Skip to content

Commit cba14f9

Browse files
Update automatic-vm-guest-patching.md - boost Acrolinx score
1 parent a224221 commit cba14f9

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/virtual-machines/automatic-vm-guest-patching.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,9 +67,9 @@ The patch installation date for a given VM may vary month-to-month, as a specifi
6767
### Which patches are installed?
6868
The patches installed depend on the rollout stage for the VM. Every month, a new global rollout is started where all security and critical patches assessed for an individual VM are installed for that VM. The rollout is orchestrated across all Azure regions in batches (described in the availability-first patching section above).
6969

70-
The exact set of patches to be installed vary based on the VM configuration, including OS type, and assessment timing. It is possible for two identical VMs in different regions to get different patches installed if there are more or less patches available when the patch orchestration reaches different regions at different times. Similarly, but less frequently, VMs within the same region but assessed at different times (due to different Availability Zone or Availability Set batches) might get different patches.
70+
The exact set of patches to be installed vary based on the VM configuration, including OS type, and assessment timing. It's possible for two identical VMs in different regions to get different patches installed if there are more or less patches available when the patch orchestration reaches different regions at different times. Similarly, but less frequently, VMs within the same region but assessed at different times (due to different Availability Zone or Availability Set batches) might get different patches.
7171

72-
As the Automatic VM Guest Patching does not configure the patch source, two similar VMs configured to different patch sources, such as public repository vs private repository, may also see a difference in the exact set of patches installed.
72+
As the Automatic VM Guest Patching doesn't configure the patch source, two similar VMs configured to different patch sources, such as public repository vs private repository, may also see a difference in the exact set of patches installed.
7373

7474
For OS types that release patches on a fixed cadence, VMs configured to the public repository for the OS can expect to receive the same set of patches across the different rollout phases in a month. For example, Windows VMs configured to the public Windows Update repository.
7575

@@ -153,22 +153,22 @@ VMs on Azure now support the following patch orchestration modes:
153153
**AutomaticByOS:**
154154
- This mode is supported only for Windows VMs.
155155
- This mode enables Automatic Updates on the Windows virtual machine, and patches are installed on the VM through Automatic Updates.
156-
- This mode does not support availability-first patching.
156+
- This mode doesn't support availability-first patching.
157157
- This mode is set by default if no other patch mode is specified for a Windows VM.
158158
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=true`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=AutomaticByOS` in the VM template.
159159
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 0
160160

161161
**Manual:**
162162
- This mode is supported only for Windows VMs.
163163
- This mode disables Automatic Updates on the Windows virtual machine. When deploying a VM using CLI or PowerShell, setting `--enable-auto-updates` to `false` will also set `patchMode` to `manual` and will disable Automatic Updates.
164-
- This mode does not support availability-first patching.
164+
- This mode doesn't support availability-first patching.
165165
- This mode should be set when using custom patching solutions.
166166
- To use this mode on Windows VMs, set the property `osProfile.windowsConfiguration.enableAutomaticUpdates=false`, and set the property `osProfile.windowsConfiguration.patchSettings.patchMode=Manual` in the VM template.
167167
- Enabling this mode will set the Registry Key SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate to 1
168168

169169
**ImageDefault:**
170170
- This mode is supported only for Linux VMs.
171-
- This mode does not support availability-first patching.
171+
- This mode doesn't support availability-first patching.
172172
- This mode honors the default patching configuration in the image used to create the VM.
173173
- This mode is set by default if no other patch mode is specified for a Linux VM.
174174
- To use this mode on Linux VMs, set the property `osProfile.linuxConfiguration.patchSettings.patchMode=ImageDefault` in the VM template.

0 commit comments

Comments
 (0)