Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure feature retirement #1697

Closed
5 tasks done
helendduncan opened this issue Jan 8, 2024 · 2 comments
Closed
5 tasks done

Azure feature retirement #1697

helendduncan opened this issue Jan 8, 2024 · 2 comments

Comments

@helendduncan
Copy link

helendduncan commented Jan 8, 2024

The DSH operations team email address has received several automated reminders of Azure feature retirements over 2024.

  • Classic metrics in Azure Storage, will be replaced with metrics in Azure Monitor (09/01/2024)
  • Update your trusted root store for Azure Storage (29/02/2024)
  • Update management in Azure Automation will be retired (31/08/2024)
  • Migrate to change tracking and inventory with Azure Monitoring Agent (31/08/2024)
  • Transition TLS to TLS 1.2 or later (31/10/2024)

Classic metrics in Azure Storage, will be replaced with metrics in Azure Monitor

Because Azure Monitor now provides rich, consolidated monitoring for Azure resources, classic metrics in Azure Storage will be retired on 9 January 2024 and you'll need to transition to using metrics in Monitor.

In addition to the classic metrics features you already use, metrics in Monitor provide improvements such as:

New metrics and dimensions for extended monitoring.
Deep analysis in Azure Monitor Logs.
Native integration with other monitoring solutions.
Recommended action

To continue monitoring your Storage resources, transition to metrics in Monitor by 9 January 2024.

Potential subscriptions affected:

  • DSH Development
  • Prod4 Mangement

Comments

Having looked through the Azure documentation here, I believe the relevant call to the classic metric would be Get-AzStorageServiceMetricsProperty - which is not used in the 4.1.0 release. So I believe this transition will not affect the running of the DSH.
Furthermore I have not come across usage via the portal and the supporting visualisations have been retired since August 2023 - which again lends weight to my belief that this isn't in active use for the DSH.

Update your trusted root store for Azure Storage

Many Azure Storage services use intermediate TLS certificates that are set to expire in June 2024. In preparation, we'll begin rolling out updates in March for these expiring certificates in Blob Storage, Azure Files, Table Storage, Queue Storage, static websites, and Data Lake Storage Gen2 in the public Azure cloud and US Government cloud.

If you have client applications that still use certificate pinning, they'll be affected by this change and you'll need to take action by 29 February 2024 to avoid potential connection interruptions. Certificate pinning—when client applications explicitly specify a list of acceptable certificate authorities—is no longer a best practice.

Required action

If you have client applications that have pinned to intermediate certificate authorities, take one of these actions by 29 February 2024 to prevent interruptions to your connections:

Add the issuing certificate authorities to your trusted root store. Keep using the current intermediate certificate authorities until they're updated.
Or, to avoid the effects of this update and future certificate updates, discontinue certificate pinning in your applications.

Potential subscriptions affected:

  • DSH Development
  • Prod4 Mangement
  • LWMCensus

Update management in Azure Automation will be retired

On 31 August 2024, both the update management feature of Azure Automation and the Log Analytics agent it uses will be retired. You’ll need to begin assessing and patching your virtual machines using Azure Update Manager by that date.

Azure Update Manager is available at no charge for managing Azure Virtual Machines and Azure Stack HCI VMs. For Azure Arc–enabled servers, the price is $5 per server per month.

In addition to the familiar features you already use, Azure Update Manager offers key improvements including:

Zero-step onboarding with native functionality built on Azure compute and Azure Arc.
Granular, per-resource access control and role-based access control.
Greater flexibility with Azure-orchestrated auto-patching, customer-defined maintenance schedules, and hotpatching.

Required action

To avoid any disruptions in service, migrate to Azure Update Manager by 31 August 2024.

Potential subscriptions affected:

  • DSH Development
  • Prod4 Mangement

Migrate to change tracking and inventory with Azure Monitoring Agent

On 31 August 2024, change tracking and inventory with Log Analytics agent in Azure Automation will be retired. You'll need to migrate to change tracking and inventory in Azure Monitoring Agent by that date.

In addition to the familiar capabilities you already use, change tracking and inventory in Azure Monitoring Agent offers key improvements such as:

Enhanced security and reliability.
At-scale onboarding with Azure Policy.
The ability to manage change and inventory with data collection rules.
Required action

To avoid any disruptions in service, migrate to change tracking and inventory in Azure Montioring Agent by 31 August 2024.

Potential subscriptions affected:

  • DSH Development
  • Prod4 Mangement
  • LWMCensus

Transition TLS to TLS 1.2 or later

If you have resources that interact with Azure services and still use TLS 1.1 or earlier, transition them to TLS 1.2 or later by 31 October 2024

To enhance security and provide best-in-class encryption for your data, we'll require interactions with Azure services to be secured using Transport Layer Security (TLS) 1.2 or later beginning 31 October 2024, when support for TLS 1.0 and 1.1 will end.

The Microsoft implementation of older TLS versions is not known to be vulnerable, however, TLS 1.2 and later offer improved security with features such as perfect forward secrecy and stronger cipher suites.

Recommended action
To avoid potential service disruptions, confirm that your resources that interact with Azure services are using TLS 1.2 or later. Then:

  • If they're already exclusively using TLS 1.2 or later, you don't need to take further action.
  • If they still have a dependency on TLS 1.0 or 1.1, transition them to TLS 1.2 or later by 31 October 2024.
@helendduncan helendduncan changed the title Azure feature retirement. Classic metrics in Azure Storage, will be replaced with metrics in Azure Monitor Azure feature retirement Jan 8, 2024
@JimMadge
Copy link
Member

JimMadge commented Jan 9, 2024

Hi @helendduncan,

There are quite a few things to go through here. I think we need to identify

  • which affect the latest release,
  • which can be fixed,
  • and how to fix those.

I would be surprised if the TLS deprecation is a problem, for example.

I think you should look carefully at these because there may be things you need to fix through manual intervention on a production deployment.

What would be most useful?
@craddm Would you be able to find some time to look into these with @helendduncan and her team?

@helendduncan
Copy link
Author

RE: Meeting 15/01/24 with @helendduncan and @craddm

Closing this issue as each individual retirement is either not relevant or is addressed in other issues

Classic metrics in Azure Storage, will be replaced with metrics in Azure Monitor (09/01/2024)
Not used in 4.1.0 release - no action needed
Update your trusted root store for Azure Storage (29/02/2024)
We’re not using the specific (Azure) certificates mentioned in the issue.
Certificates we do use = Turing issued for VPN for SHM and LetsEncrypt
Update management in Azure Automation will be retired (31/08/2024)
This is a long-standing issue addressed in issue #1403 and will perhaps require some input from James R before actioning
Migrate to change tracking and inventory with Azure Monitoring Agent (31/08/2024)
Expected to be obsolete by deadline - see issue #1232
Transition TLS to TLS 1.2 or later (31/10/2024)
unlikely to be an issue as TLS is not explicirly addressed in scripts - rather the minimum default TLS version is used

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants