Header Image
Planned Maintenance In Progress

Updated a few seconds ago

Welcome to Azure Databricks status page. Here you will find high-level availability information for all of the Azure Databricks services.

AI/BI

Planned Maintenance

Compute

Planned Maintenance

Databricks Apps

Planned Maintenance

Databricks SQL

Planned Maintenance

Lakebase

Operational

Lakeflow

Planned Maintenance

Mosaic AI

Planned Maintenance

Notebooks

Planned Maintenance

Unity Catalog

Planned Maintenance

Scheduled Maintenance

Generic Planned MaintenancePlanned Maintenance

Schedule

March 14, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks SQL, Lakeflow, Notebooks, Unity Catalog

Locations

China East 2, China East 3

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 14, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 14, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 14, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 14, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks SQL, Lakeflow, Notebooks, Unity Catalog

Locations

China North 2, China North 3

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 14, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 14, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 14, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 17, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

Southeast Asia, East Asia

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: TLS 1.0 and TLS 1.1 will be disabled for database connectivity. All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 17, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 17, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 17, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 17, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

Canada Central, Canada East

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 17, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 17, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 17, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 21, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

Australia East, Australia Central, Australia Central 2, Australia Southeast

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 21, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 21, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 21, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 21, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

West Europe, North Europe

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 21, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 21, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 21, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 28, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

West US, West US 2, South Central US

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 28, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 28, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 28, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

March 28, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

East US 2, East US, North Central US, Central US

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What's Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 28, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 28, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 28, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

April 4, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks SQL, Lakeflow, Notebooks, Unity Catalog

Locations

Qatar Central

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on April 04, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to April 04, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by April 04, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

April 4, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

UAE North

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on April 04, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to April 04, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by April 04, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Schedule

April 4, 2026 17:00 - 19:00 UTC

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakebase, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

Central India, South India, West India

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What's Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on April 04, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to April 04, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by April 04, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption. If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 13, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 13, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 13, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.

Components

AI/BI, Compute, Databricks SQL, Lakeflow, Notebooks, Unity Catalog

Locations

Switzerland West

Schedule

March 13, 2026 17:00 - 19:00 UTC



March 13, 2026 17:00 UTC
UPDATE

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 13, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 13, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 13, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.
Generic Planned MaintenancePlanned Maintenance

Description

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 13, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 13, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 13, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.

Components

AI/BI, Compute, Databricks Apps, Databricks SQL, Lakeflow, Mosaic AI, Notebooks, Unity Catalog

Locations

Switzerland North

Schedule

March 13, 2026 17:00 - 19:00 UTC



March 13, 2026 17:00 UTC
UPDATE

Azure will be performing necessary security maintenance to comply with updated TLS standards. What’s Changing During this maintenance: - TLS 1.0 and TLS 1.1 will be disabled for database connectivity. - All connections to Hive Metastore (HMS) must use TLS 1.2 going forward. - Databricks Runtime (DBR) versions 9.1 and later already use TLS 1.2 and are not affected. - Customers using DBR versions prior to 9.1 must upgrade or open a support ticket for guidance. If you currently reference Hive Metastore IP addresses directly in user-defined routes or firewalls, you must update your configuration before the maintenance window, following the instructions below. Failure to update these rules will result in Hive Metastore access failures and service outages (e.g., job failures, cluster start failures). Maintenance Window The migration will occur between 17:00 UTC and 19:00 UTC on March 13, 2026. Each region will experience a brief service interruption of approximately 5 minutes during this window. Action Required (must be completed prior to March 13, 2026) If your environment uses hard-coded Hive Metastore IP addresses: 1. Recommended: Update your user-defined routes or firewall rules (https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr#azure-service-tags) to use the Azure SQL service tag instead of static HMS IP addresses. This ensures future IP changes do not cause outages. 2. If your security policy does not allow service tags: Add the reserved IP ranges (https://community.databricks.com/t5/product-platform-updates/ip-cidr-for-azure-databricks-hive-metastore/ba-p/133401) for Hive Metastore to your routing or firewall rules. If supported, you may also allow the HMS FQDNs provided in the same documentation. Customers who already allow Azure service tags or FQDN-based rules do not need to take further action and will not experience disruption to running jobs. These actions must be completed by March 13, 2026. If the maintenance is rescheduled, the same configuration changes will still be required prior to the revised window to prevent service disruption.  If you are unable to use Service Tags or FQDN, open a support request, and we will work with you. During this maintenance period, the following capabilities may be temporarily unavailable: - Workspace authentication requests may fail or timeout. - Cluster start/resize/termination requests may fail or time out. - Jobs relying on cluster start/resize/termination may not execute. - Jobs submitted through APIs/Schedulers may not execute. - UI and Databricks SQL queries may time out. - Users may experience failures launching Databricks SQL Serverless - Warehouses. - Users may not be able to access UC APIs. - Mosaic AI Model Serving and AI/BI Dashboard may be impacted.