Automation for Large Scale Deployment of Agents on Servers managed by Azure Arc
|
There is a growing need for the deployment of tools or agents on on-premise servers in bulk. Its highly time consuming to manually deploy the agent in bulk.
Microsoft Azure uses Azure Arc for the agents/tools/application deployments and can be combined with Azure policy for large scale mass deployment. In the below usecase Log Analytics and Dependency agents pushed via the policy.
Agents can be deployed manually using Azure portal, though for large environment, it is recommended to push these agents via custom Azure Policy or using PowerShell automation scripting.
|
|
Deployment using Azure Policy
Below usecase helps deploying Log Analytics and Dependency agents using Azure policy.
There are 2 core functionalities of Azure policy that allows the automation
- Creating Azure Policy Definition
- Policy assignment & Remediation
Creating Azure Policy Definition
In order to push through Azure policy the first step is to define policy rule as below, for Arc the resource type is Microsoft.HybridCompute, For Linux we just need to change imageOffer to “linux*”.
|
"policyRule": { "if": { "allOf": [ { "field": "type", "equals": "Microsoft.HybridCompute/machines" }, { "field": "Microsoft.HybridCompute/imageOffer", "like": "windows*" } If we want to deploy MMA only to certain Arc servers, then we can add a tag to the machine, for example “loganalytics:true” and define the below section in PolicyRule, then it will push MMA agent only to VMs where this tag is set as true. { "field": "tags.loganalytics", "equals": "true" } |
|
Define OMSagent for Linux & MMA for Windows.
Policy Assignment and Remediation
After creating policy definition create policy assignment to define scope, resource exclusion against the assignment defined in the first step.
Next is to create remediation task with managed identity to auto remediate all non-compliant Arc Machine.
For Dependency Agent, the policy rule will remain same as defined for MMA, define imageOffer “windows*” for windows server & “Linux*” for Linux respectively. Existence condition will change based on the extension type.
Define Parameter, Variables and resources as below:
Deployment using Powershell Script
We can also deploy MMA/OMSAgent extensions to Arc servers via PowerShell command for all the servers aligned within same resource group.
In order to run the below command, put all the VMs, separated per line, in a text file and create a loop logic as below
$VMname=get-content "C:\list.txt"
foreach($vm in $VMname){
$vm1 = Get-AzConnectedMachine -Name $vm -ResourceGroupName <RGNAME>
$Setting = @{ "workspaceId" = "workspaceId" }
$protectedSetting = @{ "workspaceKey" = "workspaceKey" }
New-AzConnectedMachineExtension -Name OMSLinuxAgent -ResourceGroupName "RGName" -MachineName $vm1.Name -Location "regionName" -Publisher "Microsoft.EnterpriseCloud.Monitoring" -Settings $Setting -ProtectedSetting $protectedSetting -ExtensionType "OmsAgentForLinux"
}
For windows change the value for the -ExtensionType parameter to "MicrosoftMonitoringAgent".
References
Azure Arc
Azure Arc helps client to bring their distributed workloads under single control planes using Azure Public Cloud. This will allow for direct enablement and integration with Microsoft Security tools and monitoring agents.
https://learn.microsoft.com/en-us/azure/azure-arc/servers/overview
Azure Policy
Azure policy helps assess organization compliance and overall environmental state. Azure policy allows to restrict usage of Azure resources based on compliance requirements.
https://learn.microsoft.com/en-us/azure/governance/policy/
About Author
Kritika Gupta
I am an experienced IT professional, focused on cloud technologies and DevOps. I specialize in Azure, Azure DevOps, Arc, AKS , PowerShell/CLI.
I am currently working at DXC Technology as an Azure Sr. Engineer in the Global India Azure Delivery Team. LinkedIn: "linkedin.com/in/kritika-gupta-609757b6"
Published on:
Learn moreRelated posts
Resiliency by Design: Azure Compute
Introducing langchain-azure-cosmosdb: Build Agentic Apps and RAG with One Database
Build AI Agents and RAG Applications with the New LangChain + LangGraph Connector for Azure Cosmos DB Building AI agents and RAG applications ...
Microsoft Copilot (Microsoft 365): Generate documents using forms in SharePoint with Power Automate
We are introducing a new Power Automate action that enables automated document generation using document generation (DocGen) forms in SharePoi...
Azure Developer CLI (azd) – April 2026
The Azure Developer CLI (azd) shipped five releases in April 2026. The biggest theme this month is multi-language hook support: write azd hook...
Dynamics 365 Supply Chain Management – Run Planning Optimization on Azure operated by 21Vianet
We are announcing the ability for companies in China running Dynamics 365 Supply Chain Management on Azure operated by 21Vianet to run Plannin...
Microsoft Power Automate – Support for normalized schema import for data ingestion
We are announcing the ability to ingest data in a normalized data structure format for process mining in Power Automate. This feature will rea...
Power Automate – Analyze your processes in the process intelligence experience
We are announcing the ability to analyze your processes in the process intelligence experience in Power Automate. This feature will reach gene...
Power Automate: Planner - Update a task (V2) Action
The 'Update a task (V2)' Planner action upgrades Power Automate with Percent Complete, Bucket Id, and 25 category fields, plus key Preview got...
Power Automate Agent Flows: The Smarter Way Businesses Are Automating Decisions in 2026
If your business is still waiting on manual approvals, forwarded emails, or spreadsheet updates after every meeting, there is a cost to that d...
SharePoint: Power Automate trigger and action for forms in SharePoint
We are introducing new Power Automate integration capabilities for forms in SharePoint, enabling customers to create automated workflows based...