Automatic extension upgrade for Azure Arc-enabled servers
Automatic extension upgrade is available for Azure Arc-enabled servers that have supported VM extensions installed. Automatic extension upgrades reduce the amount of operational overhead for you by scheduling the installation of new extension versions when they become available. The Azure Connected Machine agent takes care of upgrading the extension (preserving its settings along the way) and automatically rolling back to the previous version if something goes wrong during the upgrade process.
Automatic extension upgrade has the following features:
- You can opt in and out of automatic upgrades at any time. By default, all extensions are opted into automatic extension upgrades.
- Each supported extension is enrolled individually, and you can choose which extensions to upgrade automatically.
- Supported in all Azure Arc regions.
How does automatic extension upgrade work?
The extension upgrade process replaces the existing Azure VM extension version supported by Azure Arc-enabled servers with a new version of the same extension when published by the extension publisher. This feature is enabled by default for all extensions you deploy the Azure Arc-enabled servers unless you explicitly opt-out of automatic upgrades.
The availability-first model for platform orchestrated updates ensures that availability configurations in Azure are respected across multiple availability levels.
For a group of Arc-enabled servers undergoing an update, the Azure platform will orchestrate updates following the model described in the Automation Extension Upgrade. However, there are some notable differences between Arc-enabled servers and Azure VMs:
- Geo-paired regions aren't applicable.
Within a region:
- Availability Zones aren't applicable.
- Machines are batched on a best effort basis to avoid concurrent updates for all machines registered with Arc-enabled servers in a subscription.
Automatic rollback and retries
If an extension upgrade fails, Azure will try to repair the extension by performing the following actions:
- The Azure Connected Machine agent will automatically reinstall the last known good version of the extension to attempt to restore functionality.
- If the rollback is successful, the extension status will show as Succeeded and the extension will be added to the automatic upgrade queue again. The next upgrade attempt can be as soon as the next hour and will continue until the upgrade is successful.
- If the rollback fails, the extension status will show as Failed and the extension will no longer function as intended. You'll need to remove and reinstall the extension to restore functionality.
If you continue to have trouble upgrading an extension, you can disable automatic extension upgrade to prevent the system from trying again while you troubleshoot the issue. You can enable automatic extension upgrade again when you're ready.
Automatic extension upgrade supports the following extensions:
- Azure Monitor agent - Linux and Windows
- Log Analytics agent (OMS agent) - Linux only
- Dependency agent – Linux and Windows
- Azure Security agent - Linux and Windows
- Key Vault Extension - Linux only
- Azure Update Management Center - Linux and Windows
- Azure Automation Hybrid Runbook Worker - Linux and Windows
- Azure Arc-enabled SQL Server agent - Linux and Windows
More extensions will be added over time. Extensions that do not support automatic extension upgrade today are still configured to enable automatic upgrades by default. This setting will have no effect until the extension publisher chooses to support automatic upgrades.
Manage automatic extension upgrade
Automatic extension upgrade is enabled by default when you install extensions on Azure Arc-enabled servers. To enable automatic upgrades for an existing extension, you can use Azure CLI or Azure PowerShell to set the
enableAutomaticUpgrade property on the extension to
true. You'll need to repeat this process for every extension where you'd like to enable or disable automatic upgrades.
Use the following steps to configure automatic extension upgrades in using the Azure portal:
- Navigate to the Azure portal and type Servers - Azure Arc into the search bar.
- Select Servers - Azure Arc under the Services category, then select the individual server you wish to manage.
- In the navigation pane, select the Extensions tab to see a list of all extensions installed on the server.
- The Automatic upgrade column in the table shows whether upgrades are enabled, disabled, or not supported for each extension. Select the checkbox next to the extensions for which you want automatic upgrades enabled, then select Enable automatic upgrade to turn on the feature. Select Disable automatic upgrade to turn off the feature.
Extension upgrades with multiple extensions
A machine managed by Arc-enabled servers can have multiple extensions with automatic extension upgrade enabled. The same machine can also have other extensions without automatic extension upgrade enabled.
If multiple extension upgrades are available for a machine, the upgrades may be batched together, but each extension upgrade is applied individually on a machine. A failure on one extension doesn't impact the other extension(s) to be upgraded. For example, if two extensions are scheduled for an upgrade, and the first extension upgrade fails, the second extension will still be upgraded.
Check automatic extension upgrade history
You can use the Azure Activity Log to identify extensions that were automatically upgraded. You can find the Activity Log tab on individual Azure Arc-enabled server resources, resource groups, and subscriptions. Extension upgrades are identified by the
Upgrade Extensions on Azure Arc machines (Microsoft.HybridCompute/machines/upgradeExtensions/action) operation.
To view automatic extension upgrade history, search for the Azure Activity Log in the Azure portal. Select Add filter and choose the Operation filter. For the filter criteria, search for "Upgrade Extensions on Azure Arc machines" and select that option. You can optionally add a second filter for Event initiated by and set "Azure Regional Service Manager" as the filter criteria to only see automatic upgrade attempts and exclude upgrades manually initiated by users.