Generated on: February 19, 2026 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 8 items
Published: February 18, 2026 18:00:55 UTC Link: Generally Available: Anthropic Claude Sonnet 4.6 is now available on Azure Databricks
Update ID: 557595 Data source: Azure Updates API
Categories: Launched, AI + machine learning, Analytics, Azure Databricks, Features
Summary:
What was updated
Anthropic Claude Sonnet 4.6 is now generally available on Azure Databricks via Databricks AI Model Serving.
Key changes or new features
Azure Databricks users can now access and deploy the Claude Sonnet 4.6 large language model (LLM) through Databricks AI Model Serving. Claude Sonnet 4.6 offers advanced capabilities in complex coding tasks, agentic workflows, and professional knowledge work, including enhanced reasoning. The model is optimized for lower latency, enabling faster inference and improved performance for AI-driven applications.
Target audience affected
Developers, data scientists, and IT professionals using Azure Databricks for AI/ML workloads, especially those building or integrating advanced LLM-powered solutions.
Important notes if any
Integration with Claude Sonnet 4.6 allows teams to leverage state-of-the-art LLM capabilities directly within their Databricks environment, streamlining the deployment of generative AI features. Users should review model pricing and usage limits as per Azure Databricks AI Model Serving documentation. This update enables faster prototyping and productionization of AI solutions requiring advanced reasoning and coding support.
Details:
Azure Update Technical Report
Title: Generally Available: Anthropic Claude Sonnet 4.6 is now available on Azure Databricks
Background and Purpose of the Update:
This update introduces Anthropic Claude Sonnet 4.6 as a generally available model on Azure Databricks via Azure Databricks AI Model Serving. The purpose is to provide Azure Databricks users access to a frontier-level large language model (LLM) that excels in complex coding, agentic workflows, and professional knowledge work, including advanced reasoning tasks. This aligns with Azure’s ongoing strategy to integrate state-of-the-art AI models into its analytics and data science platform, enhancing productivity and enabling advanced AI-driven solutions.
Specific Features and Detailed Changes:
Technical Mechanisms and Implementation Methods:
Use Cases and Application Scenarios:
Important Considerations and Limitations:
Integration with Related Azure Services:
Summary Sentence:
Anthropic Claude Sonnet 4.6 is now generally available on Azure Databricks via AI Model Serving, offering advanced performance for complex coding, agentic workflows, and professional knowledge work with improved reasoning and lower latency.
Published: February 18, 2026 18:00:55 UTC Link: Public Preview: Unified tooling in the AKS MCP server
Update ID: 557223 Data source: Azure Updates API
Categories: In preview, Compute, Containers, Azure Kubernetes Service (AKS)
Summary:
What was updated
Unified tooling for the Azure Kubernetes Service (AKS) Managed Control Plane (MCP) server is now in public preview, introducing new integrated tools.
Key changes or new features
Two new tools, call_az and call_kubectl, are now available directly within the AKS MCP server. These tools allow users to execute Azure CLI (az) and Kubernetes CLI (kubectl) commands without needing to switch contexts or manage multiple tool installations. This unified approach streamlines operational workflows, reduces latency, and can lower operational costs by simplifying management tasks.
Target audience affected
This update is relevant for developers, DevOps engineers, and IT professionals who manage AKS clusters using the MCP server, especially those who frequently interact with both Azure and Kubernetes command-line tools.
Important notes if any
The unified tooling is currently in public preview, so it is recommended for testing and non-production workloads. Users should provide feedback to Microsoft to help improve the tools before general availability. This update aims to enhance productivity and reduce complexity in AKS cluster management. For more details, refer to the official Azure Update.
Details:
Azure Update Technical Report
Title: Public Preview: Unified tooling in the AKS MCP server
Link: Azure Update
Background and Purpose of the Update
Managing Azure Kubernetes Service (AKS) Managed Control Plane (MCP) servers often requires multiple tools and extensive contextual knowledge. This complexity can lead to increased operational latency and higher costs for IT teams. The update introduces unified tooling for the AKS MCP server, aiming to streamline management workflows, reduce tool fragmentation, and lower the operational burden associated with AKS MCP server administration.
Specific Features and Detailed Changes
The unified tooling enhancement brings two new tools into public preview: call_az and call_kubectl.
kubectl) directly on the MCP server, facilitating cluster management and troubleshooting.These tools are designed to minimize the need for context switching between different management interfaces and tools, thereby improving efficiency and reducing latency in operational tasks.
Technical Mechanisms and Implementation Methods
The unified tooling is implemented as integrated command-line utilities within the AKS MCP server environment.
call_az and call_kubectl are accessible directly from the MCP server, leveraging secure authentication and authorization mechanisms native to Azure and AKS.Use Cases and Application Scenarios
call_kubectl to manage Kubernetes resources, troubleshoot cluster issues, and perform routine maintenance tasks directly from the MCP server.call_az, IT professionals can manage Azure resources related to the AKS cluster, such as networking, storage, and identity, without leaving the MCP environment.Important Considerations and Limitations
Integration with Related Azure Services
Summary Sentence:
The public preview of unified tooling in the AKS MCP server introduces call_az and call_kubectl to streamline Azure and Kubernetes management operations, reducing complexity, latency, and operational costs for IT professionals managing AKS environments.
Published: February 18, 2026 18:00:55 UTC Link: Public Preview: Cluster mode for the agentic CLI for AKS
Update ID: 557218 Data source: Azure Updates API
Categories: In preview, Compute, Containers, Azure Kubernetes Service (AKS)
Summary:
What was updated
Cluster mode for the agentic CLI for Azure Kubernetes Service (AKS) is now available in public preview.
Key changes or new features
Cluster mode enables a single, centrally managed deployment of the agentic CLI within an AKS cluster. This addresses previous security and manageability concerns where diagnostic agents required broad user permissions (such as cluster-admin) and each user had to deploy their own instance. With cluster mode, permissions can be scoped more securely, and agent management is streamlined, reducing operational overhead.
Target audience affected
AKS administrators, DevOps engineers, and developers who use diagnostic agents or the agentic CLI for troubleshooting and cluster management.
Important notes if any
Cluster mode enhances security by minimizing the need for broad permissions and simplifies agent deployment and management. Users are encouraged to test the public preview and provide feedback. This update is especially relevant for organizations with multiple users requiring diagnostic access to AKS clusters. For more information and to get started, refer to the official Azure Update announcement.
Details:
Azure Update Report: Public Preview – Cluster Mode for the Agentic CLI for AKS
Background and Purpose of the Update
The update addresses common security and manageability challenges encountered when using diagnostic agents in Azure Kubernetes Service (AKS) environments. Traditionally, these agents inherit broad user permissions, such as cluster-admin rights, which can lead to potential security risks. Additionally, the requirement for each user to deploy their own agent instance increases operational complexity and resource consumption. The introduction of cluster mode for the agentic CLI aims to centralize agent deployment and reduce permission scope, thereby enhancing both security and manageability.
Specific Features and Detailed Changes
Cluster mode for the agentic CLI enables a single, shared instance of the diagnostic agent to operate at the cluster level, rather than requiring individual deployments per user. This change streamlines agent management and ensures that diagnostic operations can be performed without granting excessive permissions to each user. The public preview makes this feature available for testing and feedback, allowing organizations to evaluate its impact on their AKS workflows.
Technical Mechanisms and Implementation Methods
The cluster mode implementation modifies the deployment model for the agentic CLI. Instead of multiple user-specific agents, a single agent instance is deployed with scoped permissions appropriate for cluster-wide diagnostics. This agent is managed centrally and leverages Kubernetes RBAC (Role-Based Access Control) to restrict access and limit the scope of actions performed. The CLI interacts with the agent through secure channels, ensuring that diagnostic commands are executed in accordance with defined security policies. This architecture reduces the attack surface and simplifies permission management.
Use Cases and Application Scenarios
Cluster mode is particularly beneficial in multi-user AKS environments where several engineers or operators require diagnostic capabilities. For example, in large development teams or managed service scenarios, a single diagnostic agent can serve all users, eliminating the need for individual deployments and reducing resource overhead. It is also useful in regulated environments where minimizing privileged access is a compliance requirement. Organizations can leverage cluster mode to enforce least-privilege principles while maintaining operational visibility and troubleshooting capabilities.
Important Considerations and Limitations
As this feature is in public preview, it may not be suitable for production workloads until it reaches general availability. Users should review preview documentation for known issues and limitations. It is important to verify compatibility with existing AKS configurations and ensure that RBAC policies are correctly implemented to prevent unintended privilege escalation. Additionally, organizations should monitor agent activity and audit diagnostic operations to maintain security and compliance.
Integration with Related Azure Services
Cluster mode for the agentic CLI integrates seamlessly with AKS and leverages Azure’s RBAC and security frameworks. It can be used alongside Azure Monitor, Azure Security Center, and other diagnostic tools to provide comprehensive cluster insights. The centralized agent model simplifies integration with CI/CD pipelines and automated troubleshooting workflows, enhancing operational efficiency across Azure Kubernetes deployments.
Summary Sentence
Cluster mode for the agentic CLI for AKS, now in public preview, introduces a centralized diagnostic agent deployment model that improves security and manageability by reducing broad user permissions and streamlining agent operations within Azure Kubernetes Service environments.
Published: February 18, 2026 18:00:55 UTC Link: Generally Available: Quota and deployment troubleshooting tools for Azure Functions Flex Consumption
Update ID: 556008 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Internet of Things, Azure Functions, Features
Summary:
What was updated
Azure Functions Flex Consumption now offers generally available, integrated tools for quota and deployment troubleshooting.
Target audience affected
Developers and IT professionals managing or deploying serverless workloads using Azure Functions Flex Consumption plans.
Details:
Azure Update Summary: Generally Available: Quota and deployment troubleshooting tools for Azure Functions Flex Consumption
Background and Purpose of the Update
The update introduces new platform-integrated troubleshooting tools for Azure Functions Flex Consumption. The primary purpose is to provide IT professionals and developers with enhanced visibility into quota availability and deployment behaviors specific to the Flex Consumption plan. This addresses the common challenge of diagnosing quota-related issues and deployment constraints, which can affect the reliability and scalability of serverless applications.
Specific Features and Detailed Changes
With this update, Azure Functions Flex Consumption now includes:
These features are now generally available and are integrated directly into the Azure platform, streamlining the troubleshooting workflow for Flex Consumption users.
Technical Mechanisms and Implementation Methods
The troubleshooting tools are platform-integrated, meaning they are accessible directly within the Azure portal and are part of the Azure Functions management experience. The tools automatically surface relevant quota information and deployment diagnostics without requiring additional configuration or third-party solutions. This integration ensures real-time access to quota metrics and deployment logs, allowing for immediate analysis and remediation.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
These troubleshooting capabilities are tightly integrated with the Azure Functions platform and accessible via the Azure portal. They complement existing monitoring and diagnostics tools available in Azure, such as Application Insights and Azure Monitor, by providing quota-specific and deployment-specific insights relevant to Flex Consumption. This integration allows for a unified troubleshooting experience alongside other Azure management and monitoring services.
Summary Sentence
Azure Functions Flex Consumption now offers generally available, platform-integrated tools for quota and deployment troubleshooting, providing clear visibility into quota limits and deployment behaviors to streamline issue resolution and enhance operational reliability for serverless applications.
Published: February 18, 2026 18:00:55 UTC Link: Generally Available: Azure Functions .NET 10 support
Update ID: 556003 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Internet of Things, Azure Functions, Features
Summary:
What was updated
Azure Functions now has general availability (GA) support for .NET 10, allowing developers to use the latest .NET runtime for building and running serverless applications in production environments.
Key changes or new features
The update introduces full support for .NET 10 in Azure Functions, enabling access to new language features, performance improvements, and security enhancements provided by .NET 10. Developers can now create, deploy, and manage Azure Functions projects targeting .NET 10, leveraging the latest SDKs and tooling. This update was announced as part of the Azure Functions Ignite 2025 updates.
Target audience affected
This update is relevant for developers building serverless solutions with Azure Functions, DevOps engineers managing cloud-native workloads, and IT professionals responsible for maintaining Azure-based applications.
Important notes if any
Developers should ensure their local development environments and CI/CD pipelines are updated to support .NET 10. Review Azure Functions documentation for any migration considerations if upgrading existing apps from earlier .NET versions. The update supports isolated process hosting for .NET 10, which may impact how dependencies and middleware are managed. For more details, refer to the official Azure Update: https://azure.microsoft.com/updates?id=556003
Details:
Azure Update Technical Report: Azure Functions .NET 10 Support (Generally Available)
Background and Purpose of the Update
Azure Functions is Microsoft’s serverless compute platform, enabling event-driven execution of code in the cloud. The update announces the general availability (GA) of .NET 10 support for Azure Functions, following its introduction at Ignite 2025. The purpose of this update is to allow IT professionals and developers to leverage the latest .NET runtime for production-grade serverless applications, ensuring access to new language features, performance improvements, and security enhancements provided by .NET 10.
Specific Features and Detailed Changes
With this update, Azure Functions now fully supports .NET 10 as a runtime option. This means developers can create, deploy, and run Azure Functions using the .NET 10 runtime, taking advantage of its latest features. The support includes the ability to use .NET 10 language constructs, libraries, and tooling within function apps. The update also ensures compatibility with the Azure Functions programming model and deployment workflows, allowing seamless integration into existing CI/CD pipelines and development environments.
Technical Mechanisms and Implementation Methods
.NET 10 support is implemented through the Azure Functions runtime, which now recognizes and executes function apps built targeting .NET 10. The runtime uses the isolated process model (“iso”), which decouples the function execution environment from the host process, providing greater flexibility and compatibility with new .NET versions. Developers must specify .NET 10 as the target framework in their project configuration (e.g., TargetFramework=net10.0) and ensure their function app is built using the isolated worker model. Deployment to Azure Functions can be performed via standard methods such as Azure CLI, Visual Studio, or GitHub Actions, with the platform automatically provisioning the .NET 10 runtime as needed.
Use Cases and Application Scenarios
This update is particularly relevant for organizations seeking to modernize their serverless workloads with the latest .NET features. Use cases include:
Important Considerations and Limitations
When adopting .NET 10 for Azure Functions, IT professionals should ensure that all dependencies and libraries used in their function apps are compatible with .NET 10. The isolated process model is required for .NET 10 support, which may differ from the in-process model used in previous versions. Testing and validation are recommended before migrating production workloads. Additionally, review Azure Functions documentation for any platform-specific limitations or best practices related to .NET 10.
Integration with Related Azure Services
Azure Functions .NET 10 support enables seamless integration with other Azure services, including Azure Logic Apps, Azure Event Grid, Azure Service Bus, and Azure Cosmos DB. Function apps can utilize .NET 10 SDKs for these services, ensuring compatibility and access to the latest features. The isolated process model also facilitates easier integration with custom middleware and third-party libraries.
Summary Sentence
Azure Functions now generally supports .NET 10, enabling production use of the latest .NET runtime for serverless applications with enhanced features, performance, and integration capabilities via the isolated process model.
Published: February 18, 2026 17:15:17 UTC Link: Generally Available: Node auto-provisioning support in Azure government and private cloud
Update ID: 557208 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Azure Kubernetes Service (AKS)
Summary:
What was updated
Node auto-provisioning is now generally available in Azure Kubernetes Service (AKS) for Azure Government and private cloud environments.
Key changes or new features
AKS node auto-provisioning automates the sizing and management of compute resources for Kubernetes workloads. This feature dynamically provisions and scales node pools based on workload requirements, reducing the need for manual intervention and improving resource utilization.
Target audience affected
This update is relevant for developers, DevOps engineers, and IT professionals managing Kubernetes clusters in Azure Government or private cloud environments.
Important notes if any
Node auto-provisioning helps optimize costs and operational efficiency by automatically adjusting compute resources as demand changes. Teams using AKS in regulated or isolated environments (such as government or private cloud) can now leverage this feature for improved scalability and management. Review the AKS documentation for implementation details and best practices.
Details:
Azure Update Report
Title: Generally Available: Node auto-provisioning support in Azure government and private cloud
Link: Azure Update
Azure Kubernetes Service (AKS) is a managed container orchestration service that simplifies deploying, managing, and scaling containerized applications using Kubernetes. Traditionally, teams managing AKS clusters have been responsible for manually sizing and managing the compute resources (nodes) required for their Kubernetes workloads. This manual process can lead to inefficiencies, over-provisioning, or resource shortages. The purpose of this update is to introduce general availability (GA) of node auto-provisioning support for AKS in Azure Government and private cloud environments, thereby automating the management of compute resources and reducing operational overhead.
Summary:
Node auto-provisioning for Azure Kubernetes Service is now generally available in Azure Government and private cloud, enabling automated, policy-driven management of compute resources for Kubernetes workloads and reducing the need for manual node pool sizing and management.
Published: February 18, 2026 16:45:58 UTC Link: Generally Available: Node auto-provisioning enabled clusters in AKS now support LocalDNS
Update ID: 557203 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Azure Kubernetes Service (AKS)
Summary:
What was updated
LocalDNS is now generally available for Azure Kubernetes Service (AKS) clusters that have Node auto-provisioning enabled.
Key changes or new features
Previously, AKS clusters using Node auto-provisioning could not enable LocalDNS, which limited DNS performance optimization in dynamic node environments. With this update, LocalDNS can now be enabled on these clusters, allowing for improved DNS resolution performance and reliability, especially in large or highly dynamic AKS deployments.
Target audience affected
This update is relevant to developers and IT professionals managing AKS clusters that utilize Node auto-provisioning, particularly those seeking to optimize DNS performance and cluster scalability.
Important notes if any
Enabling LocalDNS on auto-provisioned clusters can help reduce DNS lookup latency and improve overall cluster stability. No changes are required for existing clusters unless you wish to enable LocalDNS; refer to AKS documentation for configuration steps. This feature is now generally available in all supported AKS regions.
Data source: Azure Update
Details:
Comprehensive Technical Explanation: Azure Update – Node Auto-Provisioning Enabled Clusters in AKS Now Support LocalDNS (Generally Available)
Azure Update Link
Background and Purpose of the Update
Previously, Azure Kubernetes Service (AKS) clusters configured with Node auto-provisioning could not enable the LocalDNS feature. This limitation prevented customers from leveraging LocalDNS to optimize DNS resolution within their AKS environments when using dynamic node scaling. The purpose of this update is to remove this restriction, allowing LocalDNS to be used in conjunction with Node auto-provisioning, thereby improving DNS performance and reliability in auto-scaled AKS clusters.
Specific Features and Detailed Changes
With this update, LocalDNS is now generally available for AKS clusters that utilize Node auto-provisioning. The key change is the compatibility between LocalDNS and Node auto-provisioning, enabling customers to activate LocalDNS on clusters that automatically manage node scaling. This enhancement allows for improved DNS caching and resolution at the node level, reducing latency and dependency on external DNS services.
Technical Mechanisms and Implementation Methods
LocalDNS operates by deploying a DNS caching agent on each node within the AKS cluster. This agent intercepts DNS queries from pods and caches responses locally, minimizing repeated queries to upstream DNS servers. Node auto-provisioning dynamically adds or removes nodes based on workload demands. The update ensures that when new nodes are provisioned automatically, the LocalDNS agent is deployed and configured on each node, maintaining consistent DNS performance across the cluster regardless of scaling events.
To enable LocalDNS on an AKS cluster with Node auto-provisioning, customers can use the Azure CLI or ARM templates to set the LocalDNS feature flag during cluster creation or update. The AKS control plane orchestrates the deployment of LocalDNS agents as part of the node provisioning workflow.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
LocalDNS in AKS clusters works alongside Azure networking services, such as Azure DNS and Azure Virtual Network. It enhances DNS resolution within the cluster while maintaining compatibility with external DNS infrastructure. Node auto-provisioning leverages Azure Compute resources, and the integration ensures seamless deployment of LocalDNS agents as part of the node lifecycle managed by AKS.
Summary Sentence
LocalDNS is now generally available for AKS clusters with Node auto-provisioning, enabling improved DNS resolution and performance in dynamically scaled Kubernetes environments.
Published: February 18, 2026 16:30:06 UTC Link: Generally Available: Encryption at host & disk encryption sets support in node auto-provisioning
Update ID: 557213 Data source: Azure Updates API
Categories: Launched, Compute, Containers, Azure Kubernetes Service (AKS)
Summary:
What was updated
Encryption at Host and Disk Encryption Sets are now generally available for clusters with node auto-provisioning enabled in Azure Kubernetes Service (AKS).
Key changes or new features
Previously, AKS clusters using node auto-provisioning could not leverage Encryption at Host or disk encryption sets, which restricted their use in environments with strict security requirements. With this update, both Encryption at Host and disk encryption sets are now supported for node auto-provisioned clusters. This enhancement allows for improved data-at-rest security and compliance, aligning with organizational and regulatory standards.
Target audience affected
This update is relevant for developers, DevOps engineers, and IT professionals managing AKS clusters, especially those responsible for securing sensitive workloads or operating in regulated industries.
Important notes if any
To take advantage of these encryption features, ensure your cluster configuration and node pools are updated accordingly. Review Azure documentation for any prerequisites or limitations related to enabling Encryption at Host and disk encryption sets with node auto-provisioning. This update helps organizations meet higher security and compliance requirements without sacrificing the benefits of automated node management.
Read more on the official update page.
Details:
Azure Update Technical Report
Title: Generally Available: Encryption at host & disk encryption sets support in node auto-provisioning
Link: Azure Update
Background and Purpose of the Update:
Previously, Azure Kubernetes Service (AKS) clusters with node auto-provisioning enabled lacked support for Encryption at Host and disk encryption sets. This limitation prevented organizations with strict security and compliance requirements from leveraging node auto-provisioning, as they could not enforce advanced encryption standards for their cluster nodes and attached disks. The purpose of this update is to address this gap by enabling these encryption features in node auto-provisioning scenarios, thereby expanding the usability of AKS for customers with heightened security needs.
Specific Features and Detailed Changes:
With this update, node auto-provisioning enabled clusters now support:
These features are now generally available for clusters using node auto-provisioning, meaning they can be configured and used in production environments.
Technical Mechanisms and Implementation Methods:
Use Cases and Application Scenarios:
Important Considerations and Limitations:
Integration with Related Azure Services:
Summary Sentence:
Node auto-provisioning enabled clusters in Azure Kubernetes Service now support Encryption at Host and disk encryption sets, allowing organizations to meet advanced security requirements and regulatory standards while leveraging automated node scaling.
This report was automatically generated - 2026-02-19 03:04:33 UTC