Muokkaa

Jaa


Manage Azure Local clusters using Windows Admin Center in Azure (preview)

Important

Windows Admin Center in the Azure portal is currently in preview. See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Important

Version 1.36 and 1.35 of the Azure Connected Machine Agent (Arc agent) breaks connection to Windows Admin Center. This has been fixed in later versions of the Arc agent (1.37+) This can be downloaded here.

Using Windows Admin Center in the Azure portal you can manage the Azure Local operating system of your cluster. You can securely manage your cluster from anywhere–without needing a VPN, public IP address, or other inbound connectivity to your machine.

With Windows Admin Center extension in Azure, you get the management, configuration, troubleshooting, and maintenance functionality for managing your Azure Local cluster in the Azure portal. Azure Local cluster and workload management no longer require you to establish line-of-sight or Remote Desktop Protocol (RDP)–it can all be done natively from the Azure portal. Windows Admin Center provides tools that you'd normally find in Failover cluster manager, Device Manager, Task Manager, Hyper-V Manager, and most other Microsoft Management Console (MMC) tools.

This article provides an overview of using Windows Admin Center in the Azure portal, requirements, and how to install Windows Admin Center and use it to manage your cluster. It also answers frequently asked questions, and provides a list of known issues and tips for troubleshooting in case something doesn't work.

Screenshot showing Windows Admin Center in the Azure portal for an Azure Local cluster, displaying the Windows Admin Center Dashboard page.

Overview of Windows Admin Center in Azure

Windows Admin Center in the Azure portal provides essential tools for managing your Azure Local cluster. You can manage clusters without the need to open any inbound port on your firewall.

Using Windows Admin Center in the Azure portal, you can manage:

  • Servers
  • Volumes
  • Drives
  • SDN infrastructure
  • Diagnostics
  • Security
  • Certificates
  • Devices
  • Events
  • Files and file sharing
  • Firewall
  • Installed apps
  • Local users and groups
  • Performance Monitor
  • PowerShell
  • Processes
  • Registry
  • Remote Desktop
  • Roles and Features
  • Scheduled tasks
  • Services
  • Storage
  • Virtual machines
  • Virtual switches

We don't support other extensions for Windows Admin Center in the Azure portal at this time.

Warning

If you manually installed Windows Admin Center on your cluster to manage multiple systems, enabling Windows Admin Center in Azure will replace your existing instance of Windows Admin Center and removes the capability to manage other machines. You will lose access to your previously deployed instance of Windows Admin Center.

Requirements

This section provides the requirements for using Windows Admin Center in the Azure portal to manage a hybrid machine:

Azure account with an active subscription

You'll need an Azure account with an active subscription to deploy Windows Admin Center. If you don't have one already, you can create an account for free.

During the deployment of Windows Admin Center, you'll register the Microsoft.HybridConnectivity resource provider for your subscription.

Important

You must have permission to register a resource provider, which requires the */register/action operation. This is included if you are assigned the contributor or owner role on your subscription.

Note

Resource provider registration is a one time task per subscription.

To check the status of the resource provider, and register if needed:

  1. Sign in to the Azure portal.
  2. Select Subscriptions.
  3. Select the name of your subscription.
  4. Select Resource providers.
  5. Search for Microsoft.HybridConnectivity.
  6. Verify that the status of Microsoft.HybridConnectivity is Registered.
    1. If the status is NotRegistered, select Microsoft.HybridConnectivity, and then select Register.

Azure permissions

Connecting to Windows Admin center requires you to have Reader and Windows Admin Center Administrator Login permissions at the Arc-enable Azure Local resource.

Learn more about assigning Azure roles using the Azure portal.

Azure region availability

Windows Admin Center is supported in all public regions Azure Local is supported.

Note

Windows Admin Center isn't supported in Azure China 21Vianet, Azure Government, or other non-public clouds

Azure Local requirements

To use Windows Admin Center in the Azure portal, the Windows Admin Center agent must be installed on every node of your cluster via an Azure VM extension. Each node of the cluster should meet the following requirements:

  • Azure Local, version 21H2 or later
  • 3 GB of memory or more
  • The Azure Local cluster must be connected to Azure using Azure Arc
  • Azure Arc agent version 1.13.21320.014 or later

Networking requirements

Every node of the Azure Local cluster must meet the following networking requirements:

  • Outbound internet access or an outbound port rule allowing HTTPS traffic to the following endpoints:

    • *.service.waconazure.com or the WindowsAdminCenter service tag
    • pas.windows.net
    • *.servicebus.windows.net

Note

No inbound ports are required in order to use Windows Admin Center.

The management machine where the Azure Portal is running must meet the following networking requirements:

  • Outbound internet access over port 443

Make sure you review the supported devices and recommended browsers before accessing the Azure portal from the management machine or system.

Install Windows Admin Center in the Azure portal

Before you can use Windows Admin Center in the Azure portal, you must deploy the Windows Admin Center VM extension using the following steps:

  1. Open the Azure portal and navigate to your Azure Local cluster.
  2. Under the Settings group, select Windows Admin Center.
  3. Specify the port on which you wish to install Windows Admin Center, and then select Install.

Screenshot showing the install button for Windows Admin Center on an Azure Local cluster.

Connect to Windows Admin Center in the Azure portal

After you've installed Windows Admin Center on your cluster, perform the following steps to connect to it and use it to manage Azure Local:

  1. Open the Azure portal and navigate to your Azure Local cluster, and then under the Settings group, select Windows Admin Center.
  2. Select Connect.

Note

Starting April 2023, Windows Admin Center now allows you to use Microsoft Entra ID-based authentication for your 22H2 or higher clusters running the AdminCenter extension greater than 0.0.0.313. You will no longer be prompted for the credentials of a local administrator account. However, there may still be some experiences within Windows Admin Center that might require local administrator credentials. For example, when CredSSP is required. Clusters running 21H2 or below will continue to require local administrator credentials.

Windows Admin Center opens in the portal, giving you access to the same tools you might be familiar with from using Windows Admin Center in an on-premises deployment.

Screenshot showing the Connect button for Windows Admin Center on an Azure Local cluster.

Configuring role assignments

Access to Windows Admin Center is controlled by the Windows Admin Center Administrator Login Azure role. You must have this role configured on the Azure Local resource, and each of the Azure Arc-enabled servers associated with this cluster.

Note

The Windows Admin Center Administrator Login role uses dataActions and thus cannot be assigned at management group scope. Currently these roles can only be assigned at the subscription, resource group or resource scope.

To configure role assignments for your cluster using the Microsoft Entra admin center experience:

  1. Select the Resource Group containing the cluster and the associated Azure Arc resources.

  2. Select Access control (IAM).

  3. Select Add > Add role assignment to open the Add role assignment page.

  4. Assign the following role. For detailed steps, see Assign Azure roles using the Azure portal.

    Setting Value
    Role Windows Admin Center Administrator Login
    Assign access to User, group, service principal, or managed identity

For more information on how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:

How it works

By using Windows Admin Center in Azure, you can connect to your cluster without requiring any inbound port to be enabled on the firewall. Windows Admin Center, via the Arc agent, is able to securely establish a reverse proxy session connection with the Azure Arc service in an outbound manner.

For each Azure Local cluster that you want to manage with Windows Admin Center in the Azure portal, you must deploy an agent to all the nodes in the cluster.

The agent communicates to an external service that manages certificates so that you can easily connect to your cluster.

Clicking Install performs the following actions:

  1. Registers the Microsoft.HybridConnectivity resource provider on your subscription. The resource provider hosts the proxy used for communication to your Arc-enabled cluster.
  2. Deploys an Azure endpoint resource on top of each of your Arc-enabled resources in your cluster that enables a reverse proxy connection on the specified port. This is simply a logical resource in Azure, and doesn't deploy anything on your server itself.
  3. Installs the Windows Admin Center agent on your hybrid machine with a valid TLS certificate.

Note

Uninstalling Windows Admin Center does not delete the logical Azure endpoint resource. This is kept for other experiences that might leverage this resource, such as SSH.

Clicking Connect performs the following actions:

  1. The Azure portal asks the Microsoft.HybridConnectivity resource provider for access to the Arc-enabled server.
  2. The resource provider communicates with a Layer 4 SNI proxy to establish a short-lived session-specific access to one of your Arc-enabled nodes of the cluster on the Windows Admin Center port.
  3. A unique short-lived URL is generated and connection to Windows Admin Center is established from the Azure portal.

Connection to Windows Admin Center is end-to-end encrypted with SSL termination happening on your cluster.

Automate Windows Admin Center deployment using PowerShell

You can automate Windows Admin Center deployment in Azure portal using this example PowerShell script.

$clusterName = "<name_of_cluster>"
$resourceGroup = "<resource_group>"
$subscription = "<subscription_id>"
$port = "6516"
        
#Deploy Windows Admin Center
$setting = @{ "port" = $port }
New-AzStackHciExtension -ArcSettingName "default" -Name "AdminCenter" -ResourceGroupName $resourceGroup -ClusterName $clusterName -ExtensionParameterPublisher "Microsoft.AdminCenter" -ExtensionParameterSetting $setting -ExtensionParameterType "AdminCenter" -SubscriptionId $subscription -ExtensionParameterTypeHandlerVersion "0.0"
        
#Allow connectivity
$patch = @{ "properties" =  @{ "connectivityProperties" = @{"enabled" = $true}}}
$patchPayload = ConvertTo-Json $patch
Invoke-AzRestMethod -Method PATCH -Uri "https://management.azure.com/subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.AzureStackHCI/clusters/$clusterName/ArcSettings/default?api-version=2023-02-01" -Payload $patchPayload

Troubleshooting

Here are some tips to try in case something isn't working. For general Windows Admin Center troubleshooting (not specifically in Azure), see Troubleshooting Windows Admin Center.

Failed to connect with "404 endpoint not found"

  1. Version 1.36 and 1.35 of the Azure Connected Machine Agent (Arc agent) breaks connection to Windows Admin Center. This has been fixed in later versions of the Arc agent (1.37+) This can be downloaded here.

Failed to connect error

  1. Restart the HIMDS service.

    1. RDP into each node of your cluster.

    2. Open PowerShell as an administrator and run:

      Restart-Service -Name himds
      
  2. Make sure that the Windows Admin Center service is running on your cluster.

    1. RDP into each node of your cluster.
    2. Open Task Manager (Ctrl+Shift+Esc) and navigate to Services.
    3. Make sure ServerManagementGateway / Windows Admin Center is running.
    4. If it isn't, start the service.
  3. Check that the port is enabled for reverse proxy session.

    1. RDP into each node of your cluster.

    2. Open PowerShell as an administrator and run:

      azcmagent config list
      
    3. This should return a list of ports under the incomingconnections.ports (preview) configuration that are enabled to be connected from Azure. Confirm that the port on which you installed Windows Admin Center is on this list. For example, if Windows Admin Center is installed on port 443, the result would be:

      Local configuration setting
      incomingconnections.ports (preview): 443
      
    4. In the event it isn't on this list, run

      azcmagent config set incomingconnections.ports <port>
      

      If you're using another experience (like SSH) using this solution, you can specify multiple ports separated by a comma.

  4. Ensure you have outbound connectivity to the necessary ports.

    1. Each node of your cluster should have outbound connectivity to the following endpoint
      • *.wac.azure.com, *.waconazure.com or the WindowsAdminCenter ServiceTag
      • pas.windows.net
      • *.servicebus.windows.net

One of the Windows Admin Center tools isn’t loading or gives an error

  1. Navigate to any other tool in Windows Admin Center and navigate back to the one that isn’t loading.

  2. If no other tool is loading, there might be a problem with your network connectivity. Try closing the blade and then connecting again. If this doesn’t work, open a support ticket.

The Windows Admin Center extension failed to install

  1. Double-check to make sure that the cluster meets the requirements.

  2. Make sure that outbound traffic to Windows Admin Center is allowed on each node of your cluster.

    1. Test connectivity by running the following command using PowerShell inside of your virtual machine:

      Invoke-RestMethod -Method GET -Uri https://<your_region>.service.waconazure.com
      
      Microsoft Certificate and DNS service for Windows Admin Center in the Azure Portal
      
  3. If you've allowed all outbound traffic and are getting an error from the command above, check that there are no firewall rules blocking the connection.

If nothing seems wrong and Windows Admin Center still won't install, open a support request with the following information:

  • Logs in the Azure portal. This can be found under Settings > Extensions > AdminCenter > View Detailed Status.

  • Logs on each node of the cluster. Run the following PowerShell command and share the resulting .zip file.

    azcmagent logs
    
  • Network trace, if appropriate. Network traces can contain customer data and sensitive security details, such as passwords, so we recommend reviewing the trace and removing any sensitive details before sharing it.

Known issues

  • Chrome incognito mode isn't supported.
  • Azure portal desktop app isn't supported.
  • Detailed error messages for failed connections aren't available yet.
  • Updates isn’t supported. Users cannot apply updates to Azure Local cluster with CAU (Cluster-Aware Updating).

Frequently asked questions

Find answers to the frequently asked questions about using Windows Admin Center in Azure.

How much does it cost to use Windows Admin Center?

There's no cost associated to use the Windows Admin Center in the Azure portal.

Can I use Windows Admin Center to manage the virtual machines running on my cluster?

You can install the Hyper-V role using the Roles and Features extension. Once installed, refresh your browser, and Windows Admin Center will show the Virtual Machine and Switch extensions.

What clusters can I manage using this extension?

You can use the capability to manage Arc-enabled Azure Local clusters, version 21H2 or later. You can also use Windows Admin Center to manage your Arc-enabled servers

How does Windows Admin Center handle security?

Traffic from the Azure portal to Windows Admin Center is end-to-end encrypted. Your Arc-enabled cluster is managed using PowerShell and WMI over WinRM.

Do I need an inbound port to use Windows Admin Center?

No inbound connection is required to use Windows Admin Center.

Why must I create an outbound port rule?

An outbound port rule is required for the service that we have built to communicate with your server. Our service issues you a certificate free-of-cost for your instance of Windows Admin Center. This service ensures that you can always connect to your instance of Windows Admin Center from the Azure portal by keeping your WAC certificate up to date.

Furthermore, accessing Windows Admin Center from Azure requires no inbound port and only outbound connectivity via a reverse proxy solution. These outbound rules are required in order to establish the connection.

How do I find the port used for Windows Admin Center installation?

To verify the value of SmePort registry setting:

  1. RDP into your server.
  2. Open the Registry Editor.
  3. Navigate to the key \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManagementGateway.
  4. Read the value of SmePort to find the port used.

I already have Windows Admin Center installed on one or all nodes of my cluster. Can I access it from the portal?

Yes. You can follow the same steps outlined in this document.

Warning

Enabling this capability will replace your existing instance of Windows Admin Center and removes the capability to manage other machines. Your previously deployed instance of Windows Admin Center will no longer be usable.

Next steps