Skip to content

Commit 1fc3e32

Browse files
Update README.md
1 parent c49eb9c commit 1fc3e32

File tree

1 file changed

+17
-8
lines changed
  • aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org

1 file changed

+17
-8
lines changed

aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org/README.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ The SRA Patch Manager solution will automate enabling Systems Manager - Patch ma
1818

1919
**Key solution features:**
2020
- Assumes a role in each member account to enable/disable the Patch Manager Solution.
21+
- Creates 3 Maintenance Windows to Scan or Patch Windows or Linux Managed Instances
2122
- Configures the [Default Host Configuration](https://docs.aws.amazon.com/systems-manager/latest/userguide/quick-setup-default-host-management-configuration.html) feature.
2223
- Ability to disable Patch Manager within all accounts and regions via a parameter and CloudFormation update event.
2324

@@ -29,7 +30,7 @@ The Patch Manager solution requires:
2930
- SSM Agent 3.0.502 or later to be installed on the managed node
3031
- Internet connectivity from the managed node to the source patch repositories
3132
- Supported OS
32-
- A tag is applied to the Manage Instance. Key: InstanceOS Value: Linux or Windows
33+
- A tag is applied to the Managed Instance. Key: InstanceOS Value: Linux or Windows
3334

3435
---
3536

@@ -56,23 +57,31 @@ The Patch Manager solution requires:
5657

5758
##### Maintenance Windows Window
5859

59-
One maintenance windows is created:
60-
- `Update_SSMAgent` updates SSM Agent
60+
Three Maintenance Windows are created:
61+
- `Update_SSM` updates SSM Agent on all Managed Instances
62+
- `Windows_Scan` scans for missing patches on all Managed Instances Tagged as Windows
63+
- `Linux_Scan` scans for missing patches on all Managed Instances Tagged as Linux
6164

6265
##### Maintenance Windows Tasks
6366

64-
One task is created and registered with the window:
65-
- `AWS-UpdateSSMAgent` Runs an SSM Agent update on Linux and Windows
67+
Three tasks are created and registered with each of the Maintenance Windows:
68+
- `Update SSMAgent On Managed Instances` Runs an SSM Agent update on all Managed Instances
69+
- `Scan For Patches On Managed Windows Instances` Runs a scan on all Managed Instances Tagged as Windows
70+
- `Scan For Patches On Managed Linux Instances` Runs a scan on all Managed Instances Tagged as Linux
6671

6772
##### Maintenance Window Targets
6873

69-
One target is created and registered with the window:
70-
- `Update_SSMAgent` which includes all instances with the tag InstanceOS:Windows or InstanceOS:Linux
74+
Three target groups are created and registered with each of the Maintenance Windows:
75+
- `Targets To Update SSMAgent On Managed Instances` which includes all instances with the tag InstanceOS:Windows or InstanceOS:Linux
76+
- `Targets To Scan For Windows Updates On Managed Instances` which includes all instances with the tag InstanceOS:Windows
77+
- `Targets To Scan For Linux Updates On Managed Instances` which includes all instances with the tag InstanceOS:Linux
7178

7279
#### 1.4 Command Documents<!-- omit in toc -->
7380

7481
These AWS Managed SSM Documents are used by the tasks:
75-
- AWS-UpdateSSMAgent
82+
- `AWS-UpdateSSMAgent`
83+
- `AWS-RunPatchBaseline`
84+
7685

7786

7887
## Implementation Instructions

0 commit comments

Comments
 (0)