Create an Azure Kubernetes Service with Powershell

Creating an Azure AKS (Azure Kubernetes Service) cluster in PowerShell can be a daunting task for those unfamiliar with the process. However, by following a few simple steps and utilizing the Azure PowerShell module, you…

AKS #5: How to configure AKS ingress and domain

When an Azure kubernetes service up and running, we have to expose its service to the real world if we want to broadcast our public service. All request will be routed from your end-users to…

AKS #4: Deploy a NodeJS application to AKS

Node.js is a platform for building fast and scalable server applications using JavaScript. Node.js is the runtime and npm is the Package Manager for Node.js modules. In this article, we're going to explore methods to…

AKS #3: Install ArgoCD on AKS cluster

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. With ArgoCD, application definitions, configurations, and environments are declarative and version controlled. Application deployment and lifecycle management should be automated, auditable, and easy to…

AKS #2: Install AGIC add-ons for AKS

The Application Gateway Ingress Controller (AGIC) is a Kubernetes application, which makes it possible for Azure Kubernetes Service (AKS) customers to leverage Azure's native Application Gateway L7 load-balancer to expose cloud software to the Internet.…

AKS #1: Create Azure Kubernetes Service cluster

This is instruction series for beginner who is being working with Kubernetes on Azure Cloud. Azure Kubernetes Service aka AKS is one of managed Kubernetes service running on Azure Cloud. Going though this series, you…

Connect to Azure Kubernetes Cluster (AKS)

Azure Kubernetes Service (AKS) is a managed Kubernetes service that lets you quickly deploy and manage clusters. In this quickstart, you will: Deploy an AKS cluster using the Azure CLI.Run a sample multi-container application with…

How to use Azure Key Vault in Azure Kubernetes Services

Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. The…