Generated on: October 08, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 5 items
Published: October 07, 2025 21:30:21 UTC Link: Retirement: Azure Network Policy Manager (NPM) for Windows nodes on AKS to Be Retired by September 30, 2026
Update ID: 500273 Data source: Azure Updates API
Categories: Compute, Containers, Azure Kubernetes Service (AKS), Retirements
Summary:
What was updated
Microsoft announced the retirement of Azure Network Policy Manager (NPM) support for Windows nodes in Azure Kubernetes Service (AKS), effective September 30, 2026.
Key changes or new features
Support, security updates, and deployment compatibility for NPM on Windows nodes in AKS will end on the retirement date. Users must transition to alternative network policy solutions to maintain supported and secure cluster configurations.
Target audience affected
Developers and IT professionals managing AKS clusters with Windows nodes using Azure NPM for network policy enforcement.
Important notes if any
To avoid disruptions, plan migration well before the deadline. Evaluate other network policy options compatible with Windows nodes in AKS, such as Calico or native Kubernetes network policies. Staying updated ensures continued security and support for your AKS deployments. For more details, refer to the official Azure update page.
Details:
The Azure update announces the planned retirement of Azure Network Policy Manager (NPM) support for Windows nodes in Azure Kubernetes Service (AKS) effective September 30, 2026. This change is intended to streamline network policy management on AKS Windows nodes and encourage migration to alternative, supported solutions that ensure ongoing security, compatibility, and operational support.
Background and Purpose:
Azure Network Policy Manager (NPM) has been a key component for managing Kubernetes network policies on AKS clusters, enabling fine-grained control over pod-to-pod and pod-to-service communication. However, maintaining NPM support for Windows nodes presents challenges due to evolving Kubernetes networking models and the complexity of Windows networking stack integration. The retirement reflects Microsoft’s commitment to focusing on more modern, scalable, and maintainable network policy solutions that align with upstream Kubernetes developments and community standards.
Specific Features and Detailed Changes:
The retirement specifically affects NPM functionality on Windows nodes within AKS clusters. After September 30, 2026, Microsoft will no longer provide updates, security patches, or technical support for NPM on these nodes. This does not impact NPM on Linux nodes or other network policy implementations. Customers are advised to transition to alternative network policy solutions such as Calico or Azure-native network policies that support Windows nodes, ensuring continued enforcement of network segmentation and security policies.
Technical Mechanisms and Implementation Methods:
NPM operates by integrating with the Kubernetes network policy API and leveraging Windows filtering platform (WFP) capabilities on Windows nodes to enforce policies. The retirement means that the NPM agent and related components will no longer be maintained or updated for Windows nodes. Transitioning involves deploying supported network policy plugins compatible with Windows node networking, such as Calico in policy-only mode or Azure CNI network policies, which interact with Windows networking components differently but provide equivalent or enhanced policy enforcement.
Use Cases and Application Scenarios:
Organizations running AKS clusters with Windows nodes that require network segmentation, micro-segmentation, or compliance-driven network policies will be directly impacted. Typical use cases include multi-tenant environments, regulated industries requiring strict network isolation, and hybrid workloads combining Windows and Linux containers. Migrating to supported policy engines ensures uninterrupted network security enforcement and compliance adherence.
Important Considerations and Limitations:
Integration with Related Azure Services:
This update aligns with Azure’s broader networking strategy, emphasizing Azure CNI and Calico for network policy enforcement. Azure Monitor and Azure Security Center integrations remain compatible with supported network policies, enabling continued visibility and threat detection. Additionally, Azure Policy can be used to enforce cluster configuration compliance during and after migration. Customers leveraging Azure DevOps or GitOps workflows can automate deployment of updated network policies to maintain operational consistency.
In summary, the retirement of Azure Network Policy Manager for Windows nodes on AKS by September 30, 2026, requires IT professionals to proactively plan and execute migration to supported network policy solutions such as Calico or Azure-native policies. This ensures sustained security, compliance, and operational support for Kubernetes network policies on Windows nodes within AKS environments.
Published: October 07, 2025 16:30:20 UTC Link: Generally Available: Azure Firewall Updates - IP Group limit increased to 600 per Firewall Policy
Update ID: 511722 Data source: Azure Updates API
Categories: Launched, Networking, Security, Azure Firewall, Features
Summary:
What was updated
Azure Firewall Policy has increased the limit on the number of IP Groups supported per policy.
Key changes or new features
The maximum number of IP Groups per firewall policy has been raised from 200 to 600. This allows for better organization and management of IP addresses by grouping them more granularly. Developers and IT professionals can simplify firewall rules by replacing long IP address lists with structured IP Groups, improving readability and maintainability of policies.
Target audience affected
Network administrators, security engineers, and developers managing Azure Firewall policies who require scalable and manageable IP-based filtering.
Important notes if any
This update helps reduce rule complexity and enhances policy scalability without impacting existing configurations. Users should review their current policies to leverage the increased IP Group capacity for optimized firewall management.
For more details, visit: https://azure.microsoft.com/updates?id=511722
Details:
The recent Azure Firewall update increases the maximum number of IP Groups per Firewall Policy from 200 to 600, significantly enhancing policy management scalability and simplifying rule configuration for complex network environments.
Background and Purpose:
Azure Firewall uses Firewall Policies to centrally manage network and application rules. IP Groups are logical containers of IP addresses or CIDR ranges that streamline rule definitions by grouping related IPs. Previously, the limit of 200 IP Groups per policy constrained large-scale deployments, forcing administrators to either create multiple policies or embed lengthy IP lists directly in rules, increasing complexity and reducing maintainability. This update addresses these challenges by tripling the IP Group limit, enabling more granular and organized rule sets.
Specific Features and Detailed Changes:
Technical Mechanisms and Implementation Methods:
Use Cases and Application Scenarios:
Important Considerations and Limitations:
Integration with Related Azure Services:
In summary, increasing the IP Group limit to 600 per Azure Firewall Policy empowers IT professionals to design more scalable, maintainable, and organized firewall rule sets, improving security posture and operational efficiency in complex Azure and hybrid network environments.
Published: October 07, 2025 14:30:18 UTC Link: Generally Avaialbe: Azure NetApp Files short-term clones
Update ID: 503836 Data source: Azure Updates API
Categories: Launched, Features
Summary:
What was updated
Azure NetApp Files now generally supports short-term clones, a new feature enabling temporary, space-efficient clones of data volumes.
Key changes or new features
Short-term clones create instant, writable copies from existing volume snapshots without duplicating the full dataset. This approach significantly reduces storage consumption and accelerates data provisioning. The clones are designed for temporary use cases, allowing rapid testing, development, and data manipulation without impacting the original volume. Once the clone’s lifecycle ends, it can be deleted to reclaim capacity.
Target audience affected
Developers and IT professionals working with Azure NetApp Files for software development, testing, and data management scenarios will benefit. This feature is particularly useful for teams needing fast, isolated environments with minimal storage overhead.
Important notes if any
Short-term clones rely on snapshot technology and are optimized for ephemeral workloads. Users should plan clone lifecycle management to avoid unintended capacity usage. This feature complements existing Azure NetApp Files capabilities, enhancing flexibility in data operations without compromising performance.
For more details, visit: https://azure.microsoft.com/updates?id=503836
Details:
The recent general availability of Azure NetApp Files short-term clones introduces a significant enhancement in data management by enabling the creation of space-efficient, temporary thin clones derived from existing volume snapshots. This update addresses the need for rapid, cost-effective data duplication without the overhead of full data copies, optimizing storage utilization and accelerating workflows that require quick, isolated data environments.
Background and Purpose
Azure NetApp Files is a high-performance, enterprise-grade file storage service designed for demanding workloads such as databases, analytics, and development environments. Traditionally, creating copies of large datasets for testing, development, or analytics involved duplicating entire volumes, which is time-consuming and storage-intensive. The introduction of short-term clones aims to reduce storage costs and improve operational agility by allowing instant, writable clones that share data blocks with the source snapshot, thus minimizing redundant data storage.
Specific Features and Detailed Changes
Short-term clones are created from snapshots of existing Azure NetApp Files volumes and provide immediate read/write access without the need to copy the entire dataset. These clones are “thin,” meaning they initially consume negligible additional storage, only using space for changes made to the clone (copy-on-write). The clones are temporary by design, supporting use cases where data longevity is limited, such as short-term testing or data analysis. This feature complements existing snapshot and volume cloning capabilities by focusing on ephemeral, cost-effective data copies.
Technical Mechanisms and Implementation Methods
Technically, short-term clones leverage snapshot technology and copy-on-write mechanisms. When a clone is created, it references the snapshot’s data blocks without duplicating them. Any write operation on the clone triggers allocation of new storage blocks, preserving the original snapshot data integrity. This approach ensures instant clone creation with minimal latency and storage overhead. Management of these clones is integrated into the Azure NetApp Files API and Azure Portal, allowing users to create, monitor, and delete clones programmatically or via the UI. The lifecycle of short-term clones is typically managed by policies or manual deletion to reclaim storage.
Use Cases and Application Scenarios
Short-term clones are ideal for scenarios requiring rapid, isolated environments with minimal storage impact, such as:
Important Considerations and Limitations
While short-term clones offer substantial benefits, users should consider:
Integration with Related Azure Services
Azure NetApp Files short-term clones integrate seamlessly with Azure’s ecosystem, enhancing workflows involving Azure Kubernetes Service (AKS), Azure DevOps, and Azure Machine Learning by providing rapid, isolated storage environments. Additionally, they complement Azure Backup and Azure Site Recovery by enabling efficient snapshot management and data replication strategies. The clones can be managed via Azure CLI, REST APIs, and Azure Portal, facilitating automation and integration into existing DevOps pipelines and infrastructure-as-code deployments.
In summary, Azure NetApp Files short-term clones provide IT professionals with a powerful tool to create instant, writable, and space-efficient data copies, optimizing storage usage and accelerating development, testing, and analytics workflows within the Azure cloud environment.
Published: October 07, 2025 13:00:16 UTC Link: Retirement: Legacy Authentication in Azure Monitor - Container Insights will be retired on September 30, 2026.
Update ID: 500853 Data source: Azure Updates API
Categories: DevOps, Management and governance, Azure Monitor, Retirements
Summary:
What was updated
Azure Monitor - Container Insights will retire its legacy authentication method on September 30, 2026.
Key changes or new features
The legacy authentication approach is being phased out and replaced by Managed Identity authentication. Managed Identity offers enhanced security by eliminating the need for credential management and provides seamless, secure access to Azure resources.
Target audience affected
Developers and IT professionals using Azure Monitor Container Insights who currently rely on legacy authentication for monitoring containerized environments.
Important notes if any
Users must migrate to Managed Identity authentication before the retirement date to avoid service disruptions. Migrating not only improves security posture but also enables access to additional Azure features and integrations. Planning and testing the migration ahead of the deadline is recommended to ensure a smooth transition.
For detailed guidance, refer to the official Azure update and migration documentation.
Details:
The Azure update announces the planned retirement of Legacy Authentication in Azure Monitor - Container Insights effective September 30, 2026, transitioning fully to the more secure Managed Identity authentication method. This change reflects Microsoft’s ongoing commitment to enhancing security and simplifying identity management within Azure monitoring services.
Background and Purpose of the Update
Legacy Authentication in Azure Monitor - Container Insights historically relied on credential-based access methods that posed security risks such as credential leakage and management overhead. To address these concerns, Microsoft introduced Managed Identity authentication, which eliminates the need for explicit credentials by leveraging Azure Active Directory (AAD) identities assigned to resources. The retirement of legacy authentication aims to enforce stronger security postures, reduce attack surfaces, and streamline authentication workflows for container monitoring.
Specific Features and Detailed Changes
The update deprecates all legacy authentication mechanisms used by Container Insights to access Azure Monitor and related telemetry services. Users must migrate to Managed Identities, which provide automatic token acquisition and renewal without manual credential handling. This change affects how Container Insights agents authenticate to Azure Monitor, requiring configuration updates to enable Managed Identity usage. Post-retirement, legacy authentication calls will no longer be supported, and any monitoring relying on them will fail.
Technical Mechanisms and Implementation Methods
Managed Identity authentication operates by assigning a system-assigned or user-assigned identity to the Azure resource running Container Insights (such as Azure Kubernetes Service nodes or Azure VMs). The Container Insights agent then requests OAuth 2.0 tokens from Azure AD without embedding credentials in code or configuration files. These tokens grant scoped access to Azure Monitor APIs securely. Implementation involves enabling Managed Identity on the resource, granting appropriate RBAC roles (e.g., Monitoring Reader or Contributor) to the identity, and configuring the Container Insights agent to use this identity for authentication. This eliminates the need for service principals or manual secret management.
Use Cases and Application Scenarios
This update primarily impacts organizations using Azure Monitor to collect and analyze telemetry from containerized workloads, including Kubernetes clusters and container instances. It is especially relevant in environments with strict security compliance requirements, where credential management is a risk factor. Migrating to Managed Identity enhances security for continuous monitoring, alerting, and diagnostics workflows by ensuring that only authorized identities access monitoring data. It also simplifies automation and scaling scenarios by removing credential rotation tasks.
Important Considerations and Limitations
Integration with Related Azure Services
Managed Identity authentication integrates seamlessly with Azure Active Directory, Azure Kubernetes Service (AKS), Azure Virtual Machines, and Azure Monitor. It leverages Azure RBAC to control access to monitoring data and telemetry ingestion endpoints. This update aligns Container Insights with other Azure services that have adopted Managed Identity for secure service-to-service communication, such as Azure Key Vault, Azure Storage, and Azure Event Hubs. It also facilitates integration with Azure Policy and Azure Security Center for governance and compliance monitoring.
In summary, the retirement of Legacy Authentication in Azure Monitor - Container Insights by September 30, 2026, mandates migration to Managed Identity authentication, enhancing security and operational efficiency for container telemetry collection by leveraging Azure AD identities, RBAC, and token-based access, thereby aligning with Azure’s broader security modernization initiatives.
Published: October 07, 2025 12:00:49 UTC Link: Generally Available: AI toolchain operator add-on (KAITO) for AKS
Update ID: 503263 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Azure Kubernetes Service (AKS), Features
Summary:
What was updated
The AI toolchain operator add-on (KAITO) for Azure Kubernetes Service (AKS) is now generally available.
Key changes or new features
KAITO simplifies deploying AI inference and fine-tuning workflows on AKS by integrating popular open-source AI frameworks. It uses vLLM as the default inference engine, which optimizes performance and reduces management overhead. This add-on automates complex AI pipeline setups, enabling faster iteration and scaling of AI workloads within Kubernetes environments.
Target audience affected
Developers and IT professionals working with AI/ML workloads on AKS, especially those deploying large language models or custom AI inference pipelines, will benefit from streamlined operations and improved resource management.
Important notes if any
General availability means production readiness and full support from Azure. Users should review compatibility with existing AI frameworks and consider leveraging KAITO to reduce operational complexity in AI deployments on AKS.
For more details, visit: https://azure.microsoft.com/updates?id=503263
Details:
The AI toolchain operator add-on (KAITO) for Azure Kubernetes Service (AKS) has reached general availability, providing a streamlined and integrated solution for deploying AI inference and fine-tuning workflows on AKS clusters. This update addresses the complexity of managing AI workloads by leveraging popular open-source frameworks and introducing vLLM as the default inference engine, thereby simplifying operational overhead and improving performance.
Background and Purpose
As AI adoption accelerates, organizations face challenges in deploying and managing AI models at scale, particularly for inference and fine-tuning tasks that require robust orchestration and resource management. Traditional deployment methods often involve manual configuration and fragmented toolchains, leading to inefficiencies and increased operational costs. The KAITO add-on was developed to unify these processes within AKS, enabling IT professionals and data scientists to deploy AI workloads more efficiently while maintaining Kubernetes-native management and scalability.
Specific Features and Detailed Changes
Technical Mechanisms and Implementation Methods
KAITO operates as a Kubernetes operator installed as an AKS add-on, which means it can be enabled via the Azure CLI or Azure portal with minimal configuration. The operator watches for custom resource definitions (CRDs) representing AI workloads and automates their deployment lifecycle. It provisions necessary compute resources, configures vLLM inference pods with optimized GPU scheduling, and manages persistent storage for model artifacts. The add-on also integrates with AKS monitoring tools to provide telemetry and health metrics, facilitating proactive management.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
KAITO integrates seamlessly with Azure Monitor for logging and metrics, Azure Active Directory for role-based access control, and Azure Container Registry for storing container images of AI workloads. It can also be combined with Azure Machine Learning for advanced model lifecycle management and Azure Data Services for data ingestion and preprocessing, creating an end-to-end AI deployment ecosystem within Azure.
In summary
This report was automatically generated - 2025-10-08 03:03:19 UTC