Automate Patching with AWS Systems Manager Quick Setup Patch Policy
ฝัง
- เผยแพร่เมื่อ 21 ก.ค. 2024
- In this video we show you how to can automate patching of your applications and EC2 Instances in your organization and AWS accounts using AWS Systems manager.
Learn more at: go.aws/44PwORn
Subscribe:
More AWS videos: go.aws/3m5yEMW
More AWS events videos: go.aws/3ZHq4BK
Do you have technical AWS questions?
Ask the community of experts on AWS re:Post: go.aws/3lPaoPb
ABOUT AWS
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers - including the fastest-growing startups, largest enterprises, and leading government agencies - are using AWS to lower costs, become more agile, and innovate faster.
#Patching #PatchManager #WindowsUpdates #SSMPatchManager #AWS #AmazonWebServices #CloudComputing - วิทยาศาสตร์และเทคโนโลยี
You are missing the part of creating the AmazonEC2RoleforSSM role in IAM that allow the Patch baseline policy to access the EC2 instances.
Based on my understanding, this should be taken care of at 8:54.
AWS’ documentation states that the role you’re referring to - AmazonEC2RoleforSSM will soon be deprecated and they recommend the use of the AmazonSSMManagedInstanceCore policy. If you look at the blue, highlighted section in this portion of the video, it notes that this policy will be attached to the role that it creates.
What is the use of S3 bucket ? Where these logs are beneficial ?
Hey, Sanjiv! 👋 You can find more info about AWS S3, here: go.aws/3sz8ll9. 📌 If you'd like to speak to a Sales expert, feel welcome to reach them via our contact form: go.aws/3L7syVS. 👈 ^KS
It’s not clear in the video how the demonstrator is able to select ALL accounts that are part of the AWS organization. I went over the video but I just don’t see where he is able to define this.
This is explained in the "Quick Setup" chapter. It's using CloudFormation StackSets to deploy to the accounts in an AWS Organization
Thank you!