DailyAzureUpdatesGenerator

September 16, 2025 - Azure Updates Summary Report (Details Mode)

Generated on: September 16, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 6 items

Update List

1. Retirement: Azure Databricks Standard tier will retire by October 2026

Published: September 16, 2025 00:15:32 UTC Link: Retirement: Azure Databricks Standard tier will retire by October 2026

Update ID: 502623 Data source: Azure Updates API

Categories: AI + machine learning, Analytics, Azure Databricks, Retirements

Summary:

Details:

The announced retirement of the Azure Databricks Standard tier by October 2026 reflects Microsoft’s strategic effort to streamline and enhance the Azure Databricks service offerings, encouraging users to transition to more advanced tiers that provide improved performance, security, and feature sets. Effective April 1, 2026, Azure subscriptions will no longer permit the creation of new Standard tier workspaces, and from October 1, 2026, all existing Standard tier workspaces will be retired, necessitating migration to Premium or Enterprise tiers.

Background and Purpose:
The Standard tier of Azure Databricks has historically served as an entry-level option for data engineering and analytics workloads, offering core Databricks functionalities at a lower cost. However, as data workloads grow in complexity and security requirements intensify, Microsoft aims to consolidate its offerings to tiers that better support enterprise-grade features such as role-based access control (RBAC), enhanced security, compliance certifications, and advanced collaboration tools. This retirement encourages customers to leverage the Premium or Enterprise tiers, which provide richer capabilities aligned with modern data governance and operational needs.

Specific Features and Detailed Changes:
The key change is the cessation of the Standard tier workspace creation from April 1, 2026, and the complete retirement of existing Standard tier workspaces by October 1, 2026. The Standard tier lacks several advanced features present in Premium and Enterprise tiers, such as:

Users currently on the Standard tier will need to plan migration strategies to upgrade their workspaces to Premium or Enterprise tiers to maintain uninterrupted service and access to advanced features.

Technical Mechanisms and Implementation Methods:
Migration involves workspace upgrade procedures supported by Azure Databricks, which typically include exporting notebooks, jobs, and configurations from the Standard tier workspace and importing them into a Premium or Enterprise tier workspace. Azure Databricks provides APIs and CLI tools to facilitate this process. Additionally, administrators should review cluster configurations, libraries, and integration points to ensure compatibility with the target tier’s capabilities.

From a technical standpoint, the Premium and Enterprise tiers leverage enhanced Azure Active Directory integration for authentication and authorization, enabling RBAC and conditional access policies. They also support integration with Azure Monitor and Azure Security Center for comprehensive monitoring and threat detection, which are not fully available in the Standard tier.

Use Cases and Application Scenarios:
This update primarily impacts organizations using Azure Databricks for data engineering, machine learning, and analytics workloads on the Standard tier. Use cases involving sensitive data, regulatory compliance, or requiring collaboration across multiple teams will benefit from migrating to Premium or Enterprise tiers. For example:

Important Considerations and Limitations:

Integration with Related Azure Services:
Upgrading to Premium or Enterprise tiers enhances integration with Azure ecosystem services. For instance:


2. Retirement: hsmPlatform 1 Keys in Azure Key Vault

Published: September 15, 2025 21:30:04 UTC Link: Retirement: hsmPlatform 1 Keys in Azure Key Vault

Update ID: 494676 Data source: Azure Updates API

Categories: Security, Key Vault, Retirements

Summary:

Details:

The Azure update announces the planned retirement of support for hsmPlatform 1 keys in Azure Key Vault, effective September 15, 2028, as part of Microsoft’s ongoing efforts to enhance security and performance within its cryptographic key management services.

Background and Purpose:
hsmPlatform 1 keys refer to a legacy hardware security module (HSM) platform used within Azure Key Vault for generating and storing cryptographic keys. Over time, advancements in HSM technology and cryptographic standards have rendered the original hsmPlatform 1 architecture less optimal in terms of security features, performance, and compliance with modern cryptographic requirements. The retirement aims to phase out this older platform to encourage customers to migrate to newer, more secure HSM platforms (such as hsmPlatform 2 or later), which provide improved cryptographic algorithms, enhanced key protection mechanisms, and better integration with Azure’s evolving security ecosystem.

Specific Features and Detailed Changes:
The key change is the cessation of support for keys created or managed under the hsmPlatform 1 environment within Azure Key Vault. After September 15, 2028, any cryptographic operations involving these keys—such as encryption, decryption, signing, or key wrapping—will no longer be supported. Customers must migrate their keys to supported HSM platforms before this deadline to avoid service disruption. This update does not affect keys created on newer HSM platforms or software-protected keys.

Technical Mechanisms and Implementation Methods:
Azure Key Vault’s HSM-backed keys are stored and managed within FIPS 140-2 Level 2 validated hardware security modules. The hsmPlatform 1 keys are tied to a specific generation of HSM hardware and firmware. The retirement involves disabling backend support for these keys, effectively preventing cryptographic operations on them. Migration typically involves exporting key material (where allowed by key type and policy) or re-creating keys on newer HSM platforms, followed by updating applications to reference the new keys. Azure provides tooling and APIs to facilitate key migration, including Key Vault’s key rotation and backup/restore features, though direct export of HSM-protected keys is generally restricted to maintain security.

Use Cases and Application Scenarios:
This update primarily impacts organizations using Azure Key Vault for key management in scenarios such as data encryption at rest, secure key storage for application authentication, digital signing, and certificate management where keys are backed by hsmPlatform 1. Industries with stringent compliance requirements—such as finance, healthcare, and government—must ensure migration to maintain compliance with security standards and avoid operational risks. Applications relying on legacy keys for cryptographic operations need to plan and execute migration well ahead of the retirement date.

Important Considerations and Limitations:

Integration with Related Azure Services:
Azure Key Vault integrates with numerous Azure services such as Azure Storage, Azure SQL Database, Azure Virtual Machines, and Azure App Service for key management and encryption. The retirement of hsmPlatform 1 keys necessitates coordinated updates across these services to reference migrated keys. Additionally, Azure Security Center and Azure Policy can be leveraged to monitor key usage and enforce migration policies. Azure Key Vault’s integration with Azure Active Directory for access control remains unchanged, but role assignments may need review if key identifiers change during migration.

In summary, the retirement of hsmPlatform 1 keys in Azure Key Vault by September 15, 2028, reflects Microsoft’s commitment to advancing cryptographic


3. Generally Available: Enabling dedicated connections to backends in Azure Application Gateway

Published: September 15, 2025 16:45:57 UTC Link: Generally Available: Enabling dedicated connections to backends in Azure Application Gateway

Update ID: 503398 Data source: Azure Updates API

Categories: Launched, Networking, Security, Application Gateway, Services, Features, Management

Summary:

Details:

The recent Azure update announces the general availability of a new feature in Azure Application Gateway V2 that enables dedicated connections from the Application Gateway to backend servers. This enhancement addresses connection management by allowing IT professionals to configure persistent, non-shared TCP connections between the gateway and backend pools, diverging from the previous default behavior of connection reuse.

Background and Purpose
Azure Application Gateway, a Layer 7 load balancer, optimizes traffic routing to backend servers. Traditionally, it reuses idle backend connections to conserve TCP resources and improve performance by reducing connection establishment overhead. However, certain backend applications or protocols may require dedicated connections for reasons such as session affinity, transaction consistency, or compliance with backend server connection policies. This update introduces the ability to explicitly enable dedicated connections, providing finer control over backend connectivity and improving compatibility with such scenarios.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
Under the hood, enabling dedicated connections modifies the connection pooling logic within the Application Gateway’s backend HTTP(S) connection management. Instead of placing backend connections into a shared idle pool for reuse, the gateway maintains persistent, exclusive TCP connections per client request or session as configured. This reduces connection multiplexing but increases isolation between client sessions and backend connections. The feature is exposed via the Application Gateway configuration API and Azure Portal, allowing administrators to toggle dedicated connection settings on backend pools. The gateway continues to support HTTP/2 and WebSocket protocols with this feature enabled.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services
This update integrates seamlessly with Azure Monitor and Azure Network Watcher, enabling monitoring of connection metrics and diagnostics for dedicated backend connections. It complements Azure Front Door and Azure Traffic Manager by providing enhanced backend connection control within Application Gateway’s regional load balancing. When combined with Azure Web Application Firewall (WAF) on Application Gateway, dedicated connections can improve inspection accuracy for stateful traffic. Additionally, this feature aligns with Azure Private Link and Virtual Network service endpoints by maintaining dedicated, secure backend connectivity within private networks.

In summary, the general availability of dedicated backend connections in Azure Application Gateway V2 empowers IT professionals with enhanced control over TCP connection management to backend servers, improving compatibility with stateful and compliance-sensitive applications while requiring mindful resource and scalability considerations.


4. Generally Available: Backend TLS validation controls in Azure Application Gateway

Published: September 15, 2025 16:30:18 UTC Link: Generally Available: Backend TLS validation controls in Azure Application Gateway

Update ID: 503393 Data source: Azure Updates API

Categories: Launched, Networking, Security, Application Gateway, Services, Features, Management

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=503393

Details:

The recent general availability of backend TLS validation controls in Azure Application Gateway V2 introduces enhanced security and configurability for HTTPS backend communication by allowing customers to explicitly manage TLS validation behavior during backend connection establishment.

Background and Purpose:
Azure Application Gateway is a Layer 7 load balancer that supports secure end-to-end HTTPS communication between clients and backend pools. Previously, when HTTPS was selected for backend settings, the Application Gateway performed standard TLS validations automatically during the TLS handshake with backend servers. However, these validations were fixed and not configurable by customers, limiting flexibility in scenarios such as custom certificate chains, private CAs, or specific compliance requirements. The update addresses this by enabling customer-controlled backend TLS validation, enhancing security posture and operational control.

Specific Features and Detailed Changes:

Technical Mechanisms and Implementation Methods:

Use Cases and Application Scenarios:

Important Considerations and Limitations:

Integration with Related Azure Services:

In summary, the general availability of backend TLS validation controls in Azure Application Gateway V2 empowers IT professionals to finely tune HTTPS backend security by managing certificate validation policies, enabling secure, compliant, and flexible backend communication tailored to diverse enterprise environments.


5. Generally Available: Azure SQL hub experience in Azure portal

Published: September 15, 2025 16:30:18 UTC Link: Generally Available: Azure SQL hub experience in Azure portal

Update ID: 502014 Data source: Azure Updates API

Categories: Launched, Databases, Azure SQL, Features

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=502014

Details:

The Azure SQL hub experience, now generally available in the Azure portal, consolidates all Azure SQL-related services and management capabilities into a unified, streamlined interface designed to simplify service selection, deployment, and administration for IT professionals. This update addresses the complexity and fragmentation previously encountered when navigating multiple Azure SQL offerings—such as Azure SQL Database, Managed Instance, and SQL Server on Azure VMs—by providing a centralized entry point that enhances productivity and governance.

Background and Purpose:
Azure offers several SQL-based data platform services tailored to different workload requirements, including single databases, elastic pools, managed instances, and SQL Server VMs. Historically, managing these disparate services required navigating separate blades or portals, which could lead to confusion, inefficiencies, and increased learning curves. The Azure SQL hub was introduced to unify these experiences, enabling users to discover, provision, monitor, and manage all Azure SQL resources from a single, coherent portal experience. This update aims to reduce complexity, improve discoverability of features, and accelerate time-to-value for database professionals.

Specific Features and Detailed Changes:

Technical Mechanisms and Implementation Methods:
The Azure SQL hub leverages the Azure Resource Manager (ARM) framework to aggregate and manage SQL resources across subscriptions. It uses REST APIs and Azure Monitor integration to pull real-time telemetry and health data, which is then visualized within the portal using Azure portal’s extensible UX framework. Role-Based Access Control (RBAC) and Azure Active Directory (AAD) authentication ensure secure access aligned with organizational policies. The hub also integrates with Azure Advisor and Azure Cost Management APIs to provide optimization recommendations and cost insights.

Use Cases and Application Scenarios:

Important Considerations and Limitations:

Integration with Related Azure Services:
The Azure SQL hub tightly integrates with Azure Monitor for performance and health metrics, Azure Security Center for vulnerability assessments, Azure Advisor for optimization recommendations, and Azure Cost Management for budgeting and cost tracking. It also interoperates with Azure Data Factory and Azure Migrate services to facilitate


6. Retirement: Azure Linux 2.0 on AKS

Published: September 15, 2025 13:45:52 UTC Link: Retirement: Azure Linux 2.0 on AKS

Update ID: 500645 Data source: Azure Updates API

Categories: Compute, Containers, Azure Kubernetes Service (AKS), Retirements

Summary:

Details:

The Azure update announces the retirement of Azure Linux 2.0 on Azure Kubernetes Service (AKS) effective November 30, 2025, urging users to transition to Azure Linux 3.0, which is the current supported and enhanced version. This update reflects Microsoft’s ongoing commitment to maintaining a secure, performant, and feature-rich Linux base image for AKS nodes.

Background and Purpose:
Azure Linux 2.0 has served as a foundational OS image for AKS node pools, providing optimized Linux distributions tailored for Azure’s cloud environment. Over time, advancements in security, kernel improvements, and container runtime enhancements have necessitated a newer base OS. Azure Linux 3.0 replaces 2.0 to deliver improved security patches, updated software packages, and better integration with Azure infrastructure. The retirement aims to phase out older, less secure, and potentially unsupported OS versions to maintain compliance and operational excellence.

Specific Features and Detailed Changes:
Azure Linux 3.0 introduces updated kernel versions, enhanced security features such as improved SELinux/AppArmor profiles, and updated container runtimes compatible with the latest Kubernetes versions. It also includes newer versions of system libraries and tools, better performance optimizations, and support for the latest Azure VM capabilities. Compared to Azure Linux 2.0, version 3.0 provides a more robust platform for running containerized workloads with improved stability and security.

Technical Mechanisms and Implementation Methods:
Transitioning from Azure Linux 2.0 to 3.0 involves updating the node image version in AKS node pools. This can be done via the Azure CLI or Azure Portal by specifying the new node image SKU during node pool creation or upgrade. AKS supports node pool upgrades that allow rolling updates with minimal downtime. Users should plan to cordon and drain nodes running Azure Linux 2.0 workloads, then upgrade or recreate node pools with Azure Linux 3.0 images. Automation scripts leveraging Azure Resource Manager (ARM) templates or Terraform can facilitate this migration at scale.

Use Cases and Application Scenarios:
This update is critical for organizations running containerized applications on AKS that require a secure and supported OS base. It is particularly relevant for production workloads demanding compliance with security standards, performance-sensitive applications benefiting from kernel and runtime improvements, and environments leveraging the latest Kubernetes features. Migrating to Azure Linux 3.0 ensures compatibility with new AKS capabilities and future Azure enhancements.

Important Considerations and Limitations:
IT professionals should carefully test workloads on Azure Linux 3.0 in staging environments before production migration to identify any compatibility issues with custom software or drivers. Some legacy applications may require adjustments due to updated libraries or kernel changes. Additionally, the retirement deadline means that after November 30, 2025, Azure Linux 2.0 images will no longer receive security updates or support, potentially exposing workloads to vulnerabilities. Planning and executing the migration well in advance is essential to avoid service disruptions.

Integration with Related Azure Services:
Azure Linux 3.0 integrates seamlessly with AKS and benefits from Azure’s security and monitoring services such as Azure Security Center, Azure Monitor, and Azure Policy. The updated OS supports enhanced telemetry and diagnostic capabilities, enabling better observability of containerized workloads. It also aligns with Azure’s managed identity and networking features, ensuring secure and efficient communication within Azure virtual networks and with other Azure services.

In summary, the retirement of Azure Linux 2.0 on AKS by November 30, 2025, requires IT professionals to transition to Azure Linux 3.0 to leverage improved security, performance, and compatibility. This involves updating node pool images through AKS management tools, thorough testing, and integration with Azure’s monitoring and security ecosystem to maintain a resilient and compliant Kubernetes environment.


This report was automatically generated - 2025-09-16 03:03:13 UTC