Generated on: July 24, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 2 items
Published: July 23, 2025 14:45:55 UTC Link: Generally Available: Azure Managed Lustre now supports VNet Encryption for in-transit data protection
Update ID: 498993 Data source: Azure Updates API
Categories: Launched, Storage, Azure Managed Lustre, Security, Features
Summary:
What was updated
Azure Managed Lustre now supports Virtual Network (VNet) Encryption for data in transit.
Key changes or new features
This update enables encryption of data moving between Azure Managed Lustre file systems and client virtual machines within a VNet. It ensures that all in-transit data is protected using Azure’s native VNet encryption capabilities, enhancing security and compliance for sensitive workloads.
Target audience affected
Developers and IT professionals using Azure Managed Lustre for high-performance file storage, particularly those with strict data confidentiality and compliance requirements.
Important notes if any
This feature helps organizations meet regulatory standards by securing data in transit without additional configuration complexity. Users should verify their network and client VM configurations to fully leverage VNet encryption. The update is generally available and can be enabled immediately.
For more details, visit: https://azure.microsoft.com/updates?id=498993
Details:
The recent general availability of Virtual Network (VNet) Encryption for Azure Managed Lustre marks a significant enhancement in securing data in transit between Azure Managed Lustre file systems and client virtual machines (VMs). This update addresses critical compliance and security requirements by ensuring that all network traffic within the Azure backbone is encrypted, thereby protecting sensitive data from interception or tampering during transmission.
Background and Purpose
Azure Managed Lustre is a high-performance, scalable file system optimized for compute-intensive workloads such as HPC, AI, and big data analytics. As organizations increasingly adopt cloud-based storage solutions, regulatory standards and internal security policies demand robust encryption mechanisms not only at rest but also in transit. Prior to this update, data moving between client VMs and Managed Lustre was transmitted over the Azure virtual network without encryption, potentially exposing data to risks within the network fabric. The introduction of VNet Encryption aims to close this gap by providing native encryption of data packets traveling over the virtual network, thereby enhancing data confidentiality and compliance posture.
Specific Features and Detailed Changes
Technical Mechanisms and Implementation Methods
The encryption leverages Azure’s underlying virtual network infrastructure, employing IPsec or similar cryptographic protocols to secure packets at the network layer. When VNet Encryption is enabled, all network traffic between the Managed Lustre endpoint and client VMs is encapsulated and encrypted before transmission over the Azure backbone. This is transparent to the client applications and requires no changes to the Lustre protocol or client-side software. The encryption keys are managed by Azure’s Key Vault and security infrastructure, ensuring secure key lifecycle management and rotation without user intervention.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
Published: July 23, 2025 06:30:03 UTC Link: Generally Available: Search Job Enhancements in Log Analytics
Update ID: 498462 Data source: Azure Updates API
Categories: Launched, DevOps, Management and governance, Azure Monitor, Features
Summary:
What was updated
Azure Log Analytics introduced generally available enhancements to Search Jobs, enabling asynchronous queries over any data in a Log Analytics workspace, including long-term retention data.
Key changes or new features
Search Jobs now support running queries asynchronously on all workspace data, not limited to recent data, allowing retrieval of historical logs from long-term retention. The results of these queries are stored in a new Analytics table within the workspace, making them accessible for subsequent queries and analysis. This improves efficiency by decoupling query execution from result consumption and enables complex workflows involving large datasets over extended time periods.
Target audience affected
Developers and IT professionals who use Azure Monitor and Log Analytics for querying, monitoring, and analyzing log data, especially those requiring access to historical data and advanced query orchestration.
Important notes if any
The enhancement facilitates better data exploration and operational insights by leveraging long-term retention data without impacting real-time query performance. Users should consider updating their workflows to utilize asynchronous Search Jobs for improved scalability and flexibility in log data analysis.
For more details, visit: https://azure.microsoft.com/updates?id=498462
Details:
The recent general availability of Search Job enhancements in Azure Log Analytics introduces a powerful asynchronous querying capability that significantly extends the flexibility and scope of data analysis within Log Analytics workspaces. This update enables IT professionals to run Search Jobs on any data stored in their workspace, including data retained in long-term retention, and to surface the results as a new Analytics table for subsequent queries, thereby streamlining complex investigative workflows and long-term data analysis.
Background and Purpose
Traditionally, querying large volumes of telemetry and log data in Log Analytics, especially data archived in long-term retention, posed challenges due to latency and limited query scope. Search Jobs were introduced to address these limitations by allowing asynchronous execution of queries that can span all data in the workspace, including historical data beyond the standard retention period. This update marks the general availability of enhanced Search Jobs, reflecting maturity and expanded capabilities to support enterprise-grade operational analytics and security investigations.
Specific Features and Detailed Changes
Technical Mechanisms and Implementation Methods
Search Jobs leverage the underlying Kusto engine’s asynchronous processing capabilities. When a Search Job is initiated, the query is dispatched to run in the background against both the hot data store and the long-term retention store. Once the job completes, the results are persisted as a new table in the workspace’s schema. This persistence allows subsequent queries to treat the Search Job output as a first-class data source. The system provides APIs and portal interfaces to submit jobs, monitor progress, and retrieve results, supporting automation and integration into CI/CD pipelines or monitoring solutions.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
Search Jobs complement Azure Monitor and Azure Sentinel by enhancing log data accessibility and analysis. In Azure Sentinel, these jobs can support advanced threat hunting by enabling queries over extended data periods. Integration with Azure Logic Apps or Azure Functions allows automated workflows triggered by Search Job completion. Additionally, results tables can feed into Power BI
This report was automatically generated - 2025-07-24 03:01:27 UTC