Azure Kubernetes Service (AKS)

Have feedback for Azure Kubernetes Service (AKS)? Submit your idea or vote up an idea submitted by others. All of the feedback you share here will be monitored and reviewed by the AKS team. Remember that this site is only for feature suggestions and ideas. If you have technical questions or issues, please submit them to our GitHub issues page or on StackOverflow.

How can we improve the Azure Kubernetes Service (AKS)?

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Support multiple node pool

    We are currently blocked to using a single node pool in AKS. It would be good to allow us to create new node pool (in different region) and to allow us to have a different VM size (per pool). Google and Amazon are already offering that feature.

    312 votes
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)

      We’ll send you updates on this idea

      started  ·  18 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
    • Secure AKS API from Public Internet

      Managed K8s in Azure makes the AKS API publically accessible via an Internet endpoint.
      This Master node access is separate from the Agent nodes we stand up inside a VNet and can protect with interior private IPs and NSGs.

      While access to the AKS-API is be protected using Azure DDOS, and integration to AAD and RBAC for user access, some customer security organizations demand either IP whitelisting on it, or some type of if firewalling to limit access to it to only their company. VNet Service Endpoint as another option although not certain can can work. But that kind of…

      173 votes
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)

        We’ll send you updates on this idea

        16 comments  ·  Flag idea as inappropriate…  ·  Admin →
      • 167 votes
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)

          We’ll send you updates on this idea

          planned  ·  4 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
        • Please create all the kubernetes related resources in the same resource group.

          The policies in the company don't allow custom naming for azure resource groups. This is really getting the way of using AKS for production use.

          118 votes
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)

            We’ll send you updates on this idea

            9 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
          • Native integration between AKS and Azure Key Vault

            It makes sense to have some sort of smart integration between kubernetes secrets and azure key vault.

            I.e.
            containers:
            env:
            - name: CLIENT_ID
            valueFrom:
            azureSecretKeyRef:
            name: client-details
            key: client-id

            94 votes
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)

              We’ll send you updates on this idea

              3 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
            • Support multiple availability zones for HA (high-availability) clusters

              Allow k8s nodes/agent pool to be created in different/multiple availability zones, to support a highly-available (HA) cluster

              76 votes
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)

                We’ll send you updates on this idea

                planned  ·  9 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
              • Support non-interactive login for AAD-integrated clusters

                Currently if your cluster is integrated with AAD, any kubectl command will prompt you for an interactive login, even after logging in via Azure CLI and obtaining Kubectl credentials using 'az aks get-credentials'.

                This won't work for anything using automation (e.g. a CI server such as Jenkins).

                Ideally one could log in using a service principal who is then mapped to roles using RBAC. Once you are logged in via the Azure CLI, you could obtain the credentials and execute Kubectl commands as normal.

                Original issue here: https://github.com/Azure/AKS/issues/556

                A similar issue was raised here, but I would like to be…

                69 votes
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)

                  We’ll send you updates on this idea

                  4 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                • Support for network policies with calico integration

                  It would be awesome to have network policies support in AKS to control/restrict network traffic among the Pods and outside world.

                  65 votes
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)

                    We’ll send you updates on this idea

                    started  ·  7 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                  • Ability to change password on Service Principal

                    By default when AKS cluster is rolled out, default SP with password validity period of 1Y is created. Because masters are hidden for us, we are not able to change password, in order to change it for some sort of security breach, or just to create new one because old one has expired. So by now we have 2 options:
                    1. Create SP with pass that never expires (not so preferable in terms of security),
                    2. Create new AKS cluster. But, when you're in production, migrating everything from one cluster to another is not small step. And rolling out new…

                    55 votes
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)

                      We’ll send you updates on this idea

                      planned  ·  1 comment  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                    • availability zone with AKS

                      Could you please support availability zones with AKS?

                      45 votes
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)

                        We’ll send you updates on this idea

                        1 comment  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                      • Support for PodSecurityPolicy

                        The PodSecurityPolicy admission controller does not seem to be supported. This is a key part of securing a cluster. I see it has previously been raised as an issue, but no feature request was raised. https://github.com/Azure/AKS/issues/327

                        45 votes
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)

                          We’ll send you updates on this idea

                          2 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                        • 45 votes
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)

                            We’ll send you updates on this idea

                            planned  ·  2 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                          • Support for Azure Monitor Autoscale

                            Provide support for Azure Monitor Autoscale that automatically adds instances based on a metric.

                            This would allow us to mitigate issues and create awareness about them without any manual action.

                            Bonus points if we can remove instances as well.

                            44 votes
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)

                              We’ll send you updates on this idea

                              4 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                            • low priority VMs (and VMSS)

                              It would be really nice if AKS could support low priority VM scale sets.

                              It seems that support for VMSS is already in the works and available as a preview.

                              The original request was mentioned here:
                              https://github.com/Azure/AKS/issues/290

                              40 votes
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)

                                We’ll send you updates on this idea

                                planned  ·  3 comments  ·  Integration with Azure services  ·  Flag idea as inappropriate…  ·  Admin →
                              • Cluster Autoscaler Integration in portal

                                The Cluster Autoscaler(CA) feature which is currently in Preview has CLI support as in the documentation. Is there a backlog item that enables the CA integration in portal as to configure auto scaling policies either during creation of cluster(Day 0) or at a later point of time(Day N ops)?

                                40 votes
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)

                                  We’ll send you updates on this idea

                                  planned  ·  1 comment  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
                                • AKS-API Control Plane Audit Trail - Activity Logs

                                  When a user authenticates successfully to the AKS-API we need an audit trail (security log) entry made as well as detail of what commands each user executed and when.
                                  This is the type of information we would usually see in an Azure Activity Log, but K8s Master Node activity is not captured there.

                                  A workaround for one small part (who is logging on) can be retrieved using AAD reports but this requires premium licensing and its limited to only who logged in, not what they did.

                                  37 votes
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)

                                    We’ll send you updates on this idea

                                    started  ·  2 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                  • Make LsV2 series available on AKS

                                    Make LsV2 type available on AKS.

                                    We are creating an k8s operator for ScyllaDB and would like to leverage this powerful hardware (specially because of the NVMes). This would be beneficial not only to our database but to any NoSQL or applications that require fast I/O.

                                    28 votes
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)

                                      We’ll send you updates on this idea

                                      3 comments  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                                    • Custom Domain names or Zones with HTTP Application Routing Feature

                                      While HTTP Application Routing feature brings a simple and managed ingress with domain management to AKS. Being able to define a custom domain name or a preexisting Azure Zone to be used with the HTTP Application Routing feature would bring more flexibility to the product.

                                      Ref: https://github.com/MicrosoftDocs/azure-docs/issues/11060#issuecomment-403069279
                                      Ref: https://docs.microsoft.com/en-us/azure/aks/http-application-routing

                                      26 votes
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)

                                        We’ll send you updates on this idea

                                        2 comments  ·  Flag idea as inappropriate…  ·  Admin →
                                      • Please add an option to deploy k8s cluster with cpuManagerPolicy static.

                                        https://kubernetes.io/docs/tasks/administer-cluster/cpu-management-policies/#static-policy

                                        This option allows cpu pinning to be enabled on containers so that applications that are sensitive to context switches and require strong cpu isolation can benefit from this k8s feature.

                                        Please check my article regarding performance differences in ScyllaDB for a better understanding of the performance impact.

                                        https://www.scylladb.com/2018/08/09/cost-containerization-scylla/

                                        25 votes
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)

                                          We’ll send you updates on this idea

                                          1 comment  ·  Support for Kubernetes features  ·  Flag idea as inappropriate…  ·  Admin →
                                        • Support selection of nodes to remove when scaling down

                                          Support selection of nodes to remove when scaling down.
                                          At the moment when you scale down then the oldest nodes will always stay. Would be a nice feature to be able to remove a selected node when scaling down or maybe manually.

                                          25 votes
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)

                                            We’ll send you updates on this idea

                                            3 comments  ·  Portal  ·  Flag idea as inappropriate…  ·  Admin →
                                          ← Previous 1 3 4 5
                                          • Don't see your idea?

                                          Feedback and Knowledge Base