General Availability: Predictive VMSS Autoscaling

General Availability: Predictive VMSS Autoscaling

This article is contributed. See the original author and article here.

Azure autoscale automatically increase or decrease the number of VM instances for an Azure virtual machine scale set (VMSS) that run your application. This automated and elastic behavior reduces the management overhead to monitor and optimize the performance of your application. You create rules that define the acceptable performance for a positive customer experience. When those defined thresholds are met, autoscale rules take action to adjust the capacity of your scale set. You can also schedule events to automatically increase or decrease the capacity of your scale set at fixed times.


 


Now you can use machine learning to help manage and scale out your Virtual Machine Scale Sets with Predictive autoscale. The capacity needs of your Virtual Machine Scale Sets are forecasted based on the historical CPU patterns. When enabled, the predicted overall CPU load is observed and scale-out occurs in advance and in time to meet the demand.


Predictive autoscale complements loads that have cyclical workload patterns and are especially advantageous when Virtual Machines have long provisioning times. Having the scale out occur before the workload demand covers peak load while lowering the costs.


Predictive autoscale is available for Virtual Machine Scale Sets and support scale out only for Percentage CPU metrics only. Users will have to continue to create standard autoscale settings when creating scale ins for Virtual Machine Scale Sets.


Predictive autoscale can be configured via Azure Portal, CLI and PowerShell.


To get started with predictive autoscale from Azure Portal navigate to their Virtual Machine Scale Set scaling blade and then to Predictive autoscale section


Shilpa_Sharma_0-1665680971042.png


Using the Predictive Autoscale dropdown selection, you can:



  • Enable forecast only mode

  • Enable predictive autoscale

  • Disable predictive autoscale. This is the default setting when you first land on the page for predictive autoscale.


Shilpa_Sharma_1-1665680971052.png


 


Once you’ve made your predictive autoscale selection (i.e. enable forecast only or predictive autoscale) and optionally configure how far in advance you want to scale out click on Save and then the process starts.


A new tab is now available in the scaling tab: Predictive Charts which provides you an in depth overview of the forecasted CPU as well as any autoscaling that occurs if predictive autoscale is enabled.


Please note that Predictive autoscale requires a minimum of 7 days of history to provide predictions. The most accurate results come from 15 days of historical data.


 


Shilpa_Sharma_2-1665680971069.png


 


Shilpa_Sharma_3-1665680971085.png



  • The top chart shows an overlaid comparison of actual versus predicted total CPU percentage. The time span of the graph shown is from the last 24 hours to the next 24 hours.

  • The middle chart shows the number of instances running at specific times over the last 24 hours.

  • The bottom chart shows the current Average CPU utilization over the last 24 hours


 In addition to this you have an option to enable/ disable forecast only or predictive autoscale as well as the ability to view the charts with time grain ranging from 12 hours to 7 days.


Shilpa_Sharma_4-1665680971090.png


 


You can head over to Run History to review when scale outs occur due to predictive autoscale.


Shilpa_Sharma_5-1665680971102.png


 


The forecast model observes the different capacity needs during the day and manages the overall load on an as needed basis. You will need to create a standard autoscale while creating predictive autoscale as it provides a fall back in case of say, missing forecast data. Predictive autoscale can work with other autoscale conditions, autoscale will always observe the request for highest number of resources to address any workload requirements.


Predictive autoscale is generally available in all public regions as of today, Oct 12, 2022. For more information you can refer to the documentation or email: predautoscalesupport@microsoft.com

Federal Business Applications Webinar – Oct 19th

Federal Business Applications Webinar – Oct 19th

This article is contributed. See the original author and article here.

Join us Oct 19thJoin us Oct 19th


 


Please join us for our next Federal Business Applications Webinar on October 19th where the Microsoft team will be joined by partner NetImpact Strategies.


 


NetImpact Strategies will showcase two Microsoft Store approved software solutions built on top of the Power Platform.


 


First, DX360 Security ARMOR intelligent automation for Cyber compliance and continuous monitoring including RMF ATO and FedRAMP authorizations and defensive cyber operations.


 


Second, Public Sector Case Management (PSCM) suite that provides fully configurable life cycle case management processes for various case types including Investigative, FOIA, Benefits and Grants. PSCM also provides secure public portal to enable citizen (G2C) and business (G2B) interfaces for delivery of case management services.


 


Agenda:


 



  • Product & Community Updates

  • NetImpact Strategies Demonstration

  • Question and Answer Session


 


To register for this event, please go to the signup link below,


 


https://aka.ms/FedBizAppsWebinar


 


All of our past webinar events and recordings can be found in the link below,


 


https://github.com/microsoft/Federal-Business-Applications/blob/main/whitepapers/webinar-series/README.md

Adobe Releases Security Updates for Multiple Products

This article is contributed. See the original author and article here.

Adobe has released security updates to address multiple vulnerabilities in Adobe software. An attacker can exploit some of these vulnerabilities to take control of an affected system.

CISA encourages users and administrators to review Adobe Security Bulletins and apply the necessary updates.
•    Adobe Cold Fusion APSB22-44 
•    Adobe Acrobat and Reader APSB22-46
•    Adobe Commerce and Magneto Open Source APSB22-48
•    Adobe Dimension APSB22-57

Microsoft Releases October 2022 Security Updates

Microsoft Releases October 2022 Security Updates

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Released: October 2022 Exchange Server Security Updates

Released: October 2022 Exchange Server Security Updates

This article is contributed. See the original author and article here.

Microsoft has released Security Updates (SUs) for vulnerabilities found in:



  • Exchange Server 2013

  • Exchange Server 2016

  • Exchange Server 2019


SUs are available in a self-extracting auto-elevating .exe package, as well as the original update packages (.msp files), which can be downloaded from the Microsoft Update Catalog.


The October 2022 SUs are available for the following specific versions of Exchange Server:



The SUs address vulnerabilities responsibly reported to Microsoft by security partners and found through Microsoft’s internal processes. Our recommendation is to immediately install these updates to protect your environment.


These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed in these SUs and do not need to take any action other than updating any Exchange servers in their environment.


NOTE   The October 2022 SUs do not contain fixes for the zero-day vulnerabilities reported publicly on September 29, 2022 (CVE-2022-41040 and CVE-2022-41082). Please see this blog post to apply mitigations for those vulnerabilities. We will release updates for CVE-2022-41040 and CVE-2022-41082 when they are ready.


Also note that we have re-released some CVEs published in August 2022, to highlight the resolution of known issue. More details about specific CVEs can be found in the Security Update Guide (filter on Exchange Server under Product Family).


Enable Windows Extended Protection


Starting with the August 2022 SUs, Exchange Server supports the Windows Extended Protection (EP) feature, which can help you protect your environments from authentication relay or “man in the middle” (MitM) attacks. If you have not yet enabled EP in your environment, please install the October SUs which address a known issue in Exchange EP support (see below). Then, review the information in the Manual Enablement of Extended Protection section of our August announcement for more details.


Customers who have already installed the August 2022 SUs and have enabled EP do not need to re-run the EP script after installing the October SUs.


Update installation


The following update paths are available:


Oct2022SUPath.png



Known issues with this release


We are not aware of any known issues with this release.


Issues resolved by this release



  • In Exchange 2013, Exchange 2016, and Exchange 2019 various Outlook and compliance-related monitoring probes show as Failed once EP is enabled.


FAQs


My organization is in Hybrid mode with Exchange Online. Do I need to do anything?
Exchange Online is already protected, but the October 2022 SUs need to be installed on your Exchange servers, even if they are used only for management purposes. You do not need to re-run the Hybrid Configuration Wizard after installing these updates.


Do I need to install the updates on ‘Exchange Management Tools only’ workstations?
Servers and workstations running only the Management tools role (no Exchange services) do not need these updates.


This post might receive future updates; they will be listed here (if available).


The Exchange Server Team