You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes-archive.md
+23Lines changed: 23 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. Thi
19
19
- Known issues
20
20
- Bug fixes
21
21
22
+
## Version 1.36 - November 2023
23
+
24
+
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
25
+
26
+
### Known issues
27
+
28
+
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
29
+
30
+
### New features
31
+
32
+
-[azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
33
+
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
34
+
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
35
+
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
36
+
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
37
+
38
+
### Bug fixes
39
+
40
+
-[azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
41
+
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
42
+
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
43
+
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
44
+
22
45
## Version 1.35 - October 2023
23
46
24
47
Download for [Windows](https://download.microsoft.com/download/e/7/0/e70b1753-646e-4aea-bac4-40187b5128b0/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. To
16
16
17
17
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Connected Machine agent](agent-release-notes-archive.md).
18
18
19
+
## Version 1.41 - May 2024
20
+
21
+
### New features
22
+
23
+
- Certificate-based authentication is now supported when using a service principal to connect or disconnect the agent. For more information, see [authentication options for the azcmagent CLI](azcmagent-connect.md#authentication-options).
24
+
-[azcmagent check](azcmagent-check.md) now allows you to also check for the endpoints used by the SQL Server enabled by Azure Arc extension using the new `--extensions` flag. This can help you troubleshoot networking issues for both the OS and SQL management components. You can try this out by running `azcmagent check --extensions sql --location eastus` on a server, either before or after it is connected to Azure Arc.
25
+
26
+
### Fixed
27
+
28
+
- Fixed a memory leak in the Hybrid Instance Metadata service
29
+
- Better handling when IPv6 local loopback is disabled
30
+
- Improved reliability when upgrading extensions
31
+
- Improved reliability when enforcing CPU limits on Linux extensions
32
+
- PowerShell telemetry is now disabled by default for the extension manager and policy services
33
+
- The extension manager and policy services now support OpenSSL 3
34
+
- Colors are now disabled in the onboarding progress bar when the `--no-color` flag is used
35
+
- Improved detection and reporting for Windows machines that have custom [logon as a service rights](prerequisites.md#local-user-logon-right-for-windows-systems) configured.
36
+
- Improved accuracy when obtaining system metadata on Windows:
37
+
- VMUUID is now obtained from the Win32 API
38
+
- Physical memory is now checked using WMI
39
+
- Fixed an issue that could prevent the region selector in the [Windows GUI installer](onboard-windows-server.md) from loading
40
+
- Fixed permissions issues that could prevent the "himds" service from accessing necessary directories on Windows
41
+
19
42
## Version 1.40 - April 2024
20
43
21
44
Download for [Windows](https://download.microsoft.com/download/2/1/0/210f77ca-e069-412b-bd94-eac02a63255d/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
@@ -93,29 +116,6 @@ Download for [Windows](https://download.microsoft.com/download/f/6/4/f64c574f-d3
93
116
- Removed the scheduled tasks for automatic agent upgrades (introduced in agent version 1.30). We'll reintroduce this functionality when the automatic upgrade mechanism is available.
94
117
- Resolved [Azure Connected Machine Agent Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624)
95
118
96
-
## Version 1.36 - November 2023
97
-
98
-
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
99
-
100
-
### Known issues
101
-
102
-
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
103
-
104
-
### New features
105
-
106
-
-[azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
107
-
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
108
-
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
109
-
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
110
-
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
111
-
112
-
### Bug fixes
113
-
114
-
-[azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
115
-
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
116
-
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
117
-
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
118
-
119
119
## Next steps
120
120
121
121
- Before evaluating or enabling Azure Arc-enabled servers across multiple hybrid machines, review [Connected Machine agent overview](agent-overview.md) to understand requirements, technical details about the agent, and deployment methods.
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/azcmagent-check.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: azcmagent check CLI reference
3
3
description: Syntax for the azcmagent check command line tool
4
4
ms.topic: reference
5
-
ms.date: 04/20/2023
5
+
ms.date: 05/22/2024
6
6
---
7
7
8
8
# azcmagent check
@@ -29,6 +29,13 @@ Check connectivity with the East US region using public endpoints.
29
29
azcmagent check --location "eastus"
30
30
```
31
31
32
+
Check connectivity for supported extensions (SQL Server enabled by Azure Arc) using public endpoints:
33
+
34
+
```
35
+
azcmagent check --extensions all
36
+
```
37
+
38
+
32
39
Check connectivity with the Central India region using private endpoints.
33
40
34
41
```
@@ -47,6 +54,15 @@ Supported values:
47
54
* AzureUSGovernment (Azure US Government regions)
48
55
* AzureChinaCloud (Microsoft Azure operated by 21Vianet regions)
49
56
57
+
`-e`, `--extensions`
58
+
59
+
Includes additional checks for extension endpoints to help validate end-to-end scenario readiness. This flag is available in agent version 1.41 and later.
60
+
61
+
Supported values:
62
+
63
+
* all (checks all supported extension endpoints)
64
+
* sql (SQL Server enabled by Azure Arc)
65
+
50
66
`-l`, `--location`
51
67
52
68
The Azure region to check connectivity with. If the machine is already connected to Azure Arc, the current region is selected as the default.
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/azcmagent-connect.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,11 +55,19 @@ This option generates a code that you can use to log in on a web browser on anot
55
55
56
56
To authenticate with a device code, use the `--use-device-code` flag. If the account you're logging in with and the subscription where you're registering the server aren't in the same tenant, you must also provide the tenant ID for the subscription with `--tenant-id [tenant]`.
57
57
58
-
### Service principal
58
+
### Service principal with secret
59
59
60
60
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. It's recommended that you provide service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
61
61
62
-
To authenticate with a service principal, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
62
+
To authenticate with a service principal using a secret, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
63
+
64
+
### Service principal with certificate
65
+
66
+
Certificate-based authentication is a more secure way to authenticate using service principals. The agent accepts both PCKS #12 (PFX) files and ASCII-encoded files (such as PEM) that contain both the private and public keys. The certificate must be available on the local disk and the user running the `azcmagent` command must have read access to the file. Password-protected PFX files are not supported.
67
+
68
+
To authenticate with a service principal using a certificate, provide the service principal's application ID, tenant ID and path to the certificate file: `--service-principal-id [appId] --service-principal-cert [pathToPEMorPFXfile] --tenant-id [tenantid]`
69
+
70
+
For more information, see [create a service principal for RBAC with certificate-based authentication](/cli/azure/azure-cli-sp-tutorial-3).
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/azcmagent-disconnect.md
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,11 +54,19 @@ This option generates a code that you can use to log in on a web browser on anot
54
54
55
55
To authenticate with a device code, use the `--use-device-code` flag.
56
56
57
-
### Service principal
57
+
### Service principal with secret
58
58
59
-
Service principals allow you to authenticate non-interactively and are often used for at-scale operations where the same script is run across multiple servers. It's recommended that you provide service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs.
59
+
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. It's recommended that you provide service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
60
60
61
-
To authenticate with a service principal, provide the service principal's application ID and secret: `--service-principal-id [appid] --service-principal-secret [secret]`
61
+
To authenticate with a service principal using a secret, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
62
+
63
+
### Service principal with certificate
64
+
65
+
Certificate-based authentication is a more secure way to authenticate using service principals. The agent accepts both PCKS #12 (PFX) files and ASCII-encoded files (such as PEM) that contain both the private and public keys. The certificate must be available on the local disk and the user running the `azcmagent` command must have read access to the file. Password-protected PFX files are not supported.
66
+
67
+
To authenticate with a service principal using a certificate, provide the service principal's application ID, tenant ID and path to the certificate file: `--service-principal-id [appId] --service-principal-cert [pathToPEMorPFXfile] --tenant-id [tenantid]`
68
+
69
+
For more information, see [create a service principal for RBAC with certificate-based authentication](/cli/azure/azure-cli-sp-tutorial-3).
0 commit comments