Skip to content

Commit 0baa51b

Browse files
authored
Merge pull request #277098 from SnehaSudhirG/04June-AUMTSUpdate
added new limitation and resolution
2 parents a46b2b0 + 541832b commit 0baa51b

File tree

1 file changed

+16
-4
lines changed

1 file changed

+16
-4
lines changed

articles/update-manager/troubleshoot.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot known issues with Azure Update Manager
33
description: This article provides details on known issues and how to troubleshoot any problems with Azure Update Manager.
44
ms.service: azure-update-manager
5-
ms.date: 04/03/2024
5+
ms.date: 06/04/2024
66
ms.topic: conceptual
77
ms.author: sudhirsneha
88
author: SnehaSudhirG
@@ -62,10 +62,22 @@ Periodic assessment isn't getting set correctly during create for specialized, m
6262
Run a remediation task post create to remediate newly created resources. For more information see, [Remediate non-compliant resources with Azure Policy](../governance/policy/how-to/remediate-resources.md).
6363

6464

65+
## The prerequisite for scheduled patching isn't set correctly and schedules aren't attached when utilizing specific policies during create for specialized, generalized, migrated and restored VMs
66+
67+
68+
### Cause
69+
70+
The prerequisite for scheduled patching and attaching schedules isn't being set correctly when utilizing the **Schedule recurring updates using Azure Update Manager** and **Set prerequisite for Scheduling recurring updates on Azure virtual machines** policies during create for specialized, generalized, migrated, and restored VMs because of the way the current *Deploy If Not Exists policy* is designed. Post-creation, the policy will show these resources as non-compliant on the compliance dashboard.
71+
72+
### Resolution
73+
74+
Run a remediation task post create to remediate newly created resources. For more information see, [Remediate non-compliant resources with Azure Policy](../governance/policy/how-to/remediate-resources.md).
75+
76+
6577
## Policy remediation tasks are failing for gallery images and for images with encrypted disks
6678

6779
### Issue
68-
There are remediation failures for VMs which have a reference to the gallery image in the Virtual Machine mode. This is because it requires the read permission to the gallery image and it is currently not part of the Virtual Machine Contributor role.
80+
There are remediation failures for VMs which have a reference to the gallery image in the Virtual Machine mode. This is because it requires the read permission to the gallery image and it's currently not part of the Virtual Machine Contributor role.
6981

7082
:::image type="content" source="./media/troubleshoot/policy-remediation-failure-error.png" alt-text="Screenshot that shows the error code for the policy remediation failure. " lightbox="./media/troubleshoot/policy-remediation-failure-error.png":::
7183

@@ -74,7 +86,7 @@ The Virtual Machine Contributor role doesn’t have enough permissions.
7486

7587
### Resolution
7688
- For all the new assignments, a recent change is introduced to provide **Contributor** role to the managed identity created during policy assignment for remediation. Going forward, this will be assigned for any new assignments.
77-
- For any previous assignments if you are experiencing failure of remediation tasks, we recommend that you manually assign the contributor role to the managed identity by following the steps listed under [Grant permissions to the managed identity through defined roles](../governance/policy/how-to/remediate-resources.md)
89+
- For any previous assignments if you're experiencing failure of remediation tasks, we recommend that you manually assign the contributor role to the managed identity by following the steps listed under [Grant permissions to the managed identity through defined roles](../governance/policy/how-to/remediate-resources.md)
7890
- Also, in scenarios where the Contributor role doesn’t work when the linked resources (gallery image or disk) is in another resource group or subscription, manually provide the managed identity with the right roles and permissions on the scope to unblock remediations by following the steps in [Grant permissions to the managed identity through defined roles](../governance/policy/how-to/remediate-resources.md).
7991

8092

@@ -95,7 +107,7 @@ When a VM is moved to another subscription or resource group, the scheduled main
95107

96108
#### Resolution
97109

98-
The system currently doesn't support moving resources across resource groups or subscriptions. As a workaround, use the following steps for the resource that you want to move. **As a pre requisite, first remove the assignment before following the steps.**
110+
The system currently doesn't support moving resources across resource groups or subscriptions. As a workaround, use the following steps for the resource that you want to move. **As a prerequisite, first remove the assignment before following the steps.**
99111

100112
If you're using a `static` scope:
101113

0 commit comments

Comments
 (0)