<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Compute Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/bg-p/AzureCompute</link>
    <description>Azure Compute Blog articles</description>
    <pubDate>Fri, 24 Apr 2026 02:26:58 GMT</pubDate>
    <dc:creator>AzureCompute</dc:creator>
    <dc:date>2026-04-24T02:26:58Z</dc:date>
    <item>
      <title>AI-Powered Downtime Investigation for Azure VMs: Automating Root Cause Analysis</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/ai-powered-downtime-investigation-for-azure-vms-automating-root/ba-p/4513473</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Co-authors: &lt;/STRONG&gt;Jie Su, Abhinav Dua, Mukthar Ahmed, Dhruv Joshi&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;In a previous post, we shared how &lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/azure-automated-virtual-machine-recovery-minimizing-downtime/4483166" target="_blank" rel="noopener"&gt;Azure Automated VM Recovery works to minimize virtual machine downtime&lt;/A&gt; through a three-stage approach: Detection, Diagnosis, and Mitigation. This post goes one layer deeper into how our team is using AI to transform incident investigation, one of the most time-consuming parts of that process.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;When an alert fires for a recovery event taking longer than expected, a DRI is notified and a ticket is opened. From there, the DRI must manually dig through logs across multiple sources, build Kusto queries from scratch, and correlate timestamps across systems to identify where time was lost. This has historically taken a long time. On top of that, an engineering manager or TPM had to review the incident, understand the failure, and route it to the right engineer, often resulting in multiple handoffs before the right owner was found. Across a platform the size of Microsoft Azure, that time adds up. That is the problem we set out to solve.&lt;/P&gt;
&lt;DIV class="lia-align-justify"&gt;
&lt;H2&gt;How do we use AI for long duration downtime investigation?&lt;/H2&gt;
&lt;/DIV&gt;
&lt;P class="lia-align-justify"&gt;Model Context Protocol (MCP) is a standardized protocol that connects AI models to external tools; in our case, Kusto databases, log analyzers, and incident metadata extractors. Rather than generating text about what might be wrong, the AI actually runs real queries against live telemetry. Critically, this is not a chatbot. There is no interface for a DRI to interact with. When an incident fires, the system triggers automatically, runs the full investigation pipeline, and attaches a structured analysis report directly to the ticket. By the time a DRI opens the alert, the work is already done.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;The real intelligence in this system goes beyond incident analysis. It comes from encoded domain knowledge about what "normal" looks like: expected recovery timelines for different error categories, log patterns that indicate specific failure modes, and the precise meaning of each phase in the healing workflow. The system knows, for example, how to distinguish a diagnostics bottleneck from a node isolation bottleneck, and what it signals when a particular isolation step runs longer than expected. This is knowledge that took our team years to accumulate, now automatically applied to every incident. Ultimately, the goal is not to replace the DRI but to eliminate the manual investigation work so they can focus on what matters most: making the right call. The system surfaces the analysis; a human always makes the final decision.&lt;/P&gt;
&lt;DIV class="lia-align-justify"&gt;
&lt;H2&gt;How the System Works&lt;/H2&gt;
&lt;/DIV&gt;
&lt;P class="lia-align-justify"&gt;The investigation pipeline follows a six-step reasoning chain that mirrors how our best engineers approach manual triage.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 1 (Parse and Identify):&lt;/U&gt;&amp;nbsp;&lt;/STRONG&gt;The system extracts the key metadata from the ticket incident: the affected node identifier, container identifier, the timestamp when the VM went down, and the total duration of the outage. These parameters become the inputs for everything that follows.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 2 (Query VM Health Events):&lt;/U&gt;&amp;nbsp;&lt;/STRONG&gt;Using the extracted metadata, the AI invokes the AI assisted triage against VM availability tables, retrieving the sequence of state transitions the virtual machine experienced during the incident window.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 3 (Check Host Health):&lt;/U&gt;&amp;nbsp;&lt;/STRONG&gt;The AI then queries host-level health event tables, examining node state changes to understand what the underlying host was doing during the same period. This establishes whether the issue originated at the VM level or at the node level.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 4 (Correlate Repair Service Logs):&lt;/U&gt;&amp;nbsp;&lt;/STRONG&gt;With both the VM and host picture in hand, the AI cross-references repair service logs to trace when our repair orchestration service was triggered, what actions it took, and how long each step took.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 5 (Build the Timeline)&lt;/U&gt;:&amp;nbsp;&lt;/STRONG&gt;The AI assembles all of the retrieved data into a chronological, end-to-end timeline of the recovery event. This timeline maps directly to the three phases we track: Time to Detect (TTD), Time to Diagnose (TTDiag), and Time to Mitigate (TTM), as well as Time to Isolate (TTI) when service healing is involved.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;&lt;U&gt;Step 6 (Root Cause and Report):&lt;/U&gt;&amp;nbsp;&lt;/STRONG&gt;Finally, the AI analyzes the timeline, identifies which phase contained the largest gap, determines what operation caused the bottleneck, and generates a structured investigation report that is automatically attached to the ticket incident.&lt;/P&gt;
&lt;img /&gt;
&lt;DIV class="lia-align-justify"&gt;
&lt;H2&gt;Results and conclusion&lt;/H2&gt;
&lt;/DIV&gt;
&lt;P class="lia-align-justify"&gt;The results are measurable across three dimensions. On speed, the investigation pipeline now completes in under 5 minutes, down from 30 to 60 minutes manually, a roughly 90% reduction that shaves 50% off total triage time. On consistency, 100% of qualifying incidents receive the same thorough analysis regardless of who is on call, with the full phase breakdown (TTD, TTDiag, TTMitigate, and TTIsolate) applied every time. On ownership, the generated report gives managers and TPMs immediate context to assign the incident to the right engineer from the start, eliminating the back-and-forth handoffs that previously delayed remediation. This solution has saved Engineering Manager and TPM 10-20 minutes of manual work per incident.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;By encoding our team's best practices into an automated pipeline, we turned a slow, inconsistent manual process into something fast, thorough, and always available. MCP offers a practical path for any engineering team to make the knowledge of their most experienced engineers universally accessible, not as documentation, but as an automated system that applies it to every incident, every time. We will continue to share updates as this evolves and would love to hear from teams working on similar problems.&lt;/P&gt;
&lt;img /&gt;</description>
      <pubDate>Wed, 22 Apr 2026 18:34:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/ai-powered-downtime-investigation-for-azure-vms-automating-root/ba-p/4513473</guid>
      <dc:creator>Jon_Andoni_Baranda</dc:creator>
      <dc:date>2026-04-22T18:34:50Z</dc:date>
    </item>
    <item>
      <title>Public Preview: Ephemeral OS Disk with full caching for VM/VMSS</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-ephemeral-os-disk-with-full-caching-for-vm-vmss/ba-p/4500191</link>
      <description>&lt;P&gt;Today, we’re excited to announce the public preview of Ephemeral OS disk with full caching, a new feature designed to significantly enhance performance and reliability by utilizing local storage. This feature is ideal for IO-sensitive stateless workloads, as it eliminates dependency on remote storage by caching the entire OS image on local storage.&lt;/P&gt;
&lt;P&gt;Key Advantages:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;High Performance&lt;/STRONG&gt;: Provides extremely high-performance OS disks with consistently fast response times.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reliability&lt;/STRONG&gt;: Ensures high availability, making it suitable for critical workloads.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Why Full OS Caching?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Currently, Ephemeral OS disks store OS writes locally but still rely on a remote base OS image for reads. With Ephemeral OS Disk with full caching, the entire OS disk image is cached on local storage, removing the dependency on remote storage for OS disk reads. Once caching is complete, all OS disk IO is served locally. This results in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistently fast OS disk performance&lt;/STRONG&gt; with low‑millisecond latency&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved resilience during remote storage disruptions&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;No impact to VM create times, as caching happens asynchronously after boot&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This capability is well suited for IO-sensitive stateless workloads that need fast OS disk access, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;AI workloads&lt;/LI&gt;
&lt;LI&gt;Quorum‑based databases&lt;/LI&gt;
&lt;LI&gt;Data analytics and real‑time processing systems&lt;/LI&gt;
&lt;LI&gt;Large‑scale stateless services on General Purpose VM families&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These workloads benefit directly from lower OS disk latency and reduced exposure to remote storage outages.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How It Works?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When full OS caching is enabled:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;VM’s Local storage (cache disk, resource disk, or NVMe disk) is used to host the full OS disk&lt;/LI&gt;
&lt;LI&gt;Local storage capacity is reduced by &lt;STRONG&gt;2× the OS disk size&lt;/STRONG&gt; to accommodate OS caching&lt;/LI&gt;
&lt;LI&gt;The OS disk is cached in the background after VM boot, ensuring fast provisioning&lt;/LI&gt;
&lt;LI&gt;All OS disk IOs happen on the local storage, thus providing 10X better IO performance and resiliency to storage interruptions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Public Preview Availability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;During public preview, Ephemeral OS disk with full caching is available for most general purpose VM SKUs (excluding 2‑vCPUs and 4‑vCPUs VMs)&amp;nbsp; in 29 regions - AustraliaCentral, AustraliaCentral2, AustraliaSouthEast, BrazilSoutheast, CanadaCentral, CanadaEast, CentralIndia, CentralUSEUAP, EastAsia,&amp;nbsp; GermanyWestCentral, JapanEast, JioIndiaCentral, JioIndiaWest, KoreaCentral, KoreaSouth, MalaysiaSouth, MexicoCentral, NorthEurope, NorwayWest, QatarCentral, SouthAfricaNorth,&amp;nbsp; SwedenCentral, SwitzerlandWest, TaiwanNorth, UAECentral, UKSouth, UKWest, WestCentralUS, and WestIndia.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We’re continuing to expand support across regions, and tooling as we move toward general availability. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Getting Started&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers can enable Ephemeral OS disk with full caching when creating new VMs or VMSS by updating their &lt;STRONG&gt;ARM templates or REST API definitions&lt;/STRONG&gt; and setting the enableFullCaching flag for Ephemeral OS disks.&lt;/P&gt;
&lt;P&gt;ARM template to create VMs with full caching:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;"resources": [           
"name": "[parameters('virtualMachineName')]",
            "type": "Microsoft.Compute/virtualMachines",
            "apiVersion": "2025-04-01",
..
..
"osDisk":  
	{ 
	"diffDiskSettings": 
		{ 
		"option": "Local", 
		"placement": "ResourceDisk", 
		"enableFullCaching": true
		}, 

	"caching": "ReadOnly", 
	"createOption": "FromImage", 
	"managedDisk": 
		{ 
		"storageAccountType": "StandardSSD_LRS" 
		} 
	}
&lt;/LI-CODE&gt;
&lt;P&gt;ARM template to create VMSS with full caching:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;"resources": [           
 "name": "[parameters('vmssName')]",
        "type": "Microsoft.Compute/virtualMachineScaleSets",
            "apiVersion": "2025-04-01",
..
..
"osDisk":  
	{ 
	"diffDiskSettings": 
		{ 
		"option": "Local", 
		"placement": "ResourceDisk", 
		"enableFullCaching": true
		}, 

	"caching": "ReadOnly", 
	"createOption": "FromImage", 
	"managedDisk": 
		{ 
		"storageAccountType": "StandardSSD_LRS" 
		} 
	}
&lt;/LI-CODE&gt;
&lt;P&gt;Your feedback during public preview will help shape the final experience.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 19:37:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-ephemeral-os-disk-with-full-caching-for-vm-vmss/ba-p/4500191</guid>
      <dc:creator>viveksingla</dc:creator>
      <dc:date>2026-03-30T19:37:31Z</dc:date>
    </item>
    <item>
      <title>Upcoming Compute API Change: Always return non-null securityType</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/upcoming-compute-api-change-always-return-non-null-securitytype/ba-p/4500387</link>
      <description>&lt;H2&gt;Overview&lt;/H2&gt;
&lt;P&gt;Starting with &lt;STRONG&gt;Azure Compute API version 2025‑11‑01&lt;/STRONG&gt;, responses for Azure Virtual Machines (VMs) and Virtual Machine Scale Sets (VMSS) will include a &lt;STRONG&gt;non‑null &lt;/STRONG&gt;securityType&lt;STRONG&gt; value in all operations&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;While this is a small behavioral change, it can &lt;STRONG&gt;impact deployments &lt;U&gt;if they&lt;/U&gt; rely on &lt;/STRONG&gt;null&lt;STRONG&gt; checks&lt;/STRONG&gt; in automation, validation, or post‑deployment scripts. This post explains what is changing, why the change was made, and what—if anything—you need to do to prepare.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This update applies only to the &lt;STRONG&gt;2025&lt;/STRONG&gt;&lt;STRONG&gt;‑11&lt;/STRONG&gt;&lt;STRONG&gt;‑01 API version&lt;/STRONG&gt;. &lt;STRONG&gt;Older API versions are unaffected and will continue to behave as they do today.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;What’s changing?&lt;/H2&gt;
&lt;P&gt;With &lt;STRONG&gt;Azure Compute API version 2025‑11‑01&lt;/STRONG&gt;, all VM and VM Scale Set operations—including &lt;STRONG&gt;create&lt;/STRONG&gt;, &lt;STRONG&gt;update&lt;/STRONG&gt;, and &lt;STRONG&gt;GET&lt;/STRONG&gt;—will always return a populated securityType field in the response.&lt;/P&gt;
&lt;P&gt;Specifically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The securityType field will always return &lt;STRONG&gt;one of the following values&lt;/STRONG&gt;, based on the resource configuration:
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Input Security Type&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Returned Security Type with new API version&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;lt;&lt;EM&gt;null&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Standard&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Standard&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Standard&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;TrustedLaunch&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;TrustedLaunch&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;ConfidentialVM&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;ConfidentialVM&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;If a VM or scale set is &lt;STRONG&gt;created or updated without specifying a &lt;/STRONG&gt;securityType (that is, the value is omitted or set to null), the API response will now return &lt;STRONG&gt;securityType: "Standard"&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Existing VMs or scale sets that already have a defined securityType (TrustedLaunch or ConfidentialVM) will continue to return their configured value, unchanged.&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; This behavior change applies &lt;STRONG&gt;only&lt;/STRONG&gt; to API version &lt;STRONG&gt;2025‑11‑01&lt;/STRONG&gt;. API versions prior to this will continue returning null when no securityType is specified.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;Why this change is made&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;securityType&lt;/STRONG&gt; field represents an explicit security posture for a VM or scale set. Returning a consistent, non‑null value improves response clarity and aligns the API contract with actual runtime behavior, where resources always operate under a defined security model—even when not explicitly specified during creation.&lt;/P&gt;
&lt;P&gt;This change makes API responses more predictable and reduces ambiguity for consumers interpreting resource configuration.&lt;/P&gt;
&lt;H2&gt;Will this impact existing workloads?&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;No.&lt;/STRONG&gt; This change &lt;STRONG&gt;does not affect the runtime behavior&lt;/STRONG&gt; of your existing VMs or scale sets. There is &lt;STRONG&gt;no impact to deployed resources, workloads, or infrastructure behavior&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;However, you &lt;STRONG&gt;may be impacted&lt;/STRONG&gt; if:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You use &lt;STRONG&gt;API version 2025‑11‑01&lt;/STRONG&gt;, AND&lt;/LI&gt;
&lt;LI&gt;You have &lt;STRONG&gt;automation, validation logic, or post-deployment scripts&lt;/STRONG&gt; that:
&lt;UL&gt;
&lt;LI&gt;Explicitly check for securityType == null&lt;/LI&gt;
&lt;LI&gt;Treat a missing or null securityType as a special case&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Only requests made using &lt;STRONG&gt;API version 2025‑11‑01&lt;/STRONG&gt; will return the updated, always‑present securityType value. Requests using older API versions are unchanged.&lt;/P&gt;
&lt;H2&gt;What actions do customers need to take?&lt;/H2&gt;
&lt;P&gt;If you will be using &lt;STRONG&gt;Azure Compute API version 2025‑11‑01&lt;/STRONG&gt;, review and update any code that assumes securityType may be null.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recommended actions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;✅ Update validation logic to accept "Standard" as the default value&lt;/P&gt;
&lt;P&gt;✅ Remove or adjust null checks that gate logic or fail deployments&lt;/P&gt;
&lt;P&gt;✅ Ensure post‑deployment checks and compliance scripts handle all supported securityType values&lt;/P&gt;
&lt;P&gt;For example, a VM created without specifying securityType will now return "Standard" instead of null.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;No action is required if you are using &lt;STRONG&gt;API versions earlier than 2025‑11‑01&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;Example: GET response behavior (API version 2025‑11‑01)&lt;/H2&gt;
&lt;P&gt;The following example shows a &lt;STRONG&gt;GET VM response&lt;/STRONG&gt; where no securityType was specified at creation time. Note that the response still includes a non‑null value (Standard).&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;{
  "id": "&amp;lt;vmResourceId&amp;gt;",
  "name": "&amp;lt;vmName&amp;gt;",
  "type": "Microsoft.Compute/virtualMachines",
  "properties": {
    "securityProfile": {
      "securityType": "Standard"
    }
  }
}&lt;/LI-CODE&gt;
&lt;H2&gt;Next steps&lt;/H2&gt;
&lt;P&gt;Review your automation, validation or/and post-deployemnt scripts now to ensure a smooth transition when adopting &lt;STRONG&gt;Azure Compute API version 2025‑11‑01&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 14:16:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/upcoming-compute-api-change-always-return-non-null-securitytype/ba-p/4500387</guid>
      <dc:creator>AjKundnani</dc:creator>
      <dc:date>2026-03-09T14:16:14Z</dc:date>
    </item>
    <item>
      <title>Public Preview: Automatic zone balance for Virtual Machine Scale Sets</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-automatic-zone-balance-for-virtual-machine-scale/ba-p/4494476</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're excited to announce the public preview of &lt;STRONG&gt;automatic zone balance&lt;/STRONG&gt; for Azure Virtual Machine Scale Sets. This new capability helps you maintain zone-resilient workloads with zero manual intervention. Automatic zone balance continuously monitors your scale set and redistributes VMs across availability zones, reducing the risk that a single zone failure disproportionately impacts your applications.&lt;/P&gt;
&lt;H3&gt;Maintain Optimal Resiliency Posture with Continuous Monitoring&lt;/H3&gt;
&lt;P&gt;When you deploy a Virtual Machine Scale Set across multiple availability zones, Azure spreads your VMs as evenly as possible for maximum resiliency. However, capacity constraints, scaling operations, and other factors can cause your scale set to become imbalanced over time, with some zones holding more VM instances than others. This imbalance often goes unnoticed, but it means a zone failure could take down a larger share of your workload than expected.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: If an outage occurs in Zone 1, an imbalanced scale set would experience a 50% impact on its workload, while a balanced scale set would only experience 33% impact to an outage in any zone.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;Automatic zone balance addresses these challenges by continuously monitoring your scale set for zonal imbalances and tracking capacity in under-provisioned zones. When capacity becomes available, VMs are automatically created in the under-provisioned zone, eliminating the need for manual trial-and-error.&lt;/P&gt;
&lt;P&gt;When rebalancing occurs, Automatic zone balance uses a create-before-delete approach. New VMs are created in under-provisioned zones and verified healthy before VMs in over-provisioned zones are removed, ensuring your workload capacity is never reduced during the process. Health checks are performed through integration with Application Health Extension or Load Balancer Health Probes, so only healthy VMs are kept.&lt;/P&gt;
&lt;P&gt;Built-in safety guardrails ensure rebalancing respects instance protection policies and pauses during active scale set operations. To minimize churn, rebalancing includes back-off periods between operations and moves only one VM at a time.&lt;/P&gt;
&lt;P&gt;When you enable Automatic zone balance, &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-automatic-instance-repairs" target="_blank" rel="noopener"&gt;automatic instance repairs&lt;/A&gt; is also activated by default, giving you both zone-level resiliency and instance-level health monitoring. Together, these capabilities help you maintain resilient, well-distributed workloads with minimal operational overhead, reducing the blast radius of zone failures while ensuring gradual, controlled changes to your scale set.&lt;/P&gt;
&lt;H3&gt;How to Get Started&lt;/H3&gt;
&lt;P&gt;To get started with Automatic zone balance:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Register for the preview&lt;/STRONG&gt;: Enable the&amp;nbsp;AutomaticZoneRebalancing&amp;nbsp;feature flag in your subscription via Azure portal, CLI, or PowerShell.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ensure prerequisites&lt;/STRONG&gt;: Your scale set must span at least 2 availability zones, use best-effort zone balancing mode, and have application health monitoring configured.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Automatic zone balance&lt;/STRONG&gt;: Turn on the feature through Azure portal, CLI, PowerShell, or REST API.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For detailed instructions, visit the&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/AutoZoneBalanceDocs" target="_blank" rel="noopener"&gt;automatic zone balance documentation&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 17:30:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-automatic-zone-balance-for-virtual-machine-scale/ba-p/4494476</guid>
      <dc:creator>HilaryWang</dc:creator>
      <dc:date>2026-02-17T17:30:00Z</dc:date>
    </item>
    <item>
      <title>Azure Automated Virtual Machine Recovery: Minimizing Downtime</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/azure-automated-virtual-machine-recovery-minimizing-downtime/ba-p/4483166</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Co-authors: &lt;/STRONG&gt;Mukhtar Ahmed&lt;STRONG&gt;, &lt;/STRONG&gt;&lt;/EM&gt;Shekhar Agrawal, Harish Luckshetty, Vinay Nagarajan, Jie Su, Sri Harsha Kanukuntla, David Maldonado, Shardul Dabholkar.&lt;/P&gt;
&lt;P&gt;Keeping virtual machines running smoothly is essential for businesses across every industry. When a VM stays down for even a short period, the impact can cascade quickly; delayed financial transactions, stalled manufacturing lines, unavailable retail systems, or interruptions to healthcare services. This understanding led to the creation of this solution, with its primary goal of ensuring fast and reliable recovery times so customers can focus on their business priorities without worrying about manual recovery strategies. This feature helps ensure your business Service-Level Agreements are consistently met.&lt;/P&gt;
&lt;P&gt;When a VM experiences an issue, our system springs into action within seconds, working to restore your service as quickly as possible. It automatically executes the optimal recovery strategy, all without customer intervention. The feature operates continuously in the background, monitoring the health of VMs through multiple detection mechanisms. Lastly, it automatically selects the fastest recovery path based on the specific failure type.&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Getting Started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;The best part? Azure Automated VM Recovery requires no setup or configuration. Running quietly in the background, this service helps guarantee the highest level of recoverability and a smooth experience for every Azure customer. Your VMs are already benefiting from faster detection, smarter diagnosis, and optimized recovery strategies.&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The Importance of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Automated VM Recovery&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;Automated VM recovery is essential to keeping cloud services resilient, reliable, and interruption-free. Automated recovery ensures that the moment a failure occurs, the platform responds instantly with fast detection, intelligent diagnostics, and the optimal repair action, all without requiring customer intervention.&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;U&gt;&lt;STRONG&gt;Better experience for customers:&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;By minimizing VM downtime,&amp;nbsp;it&amp;nbsp;helps customers keep their services online, avoiding disruptions and potential business losses.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;U&gt;&lt;STRONG&gt;Stronger trust in Azure:&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Fast, reliable recovery builds customer confidence in Azure’s platform, reinforcing our reputation for dependability.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Reduced financial impact for customers:&lt;/U&gt;&lt;/STRONG&gt; The lower the downtime, the less time your customers will be impacted, reducing potential loss of revenue and minimizing business disruption during critical operations.&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Empowering internal teams:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Automated monitoring&amp;nbsp;and&amp;nbsp;clear&amp;nbsp;visibility into recovery&amp;nbsp;metrics help teams track health, onboard easily, and&amp;nbsp;identify&amp;nbsp;opportunities&amp;nbsp;for improvement&amp;nbsp;with minimal effort.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;How Azure Automated VM Recovery Works: A Three-Stage Approach&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify" aria-level="3"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Azure automatically handles VM issues through a three-stage recovery framework: Detection, Diagnosis, and Mitigation.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="lia-align-justify"&gt;
&lt;LI aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; Detection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;From the moment a failure occurs, multiple parallel mechanisms identify issues quickly. Azure hardware devices send regular health signals, which are monitored for interruptions or degradation. At the application level, operational health is tracked via response times, error rates, and successful operations to detect software-level problems rapidly.&lt;/P&gt;
&lt;OL class="lia-align-justify" start="2"&gt;
&lt;LI aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; Diagnosis&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once detected, lightweight diagnostics determine the best recovery action without unnecessary delays. Diagnostics operates at multiple levels; host level checks asses underlying infrastructure, VM level diagnostics evaluate the virtual machine state and system-on-chip (SoC) level analysis examines hardware components. This includes network checks, resource utilization assessments, and service responsiveness tests. Detailed data is also collected for post-incident analysis, continuously improving diagnostic algorithms while active recovery proceeds.&lt;/P&gt;
&lt;OL class="lia-align-justify" start="3"&gt;
&lt;LI aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; Mitigation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Based on diagnostics, the system automatically executes the optimal recovery strategy, starting with the least disruptive methods and escalating as needed. Hardware failures may trigger VM migration, while software issues might be resolved with targeted service restarts. If needed, a host reset is performed while preserving virtual machine state, ensuring minimal disruption to running workloads. Post-mitigation health checks ensure full VM functionality before recovery is considered complete.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;Recovery Event Annotations&lt;/H2&gt;
&lt;P&gt;Recovery Event Annotations are specialized annotations that provide detailed visibility into every stage of VM recovery, going beyond simple uptime metrics. These indicators act as custom monitoring metrics, breaking down each incident into precise time segments. For example, TTD (Time to Detect) measures the time between a VM becoming unhealthy and the system recognizing the issue, while TTDiag (Time to Diagnose) tracks the duration of diagnostic checks. By analyzing these segments, Recovery Timing Indicators help identify bottlenecks, optimize recovery steps, and improve overall reliability. Key benefits include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Understanding why some VMs recover faster than others.&lt;/LI&gt;
&lt;LI&gt;Identifying which diagnostics add value versus those that don’t.&lt;/LI&gt;
&lt;LI&gt;Highlighting opportunities that provide a faster path of recovery.&lt;/LI&gt;
&lt;LI&gt;Enabling early detection of regressions through event annotation-driven alerts.&lt;/LI&gt;
&lt;LI&gt;Establishing a common language across Azure teams for measuring and improving downtime.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Customer Impact and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;R&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;esult&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;s&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN data-contrast="auto"&gt;Azure Automated VM Recovery&amp;nbsp;demonstrates&amp;nbsp;our commitment to not only high availability but also rapid recovery. By minimizing downtime, it helps customers build resilient applications and&amp;nbsp;maintain&amp;nbsp;business continuity during unexpected failures. Over the past&amp;nbsp;18 months, this solution has cut average VM downtime by more than half, significantly enhancing reliability and customer experience. Our ongoing goal is to provide a platform where customers can deploy workloads with confidence, knowing&amp;nbsp;automated recovery will minimize disruptions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 19:23:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/azure-automated-virtual-machine-recovery-minimizing-downtime/ba-p/4483166</guid>
      <dc:creator>Jon_Andoni_Baranda</dc:creator>
      <dc:date>2026-02-04T19:23:11Z</dc:date>
    </item>
    <item>
      <title>Announcing General Availability of Azure Da/Ea/Fasv7-series VMs based on AMD ‘Turin’ processors</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-general-availability-of-azure-da-ea-fasv7-series-vms/ba-p/4488627</link>
      <description>&lt;P&gt;Today, Microsoft is announcing the general availability of Azure’s new AMD based Virtual Machines (VMs) powered by 5th Gen AMD EPYC™ (Turin) processors. These VMs include general-purpose (Dasv7, Dalsv7), memory-optimized (Easv7), and compute-optimized (Fasv7, Falsv7, Famsv7) series, available with or without local disks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure’s latest AMD based VMs offer faster CPU performance, greater scalability, and flexible configurations, making them the ideal choice for high performance, cost efficiency, and diverse workloads.&lt;/P&gt;
&lt;P&gt;Key improvements include up to 35% better CPU performance and price-performance compared to equivalent v6 AMD-based VMs. Workload-specific gains are significant—up to 25% for Java applications, up to 65% for in-memory cache applications, up to 80% for crypto workloads, and up to 130% for web server applications just to name a few.&lt;/P&gt;
&lt;P&gt;Dalsv7-series VMs are cost-efficient for low memory workloads like web servers, video encoding, and batch processing. Dasv7-series suit general computing tasks such as e-commerce, web front ends, virtualization, customer relationship management applications (CRM), and entry to mid-range databases. Easv7-series target memory-heavy workloads like enterprise applications, data warehousing, business intelligence, in-memory analytics and more. Falsv7-, Fasv7-, and Famsv7 series deliver full-core performance without Simultaneous Multithreading (SMT) for compute-intensive tasks like scientific simulations, financial modeling, gaming and more. You can now choose constrained-core VM sizes — reducing the vCPU total by 50% or 75% while maintaining the other resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dasv7, Dalsv7, and Easv7 VMs now scale up to 160&amp;nbsp;vCPUs, an increase from 96&amp;nbsp;vCPUs in the previous generation. The Fasv7, Falsv7, and Famsv7 VMs, which do not include Simultaneous Multithreading (SMT), support up to 80&amp;nbsp;vCPUs—up from 64&amp;nbsp;vCPUs in the prior generation—and introduce a new 1-core option. These VMs offer a maximum boost CPU frequency of up to 4.5&amp;nbsp;GHz for faster compute-intensive operations. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The new VMs deliver increased memory capacity —up to 640&amp;nbsp;GiB for Dasv7 and 1280&amp;nbsp;GiB for Easv7—making them ideal for memory-intensive workloads.&amp;nbsp; They also support three memory (GiB)-to-vCPU ratios: 2:1 (Dalsv7-series, Daldsv7-series, Falsv7-series and Faldsv7-series), 4:1 (Dasv7-series, Dadsv7-series, Fasv7-series and Fadsv7-series), and 8:1 (Easv7-series, Eadsv7-series, Famsv7-series and Famdsv7-series). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remote storage performance is improved up to 20% higher IOPS, up to 50% greater throughput, while local storage performance offers up to 55% higher throughput. &amp;nbsp;Network performance is also enhanced up to 75% compared to corresponding D-series and E-series v6 VMs. New VM series Fadsv7, Faldsv7, and Famdsv7, introduce local disk support.&lt;/P&gt;
&lt;P&gt;The new VMs leverage &lt;A href="https://learn.microsoft.com/en-us/azure/azure-boost/overview" target="_blank" rel="noopener"&gt;Azure Boost&lt;/A&gt; technology to enhance performance and security, utilize the Microsoft Azure Network Adapter (&lt;A href="https://aka.ms/manadocs" target="_blank" rel="noopener"&gt;MANA&lt;/A&gt;), and support the &lt;A href="https://aka.ms/NVMeFAQ" target="_blank" rel="noopener"&gt;NVMe&lt;/A&gt;&amp;nbsp;protocol for both local and remote disks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 5th Generation AMD EPYC™ processor family, based on the newest ‘Zen 5’ core, provides enhanced capabilities for these new Azure’s AMD based VM series such as AVX-512 with a full 512-bit data path for vector and floating-point operations, higher memory bandwidth, and improved instructions per clock compared to the previous generation. These updates provide the ability to handle compute-intensive tasks for AI and machine learning, scientific simulations, and financial analytics, among others. AMD &lt;A href="https://aka.ms/AMDInfinityGuard" target="_blank" rel="noopener"&gt;Infinity Guard&lt;/A&gt; hardware-based security features, such as Transparent Secure Memory Encryption (TSME), continue in this generation to ensure sensitive information remains secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These VMs are available in the following Azure regions: Australia East, Central US, Germany West Central, Japan East, North Europe, South Central US, Southeast Asia, UK South, West Europe, West US 2, and West US 3. The large 160 vCPU Easv7-series and Eadsv7-series sizes are available in North Europe, South Central US, West Europe, and West US 2. More regions are coming in 2026. Refer to &lt;A href="https://aka.ms/ProductAvailabilitybyRegion" target="_blank" rel="noopener"&gt;Product Availability by Region&lt;/A&gt; for the latest information.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Our customers have shared the benefits they’ve observed with these new VMs:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Elastic enables customers to drive innovation and cost-efficiency with our observability, security, and search solutions&amp;nbsp;on&amp;nbsp;Azure. In our testing, Azure’s latest Daldsv7 VMs provided up to 13% better&amp;nbsp;indexing throughput compared to&amp;nbsp;previous&amp;nbsp;generation Daldsv6 VMs, and we are looking forward to the improved performance for Elasticsearch users deploying on Azure.” &amp;nbsp;— Yuvraj Gupta, Director, Product Management, Elastic&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“The Easv7 series of Azure VMs offers a balanced mix of CPU, memory, storage, and network performance that suits the majority of Oracle Database configurations very well. The 80 Gbps network with the jumbo frame capability is especially helpful for efficient operation of FlashGrid Cluster with Oracle RAC on Azure VMs.” — Art Danielov, CEO, FlashGrid&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"Our analysis indicates that Azure’s new AMD based v7 series Virtual Machines demonstrate significantly higher performance compared to the v6 series, particularly in single-thread ratings. This advancement is highly beneficial, as several of our critical applications, such as ArcGIS Enterprise, are single-threaded and CPU-bound. Consequently, these faster v7 series VMs have resulted in improved performance with the same number of users, evidenced by lower server utilization and faster client-side response times." — Thomas Buchmann, Senior Cloud Architect, VertiGIS&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here’s what our technology partners are saying&lt;/STRONG&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“AMD and Microsoft have built one of the industry’s most successful cloud partnerships, bringing over 60 VM series to market through years of deep engineering collaboration. With the new v7 Azure VMs powered by 5th Gen AMD EPYC processors, we’re setting a new benchmark for performance, efficiency, and scalability—giving customers the proven, leadership compute they expect from AMD in the world’s most demanding cloud environments.” &lt;/EM&gt;&lt;EM&gt;—&amp;nbsp;&lt;/EM&gt;&lt;EM&gt; Steve Berg, Corporate Vice President and General Manager of the Server CPU Cloud Business Group at AMD&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“Our collaboration with Microsoft continues to empower developers and enterprises alike. The new AMD based v7-series&amp;nbsp;VMs on Azure offer a powerful foundation for the full spectrum of modern workloads, from development to production AI/ML pipelines. We are excited to support this launch, ensuring every user gets&amp;nbsp;a seamless&amp;nbsp;experience on Ubuntu, with the enterprise security and long-term stability of Ubuntu Pro available for their most critical systems."&amp;nbsp;&amp;nbsp;—&amp;nbsp;Jehudi Castro-Sierra,&amp;nbsp;Public Cloud Alliances Director&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"The new Azure Da/Ea/Fa v7-series AMD Turin-based instances running SUSE Linux Enterprise Server provide a significant performance uplift during initial tests. They show an impressive 20%-40% increase with typical Linux kernel compilation tasks compared to the same instance sizes of the v6 series. This&amp;nbsp;demonstrates&amp;nbsp;the enhanced capabilities the v7 series brings to&amp;nbsp;our joint customers seeking maximum efficiency and performance for their critical applications.”&amp;nbsp;—&amp;nbsp;Peter&amp;nbsp;Schinagl, Sr. Technical Architect, SUSE&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You can learn more about these latest Azure AMD based VMs by visiting the specification pages at &lt;A href="https://aka.ms/Dasv7-series" target="_blank" rel="noopener"&gt;Dasv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Dadsv7-series" target="_blank" rel="noopener"&gt;Dadsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Dalsv7-series" target="_blank" rel="noopener"&gt;Dalsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Daldsv7-series" target="_blank" rel="noopener"&gt;Daldsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Easv7-series" target="_blank" rel="noopener"&gt;Easv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Eadsv7-series" target="_blank" rel="noopener"&gt;Eadsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Fasv7-series" target="_blank" rel="noopener"&gt;Fasv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Fadsv7-series" target="_blank" rel="noopener"&gt;Fadsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Falsv7-series" target="_blank" rel="noopener"&gt;Falsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Faldsv7-series" target="_blank" rel="noopener"&gt;Faldsv7-series&lt;/A&gt;,&amp;nbsp;&lt;A href="https://aka.ms/Famsv7-series" target="_blank" rel="noopener"&gt;Famsv7-series&lt;/A&gt;&amp;nbsp;,&amp;nbsp;&lt;A href="https://aka.ms/Famdsv7-series" target="_blank" rel="noopener"&gt;Famdsv7-series&lt;/A&gt;, &lt;A href="https://aka.ms/constrained-coresizes" target="_blank" rel="noopener"&gt;constrained-core sizes&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;For pricing details, visit the &lt;A href="https://azure.microsoft.com/pricing/details/virtual-machines" target="_blank" rel="noopener"&gt;Azure Virtual Machines pricing&lt;/A&gt; page. These VMs support all remote disk types. See &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/disks-types" target="_blank" rel="noopener"&gt;Azure managed disk type&lt;/A&gt; for additional details. Disk storage is billed separately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/AzureIntegratedHSM-preview" target="_blank" rel="noopener"&gt;Azure Integrated HSM&lt;/A&gt; (Hardware Security Module) will continue to be in preview with these VMs. Azure Integrated HSM is an ephemeral HSM cache that enables secure key management within Azure VMs by ensuring that cryptographic keys remain protected inside a FIPS 140-3 Level 3-compliant boundary throughout their lifecycle. To explore this new feature, please sign up using the &lt;A href="https://aka.ms/AzureIntegratedHSM-preview-signup" target="_blank" rel="noopener"&gt;form&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Have questions?&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;Please reach us at&amp;nbsp;&lt;A href="https://azure.microsoft.com/en-us/support/" target="_blank" rel="noopener"&gt;Azure Support&lt;/A&gt; and our experts will be there to help you with your Azure journey.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 21:54:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-general-availability-of-azure-da-ea-fasv7-series-vms/ba-p/4488627</guid>
      <dc:creator>ArpitaChatterjee</dc:creator>
      <dc:date>2026-01-27T21:54:30Z</dc:date>
    </item>
    <item>
      <title>Improving Efficiency through Adaptive CPU Uncore Power Management</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/improving-efficiency-through-adaptive-cpu-uncore-power/ba-p/4486456</link>
      <description>&lt;P class="lia-align-justify"&gt;In a competitive landscape, Microsoft Azure, like other major cloud service providers, must continuously balance two competing objectives: maximizing performance and improving power efficiency. By using power more effectively, Azure can deploy more servers within its existing datacenter footprint to quickly meet growing customer compute demands and improve sustainability.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;While power management encompasses a broad range of technologies, this article focuses on uncore power management, which targets components outside the CPU cores but within the processor package. The uncore domain includes the mesh interconnect, memory controllers, and I/O subsystem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: An illustration of a diurnal workload’s resource utilization&lt;/img&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;The Need for Uncore Power Management&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;Cloud servers often operate under low load due to diurnal resource utilization patterns (e.g., user-facing workloads such as Microsoft Teams), which exhibit reduced demand during weeknights and weekends, as shown in Figure 1. In addition, customers often provision VMs for peak demand, causing servers to run under reduced load during off-peak periods.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Even under reduced load, server CPUs continue to consume significant power. Although idle cores can enter deep low-power states (e.g., core C6), the uncore typically remains active and operates at its highest frequency, as the presence of even a single active core prevents it from entering an idle state. The few active cores may be running background Azure server agents for monitoring and maintenance, which generally have relaxed performance requirements. Moreover, workloads operating under reduced load can often tolerate slightly higher latency without degrading tail performance. Together, these characteristics make it feasible to leverage active low-power techniques, such as reducing uncore frequency, to improve power efficiency.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;While modern CPUs support dynamic uncore frequency scaling, software-only approaches to reducing uncore frequency under low load are limited in effectiveness, as they struggle to respond quickly to sudden bursts of workload activity.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Hardware/Software Co-design For Improving CPU Power Efficiency&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;Intel and Microsoft Azure co-designed Efficiency Latency Control (ELC), a mechanism for managing uncore frequency that is now available on Intel Xeon 6 (Granite Rapids) processors. The implementation allows software to define CPU utilization thresholds and their corresponding uncore frequency targets, which are communicated to the CPU firmware for enforcement. This division of responsibility enables software to tailor power–performance behavior to workload characteristics, while the hardware ensures fast and reliable execution of the frequency control logic.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;img&gt;Figure 2: Managing uncore frequency and power using ELC&lt;/img&gt;&lt;/DIV&gt;
&lt;P class="lia-align-justify"&gt;ELC mode allows software to specify three uncore frequency points—Low, Mid, and High—along with two CPU utilization thresholds -- Low and High. When utilization is at or below the Low threshold, firmware sets the uncore frequency to the defined minimum value, thereby maximizing power savings. As utilization rises above the Low &lt;EM&gt;threshold,&lt;/EM&gt; the frequency is increased to the Mid-level, balancing performance and power efficiency. Finally, when utilization exceeds the High threshold, the uncore frequency is increased up to the defined maximum, subject to package power constraints, to meet performance demands under heavy load.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Figure 2 illustrates several ELC configuration strategies, each representing a different tradeoff between latency and power efficiency. &lt;STRONG&gt;Config #1&lt;/STRONG&gt; prioritizes latency by maintaining a consistently high uncore frequency across all CPU utilization levels, mirroring the default high-performance mode. This delivers optimal responsiveness but incurs higher power consumption, particularly under low-load conditions. &lt;STRONG&gt;Config #2&lt;/STRONG&gt; lowers the uncore frequency under very low utilization, improving power efficiency when background tasks (e.g., agents) are active and VMs are largely idle. Finally, &lt;STRONG&gt;Config #3&lt;/STRONG&gt; offers a balanced approach, allowing moderate frequency scaling at low load to conserve power while maintaining acceptable performance. This configuration is appropriate when a slight tradeoff in responsiveness is tolerable in exchange for improved power efficiency. The &lt;STRONG&gt;Perf/Watt Optimized curve&lt;/STRONG&gt; represents the ideal dynamic scaling behavior, adjusting uncore frequency to maximize performance per watt across varying workload intensities.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Real-World Impact&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;ELC mode provides compelling benefits:&lt;/P&gt;
&lt;img&gt;Figure 3: Power and performance impact for SPEC CPU Integer benchmark suite&lt;/img&gt;
&lt;OL&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;ELC reduces power consumption by up to 11% under iso-performance for moderate loads. &lt;/STRONG&gt;Figure 3 shows the performance and power impact of ELC Config #1 (latency-optimized) and Config #3 on the SPEC CPU Integer benchmark suite under moderate load, where only a subset of CPU cores are active while the rest remain idle. As the figure illustrates, Config #3 achieves comparable performance to Config #1 while reducing power consumption by up to 11% (9% on average). At higher loads (not shown), the power savings of Config #3 diminish, as the uncore must operate at higher frequencies to match the performance of Config #1.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 4: Performance/watt improvement under lightly loaded storage operations&lt;/img&gt;
&lt;OL start="2"&gt;
&lt;LI class="lia-align-justify"&gt;&lt;STRONG&gt;ELC provides up to 1.5× improvement in performance per watt under very low load.&lt;/STRONG&gt;&amp;nbsp;Figure 4 compares the performance-per-watt of ELC Config #1 and Config #3 under very low storage loads. Config #1 maintains a consistently high uncore frequency, which limits efficiency. In contrast, Config #3 can lower the uncore frequency to the Low setting under light load, slightly reducing absolute performance but achieving substantially higher performance per watt.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-align-justify"&gt;These results demonstrate that ELC’s configurability can deliver performance comparable to latency-optimized mode with significantly higher power efficiency, enabling Azure to&lt;EM&gt; &lt;/EM&gt;increase server deployments within its existing datacenter power footprint to quickly meet customer compute demands while also improving sustainability.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Looking Forward&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;As cloud workloads continue to evolve, the importance of hardware–software co-design in enabling adaptive infrastructure will increase. The integration of hardware and software controls for CPU uncore frequency management marks a significant step towards improving server power and energy efficiency. Looking ahead, further collaboration between Microsoft Azure and hardware vendors will unlock new opportunities for efficiency, sustainability, and cost effectiveness.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Appendix&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;ELC mode details: &lt;A href="https://www.intel.com/content/www/us/en/content-details/826934/intel-xeon-6-processors-performance-and-power-profiles-default-latency-optimized-mode-and-other-options-technical-article.html" target="_blank" rel="noopener"&gt;Intel® Xeon® 6 Processors - Performance and Power Profiles - Default, Latency-Optimized Mode, and Other Options Technical Article&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/improving-efficiency-through-adaptive-cpu-uncore-power/ba-p/4486456</guid>
      <dc:creator>PulkitMisra</dc:creator>
      <dc:date>2026-01-21T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Scaling Azure Compute for Performance</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/scaling-azure-compute-for-performance/ba-p/4474662</link>
      <description>&lt;P&gt;Ignite 2025 highlighted a clear trend across customer and partner discussions: modern workloads—AI inference, data-intensive analytics, and globally distributed applications—require infrastructure that delivers&amp;nbsp;&lt;STRONG&gt;consistent performance, rapid scale-out, and adaptive behavior under real-world pressure&lt;/STRONG&gt;. The focus this year was on practical capabilities that remove bottlenecks, simplify operations, and provide the compute foundation needed to support the next wave of innovation.&lt;/P&gt;
&lt;P&gt;Azure’s newest advancements reflect that direction. Breakthroughs like &lt;STRONG&gt;Direct Virtualization&lt;/STRONG&gt; enable low-latency access to GPUs and NVMe; &lt;STRONG&gt;Large Container sizes&lt;/STRONG&gt; push new limits for AI/ML and analytics; &lt;STRONG&gt;VM Applications&lt;/STRONG&gt; streamline global deployments; &lt;STRONG&gt;Scheduled Actions&lt;/STRONG&gt; bring automation to thousands of VMs; &lt;STRONG&gt;Azure Compute Gallery&lt;/STRONG&gt; boosts resiliency with Soft Delete and ZRS; and &lt;STRONG&gt;VMSS Instance Mix&lt;/STRONG&gt; improves capacity acquisition through flexible SKU selection.&lt;/P&gt;
&lt;P&gt;This retrospective highlights the capabilities that shaped Ignite and how Azure is advancing a high-performance, adaptive compute platform built for the next generation of workloads.&lt;/P&gt;
&lt;H1&gt;Direct Virtualization – Breaking Barriers for Performance&lt;/H1&gt;
&lt;P&gt;Direct Virtualization generated a lot of excitement at Ignite, enabling &lt;STRONG&gt;performance-sensitive workloads&lt;/STRONG&gt; like AI inference and gaming to launch faster and more affordably. Key highlights:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Direct access &lt;/STRONG&gt;to devices like NvMe disks and GPUs with near Bare metal performance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Isolation for child VMs&lt;/STRONG&gt; hosting hostile workloads.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Lower latency and cost efficiency&lt;/STRONG&gt; for demanding applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;High throughput data access from child VMs &lt;/STRONG&gt;for high performance workloads.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Available in limited preview, please sign up here: &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2FVirtualHostPreview&amp;amp;data=05%7C02%7CDarren.Moss%40microsoft.com%7C34a1c723688944c2c34408de1e425c1c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638981467612509029%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=gmkilcTC6KBr59lcy9JxqStUMACGG7gIMR5ErShH%2BQE%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;aka.ms/&lt;/A&gt;&lt;A href="https://aka.ms/DirectVirtualizationPreview" target="_blank" rel="noopener"&gt;DirectVirtualizationPreview&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Large Containers sizes: Supercharging Compute-Intensive Apps&lt;/H1&gt;
&lt;P&gt;Large containers were well received at Ignite. Why? Because they unlock &lt;STRONG&gt;massive performance gains&lt;/STRONG&gt; for AI/ML training, big data analytics, and high-throughput services. With higher vCPU and memory configurations, customers can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Accelerate AI workloads&lt;/STRONG&gt;: Train models faster and scale inference seamlessly.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Simplify orchestration&lt;/STRONG&gt;: Fewer containers, less complexity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduce latency&lt;/STRONG&gt;: Minimize inter-container chatter for blazing-fast execution.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now &lt;STRONG&gt;Generally Available&lt;/STRONG&gt;!&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A href="https://aka.ms/bigcontainersblog" target="_blank" rel="noopener"&gt;aka.ms/&lt;/A&gt;&lt;A href="https://aka.ms/bigcontainersblog" target="_blank" rel="noopener"&gt;bigcontainersblog&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;VM Applications: Global Reach, Zero Hassle&lt;/H1&gt;
&lt;P&gt;We were happy to announce &lt;STRONG&gt;General Availability for VM applications&lt;/STRONG&gt;. Managing apps across thousands of VMs, at Ignite we showcased how &lt;STRONG&gt;VM Applications&lt;/STRONG&gt; make this effortless. Customers loved the ability to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy up to 25 applications &lt;/STRONG&gt;(2GB each) per VM together.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy consistently&lt;/STRONG&gt; across regions with automatic replication.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate updates&lt;/STRONG&gt; without manual intervention.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scale globally&lt;/STRONG&gt; with confidence.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This simplifies operational overhead for enterprises running distributed workloads.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more: &lt;A href="https://aka.ms/VMApps/blogs/ignite2025" target="_blank" rel="noopener"&gt;https://aka.ms/VMApps/blogs/ignite2025&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Scheduled Actions: Automation at Scale&lt;/H1&gt;
&lt;P&gt;Operational efficiency was a hot topic, and &lt;STRONG&gt;Scheduled Actions&lt;/STRONG&gt;, now &lt;STRONG&gt;Generally Available&lt;/STRONG&gt; solves this problem. Now you can schedule power operations for &lt;STRONG&gt;up to 5,000 VMs in one go. &lt;/STRONG&gt;Scheduled actions enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cost optimization&lt;/STRONG&gt; during off-peak hours.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reliability&lt;/STRONG&gt; with built-in throttling safeguards.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Time savings&lt;/STRONG&gt; through automation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Actions available in GA: &lt;/STRONG&gt;Start, Stop, Hibernate, with support for more actions coming soon!&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H1&gt;Azure Compute Gallery – Enhance resiliency&lt;/H1&gt;
&lt;P&gt;Azure Compute Gallery (ACG) continues to evolve, introducing robust features that safeguard your virtual machine (VM) images and application artifacts.&amp;nbsp;Two key resiliency innovations: the new Soft Delete feature (announced in preview) and Zonal Redundant Storage (ZRS) as the default storage type for image versions.&lt;/P&gt;
&lt;P&gt;The combination of Soft Delete and ZRS by default provides Azure customers with enhanced operational reliability and data protection. Whether overseeing a suite of VM images for development and testing purposes or coordinating production deployments across multiple teams, these features offer the following benefits:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mitigate operational risks associated with accidental deletions or regional outages.&lt;/LI&gt;
&lt;LI&gt;Minimize downtime and reduce manual recovery processes.&lt;/LI&gt;
&lt;LI&gt;Promote compliance and security through advanced access controls and transparent recovery procedures.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Read more: &lt;A href="https://aka.ms/acgresiliencyblog" target="_blank" rel="noopener"&gt;https://aka.ms/acgresiliencyblog&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Acquiring capacity at Scale&lt;/H1&gt;
&lt;P&gt;We know that capacity acquisition can get complicated and can prohibit scale. With SKU fungibility in a single deployment where you can define up to 5 SKUs using VMSS Instance Mix with allocation policies simplifies &lt;STRONG&gt;capacity fungibility at scale&lt;/STRONG&gt;. Customers can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Mix up to five VM sizes&lt;/STRONG&gt; in a single scale set.&lt;/LI&gt;
&lt;LI&gt;Use allocation strategies like &lt;STRONG&gt;CapacityOptimized&lt;/STRONG&gt;, &lt;STRONG&gt;LowestPrice&lt;/STRONG&gt;, or &lt;STRONG&gt;Prioritized&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Secure capacity during peak demand while optimizing costs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This approach ensures agility and resilience for unpredictable workloads.&lt;/P&gt;
&lt;H1&gt;Best Practices&lt;/H1&gt;
&lt;P&gt;We also shared best practices for Scale and performance. The session emphasized:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Using latest SKUs&lt;/STRONG&gt; for best performance and price/performance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Using Instance mix &lt;/STRONG&gt;for acquiring capacity at scale using different SKUs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use VM Apps &lt;/STRONG&gt;for delivering apps reliably and at scale&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;For Virtual Desktop use cases,&lt;STRONG&gt; &lt;/STRONG&gt;use &lt;STRONG&gt;Schedule actions for managing power states&lt;/STRONG&gt; at scale.&lt;/LI&gt;
&lt;LI&gt;Building &lt;STRONG&gt;resiliency and security&lt;/STRONG&gt; from the get-go.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Session on-demand link: &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK173?source=/speakers/80665103-5e69-4b8c-ad15-1d1f84c8dd6a" target="_blank" rel="noopener"&gt;ignite.microsoft.com/en-US/sessions/BRK173?source=/speakers/80665103-5e69-4b8c-ad15-1d1f84c8dd6a&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Conclusion: Customer Excitement on AI + Azure Infra&lt;/H1&gt;
&lt;P&gt;Ignite made it clear that scaling for performance is no longer about simply adding more compute; it’s about intelligent architecture, automation at scale, and flexible capacity models that adapt to real-world demands. Capabilities such as Direct Virtualization, Large Container sizes, VM Applications, Scheduled Actions, and SKU fungibility are not incremental enhancements; they represent foundational building blocks for AI-ready, resilient, and cost-efficient infrastructure.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Customers are approaching Azure with bold AI ambitions, and the momentum is unmistakable&lt;/STRONG&gt;. Whether training large models or deploying inference globally, the innovations showcased at Ignite demonstrate that Azure Compute is engineered to support these next-generation workloads with precision, scale, and operational excellence.&lt;/P&gt;
&lt;P&gt;As the industry accelerates toward more intelligent and distributed systems, Azure’s compute platform is evolving in lockstep—delivering the performance, automation, and adaptability required to turn ambitious ideas into production-ready breakthroughs.&lt;/P&gt;
&lt;P&gt;Here’s to scaling smarter, operating more efficiently, and powering the next decade of cloud innovation—together.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2025 21:20:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/scaling-azure-compute-for-performance/ba-p/4474662</guid>
      <dc:creator>DanaCozmei</dc:creator>
      <dc:date>2025-12-02T21:20:46Z</dc:date>
    </item>
    <item>
      <title>Golazo: A Framework for Streamlined Engineering</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/golazo-a-framework-for-streamlined-engineering/ba-p/4471142</link>
      <description>&lt;P&gt;We’re excited to announce the public open-source release of &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fgolazo&amp;amp;data=05%7C02%7CBen.Martens%40microsoft.com%7Cd10c68679c804bd917d808de26b003e5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638990734572239318%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=%2BWjaPeT3YdX8rdHdfkszM3xAI5dyG096pxbKxKqLBms%3D&amp;amp;reserved=0" target="_blank"&gt;Golazo&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;Golazo is an open-source framework designed to help engineering teams work efficiently and transparently. It’s designed for real-world practicality by emphasizing design documentation before code, multiple peer reviews, visual workflow boards, shared ownership, and customer validation.&lt;/P&gt;
&lt;P&gt;Every work item is scoped to less than two weeks and begins with a concise design document. Peer signoff is required before coding starts, helping eliminate architectural surprises during PR reviews. These documents not only provide immediate context but also serve as a lasting knowledge base for the team and a valuable resource for AI coding agents and LLMs.&lt;/P&gt;
&lt;P&gt;There’s no assigned ownership of workstreams. Engineers are encouraged to pick up any ticket that interests them, supported by team conversations and the design doc knowledge base. Successes and learning opportunities are shared by all.&lt;/P&gt;
&lt;P&gt;Golazo is built for asynchronous collaboration, making it ideal for both in-person teams and hybrid teams across time zones. Daily standups focus on lessons learned and moving work forward, not just status updates. Regular retrospectives celebrate wins and identify ways to improve efficiency. Planning is a group activity, ensuring everyone’s perspective is included.&lt;/P&gt;
&lt;P&gt;Curious about the details? Explore the&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fgolazo&amp;amp;data=05%7C02%7CBen.Martens%40microsoft.com%7Cd10c68679c804bd917d808de26b003e5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638990734572247854%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=rSeTWqzVEv3Ql1MwJtGyt2mSV%2B6pscqcUgO1uCaaJEg%3D&amp;amp;reserved=0" target="_blank"&gt;full documentation on GitHub&lt;/A&gt; or the &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmicrosoft.github.io%2Fgolazo%2F&amp;amp;data=05%7C02%7CBen.Martens%40microsoft.com%7Cd10c68679c804bd917d808de26b003e5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638990734572256150%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=vRzdDZyLZf5S1RLEshVt8pIG%2BWRcWUgNSr6Iw3udnIk%3D&amp;amp;reserved=0" target="_blank"&gt;rendered HTML version on GitHub pages&lt;/A&gt; to see how Golazo can help your team thrive.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 16:37:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/golazo-a-framework-for-streamlined-engineering/ba-p/4471142</guid>
      <dc:creator>Ben Martens</dc:creator>
      <dc:date>2025-11-20T16:37:24Z</dc:date>
    </item>
    <item>
      <title>Introducing Metadata Security Protocol (MSP): Elevating Platform Security for Azure VMs</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/introducing-metadata-security-protocol-msp-elevating-platform/ba-p/4471204</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are excited to announce the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;General Availability (GA)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/metadata-security-protocol/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Metadata Security Protocol (MSP)&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;an industry-first innovation designed to mitigate vulnerabilities at the platform layer.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Azure becomes the first major&amp;nbsp;cloud&amp;nbsp;provider&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to integrate&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;strong authentication and authorization&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(AuthN and&amp;nbsp;AuthZ) for metadata service endpoints inside virtual machines.&amp;nbsp;MSP introduces a default-closed security model for the Instance Metadata Service (IMDS)&amp;nbsp;and&amp;nbsp;WireServer, ensuring only trusted processes can access sensitive data&amp;nbsp;over it,&amp;nbsp;eliminating&amp;nbsp;a subset of attack classes,&amp;nbsp;reducing&amp;nbsp;another subset of&amp;nbsp;attack&amp;nbsp;surfaces&amp;nbsp;and aligning with zero-trust&amp;nbsp;security principles.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What is MSP and Why Does It Matter?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/instance-metadata-service?tabs=windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Instance Metadata Service (IMDS)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; provides&amp;nbsp;critical&amp;nbsp;information to&amp;nbsp;virtual machines, including&amp;nbsp;instance details,&amp;nbsp;managed identity tokens, and platform configuration data. Historically, IMDS endpoints across the industry&amp;nbsp;cloud providers&amp;nbsp;including Azure, were accessible&amp;nbsp;security&amp;nbsp;boundary&amp;nbsp;of protection being the Guest Virtual machine.&amp;nbsp;With the advent of containerization and nested&amp;nbsp;virtualization, the new MSP protocol invests in&amp;nbsp;a strong&amp;nbsp;authentication&amp;nbsp;layer,&amp;nbsp;which enables sub-VM security boundary protection&amp;nbsp;for hosted cloud services infrastructure.&amp;nbsp; And this additionally, helps&amp;nbsp;eliminate&amp;nbsp;several security anti-patterns and attack subclasses&amp;nbsp;related to:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;Server-Side Request Forgery (SSRF) over IMDS endpoints&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;–&amp;nbsp;curtailing&amp;nbsp;exploitation&amp;nbsp;of&amp;nbsp;unauthenticated metadata APIs to gain access to sensitive tokens or configuration data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Segoe UI" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Hosted-on-Behalf-of (HoBo) nested tenancy bypasses&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;–&amp;nbsp;eliminating&amp;nbsp;attack&amp;nbsp;scenarios&amp;nbsp;bypasses for&amp;nbsp;nested&amp;nbsp;virtualization&amp;nbsp;setup for multi-tenancy&amp;nbsp;or misconfigured trust boundaries allowed indirect access to metadata.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Segoe UI" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;Implicit trust within the VM&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="none"&gt;&amp;nbsp;–&amp;nbsp;adding strong application layer defense in depth beyond network isolation for sub-VM boundaries.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;MSP addresses this by introducing&amp;nbsp;industry-first protections:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Authentication for IMDS calls&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;–&amp;nbsp;uses a trusted delegate and HMAC to ensure only verified processes can access metadata.&amp;nbsp;Every&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/instance-metadata-service?tabs=windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;IMDS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/what-is-ip-address-168-63-129-16?tabs=windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;WireServer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;request is authenticated and&amp;nbsp;validated&amp;nbsp;using trusted delegates and HMAC signatures, ensuring only&amp;nbsp;verified&amp;nbsp;processes can access metadata.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Improved isolation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;–&amp;nbsp;MSP&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;offers enhanced protection against&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;risks from&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;container&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;network misconfiguration.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Default-Closed Model&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;–&amp;nbsp;IMDS access&amp;nbsp;is&amp;nbsp;locked down by default, requiring strict allowlisting of approved in-guest software and&amp;nbsp;users, aligning with zero-trust principles.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Guest Proxy Agent (GPA)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;–&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/Azure/GuestProxyAgent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;GPA&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;leverages&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;eBPF&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to verify the source of every metadata request and enforce&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Role-Based Access Control (RBAC)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;at the process level.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Fine-grained access control&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;–&amp;nbsp;allowing you to restrict IMDS access to specific users or processes&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/metadata-security-protocol/advanced-configuration" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;advanced configuration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;reducing the attack surface significantly.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With MSP, you can limit IMDS access to approved applications, reducing your attack&amp;nbsp;surface&amp;nbsp;and improving your security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Benefits of MSP&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:281,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By adopting MSP, you gain:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Defense-in-depth against metadata-related attacks: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;MSP adds an extra security layer to protect sensitive metadata and identity tokens, reducing exposure from misconfigurations or compromised processes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Granular control over IMDS access within your VMs: &lt;/SPAN&gt;With fine-grained RBAC and allowlisting, you decide which applications and users can access metadata, ensuring only trusted components interact with critical services.&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Peace of mind with industry-leading protections: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;MSP introduces a default-closed model and per-request authentication, aligning with zero-trust principles and making Azure the first major cloud to deliver this level of in-guest security.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;How to Get Started?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The goal of onboarding is to configure your VMs so that &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;only approved applications can access the WireServer/IMDS endpoints&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;Here’s&amp;nbsp;the recommended approach:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Enable MSP in Audit Mode: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Start by enabling MSP in audit mode to monitor which processes are accessing IMDS.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Create an Allowlist: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Use audit logs to&amp;nbsp;identify&amp;nbsp;legitimate applications and build an allowlist.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Enable MSP Enforcement: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Once the allowlist is&amp;nbsp;finalized, switch MSP to enforcement mode to restrict access.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Start today by enabling MSP in audit mode and take the first step toward securing your Azure environment against evolving threats. For detailed instructions, visit the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/metadata-security-protocol/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MSP Microsoft Learn page&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 19:36:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/introducing-metadata-security-protocol-msp-elevating-platform/ba-p/4471204</guid>
      <dc:creator>Amjad_Shaik</dc:creator>
      <dc:date>2025-11-19T19:36:55Z</dc:date>
    </item>
    <item>
      <title>Announcing the Preview of the new Azure Ebsv6 VMs based on the 5th Gen Intel® Xeon® processor</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-the-preview-of-the-new-azure-ebsv6-vms-based-on-the/ba-p/4470139</link>
      <description>&lt;P&gt;&lt;EM&gt;Authored by Misha Bansal, Product Manager, Azure Compute&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We are excited to announce the public preview of the new Azure Ebsv6 and Ebdsv6 Virtual Machines, powered by 5th Generation Intel® Xeon® Platinum 8573C (Emerald Rapids) processors. These VMs deliver significantly higher remote storage performance, scaling up to 800,000 IOPS and 14 Gbps of remote disk throughput featured by &lt;A href="https://learn.microsoft.com/en-us/azure/azure-boost/overview" target="_blank" rel="noopener"&gt;Azure Boost&lt;/A&gt; which is designed to accelerate storage and networking capabilities.&lt;/P&gt;
&lt;P&gt;The Ebsv6 VMs are purpose-built for memory-intensive workloads, including relational database servers, large-scale data warehousing, and advanced analytics. This generation delivers up to 2× higher remote storage performance compared to Ebsv5, enabling greater workload consolidation and efficiency. With an&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/enable-nvme-faqs" target="_blank" rel="noopener"&gt;NVMe&lt;/A&gt; interface for both local and remote disks, these VMs provide fast, low-latency storage access. The VM series also offers flexible configurations, with options for local SSD across multiple VM sizes.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Key feature improvements compared to the previous generation Ebsv5 Intel based VMs including:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Up to 15-30% better CPU performance, powered by the 5th Generation Intel® Xeon® Platinum 8573C (Emerald Rapids) processor​&lt;/LI&gt;
&lt;LI&gt;Up to 192 vCPU and 1832 GiB memory&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Azure Boost which enables up to:
&lt;UL&gt;
&lt;LI&gt;800K IOPS and 14GB/s remote storage throughput with Premium v2 and Ultra Disk support&lt;/LI&gt;
&lt;LI&gt;15% higher remote storage performance per vCPU with up to 6600 IOPS/vCPU&lt;/LI&gt;
&lt;LI&gt;10% higher remote storage throughput per vCPU&lt;/LI&gt;
&lt;LI&gt;Increased networking bandwidth, up to 200Gbps&lt;/LI&gt;
&lt;LI&gt;Enhanced security through Total Memory Encryption (Intel® TME) technology&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In today’s data-driven world, organizations need to process, analyze, and extract insights from massive datasets quickly and efficiently. Workloads such as OLTP and OLAP, which power real-time transactions and analytics, demand high-performance compute and storage. Azure Ebsv6 VMs are built to meet these challenges by delivering fast, low-latency storage and flexible configurations to support demanding applications.&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Ebsv6 &amp;amp; Ebdsv6 Series VM Spec Summary:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 17.4209%" /&gt;&lt;col style="width: 15.758%" /&gt;&lt;col style="width: 21.4087%" /&gt;&lt;col style="width: 20.76%" /&gt;&lt;col style="width: 24.6525%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;VM Series&amp;nbsp;&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;vCPU&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;Memory (GiB)&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;Uncached Ultra Disk and Premium SSD v2 IOPS&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;Uncached Ultra Disk and Premium SSD v2 Throughput (MB/s)&lt;/STRONG&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/memory-optimized/ebsv6-series?tabs=sizebasic" target="_blank" rel="noopener"&gt;Ebsv6&lt;/A&gt;/&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/memory-optimized/ebdsv6-series?tabs=sizebasic" target="_blank" rel="noopener"&gt;Ebdsv6&amp;nbsp;&lt;/A&gt;&lt;/td&gt;&lt;td&gt;2 - 192&amp;nbsp;&lt;/td&gt;&lt;td&gt;16 - 1832&lt;/td&gt;&lt;td&gt;13200 - 800000&lt;/td&gt;&lt;td&gt;330 - 14000&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;For local temp disk options, please refer to the Ebdsv6 page for full specifications.&amp;nbsp;&lt;SPAN data-contrast="auto"&gt;Whether you choose a VM with a local&amp;nbsp;temp&amp;nbsp;disk or not, you can attach remote persistent&amp;nbsp;disk&amp;nbsp;such as Premium Disk v1, Premium Disk v2, or Ultra Disks to the VMs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Getting Started:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;These VMs are available for Public Preview in the&amp;nbsp;&lt;STRONG&gt;US East&lt;/STRONG&gt; region. To request access to the preview, please fill out this &lt;A class="lia-external-url" href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR2vQUheGFPhKmch5Uj5LYy5UQlhSTjdFM0lCRVBEQjNWMVgzOTNTWFBSTC4u&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt;survey&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can learn more here:&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/memory-optimized/ebsv6-series?tabs=sizebasic" target="_blank" rel="noopener"&gt;Ebsv6-series&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes/memory-optimized/ebdsv6-series?tabs=sizebasic" target="_blank" rel="noopener"&gt;Ebdsv6-series&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/disks-types#ultra-disk-limitations" target="_blank"&gt;Ultra Disk&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/disks-types#premium-ssd-v2" target="_blank"&gt;Premium SSD v2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Have questions?&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;Please reach us at&amp;nbsp;&lt;A href="https://azure.microsoft.com/en-us/support/" target="_blank" rel="noopener"&gt;Azure Support&lt;/A&gt; and our experts will be there to help you with your Azure journey.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 17:35:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-the-preview-of-the-new-azure-ebsv6-vms-based-on-the/ba-p/4470139</guid>
      <dc:creator>misha-bansal</dc:creator>
      <dc:date>2025-11-18T17:35:49Z</dc:date>
    </item>
    <item>
      <title>Announcing General Availability of Scheduled Actions for Azure Virtual Machines</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-general-availability-of-scheduled-actions-for-azure/ba-p/4470797</link>
      <description>&lt;P&gt;Managing VMs at scale in Azure can be a pain. Subscription throttling can prevent your operations from being received, and having to track and retry intermittent failures adds extra overhead. Scheduled Actions reduces the complexity of managing concurrent API requests in Azure at scale and allows for scheduling actions at a time in the future.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;What is Scheduled Actions?&lt;/H2&gt;
&lt;P&gt;Scheduled Actions is a separate resource provider that sits above our REST API and makes calls on your subscription’s behalf at the time that you specify. Schedule Actions gives the ability to manage the lifecycle of VMs at high scale on a periodic basis. Subscription throttling and retries due to transient errors are handled automatically to ensure that your operations succeed without additional overhead.&lt;/P&gt;
&lt;P&gt;Scheduled Actions supports the following VM operations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Stop&lt;/LI&gt;
&lt;LI&gt;Start&lt;/LI&gt;
&lt;LI&gt;Hibernate&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Key Benefits&lt;/H2&gt;
&lt;H4&gt;Scheduling&lt;/H4&gt;
&lt;P&gt;You can schedule actions to occur immediately or at a time you specify in the future.&lt;/P&gt;
&lt;H4&gt;Scale&lt;/H4&gt;
&lt;P&gt;Scheduled Actions supports up 5,000 concurrent operations for a single action.&lt;/P&gt;
&lt;H4&gt;Throttling&lt;/H4&gt;
&lt;P&gt;Scheduled Actions knows your subscription’s throttling limits and makes sure to send operations to Azure at your subscription’s limit until all operations have been received.&lt;/P&gt;
&lt;H4&gt;Retries&lt;/H4&gt;
&lt;P&gt;Scheduled Actions automatically tracks and retries errors that are transient in nature and likely to succeed with a retry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;How it Works&lt;/H2&gt;
&lt;P&gt;Scheduled Actions sits above the APIs for VM power state operations and sends actions on your behalf. Scheduled Actions ensures maximum operational throughput for your subscription on large-scale concurrent requests. Operations that fail due to intermittent or transient errors are automatically retried.&lt;/P&gt;
&lt;P&gt;You can use batch calls of up to 100 VMs at a time to submit up to 5000 VMs for a single action. Scheduled Actions will generate an operation ID for each VM which can be used for checking the status of those operations. Actions can be executed immediately or can be submitted to trigger at a specified time. Actions scheduled at a future time can be cancelled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Use Case – Contoso’s Event&lt;/H2&gt;
&lt;P&gt;Contoso needs 3,000 existing Azure VMs ready to use for a big weekend launch. The VMs need to be ready at 8am and be hibernated by 6:30pm.&lt;/P&gt;
&lt;P&gt;Using Scheduled Actions, Contoso sends 30 batches of 100 VM IDs to start at 7:45am so they are available by 8. They do not need to have someone to submit the requests manually or create a custom application to send the requests.&lt;/P&gt;
&lt;P&gt;They send another 30 batches of 100 VM IDs to Hibernate at 6:15pm so that all the VMs are Hibernated by 6:30pm. Scheduled Actions allows Contoso’s cloud infrastructure team to save time and effort in managing their Virtual Machines.&lt;/P&gt;
&lt;H2&gt;Getting Started&lt;/H2&gt;
&lt;P&gt;Visit the Scheduled Actions doc page here. - https://aka.ms/ScheduledActionsDocs&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 17:35:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-general-availability-of-scheduled-actions-for-azure/ba-p/4470797</guid>
      <dc:creator>TravisCragg_MSFT</dc:creator>
      <dc:date>2025-11-18T17:35:21Z</dc:date>
    </item>
    <item>
      <title>Enhancing Resiliency in Azure Compute Gallery</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/enhancing-resiliency-in-azure-compute-gallery/ba-p/4470082</link>
      <description>&lt;P&gt;In today's cloud-driven world, ensuring the resiliency and recoverability of critical resources is top of mind for organizations of all sizes. Azure Compute Gallery (ACG) continues to evolve, introducing robust features that safeguard your virtual machine (VM) images and application artifacts. In this blog post, we'll explore two key resiliency innovations: the new Soft Delete feature (currently in preview) and Zonal Redundant Storage (ZRS) as the default storage type for image versions. Together, these features significantly reduce the risk of data loss and improve business continuity for Azure users.&lt;/P&gt;
&lt;H2&gt;The Soft Delete Feature in Preview: A safety net for your Images&lt;/H2&gt;
&lt;P&gt;Many Azure customers have struggled with accidental deletion of VM images, which disrupts workflows and causes data loss without any way to recover, often requiring users to rebuild images from scratch. Previously, removing an image from the Azure Compute Gallery was permanent and resulted in customer dissatisfaction due to service disruption and lengthy process of recreating the image. Now, with Soft Delete (currently available in public preview), Azure introduces a safeguard that makes it easy to recover deleted images within a specified retention period.&lt;/P&gt;
&lt;H3&gt;How Soft Delete Works&lt;/H3&gt;
&lt;P&gt;When Soft Delete is enabled on a gallery, deleting an image doesn't immediately remove it from the system. Instead, the image enters a "soft-deleted" state, where it remains recoverable for up to 7 days. During this grace period, administrators can review and restore images that may have been deleted by mistake, preventing permanent loss. After the retention period expires, the platform automatically performs a hard (permanent) delete, at which point recovery is no longer possible.&lt;/P&gt;
&lt;H3&gt;Key Capabilities and User Experience&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Recovery period: Images are retained for a default period of 7 days, giving users time to identify and restore any resources deleted in error.&lt;/LI&gt;
&lt;LI&gt;Seamless Recovery: Recover soft-deleted images directly from the Azure Portal or via REST API, making it easy to integrate with automation and CI/CD pipelines.&lt;/LI&gt;
&lt;LI&gt;Role-Based Access: Only owners or users with the Compute Gallery Sharing Admin role at the subscription or gallery level can manage soft-deleted images, ensuring tight control over recovery and deletion operations.&lt;/LI&gt;
&lt;LI&gt;No Additional Cost: The Soft Delete feature is provided at no extra charge. After deletion, only one replica per region is retained, and standard storage charges apply until the image is permanently deleted.&lt;/LI&gt;
&lt;LI&gt;Comprehensive Support: Soft Delete is available for Private, Direct Shared, and Community Galleries. New and existing galleries can be configured to support the feature.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To enable Soft Delete, you can update your gallery settings via the Azure Portal or use the Azure CLI. Once enabled, the "delete" operation will soft-delete images, and you can view, list, restore, or permanently remove these images as needed.&lt;/P&gt;
&lt;P&gt;Learn more about Soft Delete feature at&amp;nbsp;&lt;A href="https://aka.ms/sigsoftdelete" target="_blank" rel="noopener"&gt;https://aka.ms/sigsoftdelete&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Zonal Redundant Storage (ZRS) by Default&lt;/H2&gt;
&lt;P&gt;Another major resiliency enhancement in Azure Compute Gallery is the default use of Zonal Redundant Storage (ZRS) for image versions. ZRS replicates your images across multiple availability zones within a region, ensuring that your resources remain available even if a zone experiences an outage. By defaulting to ZRS, Azure raises the baseline for image durability and access, reducing the risk of disruptions due to zone-level failures.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Automatic Redundancy: All new image versions are stored using ZRS by default, without requiring manual configuration.&lt;/LI&gt;
&lt;LI&gt;High Availability: Your VM images are protected against the failure of any single availability zone within the region.&lt;/LI&gt;
&lt;LI&gt;Simplified Management: Users benefit from resilient storage without the need to explicitly set up or manage storage account redundancy settings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Default ZRS capability starts with API version 2025-03-03; Portal/SDK support will be added later.&lt;/P&gt;
&lt;H2&gt;Why These Features Matter&lt;/H2&gt;
&lt;P&gt;The combination of Soft Delete and ZRS by default provides Azure customers with enhanced operational reliability and data protection. Whether overseeing a suite of VM images for development and testing purposes or coordinating production deployments across multiple teams, these features offer the following benefits:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mitigate operational risks associated with accidental deletions or regional outages.&lt;/LI&gt;
&lt;LI&gt;Minimize downtime and reduce manual recovery processes.&lt;/LI&gt;
&lt;LI&gt;Promote compliance and security through advanced access controls and transparent recovery procedures.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To evaluate the Soft Delete feature, you may register for the preview and activate it on your galleries through the Azure Portal or RestAPI. Please note that, during its preview phase, this capability is recommended for assessment and testing rather than for production environments. ZRS is already available out-of-the-box, delivering image availability starting with API version 2025-03-03.&lt;/P&gt;
&lt;P&gt;For comprehensive details and step-by-step guidance on enabling and utilizing Soft Delete, please review the public specification document at &lt;A href="https://aka.ms/sigsoftdelete" target="_blank" rel="noopener"&gt;https://aka.ms/sigsoftdelete&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Azure Compute Gallery continues to push the envelope on resource resiliency. With Soft Delete (preview) offering a reliable recovery mechanism for deleted images, and ZRS by default protecting your assets against zonal failures, Azure empowers you to build and manage VM deployments with peace of mind. Stay tuned for future updates as these features evolve toward general availability.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 18:32:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/enhancing-resiliency-in-azure-compute-gallery/ba-p/4470082</guid>
      <dc:creator>Sandeep-Raichura</dc:creator>
      <dc:date>2025-11-18T18:32:42Z</dc:date>
    </item>
    <item>
      <title>Reimagining VM Application Management for an AI-Powered, Secure Future</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/reimagining-vm-application-management-for-an-ai-powered-secure/ba-p/4470127</link>
      <description>&lt;H2&gt;&lt;STRONG&gt;The Next Evolution in VM Software Management&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Enterprises today face two simultaneous shifts that are transforming how virtual machine (VM) software is built, delivered, secured, and managed:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AI-driven automation is accelerating productivity&lt;/STRONG&gt; — applications and configurations are now being generated, packaged, and deployed faster than ever before.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Rising security threats and global outages&lt;/STRONG&gt; demand stronger administrative controls, trusted software sources, and local resiliency.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Traditional VM software deployment methods—such as scripts, custom images, or manual updates—can’t keep pace with these demands. They introduce risks like configuration drift, inconsistent environments, and limited visibility post-deployment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Azure VM Applications&lt;/STRONG&gt; provides a &lt;STRONG&gt;managed, end-to-end solution&lt;/STRONG&gt; for VM software lifecycle management that enables faster publishing, secure deployment, and consistent governance at cloud scale.&lt;/P&gt;
&lt;img&gt;End-to-end software management using Azure VM Applications&lt;/img&gt;
&lt;H2&gt;&lt;STRONG&gt;Achieving Faster Application Publishing &amp;amp; Deployment&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Modern AI agents, DevOps workflows, and automated build pipelines are generating workloads at unprecedented speed. Azure VM Applications allows teams to match that pace with a reliable and managed way to deliver software into Azure Virtual Machines (VMs) and Virtual Machine Scale Sets (VMSS).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Benefits&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Package anything&lt;/STRONG&gt; – Package any binary, configuration script, app, file, or AI model into a reusable VM Application. VM Applications can act as a payload carrier, configuration service, app deployment engine, and monitoring service.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Publish &amp;amp; deploy faster&lt;/STRONG&gt; – Publish within seconds, deploy or update independently without affecting other VM components.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved cross-team development&lt;/STRONG&gt; – Different teams can publish independently. Deployment teams can deploy multiple published apps together or independently.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy larger workloads&lt;/STRONG&gt; – Deploy up to 25 applications (2 GB each) per VM without rebuilding images, making it &lt;STRONG&gt;ideal for&lt;/STRONG&gt; &lt;STRONG&gt;workloads with large payloads&lt;/STRONG&gt; like AI models, gaming apps, media rendering tools, data processing frameworks&lt;STRONG&gt;,&amp;nbsp;&lt;/STRONG&gt;etc.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Faster deployment than scripts&lt;/STRONG&gt; – Applications are locally replicated within each Azure region or zone, enabling faster deployments than internet-based scripts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automation-ready integration&lt;/STRONG&gt; – Works seamlessly with Azure DevOps, GitHub Actions, Jenkins, and GitLab Pipelines for CI/CD.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Instant updates through templates and APIs&lt;/STRONG&gt; – Use ARM templates, PowerShell, or REST APIs to inject new app versions into existing workloads within seconds.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;In short:&lt;/STRONG&gt; Azure VM Applications turn traditional VM management into a modern, modular, and version-controlled process that keeps up with AI-scale automation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Strengthening Security and Regional Resilience&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The growth in security attacks across the software lifecycle and global service dependencies makes it essential to control what runs inside your VMs and where it comes from. Azure VM Applications enhances both security and operational resilience through trusted, locally managed publishing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Benefits: &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Private app repositories&lt;/STRONG&gt; – Create private galleries and share to specific subscriptions and tenants. Published VM Applications are stored within your organization’s Azure environment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automatic regional replication&lt;/STRONG&gt; – Apps are automatically replicated across Azure regions and zones for low-latency access and business continuity during outages.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Granular admin controls&lt;/STRONG&gt; – Apply Azure Policy to &lt;STRONG&gt;inject and enforce apps&lt;/STRONG&gt; and their versions across the infrastructure, ensuring compliance with security and governance standards.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt; Localized control, compliance, and resilience—ensuring secure VM operations even under regional or global disruptions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Managing the Complete Software Lifecycle&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Azure VM Applications&lt;/STRONG&gt; go beyond deployment. They embed management, governance, and monitoring directly into the platform—removing the need for separate tooling or manual oversight.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Benefits: &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Versioned deployments&lt;/STRONG&gt; for safe rollout and rollback.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Modular monitoring&lt;/STRONG&gt; – Monitor the presence and state of each VM component across VMs and VMSS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified monitoring and governance&lt;/STRONG&gt; – Leverage Azure Resource Graph and Azure Policy for compliance and visibility.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved troubleshooting&lt;/STRONG&gt; – Use Activity Logs and Resource Graph to track what’s running and changes across operations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This unified approach replaces custom scripts and manual processes with a &lt;STRONG&gt;managed, traceable, and auditable software delivery model&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How to Publish and Deploy a VM Application&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Publishing and deploying a VM Application in Azure is straightforward.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Create and Publish&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Upload your application package to an Azure Storage account.&lt;/LI&gt;
&lt;LI&gt;Publish VM Application&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Portal&lt;STRONG&gt;:&lt;/STRONG&gt; Navigate to &lt;STRONG&gt;Azure Compute Galleries&lt;/STRONG&gt; → Select a gallery → Create VM Application definition.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Add VM Application version&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Portal&lt;STRONG&gt;:&lt;/STRONG&gt; Navigate to Azure Compute Galleries → Select a gallery → Select VM Application definition → Add version.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Deploy to VM or VMSS&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Add during VM or VMSS creation
&lt;UL&gt;
&lt;LI&gt;Portal&lt;STRONG style="color: rgb(30, 30, 30);"&gt;:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Create VM/VMSS and add VM Applications under Advanced settings&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Update existing VMs or VMSS
&lt;UL&gt;
&lt;LI&gt;Portal&lt;STRONG style="color: rgb(30, 30, 30);"&gt;:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Navigate to Virtual Machines → Extensions + Applications&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; under Settings &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;→ Add application&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Automate with CI/CD
&lt;UL&gt;
&lt;LI&gt;Integrate with Azure DevOps, GitHub Actions, Jenkins, or other CI/CD tools using PowerShell or CLI commands.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt; Your VM Application is now published, versioned, and deployed securely across VMs and VMSS—ready for AI-scale workloads.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Learn More&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Start modernizing your VM software management today:&lt;BR /&gt;👉 &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/virtual-machines/vm-applications" target="_blank" rel="noopener"&gt;Azure VM Applications documentation&lt;/A&gt;&lt;BR /&gt;👉 &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/virtual-machines/vm-applications-how-to" target="_blank" rel="noopener"&gt;How to deploy VM Applications&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/reimagining-vm-application-management-for-an-ai-powered-secure/ba-p/4470127</guid>
      <dc:creator>tanmay-gore</dc:creator>
      <dc:date>2025-11-18T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Announcing preview of new Azure Dlsv7, Dsv7, and Esv7 VMs based on Intel® Xeon® 6 processors</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-preview-of-new-azure-dlsv7-dsv7-and-esv7-vms-based-on/ba-p/4467928</link>
      <description>&lt;P&gt;We are excited to announce the preview of new Azure Dlsv7/Dsv7 General Purpose and Esv7 Memory Optimized Virtual Machines (VMs) powered by the latest Intel® Xeon® 6 processors (Granite Rapids).&amp;nbsp; These new VMs offer three different memory-to-vCPU ratios and offer options with and without local NVMe temp disks.&lt;/P&gt;
&lt;P&gt;The latest Azure Intel-based v7 VMs are designed to power ever increasing compute demands in today’s data center environment and deliver exceptional performance across a wide range of workloads, from traditional enterprise applications to cutting edge AI.&lt;/P&gt;
&lt;P&gt;These VMs deliver several important features and improvements as compared to the equivalent previous generation (v6) Intel-based VMs including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Up to 15% better general compute performance, &lt;/STRONG&gt;powered by Intel® Xeon® 6 CPUs with turbo frequencies up to 4.2 GHz and up to 2x higher memory bandwidth&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Expanded sizes and memory capacity:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Dsv7 and Esv7 VMs now scale up to 372 vCPUs with Esv7 VMs enabling up to 2.8TiB of memory&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Increased networking and remote storage performance driven by latest Azure Boost capabilities:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Up to 400 Gbps networking bandwidth with the largest size&lt;/LI&gt;
&lt;LI&gt;Up to 800k IOPS and 20 GBps throughput to Premium v2 and Ultra Disk remote storage with the largest size&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The new VMs support three memory (GiB)-to-vCPU ratios with 2:1 (Dlsv7, Dldsv7), 4:1 (Dsv7, Ddsv7), and 8:1 (Esv7, Edsv7). Additionally, each VM family has options with and without local NVMe temp disks. Whether you choose a VM with a local temp disk or not, you can attach remote persistent disk such as Premium Disk v1, Premium Disk v2, or Ultra Disks to the VMs.&lt;/P&gt;
&lt;P&gt;Dlsv7 and Dsv7 VMs offer a balance of memory to CPU performance and are ideal for many general computing workloads such as e-commerce systems, web applications, desktop virtualization solutions, application servers, and more.&lt;/P&gt;
&lt;P&gt;Esv7 VMs offer a higher ratio of memory to CPU and are ideal for memory-intensive workloads such as SQL and noSQL database servers, data warehousing workloads, business intelligence applications, in-memory databases such as SAP and Redis, and in-memory analytics.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Join the Preview&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Dlsv7, Dsv7, and Esv7 VM sizes with and without local NVMe temp disks will be available to test in preview in the East US 2 region. To request access to the preview, please fill out the survey form&amp;nbsp;&lt;A href="https://forms.office.com/r/WKppu6FNDu" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. We look forward to hearing from you.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 17:31:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-preview-of-new-azure-dlsv7-dsv7-and-esv7-vms-based-on/ba-p/4467928</guid>
      <dc:creator>RishiGomatam</dc:creator>
      <dc:date>2025-11-18T17:31:27Z</dc:date>
    </item>
    <item>
      <title>Your guide to Azure Compute at Microsoft Ignite 2025</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/your-guide-to-azure-compute-at-microsoft-ignite-2025/ba-p/4468633</link>
      <description>&lt;img /&gt;
&lt;P class="lia-align-justify"&gt;The countdown to Microsoft Ignite 2025 is almost over— &lt;A href="https://ignite.microsoft.com/en-US/home" target="_blank" rel="noopener"&gt;Microsoft Ignite - November 18–21, 2025&lt;/A&gt;! Whether you’ll be joining us in person or tuning in virtually, this guide is your essential resource for everything Azure Compute. Explore the latest advancements, connect with product experts, and expand your cloud skills through curated sessions and interactive experiences.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Attendees will have the opportunity to dive deep into new product capabilities and solutions, including ways to boost virtual machine performance, enhance resiliency, and optimize cloud operations. Be sure to add these sessions to your schedule for a personalized and can’t-miss Ignite experience.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Bookmark this guide for quick access to all the latest Azure Compute news and updates throughout Ignite 2025!&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2 class="lia-align-justify"&gt;&lt;STRONG&gt;Featured sessions&lt;/STRONG&gt;&lt;/H2&gt;
&lt;H4&gt;Tuesday&lt;/H4&gt;
&lt;img /&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK171:&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/4ad4a2b1-09f6-4942-94d0-ae47734b7059" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="What's new and what's next in Azure IaaS"&gt;What's new and what's next in Azure IaaS&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level: &lt;/STRONG&gt;Intermediate 200&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;In this session, we’ll introduce the latest capabilities across compute, storage, and networking. Uncover the advancements in Azure IaaS, driving performance, resiliency, and cost efficiency. We will present how Azure’s global backbone, enhanced capabilities, and expanding portfolio can support mission-critical, cloud native and AI workloads —while built-in security and flexible tiering help right-size app deployments and accelerate modernization.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Tuesday, November 18 | 2:30 PM-3:15 PM PST&lt;/EM&gt;&lt;/P&gt;
&lt;H4 class="lia-align-justify"&gt;Wednesday&lt;/H4&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;BRK430:&amp;nbsp;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK430?source=sessions" target="_blank" rel="noopener"&gt;Inside Azure Innovations with Mark Russinovich&lt;/A&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Level: &lt;/STRONG&gt;Advanced 300&lt;/P&gt;
&lt;P&gt;Join Mark Russinovich, CTO and Technical Fellow of Microsoft Azure. Mark will take you on a tour of the latest innovations in Azure architecture and explain how Azure enables intelligent, modern, and innovative applications at scale in the cloud, on-premises, and on the edge. Featuring some of the latest Compute announcements with Azure Boost.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Wednesday, November 19, 2:45 PM PST&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Other related IaaS sessions&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;Use the following as a guide to build your session schedule with an emphasis on our Azure Compute topics. These sessions will be in person and recorded. Sessions Tuesday-Thursday will be live streamed.&amp;nbsp;&lt;/P&gt;
&lt;H3 class="lia-align-justify"&gt;Thursday&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK176:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK176?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Driving efficiency and cost optimization for Azure IaaS deployments"&gt;Driving efficiency and cost optimization for Azure IaaS deployments&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level&lt;/STRONG&gt;: Intermediate 200&lt;BR /&gt;Control cloud spend without compromising performance. This session shows how Azure IaaS helps IT leaders optimize costs through flexible pricing, built-in tools, and smart resource planning. Learn how to align infrastructure choices with workload requirements, reduce TCO, and make informed decisions that support growth and innovation. You will gain a deeper understanding of how Azure delivers a comprehensive set of services, tools, and financial instruments to optimize your cloud costs at scale.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Thursday, November 20&lt;SUP&gt;th&lt;/SUP&gt;, 9:45 AM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;BRK217:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK217?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Resilience by design: Secure, scalable, AI-ready cloud with Azure"&gt;Resilience by design: Secure, scalable, AI-ready cloud with Azure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Level:&lt;/STRONG&gt; Advanced 300&lt;BR /&gt;Resiliency is foundational. Explore how resiliency on Azure enables secure, scalable, AI-ready cloud architectures. Learn to set resilience goals, simulate failures, and orchestrate recovery. See live demos and discover how shared responsibility empowers teams to deliver trusted, resilient outcomes.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thursday, November 20&lt;SUP&gt;th&lt;/SUP&gt;, 1:00 PM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK178:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK178?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Architecting for resiliency on Azure Infrastructure"&gt;Architecting for resiliency on Azure Infrastructure&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level&lt;/STRONG&gt;: Intermediate 200&lt;BR /&gt;Discover how to build resilient cloud solutions on Azure by leveraging availability zones, multi-region deployments, and fungible products. This session explores architectural patterns, platform capabilities, and best practices to ensure high availability, fault tolerance, and business continuity for mission-critical workloads in dynamic and distributed environments.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Thursday, November 20, 1:00 PM&amp;nbsp; PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK148:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK148?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Architect resilient apps with Azure backup and reliability features"&gt;Architect resilient apps with Azure backup and reliability features&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Level:&lt;/STRONG&gt; Advanced 300&lt;BR /&gt;Learn to use self-serve tools to strengthen zonal resiliency for critical workloads. Assess and validate resilience across VMs, DBs, and containers. Explore enhanced data and cyber resiliency with immutability and threat detection to guard against ransomware. Discover expanded workload coverage and real-time insights to proactively protect your applications and infrastructure.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Thursday, November 20, 3:30 PM PST&lt;/EM&gt;&lt;/P&gt;
&lt;H3 class="lia-align-justify"&gt;Friday&lt;/H3&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK146:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK146?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Resiliency and recovery with Azure Backup and Site Recovery"&gt;Resiliency and recovery with Azure Backup and Site Recovery&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Level:&lt;/STRONG&gt; Advanced 300&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;This session will show how to secure, detect threats, and quickly recover critical workloads across Azure environments using advanced backup and disaster recovery solutions. It covers modern techniques like threat-aware backups, container protection, and seamless disaster recovery to help meet compliance and recovery objectives.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Friday, November 21, 9:00 AM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK149:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK149?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Unlock cloud-scale observability and optimization with Azure"&gt;Unlock cloud-scale observability and optimization with Azure&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Level:&lt;/STRONG&gt; Advanced 300&lt;BR /&gt;In this session, we'll deep dive into how Azure Monitor delivers end-to-end observability across your cloud and hybrid environments, helping you detect issues early and reduce mean time to recovery. We'll also share how new Copilot in Azure agents can extend this visibility into actionable cost and carbon efficiency insights—helping you identify optimization opportunities, validating recommendations, and streamlining resource performance for business impact.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Friday, November 21&lt;SUP&gt;st&lt;/SUP&gt;, 10:15 AM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK173&lt;/STRONG&gt;&lt;EM&gt;:&amp;nbsp;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK173?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Azure IaaS best practices to enhance performance and scale"&gt;Azure IaaS best practices to enhance performance and scale&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level&lt;/STRONG&gt;&lt;EM&gt;: &lt;/EM&gt;Advanced 300&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Azure IaaS can deliver excellent performance and scalability across a broad range of workloads. With high-throughput storage, low-latency networking, and intelligent auto-scaling, Azure supports demanding apps with precision. Learn how to optimize compute, storage, and network resources to meet performance goals, reduce costs, and scale confidently across global regions. Dive into the latest capabilities Azure Boost, Compute Fleet, Azure Virtual Machines, Azure Storage and Networking offer.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Friday, November 21, 10:15 AM PST&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK172:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK172?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Powering modern cloud workloads with Azure Compute"&gt;Powering modern cloud workloads with Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level&lt;/STRONG&gt;: Advanced 300&lt;BR /&gt;Uncover new VM offerings announcements and explore innovations like Azure Boost. Dive into the latest compute innovation at the core of Azure IaaS. Whether you're running mission-critical enterprise apps or scaling cloud-native services, discover how these innovations are unlocking new value for customers and get a preview of what’s coming next.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Friday, November 21, 11:30 AM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;BRK168:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK168?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Azure IaaS platform security deep dive"&gt;Azure IaaS platform security deep dive&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level:&lt;/STRONG&gt; Advanced 300&lt;BR /&gt;As organizations accelerate their cloud adoption, robust security for your Infrastructure as a Service platform is more critical than ever. This session will provide a comprehensive exploration of Azure’s security architecture, best practices, and innovations across four pillars: foundational security, compute security, network security, and storage security. Attendees will gain actionable insights to strengthen their cloud posture, ensure compliance, and protect sensitive workloads.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Friday, November 21&lt;SUP&gt;st&lt;/SUP&gt; ,11:30 AM PST&lt;/EM&gt;&lt;/P&gt;
&lt;H2 class="lia-align-justify"&gt;&lt;STRONG&gt;Upskill yourself with hands on labs&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="lia-align-justify"&gt;This section explains that live demos and hands-on labs are exclusively available to those who attend in person, providing them with a direct, firsthand experience.&lt;/P&gt;
&lt;H3 class="lia-align-justify"&gt;Tuesday&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;LAB500:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/LAB500?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Attain unified observability and optimization in Azure"&gt;Attain unified observability and optimization in Azure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Level: &lt;/STRONG&gt;Intermediate 200&lt;BR /&gt;Get an AI-powered view of your Azure workload health and performance while uncovering cost and carbon savings. In this lab, use AI to investigate anomalies, correlate telemetry, and drive optimization. Apply FinOps and sustainability insights, align health with SLI/SLO targets, and improve monitoring posture for lasting efficiency.&amp;nbsp;Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Tuesday November 18&lt;SUP&gt;th&lt;/SUP&gt;, 2:45 PM PST&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;LAB520:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/LAB520?source=sessions" target="_blank" rel="noopener" data-lia-auto-title-active="0" data-lia-auto-title="Start, Get and Stay Resilient with Azure"&gt;Start, Get and Stay Resilient with Azure&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Level: &lt;/STRONG&gt;Intermediate 200 &lt;BR /&gt;Understand the Start, Get, and Stay Resilient journey. Get equipped with tools &amp;amp; insights to architect mission critical applications with Azure’s Resiliency and Configuration experiences. Assess your resiliency posture, apply recommendations, validate your posture and orchestrate recovery. With the Essentials Machine Management bundle from Azure, manage and maintain the state of your resources, enforce configurations across devices and ensure resilience is not a one-time goal but an ongoing state. Please RSVP and arrive at least 5 minutes before the start time, at which point remaining spaces are open to standby attendees.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;EM&gt;Tuesday, November 18&lt;SUP&gt;th&lt;/SUP&gt;, 4:30 PM PST&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 20:41:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/your-guide-to-azure-compute-at-microsoft-ignite-2025/ba-p/4468633</guid>
      <dc:creator>melissahollingshed</dc:creator>
      <dc:date>2025-11-10T20:41:35Z</dc:date>
    </item>
    <item>
      <title>Revolutionizing Reliability: Introducing the Azure Failure Prediction and Detection (AFPD) system</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/revolutionizing-reliability-introducing-the-azure-failure/ba-p/4464883</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Blog authored by: Ayberk Ozturk, Andrew Boyd, Otis Smith, Sameer Hussain, Joao Madureira, Ronit Sharma, Isha Bhatia, Halley Ding, Parvaneh Alavi, Jelena Ilic, Kevin Meehan, Steven Li, Arhatha Bramhanand, Nathan Ernst, Abhishek Sanghai, Adam Wilson, Blake Wheaton, Dhruv Matta, Olubusola Femi-Fowode, Shweta Patil, and Tajinder Pal Singh Ahluwalia&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;Introduction&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;As part of the journey to consistently improve Azure reliability and platform stability, we launched Azure Failure Prediction &amp;amp; Detection (AFPD), Azure’s premiere shift-left reliability solution. AFPD became operational in 2024, unifying failure prediction, detection, mitigation, and remediation services into a single end-to-end system with the goal of preventing Azure Compute customer workload interruptions and repairing nodes at scale. AFPD builds upon previous reliability solutions such as &lt;A class="lia-external-url" href="https://azure.microsoft.com/en-us/blog/advancing-failure-prediction-and-mitigation-introducing-narya/?msockid=0b9480c9a32a63ae2204955da23e6290" target="_blank" rel="noopener"&gt;Project Narya&lt;/A&gt;, adding new best practices and fleet health management capabilities on top of pre-existing failure prediction and mitigation capabilities. &amp;nbsp;The end-to-end AFPD system has proven to further reduce the overall number of reboots by over 36% and allows for a proactive approach to maintaining the cloud. This system operates for all Azure Compute General Purpose, Specialized Compute, High Performance Computing (HPC)/Artificial Intelligence (AI) workloads and select Azure Storage scenarios. For a deeper dive, you can read the whitepaper &lt;A class="lia-external-url" href="https://ieeexplore.ieee.org/abstract/document/11108193" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, which won Best Paper Award at the 2025 IEEE Cloud Summit!&lt;/P&gt;
&lt;H1&gt;How does AFPD advance Azure’s failure prediction and mitigation capabilities for customers?&lt;/H1&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://azure.microsoft.com/en-us/blog/advancing-failure-prediction-and-mitigation-introducing-narya/?msockid=0b9480c9a32a63ae2204955da23e6290" target="_blank" rel="noopener"&gt;Project Narya&lt;/A&gt; and several other existing Azure failure prediction and mitigation services effectively predicted and mitigated a broad range of hardware failures for customers, leveraging A/B testing and Multi-Armed Bandit models to improve mitigation techniques for customers over time. Building on the strengths of these systems, AFPD unifies prediction, detection, mitigation, notification, and remediation in a single end-to-end solution with a standard set of performance metrics. AFPD expands coverage to more hardware and software scenarios, uses new Contextual Bandit models alongside A/B and Multi-Armed Bandit methods, and introduces scaled node repair for better fleet health management. This proactive strategy improves reliability, reduces customer downtime, and enhances overall platform stability for a smoother Azure experience.&lt;/P&gt;
&lt;H1&gt;How does AFPD work?&lt;/H1&gt;
&lt;P&gt;AFPD’s ability to identify impending failure events and prevent downtime impact to customer workloads can be broken down into three phases: 1) failure prediction and detection, 2) failure mitigation, and 3) remediation.&lt;/P&gt;
&lt;H3&gt;Phase 1: Failure Prediction and Detection&lt;/H3&gt;
&lt;P&gt;Like Narya, AFPD rules and models monitor telemetry signals indicating node and component behavior from across the fleet. Current, AFPD primarily detects and predicts failures for key hardware components such as SSDs, along with select software scenarios. When these capabilities notice patterns in telemetry that indicate an ongoing failure or a likely future failure, the node in question is tagged and a request is sent to repair the node.&lt;/P&gt;
&lt;H3&gt;Phase 2: Mitigation&lt;/H3&gt;
&lt;P&gt;Once a repair request is sent, the mitigation service optimizes for both preventing customer impact and efficient node repair. Using optimized mitigation actions as suggested by a Contextual Bandit model or A/B testing and AFPD best practices, the mitigation service will take the following actions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mark the node “Unallocatable” to prevent new customer workloads from landing on the node&lt;/LI&gt;
&lt;LI&gt;If eligible, Live Migrate customer workloads running on the node to a new, healthy node; if not eligible, a notification will be sent informing the customer that they need to take redeploy action (see "How can customers consume AFPD notifications?" section below)&lt;/LI&gt;
&lt;LI&gt;Once customer migration actions have been taken, the node is ready to be swiftly removed from production and sent to be remediated&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Phase 3: Remediation&lt;/H3&gt;
&lt;P&gt;Once customer workloads are evacuated from the node via Live Migration or customer redeploy, the node is assigned a fault code with relevant fault details. This ensures that once the node is sent to technicians for repair, the technicians can look at the targeted diagnostic information made beforehand by the subject matter expert prediction or detection capability, allowing for quicker testing to confirm the problem and perform swifter repair. Additionally, intelligent spare remediation capabilities proactively place spares so that once the affected node comes out, a spare part is ready and waiting to expedite repair. Once the node receives the correct repair and goes through additional diagnostics, it is quickly returned to production for customer use.&lt;/P&gt;
&lt;H1&gt;How can customers consume AFPD notifications?&lt;/H1&gt;
&lt;P&gt;To view and use AFPD notifications, we recommend leveraging both Flash Health events and Scheduled Events (SE). Flash Health events provide near real-time information on ongoing and historical availability disruptions. Scheduled Events offer proactive notifications prior to any impact on VM availability, including those detected by AFPD.&lt;/P&gt;
&lt;H3&gt;Navigating AFPD Events*&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;*The notification experience shown below is available for Azure public cloud customers in Compute and HPC/AI. Notifications may appear slightly different in Azure non-public offerings.&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When AFPD detects potential issues, you’ll see detailed event notifications in the Azure portal under your Resource Health blade. These notifications provide context on the type of impact, timing, and recommended actions.&lt;/P&gt;
&lt;P&gt;For example, if an unplanned degraded event is detected for the Host, and the workload can be automatically migrated by the platform, the following notification will be showcased:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Fig 1 - &lt;/STRONG&gt;AFPD Event in Resource Health – note the recommended step to wait for migration completion&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The notification will include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Event details&lt;/STRONG&gt;: Description of the issue (e.g., “The Physical Host in which your VM is running is potentially degraded”).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deadline&lt;/STRONG&gt;: A “before” timestamp indicating when the impact may occur (e.g., &lt;EM&gt;Redeploy before 8/21/2025 6:34 PM UTC&lt;/EM&gt;).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Recommended steps&lt;/STRONG&gt;: Based on your workload type, you may be asked to...&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Wait for a completion notification, as the platform will attempt to automatically migrate your workload or,&lt;/LI&gt;
&lt;LI&gt;Redeploy the VM to a different host to avoid disruption.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;: Links to documentation&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Alternatively, if the VM cannot be moved automatically, the following event will clearly state that redeployment is the only action required, and may include a deadline:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Fig 2 - &lt;/STRONG&gt;AFPD Event in Resource Health – note the recommended step to redeploy the VM with a specific deadline&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Notification text&lt;/STRONG&gt;: “Please redeploy your VM before 8/21/2025 9:49 PM UTC to a different host server to avoid unexpected disruptions.”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Recommended steps&lt;/STRONG&gt;: Redeploy the VM immediately to a different host server as soon as possible.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Consume AFPD annotations through Project Flash endpoints*&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;* All below endpoints are available for Azure public cloud customers in Compute and HPC/AI. In Azure non-public offerings, the ARG and Event Grid endpoints are not yet available.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We’re making it easier than ever to stay on top of AFPD events and respond quickly to minimize disruption. AFPD events are delivered as part of the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/service-health/resource-health-vm-annotation" target="_blank" rel="noopener"&gt;resource health annotations&lt;/A&gt;, which can be conveniently accessed through different endpoints of &lt;A class="lia-external-url" href="https://azure.microsoft.com/en-us/blog/project-flash-update-advancing-azure-virtual-machine-availability-monitoring-2/" target="_blank" rel="noopener"&gt;Project Flash&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can easily find notifications related to AFPD events in the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/flash-azure-resource-health" target="_blank" rel="noopener"&gt;Resource Health portal&lt;/A&gt; along with other resource health events. This helps you stay aware of any ongoing platform issues affecting your resources.&lt;/LI&gt;
&lt;LI&gt;For large-scale investigations, centralized tracking, or historical event lookups, you can query all the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/service-health/resource-health-vm-annotation" target="_blank" rel="noopener"&gt;resource health annotations&lt;/A&gt; in &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/previous-versions/azure/governance/resource-graph/samples/samples-by-table?tabs=azure-cli#healthresources" target="_blank" rel="noopener"&gt;HealthResources&lt;/A&gt; and &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/previous-versions/azure/governance/resource-graph/samples/samples-by-table?tabs=azure-cli#healthresourcechanges" target="_blank" rel="noopener"&gt;HealthResourceChanges&lt;/A&gt; tables using &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/flash-azure-resource-graph" target="_blank" rel="noopener"&gt;Azure Resource Graph&lt;/A&gt;. The following example demonstrates how to retrieve only the AFPD annotations related to node degradation from the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/previous-versions/azure/governance/resource-graph/samples/samples-by-table?tabs=azure-cli#healthresources" target="_blank" rel="noopener"&gt;HealthResources&lt;/A&gt; table.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="kusto"&gt;healthresources
| where type =~ 'microsoft.resourcehealth/resourceannotations'
| extend temp = parse_json(properties)
| where temp.impactType == "Degraded"&lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI&gt;Through &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/flash-event-grid-system-topic" target="_blank" rel="noopener"&gt;Event Grid system topics&lt;/A&gt;, you can set up alerts and automatically trigger critical actions—such as redeploying or restarting VMs—using &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/event-grid/event-handlers" target="_blank" rel="noopener"&gt;event handlers&lt;/A&gt; like Azure functions and Logic Apps. You also have full flexibility to manage your &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/event-grid/handle-health-resources-events-using-azure-monitor-alerts#event-filters" target="_blank" rel="noopener"&gt;event filtering&lt;/A&gt; based on the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/event-grid/event-schema-health-resources?tabs=cloud-event-schema#properties-for-the-resourceannotated-event" target="_blank" rel="noopener"&gt;JSON properties&lt;/A&gt; of the &lt;EM&gt;ResourceAnnotated&lt;/EM&gt; events.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Consume AFPD events through Scheduled Events&lt;/H3&gt;
&lt;P&gt;We send events from AFPD through &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/linux/scheduled-events" target="_blank" rel="noopener"&gt;scheduled events&lt;/A&gt; so you can have a single source for all planned and unplanned availability impacts to your VMs. For automated resiliency, you can retrieve scheduled events within the VM through the Instance Metadata Endpoint. Then you can proactively migrate your workload away from at risk resources before the impact happens, reducing the downstream impact to your customers.&lt;/P&gt;
&lt;P&gt;If you are a current user of scheduled events, you’re already receiving notifications from AFPD. You will just need to confirm that your workload is configured to handle not before times up to 7 days in the future. For new users, you can get started using scheduled events today with our &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/linux/scheduled-events#python-sample-2" target="_blank" rel="noopener"&gt;code samples&lt;/A&gt;.&lt;/P&gt;
&lt;H1&gt;VM Watch for enhanced diagnostics and AFPD performance on L-Series&lt;/H1&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/azure-vm-watch" target="_blank" rel="noopener"&gt;VM Watch&lt;/A&gt; is a lightweight, in-VM watchdog service that emits near real-time health signals from guest VMs, enabling Azure to detect regressions and initiate proactive recovery. Enabling VM Watch for L-Series workloads is specifically important for enabling better AFPD predictions and detections.&lt;/P&gt;
&lt;P&gt;For onboarding, customers can enable VM watch through the Application Health Extension using tools like Azure CLI, PowerShell, ARM templates or Azure Policy. The onboarding process includes specifying a CohortId—typically a string name for customers, if they identify themselves—to group and track VM watch instances across a fleet. Once enabled, VM watch begins emitting signals immediately, thanks to &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/vm-watch-collector-suite" target="_blank" rel="noopener"&gt;its built-in suite of default tests&lt;/A&gt; that require minimal configuration. For L-Series VMs, which often run data-intensive workloads, VM watch can be particularly valuable in detecting issues like network connectivity failures, DNS resolution problems, and disk I/O anomalies. &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/install-vm-watch?tabs=cli-1%2Ccli-2" target="_blank" rel="noopener"&gt;To onboard to VM watch&lt;/A&gt;, follow the steps in the linked page. In addition, VM watch can be &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/configure-vm-watch?tabs=ARM-template-1" target="_blank" rel="noopener"&gt;configured&lt;/A&gt; to suit your specific requirements, including being able to view signals through a &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/configure-eventhub-vm-watch?tabs=managedidentity-1%2Clinux-1" target="_blank" rel="noopener"&gt;pre-configured Event Hub&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 19:02:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/revolutionizing-reliability-introducing-the-azure-failure/ba-p/4464883</guid>
      <dc:creator>andrewb710</dc:creator>
      <dc:date>2025-10-31T19:02:54Z</dc:date>
    </item>
    <item>
      <title>Streamline Cloud Spend with Azure Reserved VM Instances</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/streamline-cloud-spend-with-azure-reserved-vm-instances/ba-p/4464773</link>
      <description>&lt;P&gt;Cloud costs can feel like a runaway train, especially if you’re running GPU-heavy workloads for AI. Every hour of compute adds up, and before long, your forecasted budget is looking off.&lt;/P&gt;
&lt;P&gt;This is where Azure Reserved Virtual Machine Instance can help. When customers commit to using a specific Virtual Machine in a region for a set time they’ll receive a discounted price.&lt;/P&gt;
&lt;P&gt;In this blog we’ll follow a fictious company, Contoso, that is looking to optimize their VM spend while scaling their AI workloads. Contoso were training generative models and running inference on &lt;STRONG&gt;NC64as T4 v3 VMs&lt;/STRONG&gt; in East US. These VMs are built for &lt;STRONG&gt;GPU acceleration&lt;/STRONG&gt;, making them ideal for AI workloads. They used these VMs for deep learning inference, model fine-tuning, and batch processing at scale.&lt;/P&gt;
&lt;P&gt;Performance was non-negotiable, but cost predictability was slipping away.&lt;/P&gt;
&lt;P&gt;So how did they turn things around? With &lt;STRONG&gt;&lt;A href="https://azure.microsoft.com/en-us/pricing/offers/reservations/" target="_blank" rel="noopener"&gt;Azure Reserved VM Instances&lt;/A&gt; &lt;/STRONG&gt;and leveraging Azure’s built-in tools.&lt;/P&gt;
&lt;H2&gt;What are Azure Reserved VM Instances?&lt;/H2&gt;
&lt;P&gt;Azure Reserved VM Instances (RIs) are&amp;nbsp;&lt;STRONG&gt;an Azure commitment offer that provides a discount when you&lt;/STRONG&gt; commit to Azure usage for 1 or 3 years. You pick a VM instance, region, and term, and Azure automatically applies the discount to any matching VM you run. No manual assignment, no runtime changes, just lower compute costs.&lt;/P&gt;
&lt;P&gt;Why does this matter? Because if your workloads are &lt;STRONG&gt;predictable and stable&lt;/STRONG&gt;, RIs can save you up to &lt;A href="https://azure.microsoft.com/en-us/pricing/offers/reservations/#footnote-1" target="_blank" rel="noopener"&gt;72% compared to pay-as-you-go pricing&lt;/A&gt; for Windows and Linux virtual machines. For Contoso, that meant turning unpredictable GPU costs into a predictable, CFO-approved budget.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=PRGo-RH-sL4/1761665020947" data-video-remote-vid="https://www.youtube.com/watch?v=PRGo-RH-sL4/1761665020947" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FPRGo-RH-sL4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DPRGo-RH-sL4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FPRGo-RH-sL4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H2&gt;The challenge: “How do we start?”&lt;/H2&gt;
&lt;P&gt;Contoso had questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;What if we resize VMs during model experiments?&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;What if usage shifts across subscriptions as teams grow?&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;How do we avoid overbuying and wasting money?&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That’s where Azure’s ecosystem comes in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://azure.microsoft.com/en-us/products/advisor/" target="_blank" rel="noopener"&gt;Azure Advisor&lt;/A&gt;&lt;/STRONG&gt;: Personalized recommendations based on your actual usage.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/reserved-vm-instance-size-flexibility?toc=%2Fazure%2Fcost-management-billing%2Freservations%2Ftoc.json" target="_blank" rel="noopener"&gt;Instance size flexibility&lt;/A&gt;&lt;/STRONG&gt;: Discounts apply across sizes in the same instance group.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://azure.microsoft.com/en-us/products/cost-management/" target="_blank" rel="noopener"&gt;Microsoft Cost Management&lt;/A&gt;&lt;/STRONG&gt;: Monitor utilization, set alerts, and manage renewals.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Step 1: Let Azure Advisor do the math&lt;/H2&gt;
&lt;P&gt;Instead of guessing, Contoso opened &lt;STRONG&gt;Azure Advisor&lt;/STRONG&gt;. Within seconds, they saw:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Which VM family (NCasT4_v3) was most consistent based on historical usage.&lt;/LI&gt;
&lt;LI&gt;How many RIs to purchase.&lt;/LI&gt;
&lt;LI&gt;Whether a 1-year or 3-year term made sense.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Azure Advisor even flagged idle VMs they could shut down before buying to avoid purchasing for resources that are not being used.&lt;/P&gt;
&lt;H2&gt;Step 2: Choosing the right scope&lt;/H2&gt;
&lt;P&gt;Here’s where Contoso faced a critical choice: &lt;STRONG&gt;scope&lt;/STRONG&gt;. Scope determines where the RI discount applies:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Shared scope&lt;/STRONG&gt;: Applies across all subscriptions in the same billing context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Management group&lt;/STRONG&gt;: Covers subscriptions grouped under a management hierarchy.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Single subscription&lt;/STRONG&gt;: Simple, but limited to one subscription.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Resource group:&amp;nbsp;&lt;/STRONG&gt;Most accurate for chargeback costs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Contoso had multiple teams running AI workloads in different subscriptions but under the same billing account. They wanted &lt;STRONG&gt;maximum utilization&lt;/STRONG&gt; without losing visibility for chargeback. After reviewing governance policies, they chose &lt;STRONG&gt;Shared scope &lt;/STRONG&gt;as&lt;STRONG&gt; &lt;/STRONG&gt;it gave them broad coverage while keeping reporting simple in Cost Management.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Step 3: Buying RIs the smart way&lt;/H2&gt;
&lt;P&gt;Based on their Azure Advisor recommendations Contoso purchased:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NC64as T4 v3 RIs in East US&lt;/STRONG&gt; for inference clusters (3-year term, upfront for maximum savings).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;They scoped the reservations to &lt;STRONG&gt;Shared&lt;/STRONG&gt; so discounts applied across multiple subscriptions. And they enabled &lt;STRONG&gt;instance size flexibility&lt;/STRONG&gt;, meaning their NC64as T4 v3 RI could also cover smaller sizes in the NCasT4_v3 family if they scaled down during experiments. No lock-in panic.&lt;/P&gt;
&lt;H2&gt;Step 4: Monitoring like a pro&lt;/H2&gt;
&lt;P&gt;After purchase, Contoso didn’t just walk away. They set up:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/cost-management-billing/costs/reservation-utilization-alerts" target="_blank" rel="noopener"&gt;Utilization alerts&lt;/A&gt;&lt;/STRONG&gt; in Microsoft Cost Management (triggered if usage dipped below a predetermine threshold).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/cost-management-billing/reservations/reservation-renew" target="_blank" rel="noopener"&gt;Auto-renewal&lt;/A&gt; &lt;/STRONG&gt;to avoid unexpected spikes in cost when their RIs expired.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;When they added new inference nodes for a production rollout, the RI discount applied automatically. When they resized a few training VMs for smaller models, instance size flexibility kept the savings intact.&lt;/P&gt;
&lt;H2&gt;The result? Big savings, zero compromise&lt;/H2&gt;
&lt;P&gt;Contoso cut GPU compute costs compared to pay-as-you-go. They kept performance rock solid, freed up budget for more experiments, and gave their CFO the predictability they craved.&lt;/P&gt;
&lt;H3&gt;What Contoso learned&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Start with Advisor&lt;/STRONG&gt;: It’s like having a FinOps analyst on demand.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scope smartly&lt;/STRONG&gt;: Shared scope boosts utilization, but align with your chargeback model.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Flexibility matters&lt;/STRONG&gt;: Enable instance size flexibility for future-proofing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor relentlessly&lt;/STRONG&gt;: Alerts and Cost Management dashboards keep you ahead of surprises.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Combine with &lt;A href="https://azure.microsoft.com/en-us/pricing/offers/savings-plan-compute/" target="_blank" rel="noopener"&gt;Azure savings plan for compute&lt;/A&gt;&lt;/STRONG&gt; if your workloads are less predictable and need additional flexibility&lt;/P&gt;
&lt;H2&gt;Why this matters for you&lt;/H2&gt;
&lt;P&gt;If you’re running AI workloads, or any predictable compute, Reserved Instances aren’t just a cost-saving trick. They’re a strategy for &lt;STRONG&gt;financial predictability&lt;/STRONG&gt;, &lt;STRONG&gt;operational flexibility&lt;/STRONG&gt;, and &lt;STRONG&gt;cloud efficiency&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ready to start?&lt;/STRONG&gt;&lt;BR /&gt;Visit the&amp;nbsp;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2315958&amp;amp;clcid=0x409" target="_blank" rel="noopener"&gt;Azure portal&lt;/A&gt;&amp;nbsp;to purchase your Reserved Instance today or read the &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/prepay-reserved-vm-instances?toc=%2Fazure%2Fcost-management-billing%2Freservations%2Ftoc.json" target="_blank" rel="noopener"&gt;Azure Reserved Instance documentation&lt;/A&gt; to learn more.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;Resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;"&gt;&lt;STRONG&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/plans/8q5nfo4xyx2g5x" target="_blank" rel="noopener"&gt;Lean about Azure pricing tools and cost-saving best practices&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: bold;"&gt;&lt;STRONG&gt;&lt;A class="lia-external-url" href="https://aka.ms/TEI-Cost-Efficiency" target="_blank" rel="noopener"&gt;Read the business impact of Azure in a Forrester study&lt;/A&gt;.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: bold;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=OYribdKLHtE" target="_blank" rel="noopener"&gt;Watch how to how to optimize and save with RIs and Azure savings plan.&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 29 Oct 2025 17:26:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/streamline-cloud-spend-with-azure-reserved-vm-instances/ba-p/4464773</guid>
      <dc:creator>kyleikeda</dc:creator>
      <dc:date>2025-10-29T17:26:23Z</dc:date>
    </item>
    <item>
      <title>Announcing Preview of vCore Customization: Disable Multithreading &amp; Configurable Constrained Cores</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-preview-of-vcore-customization-disable-multithreading/ba-p/4462417</link>
      <description>&lt;P&gt;Today, we are excited to announce the public preview of VM vCore Customization feature in Azure introducing two powerful new capabilities:&amp;nbsp;&lt;STRONG&gt;Disable Simultaneous Multi-Threading (SMT/HT)&lt;/STRONG&gt; and &lt;STRONG&gt;Configurable Constrained Cores&lt;/STRONG&gt;. These features give customers unprecedented control over virtual CPU configurations, enabling performance optimization and significant software licensing savings across a wide range of workloads.&lt;/P&gt;
&lt;P&gt;VM vCore Customization is designed to meet the evolving needs of customers who require flexibility in how compute resources are allocated. Whether you're optimizing cost, performance, or compliance, these features allow you to tailor VM configurations to match your licensed capacity, workload profile, or infrastructure strategy without compromising on memory, storage, or I/O.&lt;/P&gt;
&lt;P&gt;This launch marks a major milestone in Azure’s commitment to customizable infrastructure. By decoupling core count from VM size, customers can now deploy high-memory or high-bandwidth VMs with fewer active cores, reducing software licensing costs and improving efficiency. Combined with the ability to disable SMT for latency-sensitive workloads, VM vCore Customization unlocks new scenarios for database optimization, HPC, analytics, and more.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What’s New&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;With VM Customization, customers can now:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Disable Simultaneous Multi-Threading (SMT/HT Off):&lt;/STRONG&gt; Configure supported VMs to run with one thread per core, giving workloads exclusive access to physical cores for improved performance and latency consistency.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Select Custom vCPU Counts:&lt;/STRONG&gt; Choose from a guided list of valid vCPU counts per VM size to match licensing rights or workload needs without changing memory, storage, or I/O capabilities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Why It Matters&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;VM vCore Customization is designed to resolve persistent customer challenges by offering greater flexibility in how virtual machines are configured. For performance-sensitive workloads such as high-performance computing or financial modeling, disabling hyperthreading allows for full-core isolation, which can significantly enhance performance.&lt;/P&gt;
&lt;P&gt;For database workloads like SQL Server, Oracle, or SAP, VM vCore Customization enables customers to select only the number of cores they require, while still benefiting from the memory and bandwidth of larger VM sizes. This targeted approach can lead to substantial reductions in licensing costs.&lt;/P&gt;
&lt;P&gt;Additionally, VM vCore Customization simplifies compliance and cost optimization, especially for organizations operating under Bring Your Own License (BYOL) models or per-core software agreements. By tailoring VM resources to precise needs, customers can better align their infrastructure with both technical and business requirements.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Join the Preview&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;VM vCore Customization is now available today in public preview across select regions, including West Central US, North Europe, East Asia, and UK South.&lt;/P&gt;
&lt;P&gt;VM vCore Customization is available via Azure portal, ARM templates, Azure CLI and PowerShell. Only first-party OS images are supported, Marketplace images with third-party licensing are not supported.&lt;/P&gt;
&lt;P&gt;To request access to the preview, please fill out the survey form &lt;A href="https://forms.office.com/r/JjMivfn8bS" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. We look forward to hearing from you.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2025 19:31:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/announcing-preview-of-vcore-customization-disable-multithreading/ba-p/4462417</guid>
      <dc:creator>eehindero</dc:creator>
      <dc:date>2025-10-23T19:31:08Z</dc:date>
    </item>
    <item>
      <title>Public Preview for Sharing Capacity Reservation Groups - now available</title>
      <link>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-for-sharing-capacity-reservation-groups-now/ba-p/4461834</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The ability to share Capacity Reservation Gr&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;oups&amp;nbsp;(CRGs)&amp;nbsp;with subscriptions&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is now in Public Preview.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Previously, customers could deploy VMs in a Capacity Reservation Group within the same subscription only.&amp;nbsp;On-demand Capacity Reservation Group (CRG) can now be shared with other subscriptions. Using this&amp;nbsp;option&amp;nbsp;can make it easier to manage some common configuration needs like resource reuse, centralized capacity management, more cost-effective scale-out&amp;nbsp;and separating security and capacity concerns.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For example, for resource reuse&amp;nbsp;scenario, customers&amp;nbsp;cannot use a&amp;nbsp;Disaster Recovery Capacity Reservation Group for development testing&amp;nbsp;purposes&amp;nbsp;across&amp;nbsp;subscriptions&amp;nbsp;today. With the sharing feature, customers will be able to repurpose the Capacity Reservation Group for&amp;nbsp;non-production workloads.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;User Experience:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Sharing reserved capacity requires at least two subscriptions:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Provider subscription – the subscription that creates and hosts the Capacity Reservation Group and member Capacity Reservations.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Consumer subscription - another subscription that is granted access to the reserved capacity, obtaining the ability to deploy virtual machines (VMs) with the Capacity Reservation Service Level Agreement (SLA).&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The deployed VMs must match one of the Capacity Reservations in the Capacity Reservation groups on SKU, location, and availability zone if applicable.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Example:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this example, Subscription A is the&amp;nbsp;Provider&amp;nbsp;and Subscription B is the Consumer subscription.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Step 1: Share CRG X&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;A rights administrator in Subscription B must grant User “A” CRG “share” permissions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;User “A” (CRG owner) must then update the “sharing profile” of CRG X to include Subscription B. A given Capacity Reservation Group can be shared with up to 100 consumer subscriptions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Step 2: grant user access to CRG X&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;A rights administrator in Subscription A must grant User “B” (VM owner) read and deploy rights to CRG X in Subscription&amp;nbsp;A.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;Once complete, User B can deploy VMs by&amp;nbsp;setting&amp;nbsp;the “capacityReservationGroup” property on Virtual Machines or Virtual Machine Scale Sets.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Public Preview limitations:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Portal support is not available; API and other Azure clients are available.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="·" data-font="Symbol" data-listid="11" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;·&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Re-provisioning of VMSS VMs using a shared Capacity Reservation Group is not supported during a zone outage.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt; Resources to get started:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/computereservationsharing" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://aka.ms/computereservationsharing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Additionally, you can read the &lt;/SPAN&gt;&lt;A href="https://aka.ms/on-demand-capacity-reservations-docs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;on demand capacity reservation documentation&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; that includes sample code.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Background:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:180,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;On-demand capacity reservations for Azure Virtual Machines let you deploy and manage the compute capacity required to run Azure Virtual Machines. This new feature enables your IT organization to reserve compute capacity for a VM size. The reservation can be for any length of time in any public Azure region or availability zone and supports most VM series. You can create and cancel an on-demand capacity reservation at any time; no commitment is required. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:180,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The ability for you to access&amp;nbsp;compute&amp;nbsp;capacity–with SLA guarantees–ahead of actual VM deployments is particularly important to ensure the availability of business-critical applications running on Azure. On-demand capacity reservations can be combined with Azure Reserved VM Instances (RIs) to significantly reduce costs. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:180,&amp;quot;335559739&amp;quot;:180,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Read the &lt;/SPAN&gt;&lt;A href="https://aka.ms/on-demand-capacity-reservations-GA-ACOM" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;blog&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(link to tech community blog for Public Preview of specialty SKUs) for more details. You can also watch this&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; &lt;/SPAN&gt;&lt;A href="https://www.youtube.com/watch?v=9dd65rTbbWY" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;video&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; or read the &lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/virtual-machines/capacity-reservation-overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;documentation&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:180,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 22:47:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-compute-blog/public-preview-for-sharing-capacity-reservation-groups-now/ba-p/4461834</guid>
      <dc:creator>Tarannum91</dc:creator>
      <dc:date>2025-10-15T22:47:39Z</dc:date>
    </item>
  </channel>
</rss>

