Frequently asked questions about Azure Kubernetes Service (AKS)
This article addresses frequent questions about Azure Kubernetes Service (AKS).
Which Azure regions currently provide AKS?
For a complete list of available regions, see AKS regions and availability.
Does AKS support node autoscaling?
Yes, the ability to automatically scale agent nodes horizontally in AKS is currently available in preview. See Automatically scale a cluster to meet application demands in AKS for instructions. AKS autoscaling is based on the Kubernetes autoscaler.
Can I deploy AKS into my existing virtual network?
Yes, you can deploy an AKS cluster into an existing virtual network by using the advanced networking feature.
Can I limit who has access to the Kubernetes API server?
Yes, you can limit access to the Kubernetes API server using API Server Authorized IP Ranges, which is currently in preview.
Can I make the Kubernetes API server accessible only within my virtual network?
Not at this time, but this is planned. You can track progress on the AKS GitHub repo.
Can I have different VM sizes in a single cluster?
Yes, you can use different virtual machine sizes in your AKS cluster by creating multiple node pools, which is currently in preview.
Are security updates applied to AKS agent nodes?
Azure automatically applies security patches to the Linux nodes in your cluster on a nightly schedule. However, you are responsible for ensuring that those Linux nodes are rebooted as required. You have several options for rebooting nodes:
- Manually, through the Azure portal or the Azure CLI.
- By upgrading your AKS cluster. The cluster upgrades cordon and drain nodes automatically and then bring a new node online with the latest Ubuntu image and a new patch version or a minor Kubernetes version. For more information, see Upgrade an AKS cluster.
- By using Kured, an open-source reboot daemon for Kubernetes. Kured runs as a DaemonSet and monitors each node for the presence of a file that indicates that a reboot is required. Across the cluster, OS reboots are managed by the same cordon and drain process as a cluster upgrade.
For more information about using kured, see Apply security and kernel updates to nodes in AKS.
Windows Server nodes
For Windows Server nodes (currently in preview in AKS), Windows Update does not automatically run and apply the latest updates. On a regular schedule around the Windows Update release cycle and your own validation process, you should perform an upgrade on the cluster and the Windows Server node pool(s) in your AKS cluster. This upgrade process creates nodes that run the latest Windows Server image and patches, then removes the older nodes. For more information on this process, see Upgrade a node pool in AKS.
Why are two resource groups created with AKS?
AKS builds upon a number of Azure infrastructure resources, including virtual machine scale sets, virtual networks, and managed disks. This enables you to leverage many of the core capabilities of the Azure platform within the managed Kubernetes environment provided by AKS. For example, most Azure virtual machine types can be used directly with AKS and Azure Reservations can be used to receive discounts on those resources automatically.
To enable this architecture, each AKS deployment spans two resource groups:
- You create the first resource group. This group contains only the Kubernetes service resource. The AKS resource provider automatically creates the second resource group during deployment. An example of the second resource group is MC_myResourceGroup_myAKSCluster_eastus. For information on how to specify the name of this second resource group, see the next section.
- The second resource group, known as the node resource group, contains all of the infrastructure resources associated with the cluster. These resources include the Kubernetes node VMs, virtual networking, and storage. By default, the node resource group has a name like MC_myResourceGroup_myAKSCluster_eastus. AKS automatically deletes the node resource whenever the cluster is deleted, so it should only be used for resources which share the cluster's lifecycle.
Can I provide my own name for the AKS node resource group?
Yes. By default, AKS will name the node resource group MC_resourcegroupname_clustername_location, but you can also provide your own name.
To specify your own resource group name, install the aks-preview Azure CLI extension version 0.3.2 or later. When you create an AKS cluster by using the az aks create command, use the --node-resource-group parameter and specify a name for the resource group. If you use an Azure Resource Manager template to deploy an AKS cluster, you can define the resource group name by using the nodeResourceGroup property.
- The secondary resource group is automatically created by the Azure resource provider in your own subscription.
- You can specify a custom resource group name only when you're creating the cluster.
As you work with the node resource group, keep in mind that you cannot:
- Specify an existing resource group for the node resource group.
- Specify a different subscription for the node resource group.
- Change the node resource group name after the cluster has been created.
- Specify names for the managed resources within the node resource group.
- Modify or delete tags of managed resources within the node resource group. (See additional information in the next section.)
Can I modify tags and other properties of the AKS resources in the node resource group?
If you modify or delete Azure-created tags and other resource properties in the node resource group, you could get unexpected results such as scaling and upgrading errors. AKS allows you to create and modify custom tags. You might want to create or modify custom tags, for example, to assign a business unit or cost center. By modifying the resources under the node resource group in the AKS cluster, you break the service-level objective (SLO). For more information, see Does AKS offer a service-level agreement?
What Kubernetes admission controllers does AKS support? Can admission controllers be added or removed?
AKS supports the following admission controllers:
Currently, you can't modify the list of admission controllers in AKS.
Is Azure Key Vault integrated with AKS?
AKS isn't currently natively integrated with Azure Key Vault. However, the Azure Key Vault FlexVolume for Kubernetes project enables direct integration from Kubernetes pods to Key Vault secrets.
Can I run Windows Server containers on AKS?
Yes, Windows Server containers are available in preview. To run Windows Server containers in AKS, you create a node pool that runs Windows Server as the guest OS. Windows Server containers can use only Windows Server 2019. To get started, see Create an AKS cluster with a Windows Server node pool.
Windows Server support for node pool includes some limitations that are part of the upstream Windows Server in Kubernetes project. For more information on these limitations, see Windows Server containers in AKS limitations.
Does AKS offer a service-level agreement?
In a service-level agreement (SLA), the provider agrees to reimburse the customer for the cost of the service if the published service level isn't met. Since AKS is free, no cost is available to reimburse, so AKS has no formal SLA. However, AKS seeks to maintain availability of at least 99.5 percent for the Kubernetes API server.
It is important to recognize the distinction between AKS service availability which refers to uptime of the Kubernetes control plane and the availability of your specific workload which is running on Azure Virtual Machines. Although the control plane may be unavailable if the control plane is not ready, your cluster workloads running on Azure VMs can still function. Given Azure VMs are paid resources they are backed by a financial SLA. Read here for more details on the Azure VM SLA and how to increase that availability with features like Availability Zones.
Why can't I set maxPods below 30?
In AKS, you can set the
maxPods value when you create the cluster by using the Azure
CLI and Azure Resource Manager templates. However, both Kubenet and Azure CNI require a minimum value (validated at creation time):
Because AKS is a managed service, we deploy and manage add-ons and pods as part of the cluster. In the past, users could define a
maxPods value lower than the value that the managed pods required to run (for example, 30). AKS now calculates the minimum number of
pods by using this formula: ((maxPods or (maxPods * vm_count)) > managed add-on pods minimum.
Users can't override the minimum
Can I apply Azure reservation discounts to my AKS agent nodes?
AKS agent nodes are billed as standard Azure virtual machines, so if you've purchased Azure reservations for the VM size that you are using in AKS, those discounts are automatically applied.
Can I move/migrate my cluster between Azure tenants?
az aks update-credentials command can be used to move an AKS cluster between Azure tenants. Follow the instructions in Choose to update or create a service principal and then update aks cluster with new credentials.
Can I move/migrate my cluster between subscriptions?
Movement of clusters between subscriptions is currently unsupported.
Can I move my AKS clusters from the current azure subscription to another?
Moving your AKS cluster and it's associated resources between Azure subscriptions is not supported.
Why is my cluster delete taking so long?
Most clusters are deleted upon user request; in some cases, especially where customers are bringing their own Resource Group, or doing cross-RG tasks deletion can take additional time or fail. If you have an issue with deletes, double-check that you do not have locks on the RG, that any resources outside of the RG are disassociated from the RG, etc.
If I have pod / deployments in state 'NodeLost' or 'Unknown' can I still upgrade my cluster?
You can, but AKS does not recommend this. Upgrades should ideally be performed when the state of the cluster is known and healthy.
If I have a cluster with one or more nodes in an Unhealthy state or shut down, can I perform an upgrade?
No, please delete/remove any nodes in a failed state or otherwise removed from the cluster prior to upgrading.
I ran a cluster delete, but see the error
[Errno 11001] getaddrinfo failed
Most commonly, this is caused by users having one or more Network Security Groups (NSGs) still in use and associated with the cluster. Please remove them and attempt the delete again.
I ran an upgrade, but now my pods are in crash loops, and readiness probes fail?
My cluster was working, but suddenly can not provision LoadBalancers, mount PVCs, etc.?
Can I use the virtual machine scale set APIs to scale manually?
No, scale operations by using the virtual machine scale set APIs aren't supported. Use the AKS APIs (
az aks scale).
Can I use virtual machine scale sets to manually scale to 0 nodes?
No, scale operations by using the virtual machine scale set APIs aren't supported.
Can I stop or de-allocate all my VMs?
While AKS has resilience mechanisms to withstand such a config and recover from it, this is not a recommended configuration.
Can I use custom VM extensions?
No AKS is a managed service, and manipulation of the IaaS resources is not supported. To install custom components, etc. please leverage the kubernetes APIs and mechanisms. For example, leverage DaemonSets to install required components.