multicloud365
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud
No Result
View All Result
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud
No Result
View All Result
multicloud365
No Result
View All Result

Customise the extension allowlist for Azure Arc-enabled Linux Servers – Wim Matthyssen

admin by admin
March 28, 2025
in IAC
0
Customise the extension allowlist for Azure Arc-enabled Linux Servers – Wim Matthyssen
399
SHARES
2.3k
VIEWS
Share on FacebookShare on Twitter


On this weblog put up, I’ll information you thru the steps to customise the extension allowlist for the Azure Linked Machine agent on Azure Arc-enabled Linux servers.

This step-by-step information will assist you improve safety and streamline administration in your Azure Arc atmosphere.

💡 In a earlier weblog put up, I confirmed you tips on how to customise the extension allowlist for Azure Arc-enabled Home windows Servers. You will discover it right here.

Desk of Contents

Customise the extension allowlist on a Linux server

First, connect with the Arc-enabled Linux Server through SSH (Safe Shell), ideally by a Soar Server.

I usually use a secured and hardened Home windows Administration Server with a SSH shopper like PuTTY put in, however you may as well use alternate options corresponding to Home windows Terminal, relying in your desire.

To attach, you’ll want the server’s IP handle or hostname, in addition to a username and password, or after all, the SSH key.

💡 For those who don’t have already got PuTTY put in, you possibly can obtain it from right here.

On this instance, I’ll be utilizing PuTTY, so go forward and open PuTTY in your system.

Within the “Host Title (or IP handle)” area, enter the server’s IP handle or hostname. Make sure the “Port” is about to 22 (the default for SSH). Underneath “Connection kind,” choose SSH.

💡If you wish to simply connect with the identical server later and save time sooner or later, enter a reputation within the “Saved Periods” area and click on Save. Then, merely choose the saved session and click on Open to attach.

Then, authenticate by coming into your username and urgent Enter. Subsequent, present your password or load your SSH key if required.

Subsequent, log in as the basis consumer. You are able to do this through the use of the sudo command (superuser do), adopted by su or -i to simulate a root login shell.

Then, enter the next command to listing all Azure Linked Machine agent configuration properties, such because the extensions.allowlist, together with their present values:

You’ll be able to then verify whether or not an allowlist or blocklist is already utilized or if the server continues to be utilizing the default setting, which permits all extensions ([ ]).

Then, as I choose to do, you possibly can configure an allowlist on this server. To allow solely particular extensions, such because the Azure Key Vault digital machine extension for Linux, use the next command:

azcmagent config set extensions.allowlist "Microsoft.Azure.Key.Vault/KeyVaultForLinux"

💡 You will discover a full listing of accessible extensions for Linux through this hyperlink.

Add or take away an extension from a configured allowlist

For those who later want so as to add one other extension to the configured allowlist, you are able to do so utilizing the “--add” flag.

For instance, to permit the Azure Monitor agent extension along with the prevailing ones, run the next command:

azcmagent config set extensions.allowlist "Microsoft.Azure.Monitor/AzureMonitorLinuxAgent" --add

If, alternatively, it’s worthwhile to take away an extension from the allowlist later, you should utilize the “--remove” flag.

For instance, to take away the Azure Key Vault digital machine extension for Linux, run the next command:

azcmagent config set extensions.allowlist "Microsoft.Azure.Key.Vault/KeyVaultForLinux" --remove

💡 When troubleshooting points whereas working a command, including extra detailed logging data will be useful. To take action, merely append the “--verbose” flag on the finish of the command.

Enable a number of extensions without delay

In fact, it’s extra environment friendly to permit a number of extensions without delay as a substitute of configuring each individually.

For instance, to permit the Azure Key Vault digital machine extension for Linux, the Azure Monitor Agent, the Azure Automation Hybrid Runbook Employee extension, the Linux OS Replace Extension, and the Linux Patch Extension in your Linux server, you should utilize the next command:

azcmagent config set extensions.allowlist "Microsoft.Azure.Key.Vault/KeyVaultForLinux,Microsoft.Azure.Monitor/AzureMonitorLinuxAgent,Microsoft.Compute/HybridWorkerForLinux,Microsoft.SoftwareUpdateManagement/LinuxOsUpdateExtension,Microsoft.CPlat.Core/LinuxPatchExtension"

Customizing the Arc Onboarding script with an allowlist

For automated deployments at scale, the allowlist will be seamlessly built-in into the Azure Arc onboarding Bash script (OnboardingScript.sh), which will be manually generated from the Azure Arc menu.

This integration permits you to streamline and automate the onboarding course of throughout a number of machines or environments, guaranteeing that the allowlist is constantly utilized to all machines throughout deployment.

Under is an instance of how this may be carried out by including a line of code to incorporate an allowlist within the OnboardingScript.sh:

# Set the allowlist

sudo azcmagent config set extensions.allowlist "Microsoft.Azure.Key.Vault/KeyVaultForLinux,Microsoft.Azure.Monitor/AzureMonitorLinuxAgent,Microsoft.Compute/HybridWorkerForLinux,Microsoft.SoftwareUpdateManagement/LinuxOsUpdateExtension,Microsoft.CPlat.Core/LinuxPatchExtension"

I choose to run the custom-made bash script domestically, and to take action, I often copy (add) the script from my Home windows workstation or administration server to a folder (like Temp) on the Linux server utilizing a device like WinSCP.

💡 If required you possibly can obtain WinSCP from right here.

As soon as uploaded, grant execute permissions to the script for the present consumer by reopening PuTTY, connecting to the Linux server, and working the next command as root:

chmod +x OnboardingScript.sh

Then run the script as the basis consumer.

./Temp/OnboardingScript.sh

Reset an extension allowlist to its default setting

For those who’ve configured an allowlist however not want it for any motive, you possibly can clear the extension allowlist and revert to the default setting, which permits all extensions, by working the next command:

azcmagent config clear "extensions.allowlist"

Disable the Extension Supervisor

For those who don’t want to make use of extensions with Azure Arc, you possibly can fully disable the extension supervisor by working the next command as root:

azcmagent config set extensions.enabled false

This can disable the extension supervisor, stopping any extensions from getting used on the Azure Arc-connected machine.

💡 Take into account that disabling the extension supervisor received’t take away any extensions already put in in your server, so that you’ll nonetheless have to take away them.

Conclusion

From a safety and administration perspective, it’s beneficial to configure an allowlist for the Azure Linked Machine agent in your Arc-enabled Linux servers.

This method improves safety by controlling which extensions are allowed, minimizing the danger of unauthorized or unintended deployments or duties executed by both licensed customers or potential malicious actors.

I hope the steps and numerous allowlist configurations defined on this weblog put up assist you keep safe and well-managed Arc deployments.

In case you have any questions or strategies about this weblog put up, be at liberty to achieve out to me on X (@wmatthyssen) or depart a remark. I’ll be blissful to help!

Tags: allowlistArcenabledAzureCustomizeExtensionLinuxServersMatthyssenWim
Previous Post

Welsh Azure Person Group September 2024 Meet Up! – Cloud Computing with a aspect of Chipz

Next Post

‘Faucet’ping The Myths Of Cloud Migration

Next Post
‘Faucet’ping The Myths Of Cloud Migration

‘Faucet’ping The Myths Of Cloud Migration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending

What’s Cloud Backup and How Does it Work?

What’s Cloud Backup and How Does it Work?

March 21, 2025
The state of prompting: Unlocking the Full Potential of Conversational AI

#AI horizons 25-02 – humanoid robots

March 21, 2025
Generative AI Unlocking Quantum Computing Information Potential

Generative AI Unlocking Quantum Computing Information Potential

January 23, 2025
Novel methodology detects microbial contamination in cell cultures | MIT Information

Novel methodology detects microbial contamination in cell cultures | MIT Information

April 26, 2025
Distributed Cloud Computing: Enhancing Privateness with AI-Pushed Options

Distributed Cloud Computing: Enhancing Privateness with AI-Pushed Options

April 28, 2025
Passing The Baton From Gross sales To CS For Seamless Account Transitions

In An AI World, Design Issues Extra Than Ever

May 13, 2025

MultiCloud365

Welcome to MultiCloud365 — your go-to resource for all things cloud! Our mission is to empower IT professionals, developers, and businesses with the knowledge and tools to navigate the ever-evolving landscape of cloud technology.

Category

  • AI and Machine Learning in the Cloud
  • AWS
  • Azure
  • Case Studies and Industry Insights
  • Cloud Architecture
  • Cloud Networking
  • Cloud Platforms
  • Cloud Security
  • Cloud Trends and Innovations
  • Data Management
  • DevOps and Automation
  • GCP
  • IAC
  • OCI

Recent News

Closing the cloud safety hole with runtime safety

Closing the cloud safety hole with runtime safety

May 20, 2025
AI Studio to Cloud Run and Cloud Run MCP server

AI Studio to Cloud Run and Cloud Run MCP server

May 20, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact

© 2025- https://multicloud365.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Cloud Architecture
    • OCI
    • GCP
    • Azure
    • AWS
    • IAC
    • Cloud Networking
    • Cloud Trends and Innovations
    • Cloud Security
    • Cloud Platforms
  • Data Management
  • DevOps and Automation
    • Tutorials and How-Tos
  • Case Studies and Industry Insights
    • AI and Machine Learning in the Cloud

© 2025- https://multicloud365.com/ - All Rights Reserved