Hello Tracy Mosley
What you are seeing is expected behavior when AWS is connected through the Azure Arc Multicloud Connector (Inventory and/or Arc onboarding solution).
- Azure Arc Multicloud Connector performs periodic inventory scans
- The connector regularly queries AWS APIs and re‑projects discovered resources into Azure.
- Any resource that still appears discoverable from AWS APIs will be recreated in Azure on the next sync.
- Deleting the Arc machine in Azure does not block rediscovery
- Deleting
Microsoft.HybridCompute/machines only removes the Azure representation.
- On the next scan, if the connector still detects the resource, it is re‑created automatically.
- Connector‑based resources are not “owned” by Defender for Cloud
- Defender for Cloud consumes data from the connector but does not control lifecycle deletion of inventory objects.
- There is no Defender‑side “cache” or manual purge option for individual machines.
The most common root cause is even when an EC2 instance is terminated, one or more AWS artifacts can still exist, causing the connector to rediscover it:
- Instance metadata still visible via AWS APIs for a short or extended period
- Orphaned Auto Scaling Group, Launch Template, or Spot Fleet references
- AWS Config / CloudTrail historical records still being returned
- Organization‑level inventory scan returning stale entries
Because the Arc Multicloud Connector is source‑of‑truth driven by AWS, Azure will keep recreating the objects until the source is clean.
Please try below provided workarounds and let us know if it is helpfull or not:
- Remove or disable the AWS connector solution
If these AWS instances should never be managed again:
- Go to Azure Arc → Multicloud connectors
- Select the AWS connector
- Disable the Inventory solution and/or Arc onboarding solution
- After disabling, manually delete the Azure resources
Once the solution is disabled, periodic sync stops, and deleted resources will not be recreated.
- Fully remove the AWS connector (cleanest reset)
If you want a full reset:
- Delete the AWS security connector / multicloud connector in Azure
- Remove the CloudFormation stack in AWS
- Confirm no AWS IAM roles created for Azure Arc remain
- Re‑create the connector only if needed
This clears all discovery paths.
- Confirm AWS truly no longer returns the instance:
Before expecting Azure to stop rediscovering:
- Verify the instance does not appear in AWS EC2 APIs
- Check for:
- Auto Scaling Groups
- Launch Templates
- Spot requests
- AWS Config historical visibility
If AWS returns it, Azure Arc must re‑add it by design.
Please have a look into below reference links for more details:
So, Azure Arc Multicloud Connector treats AWS as the source of truth. Deleting Arc machines in Azure does not prevent rediscovery during periodic scans. To permanently remove these instances, you must either fully remove the AWS connector (or disable the Inventory/Arc onboarding solutions) or ensure the instances and all related artifacts no longer appear in AWS APIs. There is no Defender‑side or Arc‑side manual purge mechanism for individual machines while the connector remains active.
If the provided information helpful then please click "upvote" it.
If you have any other queries, then please share us the above requested details.
Thanks,
Suchitra.