Terraform – Deploy an AKS cluster using managed identity and managed Azure AD integration

Recently, I updated my Terraform AKS module switching from the AAD service principal to managed identity option as well from the AAD v1 integration to AAD v2 which is also managed. Other changes and improvements are the following ones: Private cluster support Managed control plane SKU tier support Windows node pool support Node labels support addon_profile section parameterized -> Read more [...]

Running Istio on KinD – Kubernetes in Docker

In my last blog post I have shown you my local Kubernetes setup with KinD. I mentioned also Istio and today we walk through the configuration to get it running on Kubernetes in Docker. As prerequisite I recommend reading my previous blog post before you continue with this one. -> https://www.danielstechblog.io/local-kubernetes-setup-with-kind/ I made a configuration decision for KinD Read more [...]

Local Kubernetes setup with KinD

Getting started with Kubernetes these days is easy and does not require to be in the lucky position having access to a cloud provider subscription for playing around with managed Kubernetes like AKS, EKS or GKE. All you need is your local machine. But then you must choose which one of the available offerings you would like to use: minikube, Docker Desktop, MicroK8s, k3s/k3d or KinD? Today Read more [...]

Upgrading the node image of an Azure Kubernetes Service cluster

Last year I have written a shell script to update the VMSS base image of an Azure Kubernetes Service cluster. -> https://www.danielstechblog.io/updating-the-base-image-of-a-vmss-based-aks-cluster/ -> https://www.danielstechblog.io/aks-vmss-base-image-update-script-multiple-node-pool-support/ As I am using the VMSS API and not the AKS API it was not an officially supported way to update Read more [...]

Using Azure Policy for Kubernetes

In my last blog post I mentioned that the next topic is about Azure Policy in combination with Azure Arc enabled Kubernetes. I decided to write about Azure Policy for Kubernetes instead covering Azure Kubernetes Service and Azure Arc enabled Kubernetes. As Azure Policy for Kubernetes is based on the Open Policy Agent Gatekeeper implementation, I will also highlight the difference between the Read more [...]

Connect KinD with Azure Arc enabled Kubernetes

At this year’s first ever digital Microsoft Build conference, Microsoft announced the public preview of Azure Arc enabled Kubernetes. -> https://azure.microsoft.com/en-us/updates/azure-arc-support-for-azure-kubernetes-service-aks-engine-clusters/ Azure Arc enabled Kubernetes lets you connect Kubernetes clusters running on-premises or at another cloud provider with Azure for a unified management Read more [...]

Connect KinD with Azure Monitor for containers

Last year Microsoft announced the Azure Monitor for containers support for on-premises Kubernetes clusters. -> https://azure.microsoft.com/en-us/updates/azure-monitor-now-supports-monitoring-containers-on-premises-and-on-azure-stack/ As I recently switched from the Docker Desktop for Mac Kubernetes single node cluster to KinD (Kubernetes in Docker), I was curious about to try out the on-premises Read more [...]

Optimize your Azure Function PowerShell run duration in the consumption plan

Since PowerShell is available on Azure Functions this is the way to go for automating things in Azure. Especially running the function in the consumption plan and with a managed identity enabled. Per default an Azure Function in the consumption plan is restricted to a run duration of 5 minutes but can be extended to 10 minutes. That said I like to share some optimizations with you getting the Read more [...]

Switching to Istio CNI plugin on Azure Kubernetes Service

You might question yourself, why the switch to the Istio CNI plugin might be useful? Istio uses, and other services meshes too, an init container to adjust the iptables rules for redirecting network traffic to/from the sidecar proxy container. The init container uses NET_ADMIN and NET_RAW capabilities to do the iptables changes and thus has more capabilities than per default. Exactly one capability Read more [...]

Using Azure Resource Graph to show ASC container image scan findings

In my previous blog post I showed you how to connect your Azure Container Registries with Azure Security Center. -> https://www.danielstechblog.io/connecting-azure-container-registry-with-azure-security-center/ Today we talk about how to receive the scan results via Azure Resource Graph instead of using the Security Center UI path. You can submit your queries against the Resource Graph Read more [...]