DailyAzureUpdatesGenerator

September 19, 2025 - Azure Updates Summary Report (Details Mode)

Generated on: September 19, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 4 items

Update List

1. Retirement: Licensing changes for future Azure VMware Solution subscriptions starting October 16, 2025.

Published: September 18, 2025 20:45:29 UTC Link: Retirement: Licensing changes for future Azure VMware Solution subscriptions starting October 16, 2025.

Update ID: 503878 Data source: Azure Updates API

Categories: Compute, Azure VMware Solution, Retirements

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=503878

Details:

The Azure update titled “Retirement: Licensing changes for future Azure VMware Solution subscriptions starting October 16, 2025” reflects a significant shift in VMware licensing policy that impacts how new Azure VMware Solution (AVS) customers will procure and manage their VMware Cloud Foundation (VCF) licenses on Azure. This change is driven by Broadcom’s updated licensing model, which mandates that new customers must bring their own portable VCF subscriptions when deploying VMware workloads on hyperscaler platforms such as Azure.

Background and Purpose of the Update
Broadcom, the owner of VMware, has revised its licensing strategy to require customers to independently acquire VMware Cloud Foundation licenses outside of hyperscaler-managed offerings. Previously, AVS subscriptions included bundled VMware licenses, simplifying procurement and management for customers. The update aims to align VMware licensing with Broadcom’s broader commercial policies, ensuring license portability and compliance across multi-cloud environments. This change affects only new AVS subscriptions starting October 16, 2025; existing customers with active AVS deployments can continue under their current licensing terms without disruption.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
From a technical perspective, customers will need to manage VMware license keys and compliance independently of Azure’s subscription management. During AVS deployment, customers must provide valid VMware Cloud Foundation license keys to activate and operate the VMware stack on Azure infrastructure. Azure will continue to provide the underlying infrastructure, networking, and management plane for AVS, but VMware license enforcement and compliance will be the customer’s responsibility. Azure portal and APIs may be updated to support license key input and validation workflows, but the core licensing enforcement remains within VMware’s software layer.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services
Azure VMware Solution will continue to integrate seamlessly with Azure networking (ExpressRoute, Azure Virtual WAN), Azure security services (Azure Security Center, Azure Sentinel), and Azure management tools (Azure Monitor, Azure Automation). The licensing change does not affect these integrations but requires customers to separately manage VMware licenses while leveraging Azure’s cloud-native services for infrastructure, monitoring, and security. Customers can also integrate AVS with Azure Arc for hybrid management, ensuring consistent governance across environments despite the licensing shift.


In summary, starting October 16, 2025, new Azure VMware Solution subscriptions will require customers to bring their own portable


2. Generally Available: DCa/ECa v6 series AMD based confidential virtual machines (VMs)

Published: September 18, 2025 19:00:07 UTC Link: Generally Available: DCa/ECa v6 series AMD based confidential virtual machines (VMs)

Update ID: 502874 Data source: Azure Updates API

Categories: Launched, Compute, Virtual Machines, Features

Summary:

Details:

Microsoft has announced the general availability of the DCa/ECa v6 series AMD-based confidential virtual machines (VMs) across multiple Azure regions including UAE North, Korea Central, West Central US, South Africa North, Switzerland North, and UK South. These VMs leverage 4th generation AMD EPYC processors and Azure confidential computing technologies to provide enhanced security and performance for sensitive workloads.

Background and Purpose
Confidential computing addresses the growing need for protecting data in use, complementing data-at-rest and data-in-transit encryption. By enabling hardware-based Trusted Execution Environments (TEEs), confidential VMs isolate code and data from the host OS, hypervisor, and even Azure administrators, mitigating risks from insider threats and sophisticated attacks. The DCa/ECa v6 series expands Azure’s confidential computing portfolio by introducing AMD-based options, offering customers more choice and flexibility in confidential workload deployments.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
AMD SEV-SNP extends AMD SEV by adding integrity protection and replay attack prevention to encrypted memory pages. This is implemented at the hardware level within the AMD EPYC CPU, enabling the hypervisor to run untrusted code while protecting guest VM memory confidentiality and integrity. Azure’s confidential VM infrastructure integrates with the Azure Attestation service to provide remote attestation capabilities, allowing customers to verify the VM’s trusted state before provisioning sensitive workloads. The VMs support standard Azure VM management and networking features, making integration with existing Azure environments seamless.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services


3. Public Preview: Azure Kubernetes Fleet Manager – update run approval gates

Published: September 18, 2025 17:30:18 UTC Link: Public Preview: Azure Kubernetes Fleet Manager – update run approval gates

Update ID: 503245 Data source: Azure Updates API

Categories: In preview, Containers, Compute, Azure Kubernetes Fleet Manager, Azure Kubernetes Service (AKS), Features

Summary:

Reference: https://azure.microsoft.com/updates?id=503245

Details:

The recent public preview update for Azure Kubernetes Fleet Manager introduces approval gates within update runs, enhancing control and governance over cluster update workflows across large-scale Kubernetes environments.

Background and Purpose
Azure Kubernetes Fleet Manager is designed to simplify management of multiple Azure Kubernetes Service (AKS) clusters by enabling centralized orchestration of updates, configuration, and policy enforcement across a fleet of clusters. As organizations scale their Kubernetes deployments, ensuring safe, controlled, and auditable update processes becomes critical to maintain cluster stability and compliance. Prior to this update, update runs executed sequentially without built-in mechanisms for pausing or requiring manual validation between update stages or groups. The introduction of approval gates addresses this gap by allowing administrators to insert manual checkpoints, thereby reducing risk and increasing operational oversight during complex update workflows.

Specific Features and Detailed Changes
This update adds the capability to define approval gates at two key points within an update run: before and after update groups and stages. An update run in Fleet Manager typically consists of multiple stages (logical phases of the update process) and groups (sets of clusters or nodes targeted together). With approval gates, administrators can:

This granular control enables a more deliberate and auditable update process, reducing the likelihood of propagating errors or issues across the fleet.

Technical Mechanisms and Implementation Methods
Approval gates are implemented as configurable checkpoints within the update run orchestration engine of Fleet Manager. When an update run reaches a gate, the system transitions into a waiting state, halting further execution until an authorized user explicitly approves continuation via the Azure portal, CLI, or API. This mechanism leverages Azure Role-Based Access Control (RBAC) to ensure only designated approvers can authorize progression. The update run’s state and gate status are tracked and logged within Fleet Manager’s operational telemetry, providing visibility and audit trails. Integration with Azure Monitor and Azure Activity Logs allows organizations to monitor gate events and approvals programmatically.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services

In summary, the introduction of approval gates in Azure Kubernetes Fleet Manager update runs empowers IT professionals with enhanced operational control


4. Generally Available: Distributed tracing for Durable Functions

Published: September 18, 2025 17:00:27 UTC Link: Generally Available: Distributed tracing for Durable Functions

Update ID: 503139 Data source: Azure Updates API

Categories: Launched, Compute, Containers, Internet of Things, Azure Functions, Features

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=503139

Details:

The recent general availability of Distributed Tracing V2 for Azure Durable Functions marks a significant enhancement in observability and diagnostics for serverless workflows by introducing a comprehensive tracing model that correlates operations across orchestrations, activities, and durable entities. This update addresses longstanding challenges in monitoring complex, stateful function executions by enabling end-to-end visibility into the execution flow and dependencies within Durable Functions.

Background and Purpose
Durable Functions extend Azure Functions by enabling stateful orchestration of serverless workflows, which often involve multiple asynchronous activities and durable entities. Prior to this update, tracing and diagnostics were fragmented, making it difficult to correlate events and diagnose issues across the distributed components of a durable orchestration. The purpose of Distributed Tracing V2 is to provide a unified, robust tracing framework that captures and correlates telemetry data seamlessly, thereby improving troubleshooting, performance monitoring, and operational insights.

Specific Features and Detailed Changes
Distributed Tracing V2 introduces a standardized tracing model based on OpenTelemetry principles, enabling correlation of telemetry across orchestrations, activity functions, and durable entities. Key features include:

Technical Mechanisms and Implementation Methods
The implementation leverages OpenTelemetry SDKs integrated into the Durable Functions runtime to automatically generate and propagate trace context. Trace identifiers (trace ID, span ID) are injected into orchestration and activity function calls, ensuring that telemetry emitted by these components is linked. The tracing system hooks into the Durable Task Framework’s orchestration scheduler and entity operations to capture detailed execution metadata. This data is then exported to Azure Monitor and Application Insights using native exporters, enabling seamless integration with Azure’s observability stack. Developers can also extend or customize telemetry collection via OpenTelemetry APIs if needed.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services
Distributed Tracing V2 tightly integrates with Azure Monitor and Application Insights, leveraging their telemetry ingestion, storage, and visualization capabilities. Trace data is accessible via Application Insights’ End-to-End Transaction Diagnostics and Azure Monitor Workbooks, enabling rich analysis and alerting. The update complements Azure Functions’ native diagnostics and logging features, and works alongside Azure Event Grid and Azure Logic Apps when Durable Functions are part of broader event-driven architectures. Additionally, the use of OpenTelemetry standards


This report was automatically generated - 2025-09-19 03:02:28 UTC