Skip to content

Commit 3061133

Browse files
Merge pull request #273830 from maulikshah23/patch-31
Update automatic-vm-guest-patching.md
2 parents e988519 + cba14f9 commit 3061133

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/virtual-machines/automatic-vm-guest-patching.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Automatic VM Guest Patching for Azure VMs
2+
title: Automatic Guest Patching for Azure Virtual Machines and Scale Sets
33
description: Learn how to automatically patch virtual machines in Azure.
44
author: maulikshah23
55
ms.service: virtual-machines
@@ -10,20 +10,20 @@ ms.author: maulikshah
1010
ms.reviewer: mimckitt
1111
ms.custom: devx-track-azurepowershell, devx-track-azurecli, linux-related-content
1212
---
13-
# Automatic VM guest patching for Azure VMs
13+
# Automatic Guest Patching for Azure Virtual Machines and Scale Sets
1414

1515
> [!CAUTION]
1616
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and plan accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
1717
1818
**Applies to:** :heavy_check_mark: Linux VMs :heavy_check_mark: Windows VMs :heavy_check_mark: Flexible scale sets
1919

20-
Enabling automatic VM guest patching for your Azure VMs helps ease update management by safely and automatically patching virtual machines to maintain security compliance, while limiting the blast radius of VMs.
20+
Enabling automatic guest patching for your Azure Virtual Machines (VMs) and Scale Sets (VMSS) helps ease update management by safely and automatically patching virtual machines to maintain security compliance, while limiting the blast radius of VMs.
2121

2222
Automatic VM guest patching has the following characteristics:
2323
- Patches classified as *Critical* or *Security* are automatically downloaded and applied on the VM.
2424
- Patches are applied during off-peak hours for IaaS VMs in the VM's time zone.
2525
- Patches are applied during all hours for VMSS Flex.
26-
- Patch orchestration is managed by Azure and patches are applied following [availability-first principles](#availability-first-updates).
26+
- Azure manages the patch orchestration and follows [availability-first principles](#availability-first-updates).
2727
- Virtual machine health, as determined through platform health signals, is monitored to detect patching failures.
2828
- Application health can be monitored through the [Application Health extension](../virtual-machine-scale-sets/virtual-machine-scale-sets-health-extension.md).
2929
- Works for all VM sizes.
@@ -34,7 +34,7 @@ If automatic VM guest patching is enabled on a VM, then the available *Critical*
3434

3535
The VM is assessed periodically every few days and multiple times within any 30-day period to determine the applicable patches for that VM. The patches can be installed any day on the VM during off-peak hours for the VM. This automatic assessment ensures that any missing patches are discovered at the earliest possible opportunity.
3636

37-
Patches are installed within 30 days of the monthly patch releases, following availability-first orchestration described below. Patches are installed only during off-peak hours for the VM, depending on the time zone of the VM. The VM must be running during the off-peak hours for patches to be automatically installed. If a VM is powered off during a periodic assessment, the VM will be automatically assessed and applicable patches will be installed automatically during the next periodic assessment (usually within a few days) when the VM is powered on.
37+
Patches are installed within 30 days of the monthly patch releases, following availability-first orchestration. Patches are installed only during off-peak hours for the VM, depending on the time zone of the VM. The VM must be running during the off-peak hours for patches to be automatically installed. If a VM is powered off during a periodic assessment, the platform will automatically assess and apply patches (if required) during the next periodic assessment (usually within a few days) when the VM is powered on.
3838

3939
Definition updates and other patches not classified as *Critical* or *Security* won't be installed through automatic VM guest patching. To install patches with other patch classifications or schedule patch installation within your own custom maintenance window, you can use [Update Management](./windows/tutorial-config-management.md#manage-windows-updates).
4040

@@ -67,9 +67,9 @@ The patch installation date for a given VM may vary month-to-month, as a specifi
6767
### Which patches are installed?
6868
The patches installed depend on the rollout stage for the VM. Every month, a new global rollout is started where all security and critical patches assessed for an individual VM are installed for that VM. The rollout is orchestrated across all Azure regions in batches (described in the availability-first patching section above).
6969

70-
The exact set of patches to be installed vary based on the VM configuration, including OS type, and assessment timing. It is possible for two identical VMs in different regions to get different patches installed if there are more or less patches available when the patch orchestration reaches different regions at different times. Similarly, but less frequently, VMs within the same region but assessed at different times (due to different Availability Zone or Availability Set batches) might get different patches.
70+
The exact set of patches to be installed vary based on the VM configuration, including OS type, and assessment timing. It's possible for two identical VMs in different regions to get different patches installed if there are more or less patches available when the patch orchestration reaches different regions at different times. Similarly, but less frequently, VMs within the same region but assessed at different times (due to different Availability Zone or Availability Set batches) might get different patches.
7171

72-
As the Automatic VM Guest Patching does not configure the patch source, two similar VMs configured to different patch sources, such as public repository vs private repository, may also see a difference in the exact set of patches installed.
72+
As the Automatic VM Guest Patching doesn't configure the patch source, two similar VMs configured to different patch sources, such as public repository vs private repository, may also see a difference in the exact set of patches installed.
7373

7474
For OS types that release patches on a fixed cadence, VMs configured to the public repository for the OS can expect to receive the same set of patches across the different rollout phases in a month. For example, Windows VMs configured to the public Windows Update repository.
7575

@@ -142,7 +142,7 @@ VMs on Azure now support the following patch orchestration modes:
142142
**AutomaticByPlatform (Azure-orchestrated patching):**
143143
- This mode is supported for both Linux and Windows VMs.
144144
- This mode enables automatic VM guest patching for the virtual machine and subsequent patch installation is orchestrated by Azure.
145-
- During the installation process, this mode will [assess the VM](/rest/api/compute/virtual-machines/assess-patches) for available patches and save the details in [Azure Resource Graph](/azure/update-center/query-logs). (preview).
145+
- During the installation process, this mode will [assess the VM](/rest/api/compute/virtual-machines/assess-patches) for available patches and save the details in [Azure Resource Graph](/azure/update-center/query-logs).
146146
- This mode is required for availability-first patching.
147147
- This mode is only supported for VMs that are created using the supported OS platform images above.
148148
- For Windows VMs, setting this mode also disables the native Automatic Updates on the Windows virtual machine to avoid duplication.
@@ -153,29 +153,29 @@ VMs on Azure now support the following patch orchestration modes:
153153
**AutomaticByOS:**
154154
- This mode is supported only for Windows VMs.
155155
- This mode enables Automatic Updates on the Windows virtual machine, and patches are installed on the VM through Automatic Updates.
156-
- This mode does not support availability-first patching.
156+
- This mode doesn't support availability-first patching.
157157
- This mode is set by default if no other patch mode is specified for a Windows VM.
158158
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=true`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=AutomaticByOS` in the VM template.
159159
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 0
160160

161161
**Manual:**
162162
- This mode is supported only for Windows VMs.
163163
- This mode disables Automatic Updates on the Windows virtual machine. When deploying a VM using CLI or PowerShell, setting `--enable-auto-updates` to `false` will also set `patchMode` to `manual` and will disable Automatic Updates.
164-
- This mode does not support availability-first patching.
164+
- This mode doesn't support availability-first patching.
165165
- This mode should be set when using custom patching solutions.
166166
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=false`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=Manual` in the VM template.
167167
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 1
168168

169169
**ImageDefault:**
170170
- This mode is supported only for Linux VMs.
171-
- This mode does not support availability-first patching.
171+
- This mode doesn't support availability-first patching.
172172
- This mode honors the default patching configuration in the image used to create the VM.
173173
- This mode is set by default if no other patch mode is specified for a Linux VM.
174174
- To use this mode on Linux VMs, set the property `osProfile.linuxConfiguration.patchSettings.patchMode=ImageDefault` in the VM template.
175175

176176
> [!NOTE]
177177
>For Windows VMs, the property `osProfile.windowsConfiguration.enableAutomaticUpdates` can only be set when the VM is first created. This impacts certain patch mode transitions. Switching between AutomaticByPlatform and Manual modes is supported on VMs that have `osProfile.windowsConfiguration.enableAutomaticUpdates=false`. Similarly switching between AutomaticByPlatform and AutomaticByOS modes is supported on VMs that have `osProfile.windowsConfiguration.enableAutomaticUpdates=true`. Switching between AutomaticByOS and Manual modes is not supported.
178-
>Azure recommends that [Assessment Mode](/rest/api/compute/virtual-machines/assess-patches) be enabled on a VM even if Azure Orchestration is not enabled for patching. This will allow the platform to assess the VM every 24 hours for any pending updates, and save the details in [Azure Resource Graph](/azure/update-center/query-logs). (preview). The platform performs assessment to report consolidated results when the machine’s desired patch configuration state is applied or confirmed. This will be reported as a ‘Platform’-initated assessment.
178+
>Azure recommends that [Assessment Mode](/rest/api/compute/virtual-machines/assess-patches) be enabled on a VM even if Azure Orchestration is not enabled for patching. This will allow the platform to assess the VM every 24 hours for any pending updates, and save the details in [Azure Resource Graph](/azure/update-center/query-logs). The platform performs assessment to report consolidated results when the machine’s desired patch configuration state is applied or confirmed. This will be reported as a ‘Platform’-initated assessment.
179179
180180
## Requirements for enabling automatic VM guest patching
181181

0 commit comments

Comments
 (0)