|
| 1 | +--- |
| 2 | +ms.assetid: |
| 3 | +title: Patch Azure Monitor SCOM Managed Instance |
| 4 | +description: This article provides information on how to patch your Azure Monitor SCOM Managed Instance. |
| 5 | +author: PriskeyJeronika-MS |
| 6 | +ms.author: v-gjeronika |
| 7 | +manager: jsuri |
| 8 | +ms.date: 05/22/2024 |
| 9 | +ms.service: azure-monitor |
| 10 | +ms.subservice: operations-manager-managed-instance |
| 11 | +ms.topic: how-to |
| 12 | +--- |
| 13 | + |
| 14 | +# Patch Azure Monitor SCOM Managed Instance |
| 15 | + |
| 16 | +Azure Monitor SCOM Managed Instance offers a convenient patching experience compared to on-premises System Center Operations Manager. |
| 17 | + |
| 18 | +Following are the key highlights: |
| 19 | + |
| 20 | +- No update rollup in SCOM Managed Instance. A patch is released as and when there are significant fixes and updates made to the product. They're released at a frequency of as often as two weeks or two months. |
| 21 | +- Patching is quick and convenient and happens at the click of a button. |
| 22 | +- All newer patches are backward compatible with the older versions. |
| 23 | + |
| 24 | +This article provides information on how to patch your SCOM Managed Instance. |
| 25 | + |
| 26 | +## Pre-Patching checklist |
| 27 | + |
| 28 | +Before you proceed with the patching process, complete the following prechecks to ensure a successful patching operation: |
| 29 | + |
| 30 | +1. **SQL managed instance status**: Verify that the SQL managed instance is operational and running, and not in a shutdown state. |
| 31 | + |
| 32 | +2. **Management server health**: Confirm the health of existing Management Servers. |
| 33 | + |
| 34 | +3. **Domain credentials verification**: Validate the status of the domain credentials used in the key vault. If the credentials have expired, update the password to ensure they're active and functional. |
| 35 | + |
| 36 | +4. **NAT Gateway association**: Ensure that the NAT Gateway is still associated with the subnet and hasn't been removed. |
| 37 | + |
| 38 | +5. **VNET connectivity requirements**: Ensure that VNet to VNet communication is allowed to enable communication between the newly added managed servers and the existing ones. Additionally, verify that the connectivity from the VNet to the SQL managed instance and Domain Controller is operational. |
| 39 | + |
| 40 | +## Patch SCOM Managed Instance |
| 41 | + |
| 42 | +To patch SCOM Managed Instance, follow these steps: |
| 43 | + |
| 44 | +1. Sign in to the [Azure portal](https://portal.azure.com/) and search for **SCOM Managed Instance**. |
| 45 | +1. On the **Overview** page, under **Configuration**, select **Patching**. |
| 46 | +1. On the **Patching** page, you see the status of the updates available for your instance. |
| 47 | + |
| 48 | + :::image type="Patching" source="media/patch-scom-managed-instance/scom-mi-patching.png" alt-text="Screenshot of Patching."::: |
| 49 | + |
| 50 | +1. Select **Update instance** to update your instance. |
| 51 | + |
| 52 | + :::image type="Update Instance" source="media/patch-scom-managed-instance/update-instance.png" alt-text="Screenshot of Update Instance."::: |
| 53 | + |
| 54 | +It takes 30 mins to 1 hour to successfully update the instance. |
| 55 | + |
| 56 | + :::image type="Instance updated" source="media/patch-scom-managed-instance/instance-updated.png" alt-text="Screenshot of Instance updated."::: |
| 57 | + |
| 58 | +>[!NOTE] |
| 59 | +>To run custom configurations in your SCOM Managed Instance management servers, see [Customizations on Azure Monitor SCOM managed instance management servers](customizations-on-scom-managed-instance-management-servers.md). |
| 60 | +
|
| 61 | + |
| 62 | +## Troubleshoot patching issues |
| 63 | + |
| 64 | +### Issue: In rare cases, after patching, stale Management Servers are visible on console |
| 65 | + |
| 66 | +**Cause**: Occurs if a patching operation has left an inconsistent state after completion. |
| 67 | + |
| 68 | +**Resolution**: Microsoft Azure Virtual Machine Scale Sets is used to provision the management servers for SCOM Managed Instances. To remove the stale management server from the system, follow these steps: |
| 69 | + |
| 70 | +1. Access the Azure Virtual Machine Scale Sets and log in to one of the management servers for the SCOM Managed Instance. |
| 71 | + |
| 72 | +2. Launch PowerShell in administrative mode and navigate to the following directory. |
| 73 | + |
| 74 | + `C:\Packages\Plugins\Microsoft.Azure.SCOMMIServer.ScomServerForWindows\<version>\bin\troubleshooter` |
| 75 | + |
| 76 | + >[!Note] |
| 77 | + >To find the version, go to `C:\Packages\Plugins\Microsoft.Azure.SCOMMIServer.ScomServerForWindows` and review all available versions and then select the latest one. |
| 78 | +
|
| 79 | +3. Execute the following script: |
| 80 | + |
| 81 | + ```powershell |
| 82 | + .\RemoveStaleManagementServers.ps1 |
| 83 | + ``` |
| 84 | +
|
| 85 | + The script is interactive and prompts you for the FQDN of the stale server. |
| 86 | +
|
| 87 | +4. Provide the accurate FQDN of the stale management server you wish to remove. |
| 88 | +
|
| 89 | + For example, FQDN: SCOMMI2000001.contoso.com. |
| 90 | +
|
| 91 | +## Next steps |
| 92 | +
|
| 93 | +[Connect the Azure Monitor SCOM Managed Instance to Ops console](connect-managed-instance-ops-console.md) |
0 commit comments