This document includes guidelines what to do to upgrade to a new major version. If not mentioned otherwise, upgrade guides refer to the previous version.
To upgrade to this version you need to add the template_file_variables
notScopesForQbyNetworkSecurity
. To avoid any impact set it to notScopesForQbyNetworkSecurity = ["/providers/Microsoft.Management/managementGroups/<root_id>"]
This version moves away from the Microsoft Monitoring Agent to the Azure Monitoring Agent. Therefore you need to check everything related to Monitoring eg.:
- Names of used tables
- Collected Metrics & Logs using new DCRs
To upgrade the Module itself you need to add linuxDCRs
& windowsDCRs
to template_file_variables
of the CAF module call. It should include the DCRs to assign to VMs. If you don't need that, just set it to []
.
Furthermore you can remove the configuration of the assignments for Deploy-VMSS-Monitoring
and Deploy-VM-Monitoring
from the CAF module call, because these are not longer used.
To upgrade to the new Tagging governance policy initiative, remote the tags
property of template_file_variables
and add a map of bools as inherited_required_tags
, where the key is the tag name and the value is wether this tag is required (true
) or only inherited (false
).
The archetype qby_msp
includes everything needed to update WIndows VMs thanks to the policy initiative QBY-Deploy-Update-Mgmt
. Therefore any other Update configuration should be deleted, when using this new version (eg. module qbeyond/update-management/azurerm
).
The Update Management Initiative requires to set at least the managementSubscriptionId
of the assignment. For any management group using the archetype qby_msp
add it like this:
"msp" = {
// ...
archetype_config = {
archetype_id = "qby_msp"
parameters = {
QBY-Deploy-Update-Mgmt = {
managementSubscriptionId = "1234-12321432-12312432-123234"
}
}
}
}
The Initiative denys Vms & Arc machines without Update Allowed=yes
tag on default. To reduce the impact of the policy, the effect of this policy can be set to Audit
.