You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/log-analytics-agent.md
+16-3Lines changed: 16 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,8 +124,8 @@ The following table highlights the packages required for supported Linux distros
124
124
125
125
|Required package |Description |Minimum version |
126
126
|-----------------|------------|----------------|
127
-
|Glibc |GNU C Library | 2.5-12
128
-
|Openssl| OpenSSL Libraries | 1.0.x or 1.1.x |
127
+
|Glibc |GNU C Library | 2.5-12
128
+
|Openssl| OpenSSL Libraries | 1.0.x or 1.1.x |
129
129
|Curl | cURL web client | 7.15.5 |
130
130
|Python-ctypes ||
131
131
|PAM | Pluggable Authentication Modules ||
@@ -138,6 +138,19 @@ The following table highlights the packages required for supported Linux distros
138
138
To ensure the security of data in transit to Azure Monitor logs, we strongly encourage you to configure the agent to use at least Transport Layer Security (TLS) 1.2. Older versions of TLS/Secure Sockets Layer (SSL) have been found to be vulnerable and while they still currently work to allow backwards compatibility, they are **not recommended**. For additional information, review [Sending data securely using TLS 1.2](data-security.md#sending-data-securely-using-tls-12).
139
139
140
140
141
+
## SHA-2 Code Signing Support Requirement for Windows
142
+
The Windows agent will begin to exclusively use SHA-2 signing on May 18, 2020. This change will impact customers using the Log Analytics agent on a legacy OS as part of any Azure service (Azure Monitor, Azure Automation, Azure Update Management, Azure Change Tracking, Azure Security Center, Azure Sentinel, Windows Defender ATP). The change does not require any customer action unless you are running the agent on a legacy OS version (Windows 7, Windows Server 2008 R2 and Windows Server 2008). Customers running on a legacy OS version are required to take the following actions on their machines before May 18, 2020 or their agents will stop sending data to their Log Analytics workspaces:
143
+
144
+
1. Install the latest Service Pack for your OS. The required service pack versions are:
145
+
- Windows 7 SP1
146
+
- Windows Server 2008 SP2
147
+
- Windows Server 2008 R2 SP1
148
+
149
+
2. Install the SHA-2 signing Windows updates for your OS as described in [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus)
150
+
3. Update to the latest version of the Windows agent (version 10.20.18029).
151
+
4. Recommended to configure the agent to [use TLS 1.2](agent-windows.md#configure-agent-to-use-tls-12).
152
+
153
+
141
154
## Network requirements
142
155
The agent for Linux and Windows communicates outbound to the Azure Monitor service over TCP port 443, and if the machine connects through a firewall or proxy server to communicate over the Internet, review requirements below to understand the network configuration required. If your IT security policies do not allow computers on the network to connect to the Internet, you can set up a [Log Analytics gateway](gateway.md) and then configure the agent to connect through the gateway to Azure Monitor logs. The agent can then receive configuration information and send data collected depending on what data collection rules and monitoring solutions you have enabled in your workspace.
> If you use special characters such as “\@” in your password, you receive a proxy connection error because value is parsed incorrectly. To work around this issue, encode the password in the URL using a tool such as [URLDecode](https://www.urldecoder.org/).
194
+
> If you use special characters such as "\@" in your password, you receive a proxy connection error because value is parsed incorrectly. To work around this issue, encode the password in the URL using a tool such as [URLDecode](https://www.urldecoder.org/).
| 10.20.18029 | 1.0.18029 | March 2020 | <ul><li>Adds SHA-2 code signing support</li><li>Improves VM extension installation and management</li><li>Resolves a bug in Azure Arc for Servers integration</li><li>Adds a built-in troubleshooting tool for customer support</li><li>Adds support for additional Azure Government regions</li> |
35
36
| 10.20.18018 | 1.0.18018 | October 2019 | <ul><li> Minor bug fixes and stabilization improvements </li></ul> |
36
37
| 10.20.18011 | 1.0.18011 | July 2019 | <ul><li> Minor bug fixes and stabilization improvements </li><li> Increased MaxExpressionDepth to 10000 </li></ul> |
37
38
| 10.20.18001 | 1.0.18001 | June 2019 | <ul><li> Minor bug fixes and stabilization improvements </li><li> Added ability to disable default credentials when making proxy connection (support for WINHTTP_AUTOLOGON_SECURITY_LEVEL_HIGH) </li></ul>|
@@ -43,6 +44,7 @@ The following table provides a mapping of the version of the Windows Log Analyti
43
44
| 8.0.11072 | 1.0.11072 | Sept 2017 ||
44
45
| 8.0.11049 | 1.0.11049 | Feb 2017 ||
45
46
47
+
46
48
### Azure Security Center
47
49
48
50
Azure Security Center automatically provisions the Log Analytics agent and connects it with the default Log Analytics workspace of the Azure subscription. If you are using Azure Security Center, do not run through the steps in this document. Doing so overwrites the configured workspace and break the connection with Azure Security Center.
@@ -56,25 +58,25 @@ The following JSON shows the schema for the Log Analytics agent extension. The e
@@ -95,7 +97,7 @@ The following JSON shows the schema for the Log Analytics agent extension. The e
95
97
96
98
## Template deployment
97
99
98
-
Azure VM extensions can be deployed with Azure Resource Manager templates. The JSON schema detailed in the previous section can be used in an Azure Resource Manager template to run the Log Analytics agent extension during an Azure Resource Manager template deployment. A sample template that includes the Log Analytics agent VM extension can be found on the [Azure Quick Start Gallery](https://github.com/Azure/azure-quickstart-templates/tree/master/201-oms-extension-windows-vm).
100
+
Azure VM extensions can be deployed with Azure Resource Manager templates. The JSON schema detailed in the previous section can be used in an Azure Resource Manager template to run the Log Analytics agent extension during an Azure Resource Manager template deployment. A sample template that includes the Log Analytics agent VM extension can be found on the [Azure Quickstart Gallery](https://github.com/Azure/azure-quickstart-templates/tree/master/201-oms-extension-windows-vm).
99
101
100
102
>[!NOTE]
101
103
>The template does not support specifying more than one workspace ID and workspace key when you want to configure the agent to report to multiple workspaces. To configure the agent to report to multiple workspaces, see [Adding or removing a workspace](../../azure-monitor/platform/agent-manage.md#adding-or-removing-a-workspace).
@@ -107,51 +109,51 @@ The following example assumes the Log Analytics extension is nested inside the v
When placing the extension JSON at the root of the template, the resource name includes a reference to the parent virtual machine, and the type reflects the nested configuration.
0 commit comments