Skip to content

Commit 79a27de

Browse files
Merge pull request #261406 from maulikshah23/patch-27
Update automatic-vm-guest-patching.md
2 parents 1212f04 + 9554f50 commit 79a27de

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

articles/virtual-machines/automatic-vm-guest-patching.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,20 +146,23 @@ VMs on Azure now support the following patch orchestration modes:
146146
- For Windows VMs, setting this mode also disables the native Automatic Updates on the Windows virtual machine to avoid duplication.
147147
- To use this mode on Linux VMs, set the property `osProfile.linuxConfiguration.patchSettings.patchMode=AutomaticByPlatform` in the VM template.
148148
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.patchSettings.patchMode=AutomaticByPlatform` in the VM template.
149+
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 1
149150

150151
**AutomaticByOS:**
151152
- This mode is supported only for Windows VMs.
152153
- This mode enables Automatic Updates on the Windows virtual machine, and patches are installed on the VM through Automatic Updates.
153154
- This mode does not support availability-first patching.
154155
- This mode is set by default if no other patch mode is specified for a Windows VM.
155156
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=true`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=AutomaticByOS` in the VM template.
157+
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 0
156158

157159
**Manual:**
158160
- This mode is supported only for Windows VMs.
159161
- This mode disables Automatic Updates on the Windows virtual machine. When deploying a VM using CLI or PowerShell, setting `--enable-auto-updates` to `false` will also set `patchMode` to `manual` and will disable Automatic Updates.
160162
- This mode does not support availability-first patching.
161163
- This mode should be set when using custom patching solutions.
162164
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=false`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=Manual` in the VM template.
165+
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 1
163166

164167
**ImageDefault:**
165168
- This mode is supported only for Linux VMs.
@@ -180,6 +183,7 @@ VMs on Azure now support the following patch orchestration modes:
180183
- The virtual machine must be able to access the configured update endpoints. If your virtual machine is configured to use private repositories for Linux or Windows Server Update Services (WSUS) for Windows VMs, the relevant update endpoints must be accessible.
181184
- Use Compute API version 2021-03-01 or higher to access all functionality including on-demand assessment and on-demand patching.
182185
- Custom images aren't currently supported.
186+
- VMSS Flexible Orchestration requires the installation of [Application Health extension](../virtual-machine-scale-sets/virtual-machine-scale-sets-health-extension.md). This is optional for IaaS VMs.
183187

184188
## Enable automatic VM guest patching
185189
Automatic VM guest patching can be enabled on any Windows or Linux VM that is created from a supported platform image.
@@ -274,6 +278,8 @@ When automatic VM guest patching is enabled for a VM, a VM extension of type `Mi
274278

275279
It can take more than three hours to enable automatic VM guest updates on a VM, as the enablement is completed during the VM's off-peak hours. The extension is also installed and updated during off-peak hours for the VM. If the VM's off-peak hours end before enablement can be completed, the enablement process will resume during the next available off-peak time.
276280

281+
Please note that the platform will make periodic patching configuration calls to ensure alignment when model changes are detected on IaaS VMs or VMSS Flexible orchestration. Certain model changes such as, but not limited to, updating assessment mode, patch mode, and extension update may trigger a patching configuration call.
282+
277283
Automatic updates are disabled in most scenarios, and patch installation is done through the extension going forward. The following conditions apply.
278284
- If a Windows VM previously had Automatic Windows Update turned on through the AutomaticByOS patch mode, then Automatic Windows Update is turned off for the VM when the extension is installed.
279285
- For Ubuntu VMs, the default automatic updates are disabled automatically when Automatic VM Guest Patching completes enablement.
@@ -428,6 +434,14 @@ Example to install all Critical and Security patches on a Windows VM, while excl
428434
```azurecli-interactive
429435
az vm install-patches --resource-group myResourceGroup --name myVM --maximum-duration PT2H --reboot-setting IfRequired --classifications-to-include-win Critical Security --exclude-kbs-requiring-reboot true
430436
```
437+
## Strict Safe Deployment on Canonical Images (Preview)
438+
439+
[Microsoft and Canonical have partnered](https://ubuntu.com/blog/ubuntu-snapshots-on-azure-ensuring-predictability-and-consistency-in-cloud-deployments) to make it easier for our customers to stay current with Linux OS updates and increase the security and resiliency of their Ubuntu workloads on Azure. By leveraging Canonical’s snapshot service, Azure will now apply the same set of Ubuntu updates consistently to your fleet across regions.
440+
441+
Azure will store the package related updates within the customer repository for up to 90 days, depending on the available space. This allows customers to update their fleet leveraging Strict Safe Deployment for VMs that are up to 3 months behind on updates.
442+
443+
There is no action required for customers that have enabled Auto Patching. The platform will install a package that is snapped to a point-in-time by default. In the event a snapshot-based update cannot be installed, Azure will apply the latest package on the VM to ensure the VM remains secure. The point-in-time updates will be consistent on all VMs across regions to ensure homogeneity. Customers can view the published date information related to the applied update in [Azure Resource Graph](/azure/governance/resource-graph/overview) and the [Instance View](/powershell/module/az.compute/get-azvm) of the VM.
444+
431445
## Image End-of-Life (EOL)
432446

433447
Publishers may no longer support generating new updates for their images after a certain date. This is commonly referred to as End-of-life (EOL) for the image. Azure does not recommend using images after their EOL date, since it will expose the service to security vulnerabilities or performance issues. The Azure Guest Patching Service (AzGPS) will communicate necessary steps for customers and impacted partners. AzGPS will remove the image from the support list after the EOL date. VMs that use an end of life image on Azure might continue to work beyond their date. However, any issues experienced by these VMs are not eligible for support.

0 commit comments

Comments
 (0)