A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/compute/vm-manager/docs/patch below:

About Patch | VM Manager

Note: This page describes the Patch feature in VM Manager and how it works. To create patch jobs, see Creating patch jobs.

Use Patch to apply operating system patches across a set of Compute Engine VM instances (VMs). Long running VMs require periodic system updates to protect against defects and vulnerabilities.

The Patch feature has two main components:

Benefits

The Patch service gives you the flexibility to complete the following processes:

Pricing

For information about pricing, see VM Manager pricing.

How Patch works

To use the Patch feature, you must set up the OS Config API and install the OS Config agent. For detailed instructions, see Set up VM Manager. The OS Config service enables patch management in your environment while the OS Config agent uses the update mechanism for each operating system to apply patches. Updates are pulled from the package repositories (otherwise called the distribution source package) or a local repository for the operating system.

Note: You cannot host a local repository if you're running Pay-As-You-Go (PAYG) RHEL, RHEL for SAP, SLES, and SLES for SAP images.

The following update tools are used to apply patches:

Patch and package sources

To use the Patch feature in VM Manager, the VM must have access to the package updates or patches. The Patch service does not host or maintain package updates or patches. In some scenarios your VM might not have access to the updates. For example, if your VM doesn't use public IPs or you are using a private VPC network. In these scenarios, you must complete additional steps to allow access to the updates or patches. Consider the following options:

Patch management consist of two services: patch deployment and patch compliance. Each service is explained in the following sections.

Patch deployment overview

A patch deployment is initiated by making a call to the VM Manager API (also known as the OS Config API). This can be done by using either the Google Cloud console, Google Cloud CLI, or a direct API call. Then the VM Manager API notifies the OS Config agent that is running on the target VMs to start patching.

The OS Config agent runs the patching on each VM by using the patch management tool that is available for each distribution. For example, Ubuntu VMs use the apt utility tool. The utility tool retrieves updates (patches) from the distribution source for the operating system. As patching proceeds, the OS Config agent reports the progress to the VM Manager API.

Patch compliance overview

After you set up the VM Manager on a VM, the following takes place on the VM:

How patch compliance data is generated

The patch compliance backend periodically completes the following tasks:

  1. Reads the reports that are collected from OS inventory data on a VM.
  2. Scans for classification data from the vulnerability source for each operating system, and orders this data based on severity (from highest to lowest).

    The following table summarizes vulnerability source that is used for each operating system.

    Operating system Vulnerability source package RHEL and CentOS https://access.redhat.com/security/data

    Vulnerability scanning results for RHEL are based on the latest minor version for each major version released. There might be inaccuracies in scanning results for older minor versions of RHEL.

    Debian https://security-tracker.debian.org/tracker Ubuntu https://launchpad.net/ubuntu-cve-tracker SLES N/A

    Patch compliance reporting is not supported on SLES

    Rocky Linux N/A

    Patch compliance reporting is supported on Rocky Linux. However, the classification of vulnerability data based on severity is not available.

    Windows The patch compliance backend gets the classification data from the Windows Update Agent API.
  3. Maps these classifications (provided by the vulnerability source) to Google's patch compliance status.

    The following table summarizes the mapping system used to generate Google's patch compliance status.

    Distribution source categories Google's patch compliance status Critical (RED) Important/Security (ORANGE) Other (YELLOW) Up-to-date (GREEN)
  4. Selects the highest severity data for each available update and shows it on the Google Cloud console dashboard page. You can also see a full report of all available updates for the VM on the VM details page.

For example, if the OS inventory data for a RHEL 7 VM has the following package data:

The patch compliance backend scans for classification data (from the source distribution) and retrieves the following information:

Then on the Google Cloud console dashboard, this RHEL 7 VM is then added to list of VMs that have a Critical update available. If you review the details for this VM, you see 1 Critical update available (version 2.0) with 3 CVE's, CVE-001, CVE-002 and CVE-003.

Simultaneous patching

When you initiate a patch job, the service uses the instance filter you provided to determine the specific instances to be patched. Instance filters allow you to simultaneously patch many instances at the same time. This filtering is done when the patch job starts to account for changes in your environment after the job is scheduled.

Scheduled patching

Patches can be executed on demand, scheduled in advance, or configured with a recurring schedule. You can also cancel an in-progress patch job if you need to stop it immediately.

Note: In the event of a cancellation or timeout, the OS Config agent attempts to complete the task it is on before stopping.

You can set up patch maintenance windows by creating patch deployments with a specified frequency and duration. Scheduling patch jobs with a specified duration ensures that patching tasks do not start outside of your designated maintenance window.

You can also enforce patch installation deadlines by creating patch deployments to be completed at a specific time. If targeted VMs are not patched by this date, then the scheduled deployment starts installing patches on this date. If VMs are already patched no action is taken on those VMs, unless a pre or post patch script is specified or a reboot is required.

What is included in a patch job?

When a patch job runs on a VM, depending on the operating system, a combination of updates are applied. You can choose to target specific updates, packages, or, for Windows operating systems, specify the KB IDs that you want to update.

You can also use a patch job to update any Google agents that are installed as a standard package for that specific distribution. Use the update tool for that distribution to query the packages that are available. For example, to see the available Google agents for an Ubuntu operating system, run apt list --installed | grep -P 'google'.

Windows

For Windows operating system, you can apply all or select from the following updates:

Note: By default, VM Manager does not apply updates for the Microsoft applications running on your Windows VMs. See how to enable patching Microsoft software on Windows VMs. RHEL/Rocky/CentOS

For Red Hat Enterprise Linux, Rocky Linux and CentOS operating systems, you can apply all or select from the following updates:

Debian/Ubuntu

For Debian and Ubuntu systems, you can apply all or select from the following updates:

SUSE

For SUSE Enterprise Linux Server (SLES) and openSUSE operating systems, you can apply all or select from the following updates:

Access patch summary for your VMs

To view the patch summary for your VMs, you have the following options:

To view other information such as OS package updates and vulnerability reports, see view operating system details.

The Patch dashboard

In the Google Cloud console, a dashboard is available that you can use to monitor the patch compliance for your VM instances.

Go to the Patch page

Understanding the Patch dashboard Operating system overview

This section reflects the total number of VMs, organized by operating system. For a VM to show up in this list, it must have the OS Config agent installed and OS inventory management enabled.

If a VM is listed with its operating system as No data, one or more of the following scenarios might be true:

Patch compliance status

This section describes the compliance status of each VM, organized by operating system.

Compliance status is categorized into four main categories:

What's next?

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4