Azure Kubernetes Service (AKS)

Have feedback for Azure Kubernetes Service (AKS)? Submit your idea or vote up an idea submitted by others. All of the feedback you share here will be monitored and reviewed by the AKS team. Remember that this site is only for feature suggestions and ideas. If you have technical questions or issues, please submit them to our GitHub issues page or on StackOverflow.

How can we improve the Azure Kubernetes Service (AKS)?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Support multiple node pool

    We are currently blocked to using a single node pool in AKS. It would be good to allow us to create new node pool (in different region) and to allow us to have a different VM size (per pool). Google and Amazon are already offering that feature.

    63 votes
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)

      We’ll send you updates on this idea

      started  ·  2 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
    • Increase Kubernetes node docker version to 17.05.x & +

      In order to take full advantage of running a VSTS agent in AKS, the docker version of the node must be at least 17.05 & + to support building project using multi-stage DockerFile.

      44 votes
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)

        We’ll send you updates on this idea

        planned  ·  0 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
      • 29 votes
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)

          We’ll send you updates on this idea

          planned  ·  1 comment  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
        • Support for Istio service mesh

          Istio service mesh is now 1.0. Add support within AKS and control plane.

          19 votes
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)

            We’ll send you updates on this idea

          • Support for Azure Monitor Autoscale

            Provide support for Azure Monitor Autoscale that automatically adds instances based on a metric.

            This would allow us to mitigate issues and create awareness about them without any manual action.

            Bonus points if we can remove instances as well.

            17 votes
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)

              We’ll send you updates on this idea

              3 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
            • Enable Accelerated Networking

              Accelerated Networking enables much higher NIC throughput. See here for benefits and details https://docs.microsoft.com/en-us/azure/virtual-network/create-vm-accelerated-networking-cli

              17 votes
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)

                We’ll send you updates on this idea

                started  ·  0 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
              • Secure AKS API from Public Internet

                Managed K8s in Azure makes the AKS API publically accessible via an Internet endpoint.
                This Master node access is separate from the Agent nodes we stand up inside a VNet and can protect with interior private IPs and NSGs.

                While access to the AKS-API is be protected using Azure DDOS, and integration to AAD and RBAC for user access, some customer security organizations demand either IP whitelisting on it, or some type of if firewalling to limit access to it to only their company. VNet Service Endpoint as another option although not certain can can work. But that kind of…

                16 votes
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)

                  We’ll send you updates on this idea

                  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                • Cluster Autoscaler Integration in portal

                  The Cluster Autoscaler(CA) feature which is currently in Preview has CLI support as in the documentation. Is there a backlog item that enables the CA integration in portal as to configure auto scaling policies either during creation of cluster(Day 0) or at a later point of time(Day N ops)?

                  13 votes
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)

                    We’ll send you updates on this idea

                    planned  ·  1 comment  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
                  • AKS-API Control Plane Audit Trail - Activity Logs

                    When a user authenticates successfully to the AKS-API we need an audit trail (security log) entry made as well as detail of what commands each user executed and when.
                    This is the type of information we would usually see in an Azure Activity Log, but K8s Master Node activity is not captured there.

                    A workaround for one small part (who is logging on) can be retrieved using AAD reports but this requires premium licensing and its limited to only who logged in, not what they did.

                    8 votes
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)

                      We’ll send you updates on this idea

                      planned  ·  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                    • Add way to query which Feature-Flags are enabled

                      From: https://github.com/Azure/AKS/issues/187

                      There are workloads that are starting to show up that require certain Kube-api, controller-manager, Scheduler feature flags to be enabled to deploy a specific way. Examples:
                      Istio with auto side-car injection - aggregated-API flag
                      RBAC - RBAC Flag
                      HPA based on customer metrics - aggregated API
                      Auditing - audit policy flags

                      Perhaps a cli that can list the different flags enabled on the control plane components that are running on a specific cluster:

                      az aks get feature-flags -n <aks-resource-name> -g <resourceGroup Name>

                      Agin this would just be to query and not change so in selecting possible workloads it…

                      7 votes
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)

                        We’ll send you updates on this idea

                        0 comments  ·  CLI  ·  Flag idea as inappropriate…  ·  Admin →
                      • Add support for Kubernetes Federation

                        Kubernetes Federation with support for Azure DNS and traffic manager. (similar to google and amazon support of k8i Federation)

                        6 votes
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)

                          We’ll send you updates on this idea

                          0 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →

                          Kubernetes federation is not mature at this point. The v1 solution remains in an alpha state, with no path to GA. There is discussion around a V2 approach in sig-multicluster but it is still nascent. As a result, we have no near-term plans to enable it in AKS. If your goal is simply to run the same app across multiple clusters with traffic routing between them, you can mostly accomplish that with a good CI/CD pipeline and Azure Traffic Manager.

                        • Support PodPreset alpha feature

                          https://kubernetes.io/docs/tasks/inject-data-application/podpreset/

                          Some of my current workloads on acs-engine utilize PodPresets to add additional configuration to dynamically created Pods (e.g. by custom controllers which I'm not able to modify submission requests myself). It would be great if AKS would support this as well.

                          The two steps required on the apiserver are:

                          Adding "settings.k8s.io/v1alpha1=true" in the --runtime-config
                          Adding PodPreset to --enable-admission-plugins.

                          This feature request was moved from https://github.com/Azure/AKS/issues/450

                          5 votes
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)

                            We’ll send you updates on this idea

                            0 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                          • Support for network policies with calico integration

                            It would be awesome to have network policies support in AKS to control/restrict network traffic among the Pods and outside world.

                            4 votes
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)

                              We’ll send you updates on this idea

                              1 comment  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                            • Support OIDC parameters

                              Support configuring auth for AKS cluster (oidc-issuer-url etc).

                              Related issue: https://github.com/Azure/AKS/issues/10

                              4 votes
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)

                                We’ll send you updates on this idea

                              • Support for cluster up and down commands

                                Sometimes it helps to shutdown and restart the entire cluster with a single command like OpenShift does. It help purging some objects that are in failed state.

                                4 votes
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)

                                  We’ll send you updates on this idea

                                  0 comments  ·  CLI  ·  Flag idea as inappropriate…  ·  Admin →
                                • 4 votes
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)

                                    We’ll send you updates on this idea

                                    planned  ·  0 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Install havegd on nodes to prevent low entropy situations

                                    Nodes can run into low entropy situations.
                                    Currently, one approach to deal with with is to deploy a privileged pod to every node via DaemonSet. Having this installed on the base image would address this.

                                    More info here:

                                    http://www.irisa.fr/caps/projects/hipsor/
                                    http://issihosts.com/haveged/

                                    Packages exist for debian:

                                    https://packages.debian.org/wheezy/haveged
                                    https://packages.debian.org/sid/haveged

                                    See also https://github.com/kubernetes/kubernetes/issues/60751

                                    This proposal originated at https://github.com/Azure/AKS/issues/219

                                    See also

                                    4 votes
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)

                                      We’ll send you updates on this idea

                                      0 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Support for Event Grid events

                                      Provide support for Event Grid events so that it provides integration points

                                      First events that come to my mind:

                                      - Deployment Created
                                      - Deployment Succeeded
                                      - Cluster Scaling Initiated
                                      - Pod Scaling Initiated
                                      - Pod Starting
                                      - Pod Failed
                                      - ...

                                      4 votes
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)

                                        We’ll send you updates on this idea

                                        1 comment  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                                      • Allow LoadBalancers to bind to Static IPs, created in the AKS Resource Group

                                        At the moment LoadBalancers can only bind to IPs, created in the automatically created AKS ResourceGroup (the one starting with MC_).

                                        As I'm not a fan of manually editing automatically created resources. I would like to be able create IPs besides the AKS resource and let my LoadBalancers bind to them.

                                        3 votes
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)

                                          We’ll send you updates on this idea

                                          0 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                                        • low priority VMs (and VMSS)

                                          It would be really nice if AKS could support low priority VM scale sets.

                                          It seems that support for VMSS is already in the works and available as a preview.

                                          The original request was mentioned here:
                                          https://github.com/Azure/AKS/issues/290

                                          3 votes
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)

                                            We’ll send you updates on this idea

                                            0 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                                          ← Previous 1
                                          • Don't see your idea?

                                          Feedback and Knowledge Base