Edit

Share via


Install Arc agents at scale for your VMware VMs

In this article, you learn how to install Azure connected machine agents for VMware VMs. Installing these agents is a prerequisite to use Azure services for securing, patching, and monitoring your VMs. By using these agents, you can leverage Azure Arc benefits such as Extended Security Updates, pay-as-you-go licensing for Windows Server and SQL servers, and Software Attestation benefits.

You can install Arc agents on VMware VMs through multiple methods. Choose the method that fits your deployment preferences:

  • Azure portal
  • Programmatic methods such as Azure CLI, Azure PowerShell, Azure REST APIs, Azure SDKs, Terraform, Bicep, and ARM templates. The reference section of this documentation repository has information on the exact syntax.
  • Out-of-band methods such as using a Service Principal, System Center Configuration Manager script, System Center Configuration Manager custom task sequence, Group policy, and Ansible playbook.

Prerequisites

Before you install Arc agents at scale for VMware VMs, ensure the following conditions are met:

  • The resource bridge is running.

  • The vCenter is in Connected state and its associated Azure Arc resource bridge is in a Running state.

  • You have the Azure Arc VMware VM Contributor role or a custom Azure role with permissions to install Arc agents on the target machines.

  • All the target machines are:

    • Powered on.
    • Running a supported operating system.
    • VMware tools are installed on the machines. If you don't install VMware tools, the portal disables the option to enable guest management operation.

      Note

      Use the out-of-band methods to install Arc agents if VMware tools aren't installed.

    • Able to connect through the firewall to communicate over the internet, and these URLs aren't blocked.

    Note

    If you're using a Linux VM, the account must not prompt for login on sudo commands. To override the prompt, from a terminal, run sudo visudo, and add <username> ALL=(ALL) NOPASSWD:ALL at the end of the file. Ensure you replace <username>.

    If your VM template has these changes incorporated, you don't need to make this change for the VM created from that template.

Install Arc agents

This method works only if VMware tools are installed on the target machines. If VMware tools aren't installed, the portal grays out the Enable guest management option. You can install Arc agents by using out-of-band methods.

An administrator can install agents for multiple machines from the Azure portal if the machines share the same administrator credentials.

  1. Go to Azure Arc center and select vCenter resource.

  2. Select all the target machines and choose Enable in Azure option.

  3. Select Enable guest management checkbox to install Arc agents on the selected machines. By using this option, you can use Azure services such as Azure Update Manager, Azure Monitor, Microsoft Defender for Cloud, Azure Policy, Azure Automation, Change Tracking and Inventory, and more to secure, govern, patch, and monitor your virtual machines.

  4. If you enable guest management on any of your machines, based on your organization's network policies, choose the connectivity method for the Arc agents that runs in your VMware VMs to connect to Azure. The available options are Public endpoint, Proxy server, and Private endpoint.

    • To connect the Arc agent through a proxy, provide the proxy server details.
    • To connect the Arc agent through a private endpoint, follow these steps to set up Azure private link.

    Note

    Private endpoint connectivity is only available for Arc agent to Azure communications. For Arc resource bridge to Azure connectivity, Azure private link isn't supported.

  5. Enter the administrator username and password for the machine. For Windows VMs, the account must be part of the local administrators group. For Linux VMs, it must be a root account.

  6. Select Enable to start the installation of the Arc agent in the specified machines. Once installation is complete, the Guest management column will switch to Enabled for the machines with Arc agent running. You can start using Azure services for these machines. These credentials won't be persisted in Azure. They're used to install the Azure Arc agent and then discarded.

Next steps