You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/azure-monitor/app-insights/availability/availability-monitoring-common-issues-faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ metadata:
4
4
description: Review a list of frequently asked questions (FAQ) about common issues that occur when you use Application Insights availability monitoring.
# Azure Virtual Machine (VM) Windows servicing stack reset tool
12
+
# Azure Virtual Machine (VM) Windows Update Reset Tool
13
13
14
14
**Applies to:**:heavy_check_mark: Windows VMs
15
15
16
16
## Overview
17
17
18
-
This article covers steps to run a PowerShell script that resets the Windows servicing stack for a VM running in Azure. Running the tool can fix most problems that prevent Windows Updates from installing successfully.
18
+
This article covers steps to run a PowerShell script that resets the Windows Update servicing stack for a VM running in Azure. Running the tool can fix most problems that prevent Windows Updates from installing successfully.
19
19
20
20
> [!NOTE]
21
21
> This article is intended for use with support agents and IT professionals. If you're a home user and looking for more information about fixing Windows update errors, see [Fix Windows Update errors](https://support.microsoft.com/help/10164).
@@ -31,7 +31,7 @@ This article covers steps to run a PowerShell script that resets the Windows ser
31
31
- Restarts services.
32
32
- Generates a summary of actions performed.
33
33
34
-
For more information, see [Resetting Windows Update servicing stack script](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_WUA_Update_Reset?).
34
+
For more information, see [Azure VM Windows WUA Update Reset Tool](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_WUA_Update_Reset?).
35
35
36
36
37
37
:::image type="content" source="media/windows-vm-wureset-tool/windows-vm-wureset-tool.png" alt-text="Azure portal view Run Command example." lightbox="media/windows-vm-wureset-tool/windows-vm-wureset-tool.png":::
@@ -50,12 +50,12 @@ For more information, see [Run scripts in your Windows VM by using action run co
50
50
51
51
## Recommended workflow
52
52
53
-
1. Run `Windows_Update_Reset` to reset the servicing stack.
53
+
1. Run `Windows_Update_Reset` to reset the Windows Update servicing stack.
54
54
2. Try to install the Windows Update that previously failed.
Copy file name to clipboardExpand all lines: support/includes/azure/virtual-machines-runcmd-wu-tools.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@
4
4
>Trying to diagnose and resolve Windows Update or Windows OS upgrade issues for your Azure VM? Try one of the following tools:
5
5
>
6
6
>*[Azure VM Windows Update Error Detection Tool](../../azure/virtual-machines/windows/windows-vm-ipu-tool.md) to diagnose specific Windows Update errors.
7
-
>*[Azure VM Windows Servicing Stack Reset Tool](../../azure/virtual-machines/windows/windows-vm-wureset-tool.md) to reset the Windows servicing stack.
8
-
>*[Azure Virtual Machine (VM) Windows OS Upgrade Assessment Tool](../../azure/virtual-machines/windows/windows-vm-osupgradeassessment-tool.md) to validate the OS upgrade path and any known issues.
7
+
>*[Azure VM Windows Windows Update Reset Tool](../../azure/virtual-machines/windows/windows-vm-wureset-tool.md) to reset the Windows servicing stack.
8
+
>*[Azure VM Windows OS Upgrade Assessment Tool](../../azure/virtual-machines/windows/windows-vm-osupgradeassessment-tool.md) to validate the OS upgrade path and any known issues.
9
9
>
10
10
>If you're experiencing performance problems with VMs, run these tools first before contacting support.
While exporting the private key from the certificate store, a new password has to be set for the new key file.
87
-
88
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-private-key.png" alt-text="Screenshot that shows the command to export the private key.":::
89
-
90
-
After the export is completed, you should see a *key.pem* file:
91
-
92
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-key-dot-pem-file.png" alt-text="Screenshot that shows the command to get the private key file.":::
90
+
While exporting the private key from the certificate store, include the `-nodes` paramter (which stands for no Desktop Environments (DEs)). This instructs OpenSSL to output the private key in an unencrypted format. Otherwise a new password has to be set for the new key file.
93
91
94
92
1. Export the certificate by using the following command:
While exporting the certificate from the certificate store, you have to enter the password for the *\<FileName>.pfx* file.
98
+
1. Delete and create a new symbolic link:
101
99
102
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-certificate.png" alt-text="Screenshot that shows the command to export the certificate.":::
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-omi-dot-pem-file.png" alt-text="Screenshot that shows the command to get the certificate file.":::
114
+
1. Restart the SCX agent by running the following command:
107
115
108
-
1. Remove the password from the private key by using the following command:
116
+
```console
117
+
scxadmin -restart
118
+
```
119
+
120
+
1. Make sure the Open Management Infrastructure (OMI) processes are running after restarting the agent:
109
121
110
122
```console
111
-
openssl rsa -in key.pem -out omikey.pem
123
+
ps -ef | grep omi | grep -v grep
112
124
```
113
125
114
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-remove-password-from-private-key.png" alt-text="Screenshot that shows the command to remove password from the private key.":::
126
+
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
115
127
116
-
This action is needed since the Linux agent doesn't know the password for the file.
128
+
### Method 2: Configure certificate with bash script
117
129
118
-
1. Move the *omikey.pem* file to the Open Management Infrastructure (OMI) directory by using the following command:
130
+
1. Save the following bash script: `extract_scx_cert.sh`
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
137
-
138
181
## Validate that the certificate is signed by the CA
139
182
140
183
1. Run the following command on the agent to verify that the certificate is signed by the CA:
@@ -159,6 +202,8 @@ On a CA server in your SCOM environment, follow these steps to create a certific
159
202
notAfter=Jul 25 12:12:14 2033 GMT
160
203
```
161
204
205
+
> The path `/etc/opt/microsoft/scx/ssl` contains a symbolic link `scx.pem -> /etc/opt/omi/ssl/omi.pem` that's used by the SCX agent in order to use the OMI certificate created earlier.
206
+
162
207
1. Run a network trace on one of the management servers/gateways in the UNIX/Linux resource pool.
163
208
1. Run the following `WinRM` command against the agent and make sure you get the instance output:
0 commit comments