1. Home
  2. Training Library
  3. Operating and Monitoring SAP Workloads on AWS

Patch Manager

Contents

keyboard_tab
Course Introduction
1
Introduction
PREVIEW3m 8s
Audit Logs
AWS CloudTrail
Cost Management
15
16
Credits
1m 52s
17
18
Reports
PREVIEW1m 30s
19
20
Budgets
6m 51s
What is the AWS Data Provider for SAP?
Start course
Overview
Difficulty
Beginner
Duration
3h 7m
Students
15
Description

In this section of the AWS Certified: SAP on AWS Specialty learning path, we introduce you to strategies for operating and monitoring SAP workloads on AWS.

Learning Objectives

  • Understand how to use Amazon CloudWatch, AWS CloudTrail, and AWS Config to manage and monitor SAP infrastructure on AWS
  • Describe various AWS cost management tools including Cost Explorer, AWS Cost and Usage Reports, and AWS Budgets
  • Understand how to automate patch and state operations for our SAP instances using AWS Systems Manager
  • Explain how the AWS Data Provider for SAP is used to help gather performance-related data across AWS services

Prerequisites

The AWS Certified: SAP on AWS Specialty certification has been designed for anyone who has experience managing and operating SAP workloads. Ideally you’ll also have some exposure to the design and implementation of SAP workloads on AWS, including migrating these workloads from on-premises environments. Many exam questions will require a solutions architect level of knowledge for many AWS services. All of the AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.

Transcript

Patch Manager is the secure and scalable management service feature of Systems Manager that allows you to automate the process of patching managed instances with both security and reliability patches. You can use Patch Manager to apply updates to both the operating system and applications running on managed instances, you can patch fleets of managed instances by operating system types, including Amazon Linux, Amazon Linux 2, Ubuntu Server, and Windows Server among others.

Managed instances can be scanned for a report of missing patches, or they can be scanned and automatically have the missing patches installed. You can also generate patch compliance report. Patch Manager integrates with AWS CloudTrail, Amazon Event Bridge, Amazon S3, AWS Config, and AWS Identity and Access Management, this will permit you to gather any patch data and send it to other AWS services when necessary.

So where are these patches defined? Patch Manager uses what's called patch baselines. AWS Systems Manager provides predefined patch baselines for each operating system supported by AWS. You can use the baselines as is or you can create your own custom patch baselines. Custom patch baselines allow you greater control and flexibility to manage your fleet patch strategy. The predefined patch baselines usually include vendor patches classified as Security or Bugfix, and have a severity of critical or important.

Consider having a large fleet of instances that need patching. There are a few details important to keep in mind for patch deployment. You can use a patch group to designate groups of instances that are to be patched with a specific baseline. Patch groups can help you organize your patch deployment strategy across environments like development and production or application tiers like web servers, application servers, or data servers. You can create a patch group using resource packs.

A patch group resource tag must be defined using the tag key of Patch Group, this is a specific key, two words, the word patch capital P, the word group capital G, one space between, so they're two separate words with the proper capitalization. The key is case sensitive and it is a requirement. You can assign any value like web servers and app servers to the Patch Group key. So there are five systems manager documents available to help patching your instance with the latest security related updates. They provide a full range of patching options for Windows updates and Linux patch baselines.

Last but not least, keep in mind that you can also define maintenance windows for your patches, so that they are only applied during preset times. Patch Manager ensures that your software is up to date and meet your compliance policies. The five SSM documents include AWS-ConfigureWindowsUpdate, AWS-InstallWindowsUdate, AWS-RunPatchBaseline, AWS-RunPatchBaselineAssociation, and AWS-RunPatchBaselinewithHooks.

About the Author
Avatar
Stuart Scott
AWS Content Director
Students
198701
Labs
1
Courses
191
Learning Paths
132

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.