The outage list published on Azure’s status page named more than a dozen individual services. Among those were Azure Databricks, Azure Maps, Azure Virtual Desktop, Azure Kubernetes Service, Azure Synapse Analytics and Azure SQL Database. Microsoft 365’s own status feed noted “downstream impact” on cloud applications such as Teams, Outlook and SharePoint because they depend on Azure back-end infrastructure.
Several large customers immediately acknowledged operational problems tied to the outage. Alaska Airlines stated that key systems hosted on Azure, including those related to its recent $1.9 billion acquisition of Hawaiian Airlines, were offline. The carrier said websites and internal tools had been disrupted, complicating reservation management and other functions.
The disruption arrives at a sensitive moment for Microsoft, which is set to report fiscal first-quarter results after the closing bell. Analysts and investors are watching closely for evidence of continued momentum in the company’s cloud segment, particularly as demand for artificial-intelligence workloads lifts spending on compute and storage resources.
Wednesday’s incident follows a series of high-profile cloud outages across the industry. On 20 October, Amazon Web Services disclosed elevated error rates that interfered with customers launching new Elastic Compute Cloud (EC2) instances, taking numerous sites offline for several hours. According to market researcher Canalys, AWS remains the global leader in cloud infrastructure with a 32 percent share as of the first quarter, while Microsoft Azure holds 23 percent and Google Cloud 10 percent. Although AWS continues to command the largest slice of spending, Azure and Google have recently posted faster growth, driven in part by large language model training and generative AI services.
Microsoft has dealt with similar reliability issues this year. In March, an outage that lasted much of a weekend prevented tens of thousands of users from accessing Outlook, OneDrive and related applications. The company later attributed that problem to a networking configuration change that overloaded internal routers.
Azure Front Door, the focal point of Wednesday’s disruption, is Microsoft’s globally distributed entry service designed to accelerate application performance via edge locations and to provide Layer 7 load balancing. AFD routes user traffic to the nearest available endpoint, so configuration errors can propagate rapidly and affect multiple geographic regions.

Imagem: Internet
The sequence of events described by Microsoft indicates that an unintended setting change spread across the platform, leading to elevated latencies, connection time-outs and HTTP errors for dependent services. By rolling back to the last known good configuration, engineers aim to restore normal routing rules and certificate validations without requiring additional client-side adjustments.
As remediation work progressed, Microsoft advised customers to monitor Service Health Alerts within the Azure portal for real-time status updates. The company also encouraged administrators to implement fail-over strategies where possible and to validate application-level redundancy once connectivity stabilizes.
The incident underscores the operational stakes for hyperscale cloud providers whose offerings underpin critical public and private workloads. Even brief periods of unavailability can cascade across airlines, financial institutions, retailers and government agencies that rely on on-demand computing capacity.
All three leading U.S. hyperscalers—Microsoft, Amazon and Google—are disclosing quarterly earnings this week. Alphabet is slated to report after Wednesday’s market close, and Amazon follows on Thursday. Investors will be focused on revenue growth in cloud segments, gross-margin trends and capital-expenditure plans for expanding data-center capacity, particularly as artificial-intelligence commitments drive multi-billion-dollar hardware purchases.
By late afternoon, Microsoft reported declining error rates and improved service availability across most regions. The company said residual latency and sporadic authentication failures might persist until all AFD instances complete configuration rollback and caching layers resynchronize. Customers were advised to retry failed operations as propagation nears completion.
While root-cause analysis is ongoing, Microsoft’s preliminary assessment points to human-initiated configuration rather than a software defect or security incident. A full post-incident report, including preventive measures, is expected once the internal investigation concludes.
Crédito da imagem: Eric Lee | Bloomberg | Getty Images