Subscribe Us

Header Ads

Monday 7 February 2022

Patching in Azure

 Patching in Azure

 

What is patching?

A patch is a series of modifications to a computer program or its supporting data that are intended to update, correct, or improve it.

This includes patching security flaws and defects, which are commonly referred to as bugfixes. Patches are frequently released to improve a program's functionality, usability, and performance. For operating system and application upgrades, the bulk of patches are given by software providers.

Patches can be installed using a debugger or an editing tool. They can be used on software files stored on a hard drive, a storage device, or in computer memory. Patches can be long-term or short-term.

Poorly constructed patches, while intended to solve issues, can occasionally introduce new ones. In rare cases, updates may purposefully destroy or deactivate a device, such as by deleting components for which the update provider no longer has a license.

Patch management is a subset of lifecycle management and refers to the process of determining which patches should be deployed to which systems at what time.

 

Patching for Azure VMs

Enabling automated VM guest patching for your Azure VMs simplifies update management by patching virtual machines securely and automatically to ensure security compliance.

The following are the features of these azure patches:

• Critical and security patches are automatically downloaded and installed on the VM.

• Patches are applied during the VM's peak-off hours; azure manages the patch arrangement, and patches are deployed using availability-first principles.

• Patch failures are detected by monitoring the health of VMs as determined by platform health signals.

• Compatible with all virtual machines

Automatic VM guest patching is the most recent and best approach to patch your device or system.


How does this Automatic VM Guest Patching work?

When automated VM guest patching is enabled on a VM, all critical and security patches are automatically downloaded and applied to the VM. When fresh patches are issued every month, this procedure begins automatically. Patch evaluation and installation are automated, and the procedure involves restarting the virtual machine as needed.

To identify the appropriate patches for that VM, it is tested every few days and numerous times within each 30-day period. The fixes can be applied to the VM at any time during off-peak hours.

Patches are applied within 30 days after the publication of the monthly patch. Patches are only applied during the VM's peak-off hours, which vary based on the time zone.

For the automated patch updates to be installed, the VM must be running during off-peak hours. If a VM is turned off during a periodic assessment, it will be automatically assessed and any necessary patches will be applied during the following periodic assessment.

Updates to definitions and several other changes are not considered important, thus they will not be installed automatically. You can utilize Update Management to install patches with different patch classifications or to schedule a patch installation.

 

Availability-first principle

Azure has access to the patch installation procedure for all VMs that have Automatic VM Guest Patching enabled. This rating adheres to the availability-first approach across Azure's various degrees of availability.

Azure will conduct the following upgrades for a group of computers undergoing an update:

Across regions:

To avoid global deployment problems, a monthly update is distributed in a gradual manner throughout the Azure platform.

A phase can have one or more regions, and an update can only proceed to the next phase if all eligible VMs in that phase have been successfully updated.

The health of the VMs after an update is used to determine the update's success. The health of the VM is monitored via health indicators.

Within a region

The same update is not applied to VMs in various time zones at the same time.

To prevent synchronized updates for all the VMs in a subscription, VMs that are not part of an availability set are batched on a best-effort basis.

The patch installation date for a particular VM may change from month to month, as specific VMs may be picked up in a different batch between monthly patching rounds.

 


Which/What patches are mounted?00A0

The fixes installed are determined by the VM deployment stage. Every month, a new global rollout begins, in which all security and critical fixes that have been reviewed for an individual VM are deployed. The rollout is done in batches across all Azure regions.

The precise patch set to be installed depends on the VM setup, such as the OS type and computation timing.

It is quite likely that two identical VMs in different areas will receive different patches if there are more or fewer patches available when the patch is sent to various regions at different times. VMs in the same area but assessed at separate times may also receive different patches, but this happens less commonly.

VMs configured to the public repository for the OS should expect to get the same set of patches across the multiple rollout phases in a month for Operating System types that release fixes on a predetermined cycle.

 

Windows VMs configured to the public Windows Update Repository, for example. If a VM is switched on during off-peak hours, it will receive at least one patch rollout each month, as fresh rollouts are triggered every month. On a monthly basis, this method guarantees that the VM is patched with the latest available security and critical updates. You may arrange your VMs to review and download fixes from your own private repositories to ensure consistency in the patch set deployed.


Requirements for enabling automatic VM guest patching

·         The Azure VM Agent for Windows or Linux must be installed on the virtual machine.

·         The Azure Linux agent must be version 2.2.53.1 or above for Linux VMs. If the current version of the Linux agent is less than the needed version, it should be updated.

·         The Windows Update service must be operating on the virtual machine for Windows VMs.

·         The virtual machine must be able to connect to the update endpoints that have been specified. The required update endpoints must be available if your virtual machine is set to use private repositories for Linux or Windows Server Update Services (WSUS) for Windows VMs.

·         To access complete features, including on-demand evaluation and patching, use the Compute API version 2021-03-01 or above.

·         Custom pictures are currently unavailable.

No comments:

Post a Comment

Adbox

About

authorHello, my name is Jack Sparrow. I'm a 50 year old self-employed Pirate from the Caribbean.
Learn More →



Categories

Labels