- Newest
- Most votes
- Most comments
Thank you for providing such a detailed explanation of your setup process. It seems you've taken many of the correct steps to set up AWS Patch Manager, but there are a few things we can check to help resolve the issue of automatic patch scanning not triggering.
-
Verify Patch Policy: First, ensure that your patch policy is correctly configured and active. You can do this by checking the Quick Setup dashboard in the Systems Manager console. Look for your "Baseline Patching" policy and verify its status.
-
Check Managed Nodes: Confirm that your EC2 instances are properly set up as managed nodes. They should have the SSM Agent installed and be able to communicate with Systems Manager. You can verify this in the Fleet Manager.
-
IAM Roles and Permissions: While you've added the AmazonSSMManagedInstanceCore permission to the IAM role, make sure that the role is actually attached to your EC2 instances. Also, verify that the role has the necessary permissions to access the S3 bucket where you're storing patch operation logs.
-
VPC Endpoints: If you're using VPC endpoints to connect to Systems Manager, ensure that the VPC endpoint policy for S3 allows access to the Quick Setup patch policy S3 bucket.
-
Time Zone: The scanning schedule you've set is based on UTC. Make sure you're accounting for the time difference when expecting the scans to occur.
-
Wait Period: Sometimes, it may take some time for the patch policy to propagate and take effect, especially when targeting an entire organization. Consider waiting for 24-48 hours to see if the automatic scanning starts.
-
Manual Patch Policy Run: If the automatic scanning still doesn't trigger, you can try to manually run the patch policy from the Quick Setup console to see if it executes successfully.
-
CloudWatch Logs: Check CloudWatch Logs for any error messages or issues related to the patch policy execution.
If after checking these points, you're still experiencing issues, you may want to consider using the "Patch now" feature as a temporary solution. This allows you to run on-demand patching without waiting for the scheduled scan.
Remember, setting up patching across an entire organization can be complex, and it may take some time to fully propagate and take effect. If problems persist, don't hesitate to contact AWS Support for further assistance.
Sources
Working with Patch Manager resources and compliance using the console - AWS Systems Manager
Configure patching for instances in an organization using Quick Setup - AWS Systems Manager
Patching managed nodes on demand - AWS Systems Manager
Patch policy configurations in Quick Setup - AWS Systems Manager
Relevant content
- asked 3 years ago
- AWS OFFICIALUpdated 9 months ago
- published 2 years ago
