Hello Pardeep,
After investigation here are some things to consider, along with possible next steps:
1.Policy Limitations: It may be that the policy behaves differently for OS disk images compared to standard or custom images. There could be intrinsic limitations concerning installations via images versus using OS disks.
2.Manual Installation: If the policy isn’t applying as expected to the OS disk-based VMs, you might consider installing the AMA manually via PowerShell or using the Azure CLI. This would bypass the policy application:
You can use the PowerShell command to install the agent:
Install-Module -Name Az -AllowClobber -Scope CurrentUser
Then proceed with the installation command for AMA.
3. Custom Script: If manual installation isn't feasible for all VMs, you might create a custom script that you can run on these VMs, ensuring they get the AMA installed without relying solely on the policy.
4.Using PowerShell for Compliance Check: You can check if the extensions are installed and their status by running:
Get-AzVM -ResourceGroupName <ResourceGroupName> -Name <VMName> -Status
5.Review Installation and Application Logs: Analyzing the installation logs might reveal any errors or warnings specifically related to the AMA installation process on these images. Ensure that DCRs are properly associated with the VMs as well.
6.Known Issues: Check for known issues documented by Microsoft about AMA installations on virtual machines, particularly concerning different image types.
Look into reference document:
Troubleshoot known issues with Azure Update Manager | Microsoft Learn
Please click Accept Answer if the answer was helpful.
Thanks,
Siva shunmugam.