Patching for your Amazon EC2 Instances
Vložit
- čas přidán 27. 07. 2024
- Learn more about AWS Management and Governance at - amzn.to/2JlN2t3
In this video we show you how to automate your patching of your Amazon EC2 instances by using Systems Manager Patch Manager, Patch Groups and setting up a patch schedule. - Věda a technologie
Everything Well explained in short video. Expecting more like these
Current AWS console allows simpler process without tags and groups. Just select instances and schedule the patch
Love when the tools are fully built out in AWS. Great explainer.
Easy and straight forward. Thank you.
Great Video
AmazonEC2RoleforSSM - This policy will soon be deprecated. Please use AmazonSSMManagedInstanceCore policy to enable AWS Systems Manager service core functionality on EC2 instances.
Scan report where we can see, after running scan
Amazing!
Not a word about required reboots?
Caleb Gosnell system manager reboot the server once the patches are deployed
Only EC2 service is used or any other services like route 53, s3 etc can be used? If yes how can i create those in system manager?
SSM policy provided too much access, it's not secure!!!
Plz share patch rollback process from SSM
Is not neccesary the SSM agente in 2024 ?.
at 4:10, In approval rules does the patches gets installed also or only approved?
Only approved patches that match the approval rules are installed.
If EC2 instances are not exposed to internet and want to redirect them to look into S3 buckets which are publicly exposed, how can we do it? Created and attached IAM policy to the role but didn't help.
use a vpc endpoint
Does anyone else find AWS to be insanely complicated? Why can't we just run updates like we used to?
you can run updates on the command line, or through an ansible playbook, or with this tool. there's multiple options.
Patch manager adds more features such as patching many instances at the same time and ability to schedule patch operations to run during a maintenance window
this role doesn't exist