Skip to content

Commit fafced3

Browse files
Merge pull request #278693 from johnmarco/jm-arc-centos-limited-support
ARC: Added CentOS to limited support table.
2 parents 3d0d508 + 6700932 commit fafced3

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/azure-arc/servers/prerequisites.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connected Machine agent prerequisites
33
description: Learn about the prerequisites for installing the Connected Machine agent for Azure Arc-enabled servers.
4-
ms.date: 04/09/2024
4+
ms.date: 06/19/2024
55
ms.topic: conceptual
66
ms.custom: devx-track-azurepowershell
77
---
@@ -11,7 +11,7 @@ ms.custom: devx-track-azurepowershell
1111
> [!CAUTION]
1212
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
1313
14-
This topic describes the basic requirements for installing the Connected Machine agent to onboard a physical server or virtual machine to Azure Arc-enabled servers. Some [onboarding methods](deployment-options.md) may have more requirements.
14+
This article describes the basic requirements for installing the Connected Machine agent to onboard a physical server or virtual machine to Azure Arc-enabled servers. Some [onboarding methods](deployment-options.md) may have more requirements.
1515

1616
## Supported environments
1717

@@ -42,7 +42,6 @@ Azure Arc supports the following Windows and Linux operating systems. Only x86-6
4242
* Amazon Linux 2 and 2023
4343
* Azure Linux (CBL-Mariner) 1.0, 2.0
4444
* Azure Stack HCI
45-
* CentOS Linux 7 and 8
4645
* Debian 10, 11, and 12
4746
* Oracle Linux 7, 8, and 9
4847
* Red Hat Enterprise Linux (RHEL) 7, 8 and 9
@@ -64,8 +63,8 @@ The listed version is supported until the **End of Arc Support Date**. If critic
6463

6564
| Operating system | Last supported agent version | End of Arc Support Date | Notes |
6665
| -- | -- | -- | -- |
67-
| Windows Server 2008 R2 SP1 | 1.39 [Download](https://download.microsoft.com/download/1/9/f/19f44dde-2c34-4676-80d7-9fa5fc44d2a8/AzureConnectedMachineAgent.msi) | 3/31/2025 | Windows Server 2008 and 2008 R2 reached End of Support in January 2020. See [End of support for Windows Server 2008 and Windows Server 2008 R2](/troubleshoot/windows-server/windows-server-eos-faq/end-of-support-windows-server-2008-2008r2). |
68-
66+
| Windows Server 2008 R2 SP1 | 1.39 [Download](https://download.microsoft.com/download/1/9/f/19f44dde-2c34-4676-80d7-9fa5fc44d2a8/AzureConnectedMachineAgent.msi) | 03/31/2025 | Windows Server 2008 and 2008 R2 reached End of Support in January 2020. See [End of support for Windows Server 2008 and Windows Server 2008 R2](/troubleshoot/windows-server/windows-server-eos-faq/end-of-support-windows-server-2008-2008r2). |
67+
| CentOS 7 and 8 | 1.42 [Download](https://download.microsoft.com/download/9/6/0/9600825a-e532-4e50-a2d5-7f07e400afc1/AzureConnectedMachineAgent.msi) | 05/31/2025 | See the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md). |
6968

7069
### Client operating system guidance
7170

@@ -98,13 +97,13 @@ Linux operating systems:
9897

9998
## Local user logon right for Windows systems
10099

101-
The Azure Hybrid Instance Metadata Service runs under a low-privileged virtual account, `NT SERVICE\himds`. This account needs the "log on as a service" right in Windows to run. In most cases, there's nothing you need to do because this right is granted to virtual accounts by default. However, if your organization uses Group Policy to customize this setting, you will need to add `NT SERVICE\himds` to the list of accounts allowed to log on as a service.
100+
The Azure Hybrid Instance Metadata Service runs under a low-privileged virtual account, `NT SERVICE\himds`. This account needs the "log on as a service" right in Windows to run. In most cases, there's nothing you need to do because this right is granted to virtual accounts by default. However, if your organization uses Group Policy to customize this setting, you'll need to add `NT SERVICE\himds` to the list of accounts allowed to log on as a service.
102101

103102
You can check the current policy on your machine by opening the Local Group Policy Editor (`gpedit.msc`) from the Start menu and navigating to the following policy item:
104103

105104
Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment > Log on as a service
106105

107-
Check if any of `NT SERVICE\ALL SERVICES`, `NT SERVICE\himds`, or `S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083` (the static security identifier for NT SERVICE\\himds) are in the list. If none are in the list, you'll need to work with your Group Policy administrator to add `NT SERVICE\himds` to any policies that configure user rights assignments on your servers. The Group Policy administrator will need to make the change on a computer with the Azure Connected Machine agent installed so the object picker resolves the identity correctly. The agent doesn't need to be configured or connected to Azure to make this change.
106+
Check if any of `NT SERVICE\ALL SERVICES`, `NT SERVICE\himds`, or `S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083` (the static security identifier for NT SERVICE\\himds) are in the list. If none are in the list, you'll need to work with your Group Policy administrator to add `NT SERVICE\himds` to any policies that configure user rights assignments on your servers. The Group Policy administrator needs to make the change on a computer with the Azure Connected Machine agent installed so the object picker resolves the identity correctly. The agent doesn't need to be configured or connected to Azure to make this change.
108107

109108
:::image type="content" source="media/prerequisites/arc-server-user-rights-assignment.png" alt-text="Screen capture of the Local Group Policy Editor showing which users have permissions to log on as a service." border="true":::
110109

@@ -118,7 +117,7 @@ You'll need the following Azure built-in roles for different aspects of managing
118117

119118
## Azure subscription and service limits
120119

121-
There are no limits to the number of Azure Arc-enabled servers you can register in any single resource group, subscription or tenant.
120+
There are no limits to the number of Azure Arc-enabled servers you can register in any single resource group, subscription, or tenant.
122121

123122
Each Azure Arc-enabled server is associated with a Microsoft Entra object and counts against your directory quota. See [Microsoft Entra service limits and restrictions](../../active-directory/enterprise-users/directory-service-limits-restrictions.md) for information about the maximum number of objects you can have in a Microsoft Entra directory.
124123

0 commit comments

Comments
 (0)