@@ -18,7 +18,10 @@ The SRA Patch Manager solution will automate enabling Systems Manager - Patch ma
18
18
19
19
** Key solution features:**
20
20
- Assumes a role in each member account to enable/disable the Patch Manager Solution.
21
- - Creates 3 Maintenance Windows to Scan or Patch Windows or Linux Managed Instances
21
+ - Creates 3 Maintenance Windows:
22
+ - One updates the SSM Agents on all Managed Instances.
23
+ - One scans for, or installs, missing patches on Managed Instances tagged as Windows.
24
+ - One scans for, or installs, missing patches on Managed Instances tagged as Linux.
22
25
- Configures the [ Default Host Configuration] ( https://docs.aws.amazon.com/systems-manager/latest/userguide/quick-setup-default-host-management-configuration.html ) feature.
23
26
- Ability to disable Patch Manager within all accounts and regions via a parameter and CloudFormation update event.
24
27
@@ -52,6 +55,7 @@ The Patch Manager solution requires:
52
55
- The ` Patch Management IAM Role ` is assumed by the Lambda function in each of the member accounts to to configure Patch Manager.
53
56
- The ` SSM Automation Role ` is used by the Maintenance Window to execute the task.
54
57
- The ` DefaultHostConfig Role ` is used to enable the Default Host Configuration setting.
58
+ - The ` Patch Mgr EC2 Profile ` is used if there are issue with the Default Host Configuration setting.
55
59
56
60
#### 1.3 Maintenance Windows<!-- omit in toc -->
57
61
@@ -65,16 +69,16 @@ Three Maintenance Windows are created:
65
69
##### Maintenance Windows Tasks
66
70
67
71
Three tasks are created and registered with each of the Maintenance Windows:
68
- - ` Update SSMAgent On Managed Instances ` Runs an SSM Agent update on all Managed Instances
69
- - ` Scan For Patches On Managed Windows Instances ` Runs a scan on all Managed Instances Tagged as Windows
70
- - ` Scan For Patches On Managed Linux Instances ` Runs a scan on all Managed Instances Tagged as Linux
72
+ - ` Update_SSM ` Runs an SSM Agent update on all Managed Instances
73
+ - ` Windows_Scan ` Runs a scan on all Managed Instances Tagged as Windows
74
+ - ` Linux_Scan ` Runs a scan on all Managed Instances Tagged as Linux
71
75
72
76
##### Maintenance Window Targets
73
77
74
78
Three target groups are created and registered with each of the Maintenance Windows:
75
- - ` Targets To Update SSMAgent On Managed Instances ` which includes all instances with the tag InstanceOS: Windows or InstanceOS: Linux
76
- - ` Targets To Scan For Windows Updates On Managed Instances ` which includes all instances with the tag InstanceOS: Windows
77
- - ` Targets To Scan For Linux Updates On Managed Instances ` which includes all instances with the tag InstanceOS: Linux
79
+ - ` Update_SSM ` which includes all instances with the tag InstanceOS: Windows or InstanceOS: Linux
80
+ - ` Windows_Scan ` which includes all instances with the tag InstanceOS: Windows
81
+ - ` Linux_Scan ` which includes all instances with the tag InstanceOS: Linux
78
82
79
83
#### 1.4 Command Documents<!-- omit in toc -->
80
84
@@ -122,6 +126,13 @@ Choose to deploy the Patch Manager solution from within the chosen deployment ty
122
126
123
127
---
124
128
129
+ #### Troubleshooting<!-- omit in toc -->
130
+
131
+ Q: Its been more than 24 hours and the Instances are still not appearing in Fleet Manager (and therefore not being scanned).
132
+ A: Attach the ` patch-mgr-ec2-profile ` to the EC2 instances.
133
+
134
+ ---
135
+
125
136
## References
126
137
127
138
- [ AWS Systems Manager Patch Manager] ( https://docs.aws.amazon.com/systems-manager/latest/userguide/patch-manager.html )
0 commit comments