Azure CNI vs Kubenet in AKS: Which to Choose
Azure CNI provides true network isolation for your AKS pods, meaning they get their own IP addresses from your virtual network, while Kubenet uses a bri.
49 articles
Azure CNI provides true network isolation for your AKS pods, meaning they get their own IP addresses from your virtual network, while Kubenet uses a bri.
Azure Files, when mounted into AKS, can actually be slower than local disk for certain workloads, despite being a networked file share.
Azure Monitor for containers is surprisingly good at telling you what's happening inside your pods, not just on the nodes themselves.
Velero can back up AKS workloads by capturing their Kubernetes API objects and persistent volume data, then storing them in object storage.
Install and Configure Cilium CNI in AKS — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
The AKS Cluster Autoscaler doesn't actually scale your nodes in the traditional sense; it tells Azure to provision or deprovision nodes based on pending.
AKS Cluster Creation: Production Best Practices — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
The most surprising thing about upgrading AKS clusters with zero downtime is that you don't actually upgrade the cluster in place.
Confidential computing in AKS doesn't encrypt your data at rest or in transit; it encrypts your data while it's being processed inside the CPU.
AKS can't pull images from Azure Container Registry because the AKS cluster's service principal or managed identity lacks the necessary permissions on t.
Azure Kubernetes Service AKS is a managed Kubernetes offering that simplifies deploying, managing, and scaling containerized applications.
Dapr doesn't actually manage your microservices; it provides a sidecar that enhances them with distributed system capabilities.
Microsoft Defender for Endpoint's runtime protection capabilities can be enabled on Azure Kubernetes Service AKS clusters to provide enhanced threat det.
Deploy to AKS with Azure DevOps Pipelines. Azure DevOps Pipelines can deploy directly to Azure Kubernetes Service AKS. Let's see it in action
Configure Custom DNS in AKS. AKS's default DNS resolution behavior is to forward all DNS queries to the Azure DNS service. Let's see how to break that
You can control AKS egress traffic using User-Defined Routes UDRs by forcing all outbound traffic through a network virtual appliance NVA or Azure Firew.
AKS Fleet Manager is surprisingly more about centralized identity and RBAC management than it is about actual cluster provisioning or orchestrating work.
NVIDIA GPUs have become essential for accelerating machine learning, deep learning, and other computationally intensive workloads.
Kubernetes Horizontal Pod Autoscaler HPA can actually make your application less available if you don't understand its core assumptions about resource u.
Combine NGINX Ingress with Azure App Gateway in AKS. Azure App Gateway is actually a Kubernetes Ingress Controller. Let's get this working
KEDA scales Kubernetes pods based on external events, but it's not just another horizontal pod autoscaler; it's a reactive scaling engine that can scale.
Managed Disks are Azure's persistent storage solution, and the Container Storage Interface CSI driver is how Kubernetes talks to them.
Manage Multi-Cluster AKS with Fleet — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
Azure Kubernetes Service AKS clusters need to communicate with external services over the internet. By default, AKS uses the public IP address of the AK.
Enforce Pod Network Policies with Calico in AKS — Network Policies are the firewall for your Kubernetes pods. Here's a Calico-powered AKS cluster, sho.
The most surprising thing about upgrading AKS node images without downtime is that it's not about replacing nodes, but about persuading the cluster to s.
AKS is designed to run your Kubernetes workloads, but it also needs its own internal Kubernetes components to manage the cluster.
AKS control plane upgrades are designed to be non-disruptive, but sometimes a surge of activity during the upgrade can cause issues.
Open Service Mesh OSM is a way to manage the network of microservices in your Kubernetes cluster without changing your application code.
AKS planned maintenance windows are a surprisingly robust way to control when your cluster gets updated, but most people treat them like a simple on/off.
Pod Security Admission PSA lets you enforce security standards on your Kubernetes pods without needing to write custom admission controllers.
Enforce Policies in AKS with OPA Gatekeeper — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
Creating a private Azure Kubernetes Service AKS cluster is often about more than just network isolation; it's about controlling ingress and egress, and .
Prometheus and Grafana don't just show you your system's metrics; they fundamentally change how you think about its health and performance.
Your AKS pods can directly access secrets stored in Azure Key Vault, avoiding the need to bake them into container images or manage them as Kubernetes S.
Istio on AKS doesn't just add observability; it fundamentally shifts how your services communicate from network-level TCP to application-level, intent-b.
Cut AKS Costs with Spot Node Pools — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
AKS clusters are designed for high availability and are typically left running 24/7. However, for development, testing, or non-production workloads, thi.
Provision AKS with Terraform azurerm Module — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
The most surprising thing about right-sizing AKS pods with Vertical Pod Autoscaler VPA is that it doesn't actually scale pods in the way you might expec.
Burst AKS Workloads to Azure Container Instances — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
Run Windows Workloads on AKS Node Pools — practical guide covering aks setup, configuration, and troubleshooting with real-world examples.
Kubernetes workloads can now assume cloud provider identities without needing service account tokens or secrets, which is a massive security win.
Azure AD and AKS RBAC integrate by Azure AD acting as the identity provider for AKS cluster access, translating user/group permissions into Kubernetes R.
Application Gateway Ingress Controller AGIC lets Azure Application Gateway act as the ingress for your Azure Kubernetes Service AKS cluster.
Run ARM64 Node Pools in AKS. AKS now supports ARM64 nodes, allowing you to run workloads on Graviton processors. Here's a quick demo:
AKS API Server, when exposed publicly, is a massive attack surface. Restricting access to only known IPs is a critical security measure
Azure Blob Storage can be mounted into Azure Kubernetes Service AKS clusters using the Azure Blob CSI driver, treating cloud object storage like a tradi.
AKS Azure CNI overlay mode is actually a pretty neat trick to get the best of both worlds: the simplicity of Kubernetes networking with the power of Azu.