A Microsoft cloud service that enables deployment of Azure services across hybrid and multicloud environments.
The error in gc_ext.log indicates that the Guest Configuration/extension manager cannot establish a proper TLS context because no usable ciphers are available in the local TLS configuration. As a result, the extension workflow fails before it can even parse metadata, so no extensions will install.
azcmagent check confirms basic connectivity and TLS 1.3 support to the required Azure endpoints, so the problem is local TLS/cipher configuration on the server rather than network reachability.
To remediate, verify and correct the Windows TLS cipher suite configuration used by the Azure Connected Machine agent:
- Ensure required TLS cipher suites are enabled For Connected Machine agent for Windows (v1.56+), at least one of the following cipher suites must be enabled for TLS 1.3 or TLS 1.2:
- TLS 1.3:
-
TLS_AES_256_GCM_SHA384 -
TLS_AES_128_GCM_SHA256
-
- TLS 1.2:
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 -
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
-
If none of the above appear in the output, the agent’s TLS stack will effectively have “no ciphers,” which matches theGet-TlsCipherSuite | Format-List Namecontext: library has no ciphers (SSL routines)error. - TLS 1.3:
- Re-enable the required cipher suites If Group Policy is not enforcing cipher suites, enable them locally with PowerShell (no reboot required):
If the machine is domain-joined and cipher suites are controlled by GPO, update the SSL Cipher Suite Order in Group Policy to include at least the minimum required suites above. GPO settings override local configuration, so they must be corrected on the domain side if present.Enable-TlsCipherSuite -Name "TLS_AES_256_GCM_SHA384" Enable-TlsCipherSuite -Name "TLS_AES_128_GCM_SHA256" Enable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" Enable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" - Re-run agent and extension checks After updating cipher suites:
- Restart the Azure Connected Machine agent services.
- Re-run:
azcmagent.exe check - Retry installing an extension from the Azure portal or via PowerShell/CLI.
- If issues persist, review
gc_ext.logagain to confirm that the TLS/cipher error is no longer present and then follow the general VM extension troubleshooting steps:- Confirm
azcmagentis connected and dependent services are running. - Remove any failed extension instance and reinstall it.
- Review extension-specific logs under
C:\ProgramData\GuestConfigandC:\Packages\Pluginsfor Windows.
- Confirm
Once the required cipher suites are enabled and the agent can establish a proper TLS context, the metadata calls should succeed, the JSON parsing errors should disappear, and extension installation should proceed normally.
References: