On April 23, 2025, OS Management reaches end of life (EOL). Effective now, the service is no longer available to you in regions where you are not already using OS Management, or to new users with new tenancies. Before the EOL date, we recommend that you migrate your managed instances to the OS Management Hub service. For more information, see the Service Change Announcement.
Start using the OS Management service to manage your
instances. See What to Do Next.
Supported Environments 🔗
OS Management is included on the following Oracle Linux and Windows platform images. For more information about platform images, see Platform Images.
In addition, you can configure custom images for OS Management by installing the required Oracle Cloud Agent and enabling the OS Management Service Agent plugin. For more information on adding the Oracle Cloud Agent to custom images, see Managing Plugins with Oracle Cloud Agent.
Note
OS Management uses updates and content from the OS vendor. Ensure that you are using a supported OS release when using custom images.
Oracle Linux
Oracle Linux 9 and later.
Oracle Linux 8 and later.
Oracle Linux 7 and later.
Oracle Autonomous Linux, beginning with the August 2021 platform image. For more information, see Oracle Autonomous Linux.
Note
OS Management no longer supports Oracle Linux 6. Oracle Linux Extended Support for Oracle Linux 6 ended on December 31, 2024. See OS Lifecycle and Support.
Important
Beginning with the Oracle Linux platform images released in April 2024, the OS Management Service Agent plugin is disabled by default in Oracle Cloud Agent 1.40.0 for Oracle Linux instances.
Beginning with the Oracle Linux 8 platform images
released in October 2021, the OS Management Service Agent plugin is enabled by default in Oracle Cloud Agent 1.16.0 for Oracle Linux 8
instances.
For Oracle Linux 8 instances that were launched before October
2021 (running Oracle Cloud Agent 1.15.0 or
earlier), the OS Management Service Agent plugin is
disabled by default. The OS Management Service Agent
plugin for disabled Oracle Linux 8 instances remain disabled
after being updated to Oracle Cloud Agent
1.16.0.
For disabled Oracle 8 instances, you might see a discrepancy in
the status of the OS Management Service Agent plugin
after the update to Oracle Cloud Agent 1.16.0. For more
information, see Known Issues.
Beginning with Oracle Cloud Agent 1.15.0, the
OS Management service is supported on
Arm-based Ampere A1 Compute shapes.
Beginning with the Oracle Linux platform images
released in September 2020, the OS Management service uses the OS Management Service Agent plugin for all Oracle Linux
instances. The OS Management Service Agent plugin replaces the
OS Management Service Agent
(osms-agent) package. For more information
about the OS Management Service Agent plugin, see OS Management Components and Features.
Windows
Windows Server 2012 R2 Standard, Datacenter
Windows Server 2016 Standard, Datacenter
Windows Server 2019 Standard, Datacenter
Windows Server 2022 Standard, Datacenter
OS Lifecycle and Support 🔗
When an OS reaches the end of its support lifecycle, the OS vendor no longer provides security updates for the OS. Upgrade to the latest version to remain secure. Here's what to expect when an OS version reaches the end of its support lifecycle:
OS Management no longer provides updates to agents or plugins needed by the service.
OS Management considers the OS version as unsupported.
For more information on OS vendor lifecycles, see:
Security Lists (Windows instances only): Define your security lists or network rules
to allow access to the Windows update server. For more information, see Windows OS Updates for Windows
Images.
Service gateways or public IP addresses (Linux instances only): Attach your
instance to a virtual cloud network (VCN) that has one of the following:
A private subnet with a service gateway that uses the All
<region> Services in Oracle Services Network
CIDR label.
Oracle Cloud Agent: Ensure that the Oracle Cloud Agent software is installed and
running on the instance. By default, the Oracle Cloud Agent is installed on current
Oracle-provided images. For steps to manually install Oracle Cloud Agent on older
images, see Installing the Oracle Cloud Agent
Software.
OS Management Service Agent plugin: Ensure that the OS Management Service Agent plugin is
enabled and running on the instance. By default, the OS Management Service Agent plugin
is enabled and running on current Oracle-provided images.
Setting Up IAM Policies for OS Management 🔗
This topic explains how to set up the required policies for using the OS Management service.
Note
You must have the required privileges to create the policy. If you do not have
required privileges, work with the administrator for your tenancy to either
obtain the privileges to create the policies or to have the policies created for
you.
Before you create the required IAM policies for OS Management, you first need to create
a dynamic group. A dynamic group can include instances based on instance OCID or include
instances that reside in a compartment based on compartment OCID. For more information
about dynamic groups, see Managing Dynamic Groups.
When you create a dynamic group, you define the group members in matching rule statements
using the rule builder.
Important
A single instance can belong to a maximum of five dynamic groups. A
good practice is to reuse the same dynamic group wherever possible across services
instead of creating one or more dynamic groups for each service.
When defining matching rules, you set conditions for the matching rule statements:
All of the following (All) includes only instances that
match all the statements in the rule.
Any of the following (Any) includes instances that match
any of the statements in the rule.
Follow these guidelines when creating matching rule statements:
You can add one or more rules to define the instances to be permitted in the
policy.
All statements require that all matching rule statements be
true. This condition can cause problems when you add multiple compartments or
instances to the group under a single rule or multiple rules. When using
All, each rule condition must be met (true); otherwise the
request is denied.
Dynamic groups do not support compartment inheritance. Be sure to specify the
compartment OCIDs of the compartments where the instances reside.
Tip
The OCID for an instance is displayed on the Instance Details page
while the OCID for the compartment is displayed on the Compartments page or by
using the oci metadata utility.
After creating the dynamic group, you can create your IAM policy to permit instances to make API
calls against the OS Management service.
Required User Group 🔗
Before you create the required IAM policies for OS Management, you need to create a user group for users. This user group is used in a policy to allow users to interact with the OS Management service. For more information about user groups, see Managing Groups.
Example: Dynamic Group 🔗
Provides a dynamic group example to help you understand the use of Any
and All conditions in a matching rule statement.
Understanding Any and All Conditions
Policy Rule: When using All, for the policy to be true, instances must
match all rule statements.
All {instance.id = 'ocid1.instance1.oc1.iad..exampleuniqueid1', instance.compartment.id ='ocid1.compartmentA.oc1..exampleuniqueid2'}
In this example, instance1 (ocid1.instance1.oc1.iad..exampleuniqueid1)
must reside in compartmentA (ocid1.compartmentA.oc1..exampleuniqueid2) for
the policy to be true. If instance1 is not in compartmentA, the matching statement is
false and the service fails.
Using the same example, by changing All to Any, either an
instance that matches the OCID for instance1 or an instance in compartmentA would be
true.
Any {instance.id = 'ocid1.instance1.oc1.iad..exampleuniqueid1', instance.compartment.id ='ocid1.compartmentA.oc1..exampleuniqueid2'}
Required IAM Policies 🔗
For an instance to be registered with the OS Management
service, you must create policies that allow instances to use OS Management.
Before you create the IAM policies, you first need to create a dynamic group.
Note
The policy statement uses the default identity domain unless you define the identity domain before the group or dynamic group name (for example, <identity_domain_name>/<dynamic_group_name>). For more information, see Policy Syntax.
Required IAM Policies
You can set the required IAM policies for OS Management either at the tenancy or compartment level.
To apply the required IAM policies for OS Management to the tenacy, use the following policy.
Copy
Allow group <group_name> to manage osms-family in tenancy
Allow dynamic-group <dynamic_group_name> to read instance-family in tenancy
Allow dynamic-group <dynamic_group_name> to use osms-managed-instances in tenancy
If the tenancy administrator doesn't permit setting IAM policies at the tenancy level, you can restrict the management of OS Management resources to a compartment. To apply the IAM policy for OS Management only to a compartment inside the tenancy, use the following policies.
Copy
Allow group <group_name> to manage osms-family in compartment <compartment_name>
Allow dynamic-group <dynamic_group_name> to read instance-family in compartment <compartment_name>
Allow dynamic-group <dynamic_group_name> to use osms-managed-instances in compartment <compartment_name>
Required IAM Policy for Metrics
To allow the OS Management service to emit metrics, use the following policy.
Important
This policy must be specified at the tenancy
level.
Copy
Allow service osms to read instances in tenancy
After setting the policies, you must restart the Oracle Cloud Agent.
To restart the Oracle Cloud Agent on Oracle Linux instances:
Follow the steps to create an instance, until the advanced
options. Ensure that the instance has either a public IP address or a service
gateway, as described in the prerequisites.
Enable the OS Management Service Agent plugin.
Click Show Advanced Options.
On the Oracle Cloud Agent tab, select the OS Management Service Agent check box.
Note
If you're using an older Oracle-provided image or a custom image that is not based on a recent Oracle-provided image, you must manually install the Oracle Cloud Agent software. You can do this by providing a cloud-init script. For more information, see Installing the Oracle Cloud Agent Software. Compare the date of the image to the date listed in Supported Images.
When registering with the OS Management service, Oracle Linux instances subscribe to the default channel list and all other
channel subscriptions are disabled. If you need to reenable any of these
channels, you can do so using the Console, CLI, or REST APIs. For more
information, see Managing Software Sources.
If you're using an older Oracle-provided image or a custom image that is not
based on a recent Oracle-provided image, you must manually install the Oracle
Cloud Agent software. You can do this by providing a cloud-init script. For more
information, see Installing the Oracle Cloud Agent
Software. Compare the date of the image to the date listed in Supported Images.
Ensure that the instance has either a public IP address or a service gateway,
as described in the prerequisites.
Use the LaunchInstance operation. Include the
following parameters:
When registering with the OS Management service, Oracle Linux instances subscribe to the default channel list and all other
channel subscriptions are disabled. If you need to reenable any of these channels,
you can do so using the Console, CLI, or REST APIs. For more information, see Managing Software Sources.
Enabling the OS Management Service Agent Plugin for an Existing Compute Instance 🔗
When registering with the OS Management service, Oracle Linux instances subscribe to the default channel list and all other
channel subscriptions are disabled. If you need to reenable any of these channels,
you can do so using the Console, CLI, or REST APIs.
When registering with the OS Management service, Oracle Linux instances subscribe to the default channel list and all other
channel subscriptions are disabled. If you need to reenable any of these channels,
you can do so using the Console, CLI, or REST APIs.
Disabling the OS Management Service Agent Plugin 🔗
For <region>, specify the region identifier (for
example, us-phoenix-1). See Regions and Availability Domains
for more information about region identifiers.
For example, the following sample output indicates that the instance can
successfully reach the OS Management ingestion service.
Note
The 403 Forbidden status code message is expected in the output.
If the OS Management Service Agent plugin is not installed or has been
stopped, no output is displayed for this command.
After the OS Management Service Agent plugin is running, you have completed the getting
started tasks for setting up the managed instance. You can now use the OS Management service to manage the instance. Proceed to What to Do Next.
To verify the status of the Oracle Cloud Agent using
Windows PowerShell:
Open Windows PowerShell.
Run the Get-Service OCAOSMS command and verify that the status
is running.
For example:
PS C:\Users\opc> Get-Service OCAOSMS
Status Name DisplayName
------ ---- -----------
Running OCAOSMS Oracle Cloud Operating System Manag...
To verify the status of the Oracle Cloud Agent using
Computer Management:
Go to Computer Management.
Tip
In the Search
column, you can get to Computer Management by searching
on the keywords: Computer Management or
compmgmt.msc.
Click Services and Applications and then Services.
Verify that the Oracle Cloud Agent service is running.
After the OS Management Service Agent plugin is running, you have completed the getting
started tasks for setting up the managed instance. You can now use the OS Management service to manage the instance.
What to Do Next 🔗
After setting up managed instances, you can start using the OS Management service to keep those instances up to date with the
latest patches and updates.
Common tasks that you perform after creating managed instances include: