You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/assessment-options.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Assessment options in Update Manager.
3
3
description: The article describes the assessment options available in Update Manager.
4
4
ms.service: azure-update-manager
5
-
ms.date: 11/16/2023
5
+
ms.date: 11/29/2023
6
6
ms.topic: conceptual
7
7
author: snehasudhirG
8
8
ms.author: sudhirsneha
@@ -14,25 +14,28 @@ ms.author: sudhirsneha
14
14
15
15
This article provides an overview of the assessment options available by Update Manager.
16
16
17
-
Update Manager provides you the flexibility to assess the status of available updates and manage the process of installing required updates for your machines.
17
+
Update Manager provides you with the flexibility to assess the status of available updates and manage the process of installing required updates for your machines.
18
18
19
19
## Periodic assessment
20
20
21
21
Periodic assessment is an update setting on a machine that allows you to enable automatic periodic checking of updates by Update Manager. We recommend that you enable this property on your machines as it allows Update Manager to fetch latest updates for your machines every 24 hours and enables you to view the latest compliance status of your machines. You can enable this setting using update settings flow as detailed [here](manage-update-settings.md#configure-settings-on-a-single-vm) or enable it at scale by using [Policy](periodic-assessment-at-scale.md).
> For Arc-enabled servers, ensure that the subscription in which the Arc-server is onboarded is registered to Microsoft.Compute resource provider. For more information on how to register to the resource provider, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md).
27
+
25
28
## Check for updates now/On-demand assessment
26
29
27
30
Update Manager allows you to check for latest updates on your machines at any time, on-demand. You can view the latest update status and act accordingly. Go to **Updates** blade on any VM and select **Check for updates** or select multiple machines from Update Manager and check for updates for all machines at once. For more information, see [check and install on-demand updates](view-updates.md).
28
31
29
32
## Update assessment scan
30
33
You can initiate a software updates compliance scan on a machine to get a current list of operating system updates available.
31
34
32
-
-**On Windows** - the software update scan is actually performed by the Windows Update Agent.
35
+
-**On Windows** - the software update scan is performed by the Windows Update Agent.
33
36
-**On Linux** - The software update scan is performed using the package manager that returns the missing updates as per the configured repositories.
34
37
35
-
In the **Updates** page, after you initiate an assessment, a notification is generated to inform you the activity has started and another is displayed when it is finished.
38
+
In the **Updates** page, after you initiate an assessment, a notification is generated to inform you the activity has started and another is displayed when it's finished.
36
39
37
40
:::image type="content" source="media/assessment-options/updates-preview-page.png" alt-text="Screenshot of the Updates page.":::
Copy file name to clipboardExpand all lines: articles/update-manager/troubleshoot.md
+48-25Lines changed: 48 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Troubleshoot known issues with Azure Update Manager
3
3
description: This article provides details on known issues and how to troubleshoot any problems with Azure Update Manager.
4
4
ms.service: azure-update-manager
5
-
ms.date: 09/18/2023
5
+
ms.date: 01/13/2024
6
6
ms.topic: conceptual
7
7
ms.author: sudhirsneha
8
8
author: SnehaSudhirG
@@ -36,34 +36,60 @@ To review the logs related to all actions performed by the extension, check for
36
36
*`WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes patches assessed and installed on the machine and any problems encountered in the process.
37
37
*`CommandExecution.log`: There's a wrapper above the patch action, which is used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
38
38
39
-
## Unable to change the patch orchestration option to manual updates from automatic updates
39
+
### Azure Arc-enabled servers
40
+
41
+
For Azure Arc-enabled servers, see [Troubleshoot VM extensions](../azure-arc/servers/troubleshoot-vm-extensions.md) for general troubleshooting steps.
42
+
43
+
To review the logs related to all actions performed by the extension, on Windows, check for more information in `C:\ProgramData\GuestConfig\extension_Logs\Microsoft.SoftwareUpdateManagement\WindowsOsUpdateExtension`. It includes the following two log files of interest:
44
+
45
+
*`WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes the patches assessed and installed on the machine and any problems encountered in the process.
46
+
*`cmd_execution_<numeric>_stdout.txt`: There's a wrapper above the patch action. It's used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
47
+
*`cmd_excution_<numeric>_stderr.txt`
48
+
49
+
50
+
### Unable to generate periodic assessment for Arc-enabled servers
51
+
52
+
#### Issue
53
+
54
+
The subscriptions in which the Arc-enabled servers are onboarded aren't producing assessment data.
55
+
56
+
#### Resolution
57
+
Ensure that the Arc servers subscriptions are registered to Microsoft.Compute resource provider so that the periodic assessment data is generated periodically as expected. [Learn more](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider)
58
+
59
+
### Maintenance configuration isn't applied when VM is moved to a different subscription
60
+
61
+
#### Issue
62
+
63
+
When a VM is moved to another subscription, the scheduled maintenance configuration associated to the VM isn't running.
64
+
65
+
#### Resolution
66
+
67
+
If you move a VM to a different resource group or subscription, the scheduled patching for the VM stops working as this scenario is currently unsupported by the system. You can delete the older association of the moved VM and create the new association to include the moved VMs in a maintenance configuration.
40
68
41
-
Here's the scenario.
69
+
### Unable to change the patch orchestration option to manual updates from automatic updates
42
70
43
-
### Issue
71
+
####Issue
44
72
45
73
The Azure machine has the patch orchestration option as `AutomaticByOS/Windows` automatic updates and you're unable to change the patch orchestration to Manual Updates by using **Change update settings**.
46
74
47
-
### Resolution
75
+
####Resolution
48
76
49
77
If you don't want any patch installation to be orchestrated by Azure or aren't using custom patching solutions, you can change the patch orchestration option to **Customer Managed Schedules (Preview)** or `AutomaticByPlatform` and `ByPassPlatformSafetyChecksOnUserSchedule` and not associate a schedule/maintenance configuration to the machine. This setting ensures that no patching is performed on the machine until you change it explicitly. For more information, see **Scenario 2** in [User scenarios](prerequsite-for-schedule-patching.md#user-scenarios).
50
78
51
79
:::image type="content" source="./media/troubleshoot/known-issue-update-settings-failed.png" alt-text="Screenshot that shows a notification of failed update settings.":::
52
80
53
-
## Machine shows as "Not assessed" and shows an HRESULT exception
54
-
55
-
Here's the scenario.
81
+
### Machine shows as "Not assessed" and shows an HRESULT exception
56
82
57
-
### Issue
83
+
####Issue
58
84
59
85
* You have machines that show as `Not assessed` under **Compliance**, and you see an exception message below them.
60
86
* You see an `HRESULT` error code in the portal.
61
87
62
-
### Cause
88
+
####Cause
63
89
64
90
The Update Agent (Windows Update Agent on Windows and the package manager for a Linux distribution) isn't configured correctly. Update Manager relies on the machine's Update Agent to provide the updates that are needed, the status of the patch, and the results of deployed patches. Without this information, Update Manager can't properly report on the patches that are needed or installed.
65
91
66
-
### Resolution
92
+
####Resolution
67
93
68
94
Try to perform updates locally on the machine. If this operation fails, it typically means that there's an Update Agent configuration error.
69
95
@@ -96,25 +122,24 @@ You can also download and run the [Windows Update troubleshooter](https://suppor
96
122
> [!NOTE]
97
123
> The [Windows Update troubleshooter](https://support.microsoft.com/help/4027322/windows-update-troubleshooter) documentation indicates that it's for use on Windows clients, but it also works on Windows Server.
98
124
99
-
### Azure Arc-enabled servers
100
-
101
-
For Azure Arc-enabled servers, see [Troubleshoot VM extensions](../azure-arc/servers/troubleshoot-vm-extensions.md) for general troubleshooting steps.
102
-
103
-
To review the logs related to all actions performed by the extension, on Windows, check for more information in `C:\ProgramData\GuestConfig\extension_Logs\Microsoft.SoftwareUpdateManagement\WindowsOsUpdateExtension`. It includes the following two log files of interest:
104
-
105
-
*`WindowsUpdateExtension.log`: Contains information related to the patch actions. This information includes the patches assessed and installed on the machine and any problems encountered in the process.
106
-
*`cmd_execution_<numeric>_stdout.txt`: There's a wrapper above the patch action. It's used to manage the extension and invoke specific patch operation. This log contains information about the wrapper. For autopatching, the log has information on whether the specific patch operation was invoked.
107
-
*`cmd_excution_<numeric>_stderr.txt`
108
125
109
126
## Known issues in schedule patching
110
127
111
128
- For a concurrent or conflicting schedule, only one schedule is triggered. The other schedule is triggered after a schedule is finished.
112
129
- If a machine is newly created, the schedule might have 15 minutes of schedule trigger delay in the case of Azure VMs.
113
130
- Policy definition **Schedule recurring updates using Azure Update Manager** with version 1.0.0-preview successfully remediates resources. However, it always shows them as noncompliant. The current value of the existence condition is a placeholder that always evaluates to false.
114
131
115
-
### Unable to apply patches for the shutdown machines
116
132
117
-
Here's the scenario.
133
+
### Schedule patching fails with error 'ShutdownOrUnresponsive'
134
+
135
+
#### Issue
136
+
137
+
Schedule patching hasn't installed the patches on the VMs and gives an error as 'ShutdownOrUnresponsive'.
138
+
139
+
#### Resolution
140
+
Schedules triggered on machines deleted and recreated with the same resource ID within 8 hours may fail with ShutdownOrUnresponsive error due to a known limitation.
141
+
142
+
### Unable to apply patches for the shutdown machines
118
143
119
144
#### Issue
120
145
@@ -124,14 +149,12 @@ Patches aren't getting applied for the machines that are in shutdown state. You
124
149
125
150
The machines are in a shutdown state.
126
151
127
-
### Resolution
152
+
####Resolution
128
153
129
154
Keep your machines turned on at least 15 minutes before the scheduled update. For more information, see [Shut down machines](../virtual-machines/maintenance-configurations.md#shut-down-machines).
130
155
131
156
### Patch run failed with Maintenance window exceeded property showing true even if time remained
132
157
133
-
Here's the scenario.
134
-
135
158
#### Issue
136
159
137
160
When you view an update deployment in **Update History**, the property **Failed with Maintenance window exceeded** shows **true** even though enough time was left for execution. In this case, one of the following problems is possible:
0 commit comments