Skip to content

feature(aks): Harden and extend AKS for production readiness#1189

Closed
rmvangun wants to merge 1 commit into
mainfrom
feat/azure-aks-enhancements
Closed

feature(aks): Harden and extend AKS for production readiness#1189
rmvangun wants to merge 1 commit into
mainfrom
feat/azure-aks-enhancements

Conversation

@rmvangun
Copy link
Copy Markdown
Contributor

@rmvangun rmvangun commented Dec 8, 2025

The AKS module required a few enhancements to prepare it for production use. These include:

  • Introducing the single storage class for consistency with EKS
  • Allow toggling disk encryption
  • Enable azure monitor diagnostics
  • Enable toggling container insights
  • Allow configuring various k8s API access schemes
  • Enable multiple AZs
  • Use workload identity
  • Include image cleaner
  • Expand cilium configuration
  • Default to outbound type to use userAssignedNATGateway
  • Add Network Contributor role to cluster to support the custom VNet
  • Add disk management role so nodes can manage disks, snapshots
  • Allow toggling disk encryption
  • Default to OIDC based access to k8s api, and default to assigning an AKS admin role to the active user applying the terraform
  • Include kubelogin in aqua as it's required to connect to the k8s api

Signed-off-by: Ryan VanGundy 85766511+rmvangun@users.noreply.github.com

The AKS module required a few enhancements to prepare it for production use. These include:

* Introducing the `single` storage class for consistency with EKS
* Allow toggling disk encryption
* Enable azure monitor diagnostics
* Enable toggling container insights
* Allow configuring various k8s API access schemes
* Enable multiple AZs
* Use workload identity
* Include image cleaner
* Expand cilium configuration
* Default to outbound type  to use `userAssignedNATGateway`
* Add `Network Contributor` role to cluster to support the custom VNet
* Add disk management role so nodes can manage disks, snapshots
* Allow toggling disk encryption
* Default to OIDC based access to k8s api, and default to assigning an AKS admin role to the active user applying the terraform
* Include kubelogin in aqua as it's required to connect to the k8s api

Signed-off-by: Ryan VanGundy <85766511+rmvangun@users.noreply.github.com>
@rmvangun
Copy link
Copy Markdown
Contributor Author

rmvangun commented Dec 8, 2025

Replaced by #1192 #1193 #1194 #1195 #1196 #1197 #1198

@rmvangun rmvangun closed this Dec 8, 2025
@rmvangun rmvangun deleted the feat/azure-aks-enhancements branch February 27, 2026 13:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant