Seleziona le tue preferenze relative ai cookie

Utilizziamo cookie essenziali e strumenti simili necessari per fornire il nostro sito e i nostri servizi. Utilizziamo i cookie prestazionali per raccogliere statistiche anonime in modo da poter capire come i clienti utilizzano il nostro sito e apportare miglioramenti. I cookie essenziali non possono essere disattivati, ma puoi fare clic su \"Personalizza\" o \"Rifiuta\" per rifiutare i cookie prestazionali.

Se sei d'accordo, AWS e le terze parti approvate utilizzeranno i cookie anche per fornire utili funzionalità del sito, ricordare le tue preferenze e visualizzare contenuti pertinenti, inclusa la pubblicità pertinente. Per continuare senza accettare questi cookie, fai clic su \"Continua\" o \"Rifiuta\". Per effettuare scelte più dettagliate o saperne di più, fai clic su \"Personalizza\".

Patching service commitments

Modalità Focus
Patching service commitments - AMS Advanced User Guide
Questa pagina non è tradotta nella tua lingua. Richiedi traduzione

Based on your type of infrastructure deployment, and criticality of the update, we provide service commitments for critical security updates for mutable and immutable infrastructures, and important updates for mutable and immutable infrastructures.

Standard patching

These are AMS service commitments for standard patching.

Standard patching, mutable infrastructure (in-place patching)
Event/Action Service commitment measurement

Important Updates are released in a month.

Clock starts

Fourteen days from when the standard patch notification is created, AMS notifies you of upcoming planned patching through a service notification and by email for each stack. The service notification includes:

  • A list of update IDs (CSUs and IUs) that are applicable (needed and not applied) for the stack, and those updates excluded from patching

  • IDs of stacks affected

  • The maintenance window when the updates will be applied

Clock stops after service notification is sent.

You test the impact of the updates and approve or reject the RFC. If you do not reply within 14 days or you reject the patching in your response to the service notification, no action is taken.

If you take longer than 14 days to test, and want the updates to be applied after the 14-day period, submit a service request for a new patch RFC based on the details of the previous RFC.

If you don't approve or reply within 14 days, the pending change is canceled and the service commitment for the updates is not applicable.

If you approve the service notification within 14 days, AMS applies the updates.

You can choose to exclude specific updates from an RFC by specifying the updates to be excluded in your response to the service notification.

The clock starts if you approve service notification within 14 days of the receipt. The clock stops after the update installation has been attempted.

AMS sends a service notification to you of the outcome of each update that was attempted. The service notification includes the following details:

  • Amazon EC2 instance ID

  • Update 1 Success/Failed: ARN a1, ARN a2...

  • Update 2 Success/Failed: ARN b1, ARN b2...

  • Update N Success/Failed: ARN c1, ARN c2...

Not applicable.

In case of failed updates, AMS performs an analysis to understand the cause of failure and communicates the outcome of the analysis to you. If the failure is attributable to AMS, AMS retries the updates if within the maintenance window, otherwise AMS creates service notifications for the failed instance-update combination and waits for your instructions on a maintenance window.

Not applicable.

For failures attributable to you, submit a service request for a new patch RFC to update the instances.

Not applicable.

Critical patching

These are AMS service commitments for critical security updates.

Critical security updates, mutable infrastructure
Event/Action Service commitment measurement

CSU is released.

Clock starts

AMS notifies you of the patch RFC through a service notification (which also sends an email) for each stack. The service notification includes:

  • Updates release date

  • Update criticality

  • Update details: KB reference, and so on

  • IDs of stacks affected

The clock stops after the service notification is sent.

You test the updates listed in the RFC, and approve or reject the RFC within 10 days by replying to the service notification.

You provide a specific maintenance window (per stack) for installing the updates. Maintenance windows specified that are within 24 hours of reply to the service notification may be rescheduled based on available capacity.

If you don't reply within 10 days, or if you reject the patch RFC, the pending action is canceled.

If you want to apply the updates after the 14-day period, submit a service request for a new patch RFC based on the details of the previous RFC.

If you don't approve or reply within 14 days, the pending change is canceled and the service commitment for the update is not applicable.

If you approve the service notification, AMS applies the updates.

For multiple updates, you can choose to exclude specific updates from the change by specifying the updates to be excluded in your response to the service notification.

If the desired maintenance window is not within the service commitment time frame, the service commitment for the update is missed only if the RFC is not run within the desired maintenance window.

AMS sends a service notification to you of the outcome of each update that was applied. The service notification includes the following details:

  • Amazon EC2 instance ID

  • Update Success: ARN a1, ARN a2...

  • Update Failed: ARN c1, ARN c2...

Not applicable.

In case of failed updates, AMS performs an analysis to understand the cause of failure and communicates the outcome of the analysis to you. If the failure is attributable to AMS, AMS retries the updates if within the maintenance window, otherwise AMS creates service notifications for the failed instance-update combination and waits for your instructions on a new maintenance window.

Not applicable.

For failures attributable to you, submit a service request for a new patch RFC to update the instances.

Not applicable.

Critical security updates, immutable infrastructure
Event/Action Service commitment measurement

CSU is released.

Clock starts

AMS notifies you of the following via a service notification:

  • Update release date

  • Update criticality

  • Update details (KB reference,and so on)

  • AMS Amazon Machine Images (AMI) impacted

  • Anticipated release date and time for new updated AMIs

Clock continues to run.

AMS releases updated AMIs in managed account.

Clock stops.

If you approve the service notification, AMS applies the updates.

AMS notifies you of the AMIs shared in your account, through a service notification and by email.

Not applicable.

If testing the new AMIs takes longer than the allotted time (one week), you can submit a service request to AMS to update your Auto Scaling groups with the new AMS AMI (as is). If you want to modify the new AMS AMI with your configurations, use an RFC with the Management | Other | Other | Update CT (ct-0xdawir96cy7k) to request that we update your Auto Scaling groups.

Not applicable.

In questa pagina

PrivacyCondizioni del sitoPreferenze cookie
© 2025, Amazon Web Services, Inc. o società affiliate. Tutti i diritti riservati.