Skip to content

Commit bb72d8c

Browse files
Merge pull request #259864 from SnehaSudhirG/29Nov-AUMDocUpdates
Updated the TSG
2 parents 45721ef + 25bfb62 commit bb72d8c

File tree

2 files changed

+55
-29
lines changed

2 files changed

+55
-29
lines changed

articles/update-manager/assessment-options.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Assessment options in Update Manager.
33
description: The article describes the assessment options available in Update Manager.
44
ms.service: azure-update-manager
5-
ms.date: 11/16/2023
5+
ms.date: 11/29/2023
66
ms.topic: conceptual
77
author: snehasudhirG
88
ms.author: sudhirsneha
@@ -14,25 +14,28 @@ ms.author: sudhirsneha
1414

1515
This article provides an overview of the assessment options available by Update Manager.
1616

17-
Update Manager provides you the flexibility to assess the status of available updates and manage the process of installing required updates for your machines.
17+
Update Manager provides you with the flexibility to assess the status of available updates and manage the process of installing required updates for your machines.
1818

1919
## Periodic assessment
2020

2121
Periodic assessment is an update setting on a machine that allows you to enable automatic periodic checking of updates by Update Manager. We recommend that you enable this property on your machines as it allows Update Manager to fetch latest updates for your machines every 24 hours and enables you to view the latest compliance status of your machines. You can enable this setting using update settings flow as detailed [here](manage-update-settings.md#configure-settings-on-a-single-vm) or enable it at scale by using [Policy](periodic-assessment-at-scale.md).
2222

2323
:::image type="content" source="media/updates-maintenance/periodic-assessment-inline.png" alt-text="Screenshot showing periodic assessment option." lightbox="media/updates-maintenance/periodic-assessment-expanded.png":::
2424

25+
> [!NOTE]
26+
> For Arc-enabled servers, ensure that the subscription in which the Arc-server is onboarded is registered to Microsoft.Compute resource provider. For more information on how to register to the resource provider, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md).
27+
2528
## Check for updates now/On-demand assessment
2629

2730
Update Manager allows you to check for latest updates on your machines at any time, on-demand. You can view the latest update status and act accordingly. Go to **Updates** blade on any VM and select **Check for updates** or select multiple machines from Update Manager and check for updates for all machines at once. For more information, see [check and install on-demand updates](view-updates.md).
2831

2932
## Update assessment scan
3033
You can initiate a software updates compliance scan on a machine to get a current list of operating system updates available.
3134

32-
- **On Windows** - the software update scan is actually performed by the Windows Update Agent.
35+
- **On Windows** - the software update scan is performed by the Windows Update Agent.
3336
- **On Linux** - The software update scan is performed using the package manager that returns the missing updates as per the configured repositories.
3437

35-
In the **Updates** page, after you initiate an assessment, a notification is generated to inform you the activity has started and another is displayed when it is finished.
38+
In the **Updates** page, after you initiate an assessment, a notification is generated to inform you the activity has started and another is displayed when it's finished.
3639

3740
:::image type="content" source="media/assessment-options/updates-preview-page.png" alt-text="Screenshot of the Updates page.":::
3841

articles/update-manager/troubleshoot.md

Lines changed: 48 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot known issues with Azure Update Manager
33
description: This article provides details on known issues and how to troubleshoot any problems with Azure Update Manager.
44
ms.service: azure-update-manager
5-
ms.date: 09/18/2023
5+
ms.date: 01/13/2024
66
ms.topic: conceptual
77
ms.author: sudhirsneha
88
author: SnehaSudhirG
@@ -36,34 +36,60 @@ To review the logs related to all actions performed by the extension, check for
3636
* `WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes patches assessed and installed on the machine and any problems encountered in the process.
3737
* `CommandExecution.log`: There's a wrapper above the patch action, which is used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
3838

39-
## Unable to change the patch orchestration option to manual updates from automatic updates
39+
### Azure Arc-enabled servers
40+
41+
For Azure Arc-enabled servers, see [Troubleshoot VM extensions](../azure-arc/servers/troubleshoot-vm-extensions.md) for general troubleshooting steps.
42+
43+
To review the logs related to all actions performed by the extension, on Windows, check for more information in `C:\ProgramData\GuestConfig\extension_Logs\Microsoft.SoftwareUpdateManagement\WindowsOsUpdateExtension`. It includes the following two log files of interest:
44+
45+
* `WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes the patches assessed and installed on the machine and any problems encountered in the process.
46+
* `cmd_execution_<numeric>_stdout.txt`: There's a wrapper above the patch action. It's used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
47+
* `cmd_excution_<numeric>_stderr.txt`
48+
49+
50+
### Unable to generate periodic assessment for Arc-enabled servers
51+
52+
#### Issue
53+
54+
The subscriptions in which the Arc-enabled servers are onboarded aren't producing assessment data.
55+
56+
#### Resolution
57+
Ensure that the Arc servers subscriptions are registered to Microsoft.Compute resource provider so that the periodic assessment data is generated periodically as expected. [Learn more](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider)
58+
59+
### Maintenance configuration isn't applied when VM is moved to a different subscription
60+
61+
#### Issue
62+
63+
When a VM is moved to another subscription, the scheduled maintenance configuration associated to the VM isn't running.
64+
65+
#### Resolution
66+
67+
If you move a VM to a different resource group or subscription, the scheduled patching for the VM stops working as this scenario is currently unsupported by the system. You can delete the older association of the moved VM and create the new association to include the moved VMs in a maintenance configuration.
4068

41-
Here's the scenario.
69+
### Unable to change the patch orchestration option to manual updates from automatic updates
4270

43-
### Issue
71+
#### Issue
4472

4573
The Azure machine has the patch orchestration option as `AutomaticByOS/Windows` automatic updates and you're unable to change the patch orchestration to Manual Updates by using **Change update settings**.
4674

47-
### Resolution
75+
#### Resolution
4876

4977
If you don't want any patch installation to be orchestrated by Azure or aren't using custom patching solutions, you can change the patch orchestration option to **Customer Managed Schedules (Preview)** or `AutomaticByPlatform` and `ByPassPlatformSafetyChecksOnUserSchedule` and not associate a schedule/maintenance configuration to the machine. This setting ensures that no patching is performed on the machine until you change it explicitly. For more information, see **Scenario 2** in [User scenarios](prerequsite-for-schedule-patching.md#user-scenarios).
5078

5179
:::image type="content" source="./media/troubleshoot/known-issue-update-settings-failed.png" alt-text="Screenshot that shows a notification of failed update settings.":::
5280

53-
## Machine shows as "Not assessed" and shows an HRESULT exception
54-
55-
Here's the scenario.
81+
### Machine shows as "Not assessed" and shows an HRESULT exception
5682

57-
### Issue
83+
#### Issue
5884

5985
* You have machines that show as `Not assessed` under **Compliance**, and you see an exception message below them.
6086
* You see an `HRESULT` error code in the portal.
6187

62-
### Cause
88+
#### Cause
6389

6490
The Update Agent (Windows Update Agent on Windows and the package manager for a Linux distribution) isn't configured correctly. Update Manager relies on the machine's Update Agent to provide the updates that are needed, the status of the patch, and the results of deployed patches. Without this information, Update Manager can't properly report on the patches that are needed or installed.
6591

66-
### Resolution
92+
#### Resolution
6793

6894
Try to perform updates locally on the machine. If this operation fails, it typically means that there's an Update Agent configuration error.
6995

@@ -96,25 +122,24 @@ You can also download and run the [Windows Update troubleshooter](https://suppor
96122
> [!NOTE]
97123
> The [Windows Update troubleshooter](https://support.microsoft.com/help/4027322/windows-update-troubleshooter) documentation indicates that it's for use on Windows clients, but it also works on Windows Server.
98124
99-
### Azure Arc-enabled servers
100-
101-
For Azure Arc-enabled servers, see [Troubleshoot VM extensions](../azure-arc/servers/troubleshoot-vm-extensions.md) for general troubleshooting steps.
102-
103-
To review the logs related to all actions performed by the extension, on Windows, check for more information in `C:\ProgramData\GuestConfig\extension_Logs\Microsoft.SoftwareUpdateManagement\WindowsOsUpdateExtension`. It includes the following two log files of interest:
104-
105-
* `WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes the patches assessed and installed on the machine and any problems encountered in the process.
106-
* `cmd_execution_<numeric>_stdout.txt`: There's a wrapper above the patch action. It's used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
107-
* `cmd_excution_<numeric>_stderr.txt`
108125

109126
## Known issues in schedule patching
110127

111128
- For a concurrent or conflicting schedule, only one schedule is triggered. The other schedule is triggered after a schedule is finished.
112129
- If a machine is newly created, the schedule might have 15 minutes of schedule trigger delay in the case of Azure VMs.
113130
- Policy definition **Schedule recurring updates using Azure Update Manager** with version 1.0.0-preview successfully remediates resources. However, it always shows them as noncompliant. The current value of the existence condition is a placeholder that always evaluates to false.
114131

115-
### Unable to apply patches for the shutdown machines
116132

117-
Here's the scenario.
133+
### Schedule patching fails with error 'ShutdownOrUnresponsive'
134+
135+
#### Issue
136+
137+
Schedule patching hasn't installed the patches on the VMs and gives an error as 'ShutdownOrUnresponsive'.
138+
139+
#### Resolution
140+
Schedules triggered on machines deleted and recreated with the same resource ID within 8 hours may fail with ShutdownOrUnresponsive error due to a known limitation.
141+
142+
### Unable to apply patches for the shutdown machines
118143

119144
#### Issue
120145

@@ -124,14 +149,12 @@ Patches aren't getting applied for the machines that are in shutdown state. You
124149

125150
The machines are in a shutdown state.
126151

127-
### Resolution
152+
#### Resolution
128153

129154
Keep your machines turned on at least 15 minutes before the scheduled update. For more information, see [Shut down machines](../virtual-machines/maintenance-configurations.md#shut-down-machines).
130155

131156
### Patch run failed with Maintenance window exceeded property showing true even if time remained
132157

133-
Here's the scenario.
134-
135158
#### Issue
136159

137160
When you view an update deployment in **Update History**, the property **Failed with Maintenance window exceeded** shows **true** even though enough time was left for execution. In this case, one of the following problems is possible:

0 commit comments

Comments
 (0)