OpsCanary
Azure

AKS

4 articles from official documentation

Practitioner4 articles
azureaksPractitioner

Mastering AKS Node Pool Snapshots: A Game Changer for Cluster Management

Node pool snapshots in Azure Kubernetes Service (AKS) are a powerful tool for managing your clusters. They allow you to capture the configuration of your node pools and replicate them seamlessly. Learn how to leverage this feature effectively in your production environment.

  • Capture configurations using node pool snapshots to ensure consistency across environments.
  • Use the command `az aks nodepool snapshot create` to create a snapshot from your existing node pool.
5 min read·Microsoft Learn
Read article
azureaksPractitioner

Mastering AKS Upgrades: Strategies for Zero Downtime

Upgrading your Azure Kubernetes Service (AKS) clusters doesn't have to be a headache. Learn how to configure parameters like maxSurge and maxUnavailable to ensure smooth transitions while maintaining service availability.

  • Configure maxSurge to speed up upgrades while being mindful of workload disruptions.
  • Set maxUnavailable to manage capacity effectively during upgrades.
5 min read·Microsoft Learn
Read article
azureaksPractitioner

Mastering Microsoft Entra Workload ID in AKS: A Practical Guide

Unlock the power of Microsoft Entra Workload ID to streamline authentication in your Azure Kubernetes Service (AKS) deployments. This integration allows your workloads to securely access Azure resources using federated identities. Dive in to learn how to configure and leverage this feature effectively.

  • Configure the `azure.workload.identity/tenant-id` to point to your Azure tenant ID.
  • Use the Azure Identity client library to facilitate token exchanges for secure access.
5 min read·Microsoft Learn
Read article
azureaksPractitioner

Mastering AKS: Best Practices for Cluster Operators and Developers

Building and managing applications on Azure Kubernetes Service (AKS) requires a solid grasp of best practices. From leveraging multi-tenancy with namespaces to implementing pod security with digital key vaults, these strategies are essential for a robust deployment. Dive in to elevate your AKS game.

  • Leverage multi-tenancy by using namespaces for logical isolation.
  • Implement resource quotas and pod disruption budgets for basic scheduling.
5 min read·Microsoft Learn
Read article