Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Advancing no-impact and low-impact maintenance technologies

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Advancing no-impact and low-impact maintenance technologies


๐Ÿ’ก Newskategorie: Programmierung
๐Ÿ”— Quelle: azure.microsoft.com

โ€œThis post continues our reliability series kicked off by my July blog post highlighting several initiatives underway to keep improving platform availability, as part of our commitment to provide a trusted set of cloud services. Today I wanted to double-click on the investments weโ€™ve made in no-impact and low-impact update technologies including hot patching, memory-preserving maintenance, and live migration. Weโ€™ve deployed dozens of security and reliability patches to host infrastructure in the past year, many of which were implemented with no customer impact or downtime. The post that follows was written by John Slack from our core operating systems team, who is the Program Manager for several of the update technologies discussed below.โ€ - Mark Russinovich, CTO, Azure


This post was co-authored by Apurva Thanky, Cristina del Amo Casado, and Shantanu Srivastava from the engineering teams responsible for these technologies.

ย 

We regularly update Azure host infrastructure to improve the reliability, performance, and security of the platform. While the purposes of these โ€˜maintenanceโ€™ updates vary, they typically involve updating software components in the hosting environment or decommissioning hardware. If we go back five years, the only way to apply some of these updates was by fully rebooting the entire host. This approach took customer virtual machines (VMs) down for minutes at a time. Since then, we have invested in a variety of technologies to minimize customer impact when updating the fleet. Today, the vast majority of updates to the host operating system are deployed in place with absolute transparency and zero customer impact using hot patching. In infrequent cases in which the update cannot be hot patched, we typically utilize low-impact memory preserving update technologies to roll out the update.

Even with these technologies, there are still other rare cases in which we need to do more impactful maintenance (including evacuating faulty hardware or decommissioning old hardware). In such cases, we use a combination of live migration, in-VM notifications, and planned maintenance providing customer controls.

Thanks to continued investments in this space, we are at a point where the vast majority of host maintenance activities do not impact the VMs hosted on the affected infrastructure. Weโ€™re writing this post to be transparent about the different techniques that we use to ensure that Azure updates are minimally impactful.

Plan A: Hot patching

Function-level โ€œhotโ€ patching provides the ability to make targeted changes to running code without incurring any downtime for customer VMs. It does this by redirecting all new invocations of a function on the host to an updated version of that function, so it is considered a โ€˜no impactโ€™ update technology. Wherever possible we use hot patching to apply host updates completely avoiding any impact to the VMs running on that host. We have been using hot patching in Azure since 2017. Since then, we have worked to broaden the scope of what we can hot patch. As an example, we updated the host operating system to allow the hypervisor to be hot patched in 2018. Looking forward, we are exploring firmware hot patches. This is a place where the industry typically hasn't focused. Firmware has always been viewed as โ€˜if you need to update it, reboot the server,โ€™ but we know that makes for a terrible customer experience. We've been working with hardware manufacturers to consider our own firmware to make them hot patchable and incrementally updatable.

Some large host updates contain changes that cannot be applied using function-level hot patching. For those updates, we endeavor to use memory-preserving maintenance.

Plan B: Memory-preserving maintenance

Memory-preserving maintenance involves โ€˜pausingโ€™ the guest VMs (while preserving their memory in RAM), updating the host server, then resuming the VMs and automatically synchronizing their clocks. We first used memory-preserving maintenance for Azure in 2018. Since then we have improved the technology in three important ways. First, we have developed less impactful variants of memory-preserving maintenance targeted for host components that can be serviced without a host reboot. Second, we have reduced the duration of the customer experienced pause. Third, we have expanded the number of VM types that can be updated with memory preserving maintenance. While we continue to work in this space, some variants of memory-preserving maintenance are still incompatible with some specialized VM offerings like M, N, or H series VMs for a variety of technical reasons.

In the rare case we need to make more impactful maintenance (including host reboots, VM redeployment), customers are notified in advance and given the opportunity to perform the maintenance at a time suitable for their workload(s).

Plan C: Self-service maintenance

Self-service maintenance involves providing customers and partners a window of time, within which they can choose when to initiate impactful maintenance on their VM(s). This initial self-service phase typically lasts around a month and empowers organizations to perform the maintenance on their own schedules so it has no or minimal disruption to users. At the end of this self-service window, a scheduled maintenance phase beginsโ€”this is where Azure will perform the maintenance automatically. Throughout both phases, customers get full visibility of which VMs have or have not been updatedโ€”in Azure Service Health or by querying in PowerShell/CLI. Azure first offered self-service maintenance in 2018. We generally see that administrators take advantage of the self-service phase rather than wait for Azure to perform maintenance on their VMs automatically.

In addition to this, when the customer owns the full host machine, either using Azure Dedicated Hosts or Isolated virtual machines, we recently started to offer maintenance control over all non-zero impact platform updates. This includes rebootless updates which only cause a few seconds pause. It is useful for VMs running ultra-sensitive workloads which canโ€™t sustain any interruption even if it lasts just for a few seconds. Customers can choose when to apply these non-zero impact updates in a 35-day rolling window. This feature is in public preview, and more information can be found in this dedicated blog post.

Sometimes in-place update technologies arenโ€™t viable, like when a host shows signs of hardware degradation. In such cases, the best option is to initiate a move of the VM to another host, either through customer control via planned maintenance or through live migration.

Plan D: Live migration

Live migration involves moving a running customer VM from one โ€œsourceโ€ host to another โ€œdestinationโ€ host. Live migration starts by moving the VMโ€™s local state (including RAM and local storage) from the source to the destination while the virtual machine is still running. Once most of the local state is moved, the guest VM experiences a short pause usually lasting five seconds or less. After that pause, the VM resumes running on the destination host. Azure first started using live migration for maintenance in 2018. Today, when Azure Machine Learning algorithms predict an impending hardware failure, live migration can be used to move guest VMs onto different hosts preemptively.

Amongst other topics, planned maintenance and AI Operations were covered in Igal Figlinโ€™s recent Ignite 2019 session โ€œBuilding resilient applications in Azure.โ€ Watch the recording here for additional context on these, and to learn more about how to take advantage of the various resilient services Azure provides to help you build applications that are inherently resilient.

The future of Azure maintenanceย 

In summary, the way in which Azure performs maintenance varies significantly depending on the type of updates being applied. Regardless of the specifics, Azure always approaches maintenance with a view towards ensuring the smallest possible impact to customer workloads. This post has outlined several of the technologies that we use to achieve this, and we are working diligently to continue improving the customer experience. As we look toward the future, we are investing heavily in machine learning-based insights and automation to maintain availability and reliability. Eventually, this โ€œAI Operationsโ€ model will carry out preventative maintenance, initiate automated mitigations, and identify contributing factors and dependencies during incidents more effectively than our human engineers can. We look forward to sharing more on these topics as we continue to learn and evolve.

...



๐Ÿ“Œ Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ Minimal Coming Soon & Maintenance Mode < 2.15 - Insecure Permissions: Enable and Disable Maintenance Mode


๐Ÿ“ˆ 29.62 Punkte

๐Ÿ“Œ Advancing Vision-Language Models: A Survey by Huawei Technologies Researchers in Overcoming Hallucination Challenges


๐Ÿ“ˆ 29.05 Punkte

๐Ÿ“Œ Maintenance 2.9.7 - System maintenance utility.


๐Ÿ“ˆ 27.83 Punkte

๐Ÿ“Œ Top 10 High-income Technologies for Operation and Maintenance Practitioners in the Future


๐Ÿ“ˆ 26.8 Punkte

๐Ÿ“Œ Haven Cyber Technologies and Cassava Technologies launch a matrix of Cyber Security ... - Ariva


๐Ÿ“ˆ 23.98 Punkte

๐Ÿ“Œ Advancing Rights and Justice During a Pandemic: An Online Event Series


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ SolarWinds: Accountability, Attribution, and Advancing the Ball


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Top500: The Supercomputers Advancing Cyber Security, Renewable Energy, and Black Hole Research


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Meet LF Sustainability: How our hosted projects are enabling sustainable development and advancing United Nations goals


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing discovery of better drugs and medicine


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ 2023-24 Takeda Fellows: Advancing research at the intersection of AI and health


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Jas Tremblay, Broadcom VP and GM, Data Center Solution Group #AMD #AI


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing youth online safety and wellness


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Harmonizing Vision and Language: Advancing Consistency in Unified Models with CocoCon


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Jas Tremblay, Broadcom VP and GM, Data Center Solution Group #AMD #AI


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Lamini Co-founder and CEO Sharon Zhou #AMD #AI


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Lamini Co-founder and CEO Sharon Zhou #AMD #AI


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Lamini Co-founder and CTO Gregory Diamos


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ Advancing AI: Lamini Co-founder and CTO Gregory Diamos


๐Ÿ“ˆ 19.74 Punkte

๐Ÿ“Œ NAXSI - An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX


๐Ÿ“ˆ 19.49 Punkte

๐Ÿ“Œ Advancing Node.js for Windows 10 IoT Core


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing Node.js for Windows 10 IoT Core


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing Security Operations Through the Power of a SIEM Platform


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing Microsoft Azure reliability


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ How ThousandEyes is Advancing Internet Monitoring


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing industrial IoT capabilities in Azure Time Series Insights


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing the web framework ecosystem (Chrome Dev Summit 2019)


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing Azure Active Directory availability


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Advancing safe deployment practices


๐Ÿ“ˆ 17.95 Punkte











matomo