Update Patch Baseline
ssm_update_patch_baseline | R Documentation |
Modifies an existing patch baseline¶
Description¶
Modifies an existing patch baseline. Fields not specified in the request are left unchanged.
For information about valid key-value pairs in PatchFilters
for each
supported operating system type, see PatchFilter.
Usage¶
ssm_update_patch_baseline(BaselineId, Name, GlobalFilters,
ApprovalRules, ApprovedPatches, ApprovedPatchesComplianceLevel,
ApprovedPatchesEnableNonSecurity, RejectedPatches,
RejectedPatchesAction, Description, Sources, Replace)
Arguments¶
BaselineId |
[required] The ID of the patch baseline to update. |
Name |
The name of the patch baseline. |
GlobalFilters |
A set of global filters used to include patches in the baseline. The |
ApprovalRules |
A set of rules used to include patches in the baseline. |
ApprovedPatches |
A list of explicitly approved patches for the baseline. For information about accepted formats for lists of approved patches and rejected patches, see Package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide. |
ApprovedPatchesComplianceLevel |
Assigns a new compliance severity level to an existing patch baseline. |
ApprovedPatchesEnableNonSecurity |
Indicates whether the list of approved patches includes
non-security updates that should be applied to the managed nodes. The
default value is |
RejectedPatches |
A list of explicitly rejected patches for the baseline. For information about accepted formats for lists of approved patches and rejected patches, see Package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide. |
RejectedPatchesAction |
The action for Patch Manager to take on patches included in the
ALLOW_AS_DEPENDENCY Linux and macOS: A package in the rejected patches
list is installed only if it is a dependency of another package. It is
considered compliant with the patch baseline, and its status is reported
as Windows Server: Windows Server doesn't support the
concept of package dependencies. If a package in the rejected patches
list and already installed on the node, its status is reported as
BLOCK All OSs: Packages in the rejected patches list, and
packages that include them as dependencies, aren't installed by Patch
Manager under any circumstances. If a package was installed before it
was added to the rejected patches list, or is installed outside of Patch
Manager afterward, it's considered noncompliant with the patch baseline
and its status is reported as |
Description |
A description of the patch baseline. |
Sources |
Information about the patches to use to update the managed nodes, including target operating systems and source repositories. Applies to Linux managed nodes only. |
Replace |
If True, then all fields that are required by the
|
Value¶
A list with the following syntax:
list(
BaselineId = "string",
Name = "string",
OperatingSystem = "WINDOWS"|"AMAZON_LINUX"|"AMAZON_LINUX_2"|"AMAZON_LINUX_2022"|"UBUNTU"|"REDHAT_ENTERPRISE_LINUX"|"SUSE"|"CENTOS"|"ORACLE_LINUX"|"DEBIAN"|"MACOS"|"RASPBIAN"|"ROCKY_LINUX"|"ALMA_LINUX"|"AMAZON_LINUX_2023",
GlobalFilters = list(
PatchFilters = list(
list(
Key = "ARCH"|"ADVISORY_ID"|"BUGZILLA_ID"|"PATCH_SET"|"PRODUCT"|"PRODUCT_FAMILY"|"CLASSIFICATION"|"CVE_ID"|"EPOCH"|"MSRC_SEVERITY"|"NAME"|"PATCH_ID"|"SECTION"|"PRIORITY"|"REPOSITORY"|"RELEASE"|"SEVERITY"|"SECURITY"|"VERSION",
Values = list(
"string"
)
)
)
),
ApprovalRules = list(
PatchRules = list(
list(
PatchFilterGroup = list(
PatchFilters = list(
list(
Key = "ARCH"|"ADVISORY_ID"|"BUGZILLA_ID"|"PATCH_SET"|"PRODUCT"|"PRODUCT_FAMILY"|"CLASSIFICATION"|"CVE_ID"|"EPOCH"|"MSRC_SEVERITY"|"NAME"|"PATCH_ID"|"SECTION"|"PRIORITY"|"REPOSITORY"|"RELEASE"|"SEVERITY"|"SECURITY"|"VERSION",
Values = list(
"string"
)
)
)
),
ComplianceLevel = "CRITICAL"|"HIGH"|"MEDIUM"|"LOW"|"INFORMATIONAL"|"UNSPECIFIED",
ApproveAfterDays = 123,
ApproveUntilDate = "string",
EnableNonSecurity = TRUE|FALSE
)
)
),
ApprovedPatches = list(
"string"
),
ApprovedPatchesComplianceLevel = "CRITICAL"|"HIGH"|"MEDIUM"|"LOW"|"INFORMATIONAL"|"UNSPECIFIED",
ApprovedPatchesEnableNonSecurity = TRUE|FALSE,
RejectedPatches = list(
"string"
),
RejectedPatchesAction = "ALLOW_AS_DEPENDENCY"|"BLOCK",
CreatedDate = as.POSIXct(
"2015-01-01"
),
ModifiedDate = as.POSIXct(
"2015-01-01"
),
Description = "string",
Sources = list(
list(
Name = "string",
Products = list(
"string"
),
Configuration = "string"
)
)
)
Request syntax¶
svc$update_patch_baseline(
BaselineId = "string",
Name = "string",
GlobalFilters = list(
PatchFilters = list(
list(
Key = "ARCH"|"ADVISORY_ID"|"BUGZILLA_ID"|"PATCH_SET"|"PRODUCT"|"PRODUCT_FAMILY"|"CLASSIFICATION"|"CVE_ID"|"EPOCH"|"MSRC_SEVERITY"|"NAME"|"PATCH_ID"|"SECTION"|"PRIORITY"|"REPOSITORY"|"RELEASE"|"SEVERITY"|"SECURITY"|"VERSION",
Values = list(
"string"
)
)
)
),
ApprovalRules = list(
PatchRules = list(
list(
PatchFilterGroup = list(
PatchFilters = list(
list(
Key = "ARCH"|"ADVISORY_ID"|"BUGZILLA_ID"|"PATCH_SET"|"PRODUCT"|"PRODUCT_FAMILY"|"CLASSIFICATION"|"CVE_ID"|"EPOCH"|"MSRC_SEVERITY"|"NAME"|"PATCH_ID"|"SECTION"|"PRIORITY"|"REPOSITORY"|"RELEASE"|"SEVERITY"|"SECURITY"|"VERSION",
Values = list(
"string"
)
)
)
),
ComplianceLevel = "CRITICAL"|"HIGH"|"MEDIUM"|"LOW"|"INFORMATIONAL"|"UNSPECIFIED",
ApproveAfterDays = 123,
ApproveUntilDate = "string",
EnableNonSecurity = TRUE|FALSE
)
)
),
ApprovedPatches = list(
"string"
),
ApprovedPatchesComplianceLevel = "CRITICAL"|"HIGH"|"MEDIUM"|"LOW"|"INFORMATIONAL"|"UNSPECIFIED",
ApprovedPatchesEnableNonSecurity = TRUE|FALSE,
RejectedPatches = list(
"string"
),
RejectedPatchesAction = "ALLOW_AS_DEPENDENCY"|"BLOCK",
Description = "string",
Sources = list(
list(
Name = "string",
Products = list(
"string"
),
Configuration = "string"
)
),
Replace = TRUE|FALSE
)