DailyAzureUpdatesGenerator

October 04, 2025 - Azure Updates Summary Report (Details Mode)

Generated on: October 04, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 7 items

Update List

1. Retirement: Azure Monitor SCOM Managed Instance will be retired on Sep 30, 2026

Published: October 03, 2025 18:15:20 UTC Link: Retirement: Azure Monitor SCOM Managed Instance will be retired on Sep 30, 2026

Update ID: 501673 Data source: Azure Updates API

Categories: DevOps, Management and governance, Azure Monitor, Retirements

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=501673

Details:

The Azure update announces the planned retirement of the Azure Monitor SCOM Managed Instance service effective September 30, 2026. This service currently enables integration between Azure Monitor and System Center Operations Manager (SCOM) by providing a managed instance that facilitates monitoring of on-premises workloads through Azure’s monitoring capabilities.

Background and Purpose
Azure Monitor SCOM Managed Instance was introduced to bridge on-premises infrastructure monitoring with Azure Monitor, allowing organizations to leverage cloud-based analytics and alerting for their hybrid environments. Over time, Microsoft has evolved its hybrid monitoring strategy, emphasizing direct use of Operations Manager on-premises and enhanced Azure-native monitoring tools. The retirement aligns with this strategic shift, encouraging customers to transition away from the managed instance model toward more direct and supported monitoring solutions.

Specific Features and Detailed Changes
The service retirement means that after September 30, 2026, the Azure Monitor SCOM Managed Instance will no longer be accessible or supported. Features such as automatic data ingestion from SCOM to Azure Monitor via the managed instance will cease. Customers relying on this integration will need to migrate their monitoring workflows to alternative solutions. The recommended path is to use Operations Manager directly on-premises for workload monitoring, potentially combined with Azure Monitor’s agent-based solutions or Azure Arc for hybrid environments.

Technical Mechanisms and Implementation Methods
Azure Monitor SCOM Managed Instance functioned as a managed Azure resource that connected to an on-premises SCOM environment, receiving monitoring data and forwarding it to Azure Monitor. It abstracted the complexity of managing the integration infrastructure. Post-retirement, organizations must configure Operations Manager agents and management servers on-premises without relying on the managed instance. For hybrid monitoring, Azure Arc-enabled servers can be used to onboard on-premises machines directly into Azure Monitor, providing a more modern and flexible monitoring architecture.

Use Cases and Application Scenarios
This service primarily served enterprises with hybrid environments needing centralized monitoring dashboards and alerting that combined on-premises and cloud resources. Typical scenarios included monitoring Windows and Linux servers, applications, and infrastructure components managed by SCOM, with data visualized and analyzed in Azure Monitor. After retirement, these use cases will be fulfilled by native Operations Manager deployments supplemented by Azure Arc and Azure Monitor agents, ensuring continuity of monitoring and alerting capabilities.

Important Considerations and Limitations
Customers must plan their migration well before the retirement date to avoid monitoring disruptions. The transition involves reconfiguring monitoring agents, dashboards, and alert rules. There may be differences in data collection and visualization capabilities between the managed instance and direct Operations Manager or Azure Arc approaches, requiring validation and potential adaptation of monitoring strategies. Additionally, any automation or integrations dependent on the managed instance API will need to be refactored.

Integration with Related Azure Services
Post-retirement, integration will rely more heavily on Azure Arc, which extends Azure management and governance to on-premises and multi-cloud environments, enabling direct onboarding of servers into Azure Monitor without intermediary managed instances. Azure Monitor agents (Log Analytics agents or Azure Monitor Agent) will collect telemetry data directly from on-premises resources. Operations Manager remains the core on-premises monitoring tool, and its integration with Azure Monitor via Azure Arc and agents will be the primary hybrid monitoring architecture going forward.

In summary, the retirement of Azure Monitor SCOM Managed Instance by September 30, 2026, signals a strategic shift towards direct on-premises Operations Manager use combined with Azure Arc-enabled hybrid monitoring. IT professionals should proactively plan migration to these supported architectures to maintain comprehensive monitoring coverage across hybrid environments. Detailed migration guidance is available in Microsoft’s retirement documentation.


2. Generally Available: CLI command for migration from Availability Sets and basic load balancer on AKS

Published: October 03, 2025 16:45:25 UTC Link: Generally Available: CLI command for migration from Availability Sets and basic load balancer on AKS

Update ID: 503258 Data source: Azure Updates API

Categories: Launched, Compute, Containers, Azure Kubernetes Service (AKS), Features

Summary:

For detailed guidance and usage, refer to the official Azure update link: https://azure.microsoft.com/updates?id=503258

Details:

The Azure Kubernetes Service (AKS) update introduces a generally available Azure CLI command designed to facilitate the migration of AKS clusters from the deprecated Availability Sets and basic load balancer to the newer Virtual Machines node pool infrastructure, addressing the upcoming deprecation deadline of September 30, 2025.

Background and Purpose:
Availability Sets and the basic load balancer have historically been used in AKS to provide high availability and load distribution for cluster nodes. However, these components are being deprecated to encourage adoption of more scalable, performant, and feature-rich alternatives such as Virtual Machine Scale Sets (VMSS) for node pools and the Standard Load Balancer. The update’s primary purpose is to streamline the migration process, reducing manual effort and minimizing downtime or configuration errors by providing a dedicated CLI command that automates the transition.

Specific Features and Detailed Changes:
The key feature is a new Azure CLI command that automates the migration of existing AKS clusters from Availability Sets to VMSS-based node pools. This command handles the underlying infrastructure changes, including node reprovisioning and load balancer upgrades. It also upgrades the cluster configuration to leverage VMSS capabilities, such as improved scaling, rolling upgrades, and better integration with Azure monitoring and autoscaling features. The migration also replaces the basic load balancer with the Standard Load Balancer, which supports enhanced features like zone redundancy, higher throughput, and better health probe mechanisms.

Technical Mechanisms and Implementation Methods:
Technically, the migration command orchestrates the creation of new VMSS node pools alongside or in replacement of existing Availability Set nodes. It coordinates draining and cordoning of pods, reprovisioning of nodes on VMSS, and seamless transfer of workloads. The command updates the AKS cluster’s control plane configuration to reference the new VMSS node pools and switches the networking components from the basic load balancer to the Standard Load Balancer. This process leverages Azure Resource Manager (ARM) templates and AKS APIs to ensure consistency and atomicity of changes. The migration is designed to be minimally disruptive, supporting rolling node replacements to maintain workload availability.

Use Cases and Application Scenarios:
This update is critical for organizations running production AKS clusters on Availability Sets and basic load balancers who must comply with the deprecation timeline. It is especially relevant for clusters requiring improved scalability, reliability, and integration with advanced Azure features such as zone redundancy and autoscaling. Enterprises looking to modernize their Kubernetes infrastructure with minimal operational overhead will benefit from this automated migration. It also supports scenarios where clusters need to be upgraded to leverage newer AKS capabilities that depend on VMSS node pools.

Important Considerations and Limitations:
Before initiating migration, it is important to verify cluster compatibility, including Kubernetes version and node pool configurations. Some custom configurations or third-party integrations might require validation post-migration. The migration command requires appropriate Azure RBAC permissions to modify cluster and infrastructure resources. Downtime is expected to be minimal but not zero; workloads should be prepared for transient disruptions during node reprovisioning. Additionally, the migration is irreversible; once moved to VMSS, reverting to Availability Sets is not supported. Users should also review any network security group (NSG) or load balancer rule customizations to ensure they persist or are reapplied correctly.

Integration with Related Azure Services:
Post-migration, AKS clusters benefit from deeper integration with Azure Monitor for containers, Azure Autoscale, and Azure Policy due to VMSS support. The Standard Load Balancer enables zone-redundant deployments and improved network performance, enhancing resilience in multi-availability zone architectures. This update aligns AKS with Azure’s broader infrastructure modernization strategy, enabling better use of Azure Compute and Networking services and facilitating future AKS feature enhancements that depend on VMSS and Standard Load Balancer capabilities.

In summary, this Azure CLI migration command provides a streamlined, automated path for AKS clusters to transition from deprecated Availability Sets and basic load balancers to modern VMSS node


3. Generally Available: Cross-tenant customer-managed keys for Azure NetApp Files volume encryption

Published: October 03, 2025 16:15:04 UTC Link: Generally Available: Cross-tenant customer-managed keys for Azure NetApp Files volume encryption

Update ID: 501340 Data source: Azure Updates API

Categories: Launched, Storage, Azure NetApp Files, Features

Summary:

For more details, visit: https://azure.microsoft.com/updates?id=501340

Details:

The recent general availability of Cross-tenant Customer-Managed Keys (CMK) for Azure NetApp Files volume encryption introduces a significant enhancement in encryption key management by enabling customers to use their own encryption keys across different Azure Active Directory (AAD) tenants. This update addresses the need for greater control, compliance, and flexibility in multi-tenant environments where organizations manage resources spanning multiple Azure subscriptions and directories.

Background and Purpose
Azure NetApp Files is a high-performance file storage service optimized for enterprise workloads. By default, data at rest in Azure NetApp Files is encrypted using Microsoft-managed keys. However, many organizations require the ability to manage their own encryption keys to meet strict regulatory, compliance, or internal security policies. Previously, customer-managed keys were limited to the same tenant where the Azure NetApp Files resource resided. This limitation posed challenges for enterprises operating across multiple tenants, such as managed service providers or large organizations with segmented IT environments. The introduction of cross-tenant CMK support allows these customers to centralize key management in a single tenant while encrypting volumes in other tenants, enhancing security governance and operational efficiency.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
To implement cross-tenant CMK encryption:

  1. Key Vault Setup: In the key vault tenant, create or import the encryption key and configure access policies to grant the Azure NetApp Files service principal from the resource tenant the necessary permissions (e.g., wrapKey, unwrapKey).
  2. Service Principal and RBAC: The Azure NetApp Files resource tenant must grant the appropriate RBAC roles to the service principal to access the key vault in the other tenant.
  3. Configuration of Encryption: When creating or updating an Azure NetApp Files volume, specify the key URI from the cross-tenant key vault. The NetApp Files service then uses this key for volume encryption operations.
  4. Key Rotation and Management: Customers maintain full control over key lifecycle, including rotation and revocation, from the key vault tenant, with immediate effect on volume encryption.

Use Cases and Application Scenarios

Important Considerations and Limitations


4. Retirement: Azure Static Web Apps database connection feature

Published: October 03, 2025 16:15:04 UTC Link: Retirement: Azure Static Web Apps database connection feature

Update ID: 500848 Data source: Azure Updates API

Categories: Compute, Web, Static Web Apps, Retirements

Summary:

Details:

The Azure update announces the planned retirement of the database connections feature in Azure Static Web Apps, currently in public preview, effective November 30, 2025, due to changes in the underlying infrastructure. This feature allowed developers to simplify backend integration by directly connecting Static Web Apps to databases without managing separate API layers. With its deprecation, users must refactor applications to use alternative methods for database connectivity to ensure continued functionality and deployment stability.

Background and Purpose of the Update
Azure Static Web Apps is a service designed to streamline the deployment of full-stack web applications by hosting static frontends alongside serverless APIs. The database connections feature was introduced in public preview to enable developers to connect their static apps directly to databases, reducing the need for custom backend code or API management. However, changes in the underlying Azure infrastructure and platform architecture have made maintaining this feature unsustainable. The retirement aims to align the service with the evolving Azure ecosystem and encourage adoption of more robust, scalable, and maintainable database integration patterns.

Specific Features and Detailed Changes
The deprecated feature provided a simplified declarative configuration to connect Static Web Apps directly to supported databases, such as Azure SQL Database or Cosmos DB, enabling seamless data access within the app’s API routes. Post-November 30, 2025, this direct database connection capability will no longer be supported. Developers currently using this feature must transition to alternative approaches, such as implementing dedicated API services or leveraging Azure Functions to handle database interactions explicitly.

Technical Mechanisms and Implementation Methods
Originally, the feature abstracted database connectivity by managing connection strings and authentication within the Static Web Apps environment, automatically injecting these into serverless API functions. With the retirement, developers will need to manually configure database connections within their backend code, typically hosted as Azure Functions or other API services. This involves securely managing connection strings via Azure Key Vault or Static Web Apps secrets, implementing connection pooling, error handling, and query logic explicitly in the API layer. This shift returns control and responsibility for database interactions to the developer, enabling more customized and optimized implementations.

Use Cases and Application Scenarios
The database connections feature was particularly useful for rapid prototyping, small to medium applications, and scenarios where minimal backend complexity was desired. Typical use cases included content-driven websites, dashboards, and simple CRUD applications where direct database access simplified development. Post-deprecation, these scenarios will require developers to architect explicit API layers, which, while adding complexity, also provide greater flexibility, security, and scalability for production-grade applications.

Important Considerations and Limitations

Integration with Related Azure Services
Post-retirement, developers are encouraged to leverage Azure Functions or Azure App Service to host backend APIs that interact with databases. Azure Key Vault should be used for secure secret management. Additionally, Azure API Management can be integrated for advanced API governance. For database services, Azure SQL Database, Cosmos DB, and other Azure data platforms remain fully supported but require explicit connection management. This update aligns Static Web Apps with broader Azure best practices, promoting modular, secure, and scalable application architectures.

In summary, the retirement of the Azure Static Web Apps database connections feature by November 30, 2025, necessitates that developers refactor their applications to implement explicit backend API layers for database interactions, enhancing control, security, and


5. Public Preview: Azure NetApp Files Support for OpenLDAP, FreeIPA, and Red Hat Directory Server LDAP services

Published: October 03, 2025 16:01:01 UTC Link: Public Preview: Azure NetApp Files Support for OpenLDAP, FreeIPA, and Red Hat Directory Server LDAP services

Update ID: 508748 Data source: Azure Updates API

Categories: In preview, Storage, Azure NetApp Files, Features

Summary:

Details:

The recent Azure NetApp Files public preview introduces support for integrating with FreeIPA, OpenLDAP, and Red Hat Directory Server LDAP services, enabling secure LDAP over TLS authentication for NFSv3 and NFSv4.1 volumes. This update addresses the need for enterprises to leverage widely adopted open-source and commercial LDAP directory services to manage identity and access control for file shares hosted on Azure NetApp Files, enhancing security and interoperability in hybrid and cloud-native environments.

Background and Purpose
Azure NetApp Files is a high-performance, enterprise-grade file storage service that supports multiple protocols including NFS and SMB. Traditionally, Azure NetApp Files supported Active Directory (AD) for identity management and access control. However, many organizations use alternative LDAP directory services such as FreeIPA, OpenLDAP, or Red Hat Directory Server to manage users and groups, especially in Linux-centric or heterogeneous environments. The purpose of this update is to extend Azure NetApp Files’ authentication capabilities beyond AD by enabling integration with these LDAP services, thereby broadening customer choice and simplifying migration or hybrid deployments.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
Azure NetApp Files acts as an LDAP client that authenticates user access requests against the configured LDAP directory service. When a client attempts to access an NFS volume, Azure NetApp Files queries the LDAP server over a secure LDAPS connection to validate user credentials and retrieve group membership information. This information is then used to enforce POSIX-style permissions on the file system. The integration requires administrators to provide LDAP server details, including hostnames, ports (typically 636 for LDAPS), and service account credentials for binding. TLS certificates must be trusted by Azure NetApp Files to establish secure connections. The service supports standard LDAP schema attributes for user and group identification, allowing compatibility with common LDAP deployments.

Use Cases and Application Scenarios

Important Considerations and Limitations

Integration with Related Azure Services


6. Retirement: Azure VPN Gateway support for SSTP Protocol will be retired on March 31, 2027

Published: October 03, 2025 16:01:01 UTC Link: Retirement: Azure VPN Gateway support for SSTP Protocol will be retired on March 31, 2027

Update ID: 499923 Data source: Azure Updates API

Categories: Networking, Security, VPN Gateway, Retirements

Summary:

Reference: https://azure.microsoft.com/updates?id=499923

Details:

The Azure update announces the planned retirement of Azure VPN Gateway support for the Secure Socket Tunneling Protocol (SSTP) on March 31, 2027. This deprecation is driven by SSTP’s inherent limitations in scalability and performance, prompting Microsoft to encourage users to migrate to more robust VPN protocols such as IKEv2 and OpenVPN.

Background and Purpose:
SSTP has historically been used for VPN connections due to its ability to traverse firewalls by encapsulating traffic over HTTPS (TCP port 443). However, SSTP’s architecture limits its scalability and throughput, making it less suitable for modern enterprise environments requiring high connection counts and performance. To align with evolving network demands and enhance VPN gateway efficiency, Microsoft is retiring SSTP support and steering customers toward protocols that better support large-scale, high-performance VPN deployments.

Specific Features and Detailed Changes:
Post-retirement, Azure VPN Gateway will no longer accept SSTP-based VPN connections. Instead, users should adopt IKEv2 or OpenVPN protocols, which Azure VPN Gateway supports natively. These protocols provide advanced features such as:

Technical Mechanisms and Implementation Methods:
IKEv2 (Internet Key Exchange version 2) is a widely adopted VPN protocol that establishes and maintains secure VPN tunnels using IPsec for encryption. It supports rapid reconnection and mobility, making it suitable for mobile clients. OpenVPN is an open-source VPN protocol that uses SSL/TLS for key exchange and can operate over UDP or TCP, providing flexibility in firewall traversal and network environments. Both protocols leverage modern cryptographic standards and support multi-factor authentication integration.

To implement the transition:

Use Cases and Application Scenarios:
This update impacts organizations using Azure VPN Gateway for remote access or site-to-site VPNs relying on SSTP. Typical scenarios include:

Transitioning to IKEv2 or OpenVPN enables these use cases to scale securely and reliably, supporting larger user bases and more demanding workloads.

Important Considerations and Limitations:

Integration with Related Azure Services:
Azure VPN Gateway integrates with Azure Active Directory and Azure Multi-Factor Authentication (MFA) for enhanced security, both of which support IKEv2 and OpenVPN protocols. Additionally, Azure Monitor and Network Watcher can be used to track VPN gateway health and performance post-migration. Organizations leveraging Azure Firewall or Azure Security Center should update their policies to accommodate the new VPN protocols and traffic patterns.

In summary, the retirement of SSTP support in Azure VPN Gateway reflects a strategic move to improve VPN scalability, performance,


7. Retirement: General Purpose v1 (GPv1) and legacy blob storage accounts

Published: October 03, 2025 14:15:21 UTC Link: Retirement: General Purpose v1 (GPv1) and legacy blob storage accounts

Update ID: 496964 Data source: Azure Updates API

Categories: Storage, Storage Accounts, Retirements

Summary:

Details:

The Azure update announces the retirement of all General Purpose v1 (GPv1) storage accounts, including legacy blob storage accounts, as part of Microsoft’s initiative to optimize the Azure Storage portfolio by enhancing performance, scalability, and cost efficiency.

Background and Purpose:
GPv1 storage accounts were the original generation of Azure Storage accounts offering a mix of standard performance and pricing options. Over time, Azure introduced General Purpose v2 (GPv2) accounts and other specialized storage tiers that provide better performance, more features, and improved cost models. The retirement of GPv1 aims to simplify the storage offerings, encourage migration to more modern storage accounts, and enable customers to benefit from newer capabilities such as tiering, advanced security, and enhanced scalability.

Specific Features and Detailed Changes:

Technical Mechanisms and Implementation Methods:

Use Cases and Application Scenarios:

Important Considerations and Limitations:

Integration with Related Azure Services:


This report was automatically generated - 2025-10-04 03:03:16 UTC