Skip to content

Commit b21c112

Browse files
authored
Update automatic-vm-guest-patching.md
updated tone for Acrolix
1 parent 4339de5 commit b21c112

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/virtual-machines/automatic-vm-guest-patching.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The VM is assessed periodically every few days and multiple times within any 30-
3333

3434
Patches are installed within 30 days of the monthly patch releases, following availability-first orchestration described below. Patches are installed only during off-peak hours for the VM, depending on the time zone of the VM. The VM must be running during the off-peak hours for patches to be automatically installed. If a VM is powered off during a periodic assessment, the VM will be automatically assessed and applicable patches will be installed automatically during the next periodic assessment (usually within a few days) when the VM is powered on.
3535

36-
Definition updates and other patches not classified as *Critical* or *Security* will not be installed through automatic VM guest patching. To install patches with other patch classifications or schedule patch installation within your own custom maintenance window, you can use [Update Management](./windows/tutorial-config-management.md#manage-windows-updates).
36+
Definition updates and other patches not classified as *Critical* or *Security* won't be installed through automatic VM guest patching. To install patches with other patch classifications or schedule patch installation within your own custom maintenance window, you can use [Update Management](./windows/tutorial-config-management.md#manage-windows-updates).
3737

3838
For IaaS VMs, customers can choose to configure VMs to enable automatic VM guest patching. This will limit the blast radius of VMs getting the updated patch and do an orchestrated update of the VMs. The service also provides [health monitoring](../virtual-machine-scale-sets/virtual-machine-scale-sets-health-extension.md) to detect issues any issues with the update.
3939

@@ -46,16 +46,16 @@ For a group of virtual machines undergoing an update, the Azure platform will or
4646
**Across regions:**
4747
- A monthly update is orchestrated across Azure globally in a phased manner to prevent global deployment failures.
4848
- A phase can have one or more regions, and an update moves to the next phases only if eligible VMs in a phase update successfully.
49-
- Geo-paired regions are not updated concurrently and can't be in the same regional phase.
49+
- Geo-paired regions aren't updated concurrently and can't be in the same regional phase.
5050
- The success of an update is measured by tracking the VM’s health post update. VM Health is tracked through platform health indicators for the VM.
5151

5252
**Within a region:**
53-
- VMs in different Availability Zones are not updated concurrently with the same update.
54-
- VMs that are not part of an availability set are batched on a best effort basis to avoid concurrent updates for all VMs in a subscription.
53+
- VMs in different Availability Zones aren't updated concurrently with the same update.
54+
- VMs that aren't part of an availability set are batched on a best effort basis to avoid concurrent updates for all VMs in a subscription.
5555

5656
**Within an availability set:**
57-
- All VMs in a common availability set are not updated concurrently.
58-
- VMs in a common availability set are updated within Update Domain boundaries and VMs across multiple Update Domains are not updated concurrently.
57+
- All VMs in a common availability set aren't updated concurrently.
58+
- VMs in a common availability set are updated within Update Domain boundaries and VMs across multiple Update Domains aren't updated concurrently.
5959

6060
Narrowing the scope of VMs that are patched across regions, within a region, or an availability set, limit the blast radius of the patch. With health monitoring, any potential issues are flagged without impacting the entire fleet.
6161

@@ -75,7 +75,7 @@ As a new rollout is triggered every month, a VM will receive at least one patch
7575
## Supported OS images
7676

7777
> [!IMPORTANT]
78-
> Automatic VM guest patching, on-demand patch assessment and on-demand patch installation are supported only on VMs created from images with the exact combination of publisher, offer and sku from the below supported OS images list. Custom images or any other publisher, offer, sku combinations are not supported. More images are added periodically.
78+
> Automatic VM guest patching, on-demand patch assessment and on-demand patch installation are supported only on VMs created from images with the exact combination of publisher, offer and sku from the below supported OS images list. Custom images or any other publisher, offer, sku combinations aren't supported. More images are added periodically.
7979
8080

8181
| Publisher | OS Offer | Sku |
@@ -175,7 +175,7 @@ VMs on Azure now support the following patch orchestration modes:
175175
- For Windows VMs, the Windows Update service must be running on the virtual machine.
176176
- The virtual machine must be able to access the configured update endpoints. If your virtual machine is configured to use private repositories for Linux or Windows Server Update Services (WSUS) for Windows VMs, the relevant update endpoints must be accessible.
177177
- Use Compute API version 2021-03-01 or higher to access all functionality including on-demand assessment and on-demand patching.
178-
- Custom images are not currently supported.
178+
- Custom images aren't currently supported.
179179

180180
## Enable automatic VM guest patching
181181
Automatic VM guest patching can be enabled on any Windows or Linux VM that is created from a supported platform image.

0 commit comments

Comments
 (0)