aws_ssm_patch_baseline

Provides an SSM Patch Baseline resource

Example Usage

Basic usage using approved_patches only

resource "aws_ssm_patch_baseline" "production" {
  name  = "patch-baseline"
  approved_patches = ["KB123456"]
}

Advanced usage, specifying patch filters

resource "aws_ssm_patch_baseline" "production" {
  name  = "patch-baseline"
  description = "Patch Baseline Description"
  approved_patches = ["KB123456", "KB456789"]
  rejected_patches = ["KB987654"]
  global_filter {
    key = "PRODUCT"
    values = ["WindowsServer2008"]
  }
  global_filter {
    key = "CLASSIFICATION"
    values = ["ServicePacks"]
  }
  global_filter {
    key = "MSRC_SEVERITY"
    values = ["Low"]
  }
  approval_rule {
    approve_after_days = 7
    compliance_level = "HIGH"
    patch_filter {
      key = "PRODUCT"
      values = ["WindowsServer2016"]
    }
    patch_filter {
      key = "CLASSIFICATION"
      values = ["CriticalUpdates", "SecurityUpdates", "Updates"]
    }
    patch_filter {
      key = "MSRC_SEVERITY"
      values = ["Critical", "Important", "Moderate"]
    }
  }
  approval_rule {
    approve_after_days = 7
    patch_filter {
      key = "PRODUCT"
      values = ["WindowsServer2012"]
    }
  }
}

Argument Reference

The following arguments are supported:

  • name - (Required) The name of the patch baseline.
  • description - (Optional) The description of the patch baseline.
  • operating_system - (Optional) Defines the operating system the patch baseline applies to. Supported operating systems include WINDOWS, AMAZON_LINUX, UBUNTU, CENTOS, and REDHAT_ENTERPRISE_LINUX. The Default value is WINDOWS.
  • approved_patches_compliance_level - (Optional) Defines the compliance level for approved patches. This means that if an approved patch is reported as missing, this is the severity of the compliance violation. Valid compliance levels include the following: CRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL, UNSPECIFIED. The default value is UNSPECIFIED.
  • approved_patches - (Optional) A list of explicitly approved patches for the baseline.
  • rejected_patches - (Optional) A list of rejected patches.
  • global_filter - (Optional) A set of global filters used to exclude patches from the baseline. Up to 4 global filters can be specified using Key/Value pairs. Valid Keys are PRODUCT | CLASSIFICATION | MSRC_SEVERITY | PATCH_ID.
  • approval_rule - (Optional) A set of rules used to include patches in the baseline. up to 10 approval rules can be specified. Each approval_rule block requires the fields documented below.

The approval_rule block supports:

  • approve_after_days - (Required) The number of days after the release date of each patch matched by the rule the patch is marked as approved in the patch baseline. Valid Range: 0 to 100.
  • patch_filter - (Required) The patch filter group that defines the criteria for the rule. Up to 4 patch filters can be specified per approval rule using Key/Value pairs. Valid Keys are PRODUCT | CLASSIFICATION | MSRC_SEVERITY | PATCH_ID.
  • compliance_level - (Optional) Defines the compliance level for patches approved by this rule. Valid compliance levels include the following: CRITICAL, HIGH, MEDIUM, LOW, INFORMATIONAL, UNSPECIFIED. The default value is UNSPECIFIED.
  • enable_non_security - (Optional) Boolean enabling the application of non-security updates. The default value is 'false'. Valid for Linux instances only.

Attributes Reference

In addition to all arguments above, the following attributes are exported:

  • id - The ID of the patch baseline.

© 2018 HashiCorp
Licensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/aws/r/ssm_patch_baseline.html