Azure Kubernetes Service (AKS)

Have feedback for Azure Kubernetes Service (AKS)? Submit your idea or vote up an idea submitted by others. All of the feedback you share here will be monitored and reviewed by the AKS team. Remember that this site is only for feature suggestions and ideas. If you have technical questions or issues, please submit them to our GitHub issues page or on StackOverflow.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Please create all the kubernetes related resources in the same resource group.

    The policies in the company don't allow custom naming for azure resource groups. This is really getting the way of using AKS for production use.

    195 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  2. Support multiple availability zones for HA (high-availability) clusters

    Allow k8s nodes/agent pool to be created in different/multiple availability zones, to support a highly-available (HA) cluster

    186 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  20 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  3. Native integration between AKS and Azure Key Vault

    It makes sense to have some sort of smart integration between kubernetes secrets and azure key vault.

    I.e.
    containers:
    env:
    - name: CLIENT_ID
    valueFrom:
    azureSecretKeyRef:
    name: client-details
    key: client-id

    172 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
  4. Support non-interactive login for AAD-integrated clusters

    Currently if your cluster is integrated with AAD, any kubectl command will prompt you for an interactive login, even after logging in via Azure CLI and obtaining Kubectl credentials using 'az aks get-credentials'.

    This won't work for anything using automation (e.g. a CI server such as Jenkins).

    Ideally one could log in using a service principal who is then mapped to roles using RBAC. Once you are logged in via the Azure CLI, you could obtain the credentials and execute Kubectl commands as normal.

    Original issue here: https://github.com/Azure/AKS/issues/556

    A similar issue was raised here, but I would like to be…

    154 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  5. Support selection of nodes to remove when scaling down

    Support selection of nodes to remove when scaling down.
    At the moment when you scale down then the oldest nodes will always stay. Would be a nice feature to be able to remove a selected node when scaling down or maybe manually.

    78 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    8 comments  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
  6. low priority VMs (and VMSS)

    It would be really nice if AKS could support low priority VM scale sets.

    It seems that support for VMSS is already in the works and available as a preview.

    The original request was mentioned here:
    https://github.com/Azure/AKS/issues/290

    69 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  6 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  7. Changing Node Size in a kubernetes cluster

    Currently we are able to configure the count for Nodes using scale up option in Portal for AKS, Please add an option to change the size of the Nodes. So if required we can resize the node configuration.

    63 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
  8. Support for Azure Monitor Autoscale

    Provide support for Azure Monitor Autoscale that automatically adds instances based on a metric.

    This would allow us to mitigate issues and create awareness about them without any manual action.

    Bonus points if we can remove instances as well.

    51 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  9. Cluster Autoscaler Integration in portal

    The Cluster Autoscaler(CA) feature which is currently in Preview has CLI support as in the documentation. Is there a backlog item that enables the CA integration in portal as to configure auto scaling policies either during creation of cluster(Day 0) or at a later point of time(Day N ops)?

    50 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  1 comment  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
  10. Allow selecting disk type when creating AKS cluster

    There is no way to select disk type (Standard or Premium) when creating an AKS cluster via Portal or Azure CLI, by default Node OS disk type is derived from the selected VM size.

    To be more specific, I want a node Standard_B2s with Standard disk. If I create a plain VM, I can select such configuration. If I create an AKS cluster with Standard_B2s node, I can stop the node and change the disk type to Standard, but I cannot select Standard_B2s + Standard disk while creating AKS cluster.

    https://github.com/Azure/AKS/issues/580

    48 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  CLI  ·  Flag idea as inappropriate…  ·  Admin →
  11. Support PodPreset alpha feature

    https://kubernetes.io/docs/tasks/inject-data-application/podpreset/

    Some of my current workloads on acs-engine utilize PodPresets to add additional configuration to dynamically created Pods (e.g. by custom controllers which I'm not able to modify submission requests myself). It would be great if AKS would support this as well.

    The two steps required on the apiserver are:

    Adding "settings.k8s.io/v1alpha1=true" in the --runtime-config
    Adding PodPreset to --enable-admission-plugins.

    This feature request was moved from https://github.com/Azure/AKS/issues/450

    48 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
  12. Support VM Disk Encryption

    Azure Security Recommendations notice that the disks provisioned as part of the Kubernetes Service cluster are not encrypted. And according to the AKS FAQ (https://docs.microsoft.com/en-us/azure/aks/faq),
    "Modifying the resources under the MC_* in the AKS cluster breaks the SLO."

    A method to encrypt the disks should be made available.

    41 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  13. 34 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
  14. Please add an option to deploy k8s cluster with cpuManagerPolicy static.

    https://kubernetes.io/docs/tasks/administer-cluster/cpu-management-policies/#static-policy

    This option allows cpu pinning to be enabled on containers so that applications that are sensitive to context switches and require strong cpu isolation can benefit from this k8s feature.

    Please check my article regarding performance differences in ScyllaDB for a better understanding of the performance impact.

    https://www.scylladb.com/2018/08/09/cost-containerization-scylla/

    33 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
  15. Custom Domain names or Zones with HTTP Application Routing Feature

    While HTTP Application Routing feature brings a simple and managed ingress with domain management to AKS. Being able to define a custom domain name or a preexisting Azure Zone to be used with the HTTP Application Routing feature would bring more flexibility to the product.

    Ref: https://github.com/MicrosoftDocs/azure-docs/issues/11060#issuecomment-403069279
    Ref: https://docs.microsoft.com/en-us/azure/aks/http-application-routing

    31 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  16. Add way to query which Feature-Flags are enabled

    From: https://github.com/Azure/AKS/issues/187

    There are workloads that are starting to show up that require certain Kube-api, controller-manager, Scheduler feature flags to be enabled to deploy a specific way. Examples:
    Istio with auto side-car injection - aggregated-API flag
    RBAC - RBAC Flag
    HPA based on customer metrics - aggregated API
    Auditing - audit policy flags

    Perhaps a cli that can list the different flags enabled on the control plane components that are running on a specific cluster:

    az aks get feature-flags -n <aks-resource-name> -g <resourceGroup Name>

    Agin this would just be to query and not change so in selecting possible workloads it…

    28 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  CLI  ·  Flag idea as inappropriate…  ·  Admin →
  17. Allow LoadBalancers to bind to Static IPs, created in the AKS Resource Group

    At the moment LoadBalancers can only bind to IPs, created in the automatically created AKS ResourceGroup (the one starting with MC_).

    As I'm not a fan of manually editing automatically created resources. I would like to be able create IPs besides the AKS resource and let my LoadBalancers bind to them.

    27 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
  18. Make Kubernetes Dashboard available through Azure Portal

    It would be nice if the Kubernetes Dashboard could be reached directly through the Azure Portal instead of creating a local tunnel using kubectl portforward command.

    26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
  19. IPv6 Container Support in AKS Cluster in Private Azure VNet

    Once K8s has a final release of IPv6 (https://github.com/kubernetes/features/issues/508) I would expect it can be packaged into Azure AKS with integration in CNI, but of this I am not certain.
    I wanted to put this request here formally to track a request to support IPv6 Containers inside an Azure Dual Stack VNet and Subnet.

    24 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
  20. AKS should add new nodes to the clcuster when existing nodes crash/get deleted

    AKS should add new nodes to the cluster when existing nodes crash/get deleted

    23 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1 3 4 5 6 7 8
  • Don't see your idea?

Feedback and Knowledge Base