38+
3239
Check connectivity with the Central India region using private endpoints.
3340

3441
```
@@ -39,14 +46,23 @@ azcmagent check --location "centralindia" --enable-pls-check
3946

4047
`--cloud`
4148

42-
Specifies the Azure cloud instance. Must be used with the `--location` flag. If the machine is already connected to Azure Arc, the default value is the cloud to which the agent is already connected. Otherwise, the default value is "AzureCloud".
49+
Specifies the Azure cloud instance. Must be used with the `--location` flag. If the machine is already connected to Azure Arc, the default value is the cloud to which the agent is already connected. Otherwise, the default value is AzureCloud.
4350

4451
Supported values:
4552

4653
* AzureCloud (public regions)
4754
* AzureUSGovernment (Azure US Government regions)
4855
* AzureChinaCloud (Microsoft Azure operated by 21Vianet regions)
4956

57+
`-e`, `--extensions`
58+
59+
Includes extra checks for extension endpoints to help validate end-to-end scenario readiness. This flag is available in agent version 1.41 and later.
60+
61+
Supported values:
62+
63+
* all (checks all supported extension endpoints)
64+
* sql (SQL Server enabled by Azure Arc)
65+
5066
`-l`, `--location`
5167

5268
The Azure region to check connectivity with. If the machine is already connected to Azure Arc, the current region is selected as the default.

articles/azure-arc/servers/azcmagent-connect.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,11 +41,11 @@ azcmagent connect --subscription-id "Production" --resource-group "HybridServers
4141

4242
## Authentication options
4343

44-
There are 4 ways to provide authentication credentials to the Azure connected machine agent. Choose one authentication option and replace the `[authentication]` section in the usage syntax with the recommended flags.
44+
There are four ways to provide authentication credentials to the Azure connected machine agent. Choose one authentication option and replace the `[authentication]` section in the usage syntax with the recommended flags.
4545

4646
### Interactive browser login (Windows-only)
4747

48-
This option is the default on Windows operating systems with a desktop experience. It login page opens in your default web browser. This option might be required if your organization has configured conditional access policies that require you to log in from trusted machines.
48+
This option is the default on Windows operating systems with a desktop experience. It login page opens in your default web browser. This option might be required if your organization configured conditional access policies that require you to log in from trusted machines.
4949

5050
No flag is required to use the interactive browser login.
5151

@@ -55,11 +55,19 @@ This option generates a code that you can use to log in on a web browser on anot
5555

5656
To authenticate with a device code, use the `--use-device-code` flag. If the account you're logging in with and the subscription where you're registering the server aren't in the same tenant, you must also provide the tenant ID for the subscription with `--tenant-id [tenant]`.
5757

58-
### Service principal
58+
### Service principal with secret
5959

60-
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. It's recommended that you provide service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
60+
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. Microsoft recommends providing service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
6161

62-
To authenticate with a service principal, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
62+
To authenticate with a service principal using a secret, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
63+
64+
### Service principal with certificate
65+
66+
Certificate-based authentication is a more secure way to authenticate using service principals. The agent accepts both PCKS #12 (.PFX) files and ASCII-encoded files (such as .PEM) that contain both the private and public keys. The certificate must be available on the local disk and the user running the `azcmagent` command needs read access to the file. Password-protected PFX files are not supported.
67+
68+
To authenticate with a service principal using a certificate, provide the service principal's application ID, tenant ID, and path to the certificate file: `--service-principal-id [appId] --service-principal-cert [pathToPEMorPFXfile] --tenant-id [tenantid]`
69+
70+
For more information, see [create a service principal for RBAC with certificate-based authentication](/cli/azure/azure-cli-sp-tutorial-3).
6371

6472
### Access token
6573

@@ -128,11 +136,15 @@ Sample value: FileServer01
128136

129137
`-i`, `--service-principal-id`
130138

131-
Specifies the application ID of the service principal used to create the Azure Arc-enabled server resource in Azure. Must be used with the `--service-principal-secret` and `--tenant-id` flags. For more information, see [authentication options](#authentication-options).
139+
Specifies the application ID of the service principal used to create the Azure Arc-enabled server resource in Azure. Must be used with the `--tenant-id` and either the `--service-principal-secret` or `--service-principal-cert` flags. For more information, see [authentication options](#authentication-options).
140+
141+
`--service-principal-cert`
142+
143+
Specifies the path to a service principal certificate file. Must be used with the `--service-principal-id` and `--tenant-id` flags. The certificate must include a private key and can be in a PKCS #12 (.PFX) or ASCII-encoded text (.PEM, .CRT) format. Password-protected PFX files are not supported. For more information, see [authentication options](#authentication-options).
132144

133145
`-p`, `--service-principal-secret`
134146

135-
Specifies the service principal secret. Must be used with the `--service-principal-id` and `--tenant-id` flags. To avoid exposing the secret in console logs, it's recommended to pass in the service principal secret in a configuration file. For more information, see [authentication options](#authentication-options).
147+
Specifies the service principal secret. Must be used with the `--service-principal-id` and `--tenant-id` flags. To avoid exposing the secret in console logs, Microsoft recommended providing the service principal secret in a configuration file. For more information, see [authentication options](#authentication-options).
136148

137149
`-s`, `--subscription-id`
138150

0 commit comments

Comments
 (0)