This content originally appeared on DEV Community and was authored by Jimi
Introduction
In our final guide for the series we'll walk through the process of configuring Azure Arc-enabled Windows servers using an Azure VM extension. We'll cover essential steps like installing IIS and blocking the legacy Azure Log Analytics agent. Whether you're a system administrator new to Azure Arc or looking to refine your configuration, this post will provide valuable insights.
Step-by-Step Guide
Installing IIS
- Log into your Windows VM: Establish a Remote Desktop connection to your Windows VM.
-
Open PowerShell ISE: Launch Windows PowerShell Integrated Scripting Environment (ISE) with administrative privileges.
-
Create the installation script:
- Paste the following script into PowerShell ISE:
Install-WindowsFeature -name Web-Server -IncludeManagementTools Remove-Item -Path 'C:\inetpub\wwwroot\iisstart.htm' Add-Content -Path 'C:\inetpub\wwwroot\iisstart.htm' -Value "$env:computername"
* Save the script as
Install_IIS.ps1
in your Documents folder. -
Create an Azure storage account:
- Navigate to the Azure portal and create a new storage account.
- Configure the storage account with your Subscription, Resource Group, and create a globally unique name.
- Select Locally Redundant Storage (LRS) for redundancy and click "Review + Create".
-
Create a storage container:
- Within the storage account, click on "Container" to create a folder for the script.
- Click on "+ Container"
- Create a name for the storage container then click on "Create"
-
Upload the script:
- Upload the
Install_IIS.ps1
script to the created storage container.
- Upload the
-
Configure the Azure VM extension:
- In the Azure portal, navigate to your Azure Arc-enabled machine.
- Underneath "Settings" click on "Extensions"
- In the Extensions page, search for and add "Custom Script Extension for Windows - Azure Arc."
- Configure the extension to use the storage account and container containing the script.
-
Verify IIS installation:
- Wait for the deployment to complete.
- Open a web browser and navigate to
https://localhost
. You should see the server's name. Alternatively, check the contents ofC:\inetpub\wwwroot\iisstart.htm
.
Blocking the Legacy Azure Log Analytics Agent
-
Open Command Prompt: Launch Command Prompt on the Windows VM.
-
Check current configuration:
- Run
azcmagent config list
to view the current configuration.
- Run
-
Block the agent:
- Execute
azcmagent config set extensions.blocklist "Microsoft.EnterpriseCloud.Monitoring/MicrosoftMonitoringAgent"
to block the agent.
- Execute
-
Verify the change:
- Run
azcmagent config list
again to confirm the blocklist entry.
- Run
Conclusion:
Congratulations on completing this guide! You've successfully transformed your Windows Server into a managed Azure Arc-enabled machine. By integrating Azure Policy, Microsoft Defender for Cloud, Azure Monitor, and Azure Update Manager, you've established a strong foundation for security, compliance, and management.
To deepen your understanding, explore the Azure portal for detailed insights into your environment. Remember to clean up resources when finished to avoid unnecessary costs.
This content originally appeared on DEV Community and was authored by Jimi
Jimi | Sciencx (2024-08-15T22:15:58+00:00) Configuring Azure Arc-Enabled Windows Servers with Azure VM Extensions. Retrieved from https://www.scien.cx/2024/08/15/configuring-azure-arc-enabled-windows-servers-with-azure-vm-extensions/
Please log in to upload a file.
There are no updates yet.
Click the Upload button above to add an update.