Movatterモバイル変換


[0]ホーム

URL:


Toru Makabe, profile picture
Uploaded byToru Makabe
PDF, PPTX2,883 views

Azure Kubernetes Service 2019 ふりかえり

This document provides an overview and summary of key releases and features for Azure Kubernetes Service (AKS) in 2019. It begins with introductions from the author and describes the major AKS releases for 2019, including availability zones, multiple node pools, cluster autoscaler, network policy, and more. It also summarizes major releases for Azure Container Registry and discusses upcoming features on the public roadmap. Other related cloud-native projects from Microsoft are listed as well. The document concludes with the author's perspectives on best practices for AKS at the end of 2019.

Embed presentation

Download as PDF, PPTX
Azure Kubernetes Service真壁 徹日本マイクロソフト株式会社クラウドソリューションアーキテクト2019/12/42019年を ふりかえる
自己紹介apiVersion: selfIntroduction/v1name: “真壁 徹(まかべ とおる)”company:name: “日本マイクロソフト株式会社”role: “クラウド ソリューションアーキテクト”career:- name: “大和総研”- name: ”HP Enterprise”cert : “CNCF Certified Kubernetes Admin.”
AKS(Azure Kubernetes Service)の2019年の機能拡充やトピックをおさらいしよう※AKSの利用に大きく影響する他サービスも一部含みます (ACR、ACIなど)
Azure Kubernetes Service (AKS) 主なリリース補足のないものはGAしてますAPI ServerのIPアドレス ホワイトリスト制御APIサーバー 監査ログAzure Monitor for containersVirtual Node in ACIユーザー定義ルートのサポートAzure Arc による管理 (Preview)Kubernetes 1.12、1.13、1.14、1.15(Preview)Availability Zones複数Node PoolCluster Autoscaler & VMSSNetwork PolicyJapan East/West両リージョン対応
Azure Kubernetes Service (AKS) 主なリリース補足のないものはGAしてますAKS Pod Security Policy(Preview)Azure PolicyとOpen Policy Agentの統合 (Preview)Azure Monitor for containers ライブデータ表示 (Preview)Azure Monitor PrometheusMetric スクレイピング (Preview)Standard Load BalancerサポートApp Gateway Ingress Controller証明書ローテーションEgress lockdown対話型診断Managed Identity 統合 (Preview)Windowsノード (Preview)
Azure Container Registry (ACR) 主なリリース補足のないものはGAしてますリポジトリスコープ RBACサポート (Preview)監査と診断ログ (Preview)Azure Security Centerによるイメージの脆弱性スキャン(Preview)署名済みイメージのサポートACR Tasks スケジューリングACR in VNet (Preview)Helm Chartリポジトリ (Preview)ACR Tasks Cloud Native Buildpackサポート (Preview)
今後のプランは? 公開ロードマップをご覧下さいGitHubに公開してますプライベートクラスターノード自己修復ノード自動アップグレードLow Priority ノードプールなどなど
そのほかリリースマイクロソフトがリード/関与が強い CNCFプロジェクトなどKubernetes ConfidentialcomputingDistributed Application Runtime(Dapr)Cloud Native Application Bundle(CNAB) with BrigadeKEDA (Kubernetes-based EventDriven Autoscaling)GitHub Actions for deploying toKubernetes serviceService Mesh InterfaceHelm 3
2019年末時点でのAKS ベストプラクティス
公式ベストプラクティスAzureの製品グループだけでなく、ユーザーに接しているメンバーがその知見をコンテンツとして提供手を動かす前に目を通してもよし、振り返り/改善のチェックに読むもよしまずは ここ を見よう
Ignite 2019 Breakout SessionBRK4006 Applying best practices to Azure Kubernetes Service (AKS)AKSを本番で使うなら必見高可用性バックアップ&リストアマルチクラスター & マルチリージョンアップグレードなどなど
不安定な時はノードのディスク性能を疑うkubeletやtunnnelfrontなど、ノード上にはアプリ以外にも重要コンポーネントが動いているIOPSの高いディスクにすると安定することが とても とても 多いPodのResource Limitも重要 暴れん坊を抑え込もう特にメモリ周辺リソースと合わせてInfrastructure as Code化するアップグレードや新機能の検証など、運用しているとクラスターを作る機会は多いKubernetesだけで完結するシステムは稀データストアやネットワーク系サービスなど周辺リソースも合わせて作れるようにするTerraformでもARM Templateでも お好みで俺のベストプラクティス
おかしいな、という時はGitHubのIssueを検索するサポート窓口ではありません が、PMがIssueを見て対応していますズバリな解決策が見つかることもとはいえ サポート要求はサポート窓口、新機能リクエストはAzure Feedbackへ話題の機能/OSSだからといって あれもこれも使う必要はない運用するなら腹落ちしたもの、ビジネス目標に合うものを選んで使いましょう華やかな 事例の裏には 生存者バイアスがみなぎらないなら その時を待つどんどん進化するので 追従には組織としてのモチベーションが重要です流行ってるっぽいから、誰かにやれって言われたから、では続きませんAKS/Kubernetesの代替方式は多くあります (App Service、Functions、ACI、etc)俺のベストプラクティス
ここからは鮮度重視で英語ですあっ 5 7 5
主要リリース/機能の図解とポイント
Additionalnodes neededPods are inpending stateCluster AutoscalerPod PodNodePod PodNodePod PodAKS clusterClusterAutoscalerAzureNode is grantedPending podsare scheduledThe cluster autoscaler watches for pods that can't be scheduled on nodes because ofresource constraints. The cluster then automatically increases the number of nodes.1. HPA obtains resource metrics andcompares them to user-specifiedthreshold2. HPA evaluates whether user specifiedthreshold is met or not3. HPA increases/decreases the replicasbased on the specified threshold4. The Deployment controller adjuststhe deployment based onincrease/decrease in replicas
• Elastically provision compute capacityin seconds• No infrastructure to manage• Built on open sourced Virtual Kubelettechnology, donated to the Cloud NativeComputing Foundation (CNCF)Serverless Kubernetes using AKS virtual nodesNodePodsNodePodsKubernetescontrol planeAzure ContainerInstances (ACI)PodsVirtual node
Application Gateway Ingress Controller• Application Gateways as Ingress for AKS• Deployed using Helm• Utilizes pod-AAD for ARM authentication.• Tighter integration with AKS add on support upcoming• Supports URI path based, host based, SSL termination,SSL re-encryption, redirection, custom health probes,draining, cookie affinity• Support for Let’s Encrypt provided TLS certificates• WAF fully supported with custom listener policies• Support for multiple AKS as backend• Support for mixed mode – both AKS and other backendtypes on the same Application Gateway!ApplicationGatewayAzure ARMAzure Key VaultAzure KubernetesServices (AKS)APIserverAGIngressControllerIngressresourcePodsConfigure routing rules
Accelerate containerized developmentKubernetes and DevOpsbetter togetherDevelop• Native containers and Kubernetes support in IDE• Remote debugging and iteration for multi-containers• Effective code merge• Automatic containerizationDeliver• CI/CD pipeline with automated tasks in a fewclicks• Pre-configured canary deployment strategy• In depth build and delivery process review andintegration testing• Private registry with Helm supportOperate• Out-of-box control plane telemetry, logaggregation, and container health• Declarative resource management• Auto scalingInner loopTestDebugAzureDevSpacesAKS devclusterCI/CD PipelinesGitHub reposAzureContainerRegistryHelm chartContainerimageAKSproductionclusterAzureMonitorScaleTerraformDevelop Deliver OperateBoards
GitHub Actions for Kubernetes on Azure1. Authenticate and login securely to an Azuresubscription2. Set the target AKS cluster3. Create Kubernetes secret objects to managesensitive information4. Connect to the Kubernetes cluster and deploymanifests, etc.Actiondocker-loginActionk8s-create-secretActionaks-set-contextActionk8s-deploy
Pull Request flow in Dev Spaces1. John is working out of branch “feature-x”locally2. John commits his code and pushes hisbranch to his remote GitHub repo3. John creates a pull request beforemerging the changes into theapplication’s main branch4. GitHub Actions workflow is triggeredupon PR creation; a delta namespace forthe pull request is created and the codeis deployed to the namespaceSourcecode controlmasternamespacefeature-xnamespaceGitHub Actionsworkflow builds anddeploysfeature-xJohnDeveloperLisaReviewerOpen pullrequest, deployfeature-branchPull request merged,master updatedPR namespacecreated, changesdeployedAzure Dev Spaces + AKS cluster5. A team member reviews the changes inthe context of the entire application6. The pull request is approved and aGitHub workflow is triggered to updatethe master namespace with the mergedcode changes
AKS with RBACStorageSQLDatabaseCosmosDBVNetNode NodePod PodAAD Pod IdentityKey VaultActiveDirectoryActiveDirectoryIdentityUse familiar tools like AAD for fine-grained identity and access control to Kubernetes resources fromcluster to containers
1. Kubernetes operator defines anidentity map for K8s service accountsAAD Pod identity2. Node Managed Identity (NMI)watches for mapping reaction andsyncs to Managed Service Identify(MSI)3. Developer creates a pod witha service account, and pod usesstandard Azure SDK to fetcha token bound to MSI4. Pod uses access token to consumeother Azure services; services validatetokenKubernetesKubernetescontrollerAzure MSIAzureIdentityBindingActiveDirectoryPod IdentityNMI + EMSIPodTokenAzure SQLServerDeveloper<¥>
1. Cloud architect assigns a deploymentpolicy across cluster(s)2. Developer uses standard KubernetesAPI to deploy to the cluster3. Real-time deployment enforcement(acceptance/denial) provided todeveloper based on policy4. Cloud architect obtains compliancereport for the entire environment andcan drill down to individual pod levelAzure Policy for clusters (OPA Integration)CloudArchitectDeveloperCluster-1Cluster-2 Cluster-3AKSAzurePolicyCluster-3Cluster-2Cluster-1Compliance reports
2. Node and cluster level security• Automatic security patching nightly• Nodes deployed in private virtual networksubnet w/o public addresses• Network policy to secure communicationpaths between namespaces (and nodes)• Pod Security Policies using Gatekeeper• K8s RBAC and AAD for authentication• Threat protection on nodesAKS with RBACSecurity overview1. Image and container level security• AAD authenticated Container registryaccess• ACR image scanning and content trust forimage validation3. Pod level security• Pod level control using AAD Pod Identity• Pod Security Context4. Workload level security• Azure Role-based Access Control (RBAC)& security policy groups• Secure access to resources & services(e.g. Azure Key Vault) via Pod Identity• Storage Encryption• App Gateway with WAF to protect againstthreats and intrusionsDeveloperAzureContainerRegistryKubernetesAdminAzure Storage SQL Database Cosmos DBInternalUserInternalLoad BalancerExternalUserExternalLoad BalancerAzure VNetNode NodePod PodAAD Pod IdentityIngressControllerEncrypted StorageAzureKey VaultIngressControllerApp GatewayExternalDNSActiveDirectory
AKS Support in Azure Security Center1. For managed subscriptions, each new AKScluster and node are discovered in ASC2. ASC monitors AKS cluster for securitymisconfigurations and providesactionable recommendations forcompliance with security best practices3. ASC continuously analyzes AKS forpotential threats based on:a. Raw security events such as networkdata and process creationb. Kubernetes log auditAzureSecurityCenterContinuous discovery ofmanaged AKS instancesActionable recommendationsfor security best practicesDetect threats across AKSnodes and clusters usingadvanced analyticsAzure Kubernetes ServiceAKS security configurationAPI ServerMasterWorkersNode1Container runtimeSecurity centerNode2Container runtimeSecurity centerNode3Container runtimeSecurity centerVerified by Security CenterAudit logRaw security events…and reports any threats and maliciousactivity detected (e.g., “API requests to yourcluster from a suspicious IP was detected”)
Threat protectionAutomated threat detection and best practices recommendation for Kubernetes clusters using advancedanalytics from Azure Security CenterCluster Cluster ClusterAzureSecurityCenterContinuous discovery ofmanaged AKS instancesActionable recommendationsfor security best practicesDetect threats across AKSnodes and clusters usingadvanced analyticsAzure Kubernetes Service
Image SecurityDeveloperCI/CDPipelinesAzure Container RegistryAzureKubernetesServiceImage scanningFail PassYour private registry, with built-in Helm chart support, only deploys validated images and can beautomatically geo-replicated to the data center close to where your users areVulnerabilityscanningActionablerecommendationsAdmin
Secure network communications with VNET and CNIAKS subnetBackendservices subnetAzure VNet AOn-premisesinfrastructureEnterprisesystemOther peered VNetsVNet peeringAzureExpressRouteAKS cluster SQL Server1. Uses Azure subnet for both yourcontainers and cluster VMs2. Allows for connectivity to existingAzure services in the same VNetAKS VNet integration works seamlesslywith your existing network infrastructure3. Use Express Route to connect to on-premises infrastructure4. Use VNet peering to connect to otherVNetsServiceEndpointAzure SQLPaaS DB5. Connect AKS cluster securely andprivately to other Azure resourcesusing VNet endpoints
1. A developer authenticates to the AADtoken issuance endpoint and requestsan access tokenIdentity and access management through AAD and RBACAzure delivers a streamlined identity andaccess management solution with AzureActive Directory (AAD) and AzureKubernetes Services (AKS)2. The AAD token issuance endpointissues the access token3. The access token is used toauthenticate to the secured resource4. Data from the secured resource isreturned to the web applicationAKSAzure ActiveDirectoryTokenTokenDeveloper
Azure Pipelines build audit & enforcement using Azure Policy1. Cloud architect assigns a policy acrossclusters; policy can be set to block non-compliance (deny) or generate non-compliance warnings (audit)2. Developer makes code change that kicksoff a build on Azure Pipelines3. Azure Pipelines evaluates the request forpolicy compliance4. If policy is set to deny, Azure Pipelinesrejects the build attempt if any non-compliance is identified5. If policy is set to audit, a non-complianceevent is logged and the build is allowedto proceedCloudArchitectDeveloperCluster-1 Cluster-2 Cluster-3AKSAzurePolicyCI/CD PipelinesPassFailDeny policy</>Yes NoCompliance check</>
Azure managementexperiencesAzure PortalAzure CLIAzure SDKHybrid Agentand Services:Azure Arc for Kubernetes - ComponentsAzureIdentityRBACPolicyIndexGroupsEtc.Azure ResourceManagerAzureContainerRegistryKubernetesK8s API serverCluster provisioningCluster upgrade and patchmanagementCluster lifecycle managementCluster monitoringAdministrative accessK8s native toolsCustomer locationsConfig ServiceK8s ConnectServiceSource RepoGitOpsManagerConfig AgentConnect Agent
k8s cluster1: security.yamlClusterAdmin3: Arcoperators4:KubernetesCluster –Azure Arc2: PolicySecurityAdmin6: configto cluster8: get manifestfrom repo7: Git Url9: apply andenforce rulesAzure Arc for Kubernetes - Workflow5
Azure Monitor for containers AzureMonitorfor containersVisualizationInsightsMonitor &analyzeResponseNative alerting with integrationto issue management andITSM toolsMonitor and analyzeKubernetes and containerdeployment performance,events, health, and logsProvide insights withcluster health rollup viewVisualize overall health andperformance from cluster tocontainers with drilldownsand filtersCloud native experiencefor Azure Monitor withPrometheus integrationAzureKubernetesServiceAzurePipelinesObservabilityObserve live containerlogs and Kubernetesevent log on containerdeployment statusVirtualnodePrometheus1. Get detailed insights about yourworkloads with Azure Monitor3. See graphical insights about clusters2. Filter for details about nodes,controllers, and containers4. Pull events and logs for detailedactivity analysis
1. Deploy Azure Arc for Kubernetesagent2. Azure Arc agent registers cluster withARM3. Cluster operator applies clusterconfiguration via ARM4. Configuration agent picks upconfiguration and syncs statefrom git repo5. Configuration agent informs Azurepolicy of status6. Cluster operator or applicationdeveloper pushes changes via GitHubClusterConnect RPClusteroperatorAzureResourceManagerClusterConfig RPAzurePolicyGitHubConfigagentAzure ArcagentCluster operator/Application devAzure Monitor for containersConfiguration management scenarioKubernetes on-prem
AKS DiagnosticsAzurebackendtelemetry Node 1 Node 2AKSproductionclusterUserAzureportalZero configurationand zero costIntelligent detectors basedon AKS-specific telemetryCluster-specificobservationsRecommended actionsfor troubleshooting<¥>Cluster InsightsCluster Node IssuesNode Issues DetectedNode Insufficient Resources DetectedCreate, Read, Update & Delete OperationsIdentity and Security ManagementAKS DiagnosticsSample diagnostics web portal!!!xAn interactive and intelligent experiencefor self-troubleshooting your app issuesDiagnose and guide you through eachproblem with best practicesrecommendationsIntelligent search capabilities to help youfind right answers fastStraight out-of-the box, no extraconfiguration necessary
Open-source component jointly built by Microsoft andRedHat• Event-driven container creation & scalingAllows containers to “scale to zero” until an eventcomes in, which will then create the container andprocess the event, resulting in more efficientutilization and reduced costs• Native triggers supportContainers can consume events directly from theevent source, instead of routing events throughHTTP• Can be used in any Kubernetes serviceThis includes in the cloud (e.g., AKS, EKS, GKE, etc.)or on-premises with OpenShift—any Kubernetesworkload that requires scaling by events instead oftraditional CPU or memory scaling can leverage thiscomponent.Kubernetes-based event-driven auto-scaling (KEDA)Kubernetes clusterExternaltrigger sourceKEDAAKS clusterScalerControllerMetrics adapter
SMI defines a set of APIs that can be implementedby individual mesh providers. Service meshes and toolscan either integrate directly with SMI or an adapter canconsume SMI and drive native mesh APIs.• Standard interface for service mesh on Kubernetes• Basic feature set to address most commonscenarios• Extensible to support new features as they becomewidely availableService Mesh Interface (SMI)Apps Tooling Ecosystem…and moreService Mesh InterfaceRouting Telemetry PolicyKubernetes
ユーザー事例とそのアーキテクチャー
Bosch Increases Vehicle Safety Using PrecisionGPS Algorithms and Azure Kubernetes ServiceChallenge: Bosch designed a software development kit (SDK) thatcan be used by original equipment manufacturers (OEMs)to embed driving safety information at scale. For such aservice to work commercially, they had to build a real-time data ingestion and processing pipeline capable ofdetecting hazards and notifying drivers within secondsSolution: The solution is deployed as multiple microservicesrunning in containers behind an Azure API Managementgateway. AKS provided the simplicity a serverlessKubernetes experience that provided the elasticprovisioning they wanted without the need to manage theinfrastructure.Outcome: By running their solution, which has been downloaded by12 million users, on Azure and AKS, the average time todetect driving hazards dropped to approximately 60milliseconds.What we like about AKS is the simplifiedKubernetes experience. It's click and deploy,it’s click and scale. It’s infrastructure as codetoo, which is quite cool for us.”— Christian Jeschke, Product Owner, BoschClick icon to learn more“
Bosch: architecture1. Sensor data is generated and streamed toAzure API Management2. AKS cluster runs microservice that are deployedas containers behind a service mesh; containersare built using a DevOps process and stored inAzure Container Registry3. Ingest service stores data in an Azure CosmosDB and other data storage destinations4. Asynchronously, the map matching servicereceives the data from Kafka Streams on AzureHDInsight5. Data is processed and stored the result inAzure Database for PostgreSQL and maps arecontinuously updated using Azure Databricks6. A web app running in Azure App Service is usedto visualize the resultsVNetSecurityPublic API Key VaultSDKHotspotsWDW ServiceBlobStorageWeb AppsACRAKSServiceKafka Streamson HD InsightsAKSMap matchingData ExplorerClustersCosmosDBCache forRedisPostgreSQLServerDatabricksmVISE
Power grid operator uses containerized softwareto promote smart utility initiatives for 1.5M peopleChallenge: Legacy systems for reading meter data needed greatercapacity to process large volumes of IoT data—butimplementing the necessary system enhancements wasdifficult and expensiveSolution: Hafslund chose to develop its own software forprocessing meter data. The company used MicrosoftAzure as its cloud platform, AKS to manage softwarecontainers, and Azure Monitor for containers to optimizecontainer performance.Outcome: Halfslund now has a standard way to create, monitor,scale, and manage applications, which means it canrespond to customer needs faster.We wanted a platform to speed developmentand testing but do it safely, without losingcontrol over security and performance. That’swhy Azure and AKS are the perfect fit for us.”— Ståle Heitmann, Chief Technology OfficerHafslund NettClick icon to learn more“
Hafslund Nett: architecture1. Azure Pipelines automates containerimage build, push and release to AzureKubernetes service, triggered by sourcecode updates.2. Azure Kubernetes Services provides thealways-on service for meter reading andconnects with Azure managed databasesto process the massive amounts of datathe IoT devices generate3. Azure API Management serves as thesecure gateway that helps connect todata and services anywhere.4. Azure network and Active Directoryprovides fine-grain controls for externaland inter-service communication.5. Azure Monitor provides a single pane ofglass for cluster-to-container monitoring.…TerraformInfrastructureAKS…Namespace…Namespace NamespaceHalsfundNettCSS StylesExpressRoutesVirtualNetworkTableStorageGitHubVMActiveDirectoryKey Vault…Application InsightsLogAnalyticsCosmosDBSQLServerAzureSearchContainerMonitorOn-premservicesVM VM VMLoadBalancerInternalACRDevOpsLoadBalancerExternalAPIMgmt.
DNV GL scales up machine learning using AzureKubernetes ServiceChallenge: Initially, the group trained machine learning modelslocally and deployed each application to Azure VirtualMachines. This process took up to 2 weeks and consumedmore Azure resources than needed.Solution: DNV GL created a service using that builds and deployseach machine learning application as a container on AKS.They’re able to use the Kubernetes Cluster Autoscaler toadd resources on demand as the need for more computepower arises.Outcome: Data scientists and developers at DNV GL can now delivermore solutions to their internal and external customerswith more speed, for less money, and with a more elasticsoftware stack. Now the data scientists and engineers atDNV GL can focus on developing new, predictive solutionsand providing real business value.Click icon to learn moreWe decided to address the friction areasof our internal company deployment,management, and operations, and afterevaluating commercial offerings, we choseto develop ML Factory based on Azureservices.”— Kristian Ramsrud, Machine Learning groupDNV GL Maritime“
DNV GL: architecture1. Data scientists create their machine learningapplications as containers using the ML Factorydevelopment tools2. ML Apps are built using automatically using AzureContainer Registry Tasks and are deployed to AzureKubernetes Service3. Realtime logs can be streamed directly fordebugging purposes. Azure Log Analytics alsoprovides access to historical logs within definedretention periods4. As the data flows through the platform, multiplefunctions hosted in Azure Functions work togetherto fire alerts or trigger actions, triggered by signalsfrom Azure Event Grid5. Published applications are automatically added tothe company’s corporate API Management gatewayand the internal API catalogML developmentand monitoringSupportcomponentsML FactoryEventGridFunctionAppsML FactoryDeveloper toolsActiveDirectoryBlobStorageAPIManagementKeyVaultML FactoryWeb portalAKSSQLServerStorageAccountsAppServiceAPIGatewayConsumingapplicationsACR
Click icon to learn moreMaersk uses AKS for a customer service processto elevate NSAT, an industry-wide challengeNeeds: Get near-real-time data to provide better customerserviceCollect data for future Machine Learning driven featuresChallenges: Compute & memory intensive featuresData integration difficultiesLimited organisational experience in Cloud & KubernetesRequirements: Spend less time on container software managementAutomation and continuous deliveryFull visibility to application, container and infrastructureFine grained security and access controlOutcomes: Reduced environment provisioning time from 1+ weeksto 2.5 hoursAKS and CaaS can potentially save 33% on run costUsing Kubernetes on Azure satisfies ourobjectives for efficient software development.It aligns well with our digital plans and ourchoice of open-source solutions for specificprogramming languages.”“— Rasmus Hald, Head of Cloud Architecture,A.P. Moller - Maersk
1. Azure Pipelines for automationand CI/CD pipelines; addingTerraform for further automation2. Key Vault to secure secrets andfor persistent configurationstore3. Azure Monitor for containers toprovide better logging,troubleshooting, with no directcontainer access4. RBAC control for fine grainedKubernetes resources accesscontrolFirewallApp GatewayAKS w/RBACAzureMonitorAppInsightsSQLDatabaseCosmosDBPerformanceDocument DBKey VaultVaultEvent HubBatch processingEvent SimulationDataFactoryDataManagementGatewayOn-premisesdatabaseExpressRouteService BusInternal QueuingSQLDatabaseAzurePipelinesMaersk: architecture
© Copyright Microsoft Corporation. All rights reserved.

Recommended

PDF
Ingress on Azure Kubernetes Service
PPTX
Private Azure Kubernetes Service cluster を触ってみよう♪
PDF
3分でわかるAzureでのService Principal
PDF
実用段階に入ったOpenStack ~ もうすぐ絶滅するというPrivate Cloudの多様性について ~
PPTX
Dockerと外部ルータを連携させる仕組みを作ってみた
 
PDF
SharePoint Online 「アクセス権」を理解する
PDF
Azure Network 概要
PDF
OpenStackによる、実践オンプレミスクラウド
PPTX
ネットワーク機器のAPIあれこれ入門 (NetOpsCoding#2)
PDF
OpenStackで始めるクラウド環境構築入門(Horizon 基礎編)
PDF
Apache NiFi の紹介 #streamctjp
PDF
Nutanix Community Edition 5.18 徹底解説
PPTX
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
PDF
【de:code 2020】 Azure Synapse Analytics 技術編 ~ 最新の統合分析プラットフォームによる新しい価値の創出(後編)
PDF
[Cloud OnAir] Google Cloud で実現するバックアップ ディザスタリカバリのベストプラクティス 2019年4月25日 放送
PDF
【第26回Elasticsearch勉強会】Logstashとともに振り返る、やっちまった事例ごった煮
PDF
Mercari JPのモノリスサービスをKubernetesに移行した話 PHP Conference 2022 9/24
PPTX
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
PDF
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
PPTX
急速に進化を続けるCNIプラグイン Antrea
PDF
一歩先行く Azure Computing シリーズ(全3回) 第2回 Azure VM どれを選ぶの? Azure VM 集中講座
PDF
"SRv6の現状と展望" ENOG53@上越
PDF
TLS 1.3 と 0-RTT のこわ〜い話
PPTX
BigtopでHadoopをビルドする(Open Source Conference 2021 Online/Spring 発表資料)
PDF
株式会社コロプラ『GKE と Cloud Spanner が躍動するドラゴンクエストウォーク』第 9 回 Google Cloud INSIDE Game...
PDF
バックボーン運用から見るインターネットの実情
byIIJ
 
PDF
Dapr × Kubernetes ではじめるポータブルなマイクロサービス(CloudNative Days Tokyo 2020講演資料)
KEY
オリジナルからデータ・ポンプに移植するツボ
PPTX
653493625-Azure-Kubernetes-Services-Booklet.pptx
PDF
Compute Security - Container Security

More Related Content

PDF
Ingress on Azure Kubernetes Service
PPTX
Private Azure Kubernetes Service cluster を触ってみよう♪
PDF
3分でわかるAzureでのService Principal
PDF
実用段階に入ったOpenStack ~ もうすぐ絶滅するというPrivate Cloudの多様性について ~
PPTX
Dockerと外部ルータを連携させる仕組みを作ってみた
 
PDF
SharePoint Online 「アクセス権」を理解する
PDF
Azure Network 概要
PDF
OpenStackによる、実践オンプレミスクラウド
Ingress on Azure Kubernetes Service
Private Azure Kubernetes Service cluster を触ってみよう♪
3分でわかるAzureでのService Principal
実用段階に入ったOpenStack ~ もうすぐ絶滅するというPrivate Cloudの多様性について ~
Dockerと外部ルータを連携させる仕組みを作ってみた
 
SharePoint Online 「アクセス権」を理解する
Azure Network 概要
OpenStackによる、実践オンプレミスクラウド

What's hot

PPTX
ネットワーク機器のAPIあれこれ入門 (NetOpsCoding#2)
PDF
OpenStackで始めるクラウド環境構築入門(Horizon 基礎編)
PDF
Apache NiFi の紹介 #streamctjp
PDF
Nutanix Community Edition 5.18 徹底解説
PPTX
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
PDF
【de:code 2020】 Azure Synapse Analytics 技術編 ~ 最新の統合分析プラットフォームによる新しい価値の創出(後編)
PDF
[Cloud OnAir] Google Cloud で実現するバックアップ ディザスタリカバリのベストプラクティス 2019年4月25日 放送
PDF
【第26回Elasticsearch勉強会】Logstashとともに振り返る、やっちまった事例ごった煮
PDF
Mercari JPのモノリスサービスをKubernetesに移行した話 PHP Conference 2022 9/24
PPTX
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
PDF
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
PPTX
急速に進化を続けるCNIプラグイン Antrea
PDF
一歩先行く Azure Computing シリーズ(全3回) 第2回 Azure VM どれを選ぶの? Azure VM 集中講座
PDF
"SRv6の現状と展望" ENOG53@上越
PDF
TLS 1.3 と 0-RTT のこわ〜い話
PPTX
BigtopでHadoopをビルドする(Open Source Conference 2021 Online/Spring 発表資料)
PDF
株式会社コロプラ『GKE と Cloud Spanner が躍動するドラゴンクエストウォーク』第 9 回 Google Cloud INSIDE Game...
PDF
バックボーン運用から見るインターネットの実情
byIIJ
 
PDF
Dapr × Kubernetes ではじめるポータブルなマイクロサービス(CloudNative Days Tokyo 2020講演資料)
KEY
オリジナルからデータ・ポンプに移植するツボ
ネットワーク機器のAPIあれこれ入門 (NetOpsCoding#2)
OpenStackで始めるクラウド環境構築入門(Horizon 基礎編)
Apache NiFi の紹介 #streamctjp
Nutanix Community Edition 5.18 徹底解説
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
【de:code 2020】 Azure Synapse Analytics 技術編 ~ 最新の統合分析プラットフォームによる新しい価値の創出(後編)
[Cloud OnAir] Google Cloud で実現するバックアップ ディザスタリカバリのベストプラクティス 2019年4月25日 放送
【第26回Elasticsearch勉強会】Logstashとともに振り返る、やっちまった事例ごった煮
Mercari JPのモノリスサービスをKubernetesに移行した話 PHP Conference 2022 9/24
サポート エンジニアが Azure Networking をじっくりたっぷり語りつくす会
細かすぎて伝わらないかもしれない Azure Container Networking Deep Dive
急速に進化を続けるCNIプラグイン Antrea
一歩先行く Azure Computing シリーズ(全3回) 第2回 Azure VM どれを選ぶの? Azure VM 集中講座
"SRv6の現状と展望" ENOG53@上越
TLS 1.3 と 0-RTT のこわ〜い話
BigtopでHadoopをビルドする(Open Source Conference 2021 Online/Spring 発表資料)
株式会社コロプラ『GKE と Cloud Spanner が躍動するドラゴンクエストウォーク』第 9 回 Google Cloud INSIDE Game...
バックボーン運用から見るインターネットの実情
byIIJ
 
Dapr × Kubernetes ではじめるポータブルなマイクロサービス(CloudNative Days Tokyo 2020講演資料)
オリジナルからデータ・ポンプに移植するツボ

Similar to Azure Kubernetes Service 2019 ふりかえり

PPTX
653493625-Azure-Kubernetes-Services-Booklet.pptx
PDF
Compute Security - Container Security
PDF
Accelerate Application Innovation Journey with Azure Kubernetes Service
PPTX
Implementing AKS on the Enterprise
PDF
Best Practices with Azure Kubernetes Services
PPTX
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptx
PDF
CloudBurst Malmö: Best practices of securing web applications running on Azur...
PPTX
PDF
IglooConf 2020: Best practices of securing web applications running on Azure ...
PPTX
Azure kubernetes service (aks)
PDF
Running Containers on Azure
PDF
04_Azure Kubernetes Service: Basic Practices for Developers_GAB2019
PPTX
aks_training_document_Azure_kuberne.pptx
PPTX
Tokyo Azure Meetup #29 AKS
PDF
Cloud for Kubernetes : Session4
PPTX
Lets talk about: Azure Kubernetes Service (AKS)
PPTX
Kubernetes for .NET Developers
PPTX
Building Cloud Native Applications Using Azure Kubernetes Service
PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PDF
The state of containers for your DevOps journey
653493625-Azure-Kubernetes-Services-Booklet.pptx
Compute Security - Container Security
Accelerate Application Innovation Journey with Azure Kubernetes Service
Implementing AKS on the Enterprise
Best Practices with Azure Kubernetes Services
Kubernetes on on on on on on on on on on on on on on Azure Deck.pptx
CloudBurst Malmö: Best practices of securing web applications running on Azur...
IglooConf 2020: Best practices of securing web applications running on Azure ...
Azure kubernetes service (aks)
Running Containers on Azure
04_Azure Kubernetes Service: Basic Practices for Developers_GAB2019
aks_training_document_Azure_kuberne.pptx
Tokyo Azure Meetup #29 AKS
Cloud for Kubernetes : Session4
Lets talk about: Azure Kubernetes Service (AKS)
Kubernetes for .NET Developers
Building Cloud Native Applications Using Azure Kubernetes Service
TechDays Finland 2020: Best practices of securing web applications running on...
The state of containers for your DevOps journey

More from Toru Makabe

PDF
インフラ廻戦 品川事変 前夜編
PDF
Demystifying Identities for Azure Kubernetes Service
PDF
Azure Blueprints - 企業で期待される背景と特徴、活用方法
PDF
ミッション : メガクラウドを安全にアップデートせよ!
PDF
俺の Kubernetes Workflow with HashiStack
PDF
Resilience Engineering on Kubernetes
PDF
俺とHashiCorp
PDF
Real World Azure RBAC
PDF
インフラ野郎AzureチームProX
PDF
NoOps Japan Community 1st Anniversary 祝辞
PDF
ZOZOTOWNのCloud Native Journey
PDF
Ops meets NoOps
PDF
Essentials of container
PDF
インフラ野郎 Azureチーム at クラウド boost
PDF
ダイ・ハード in the Kubernetes world
PDF
半日でわかる コンテナー技術 (応用編)
PDF
インフラエンジニア エボリューション ~激変する IT インフラ技術者像、キャリアとスキルを考える~ at Tech Summit 2018
PDF
インフラ野郎 Azureチーム v18.11 at Tech Summit 2018
PDF
Kubernetesのしくみ やさしく学ぶ 内部構造とアーキテクチャー
PDF
半日でわかる コンテナー技術 (入門編)
インフラ廻戦 品川事変 前夜編
Demystifying Identities for Azure Kubernetes Service
Azure Blueprints - 企業で期待される背景と特徴、活用方法
ミッション : メガクラウドを安全にアップデートせよ!
俺の Kubernetes Workflow with HashiStack
Resilience Engineering on Kubernetes
俺とHashiCorp
Real World Azure RBAC
インフラ野郎AzureチームProX
NoOps Japan Community 1st Anniversary 祝辞
ZOZOTOWNのCloud Native Journey
Ops meets NoOps
Essentials of container
インフラ野郎 Azureチーム at クラウド boost
ダイ・ハード in the Kubernetes world
半日でわかる コンテナー技術 (応用編)
インフラエンジニア エボリューション ~激変する IT インフラ技術者像、キャリアとスキルを考える~ at Tech Summit 2018
インフラ野郎 Azureチーム v18.11 at Tech Summit 2018
Kubernetesのしくみ やさしく学ぶ 内部構造とアーキテクチャー
半日でわかる コンテナー技術 (入門編)

Recently uploaded

PPTX
THIS IS CYBER SECURITY NOTES USED IN CLASS ON VARIOUS TOPICS USED IN CYBERSEC...
PPTX
Building Cyber Resilience for 2026: Best Practices for a Secure, AI-Driven Bu...
PDF
TrustArc Webinar - Looking Ahead: The 2026 Privacy Landscape
PPTX
cybercrime in Information security .pptx
PPTX
Data Privacy and Protection: Safeguarding Information in a Connected World
PDF
Six Shifts For 2026 (And The Next Six Years)
PDF
Unlocking the Power of Salesforce Architecture: Frameworks for Effective Solu...
PPTX
Unit-4-ARTIFICIAL NEURAL NETWORKS.pptx ANN ppt Artificial neural network
PDF
API-First Architecture in Financial Systems
PPTX
Ethics in AI - Artificial Intelligence Fundamentals.pptx
PDF
Safeguarding AI-Based Financial Infrastructure
PPTX
Kanban India 2025 | Daksh Gupta | Modeling the Models, Generative AI & Kanban
PDF
GPUS and How to Program Them by Manya Bansal
PDF
ElyriaSoftware — Powering the Future with Blockchain Innovation
PDF
Dev Dives: AI that builds with you - UiPath Autopilot for effortless RPA & AP...
PDF
Internet_of_Things_IoT_for_Next_Generation_Smart_Systems_Utilizing.pdf
PPTX
AI in Cybersecurity: Digital Defense by Yasir Naveed Riaz
PDF
Decoding the DNA: The Digital Networks Act, the Open Internet, and IP interco...
PPTX
Protecting Data in an AI Driven World - Cybersecurity in 2026
PPTX
Chapter 3 Introduction to number system.pptx
THIS IS CYBER SECURITY NOTES USED IN CLASS ON VARIOUS TOPICS USED IN CYBERSEC...
Building Cyber Resilience for 2026: Best Practices for a Secure, AI-Driven Bu...
TrustArc Webinar - Looking Ahead: The 2026 Privacy Landscape
cybercrime in Information security .pptx
Data Privacy and Protection: Safeguarding Information in a Connected World
Six Shifts For 2026 (And The Next Six Years)
Unlocking the Power of Salesforce Architecture: Frameworks for Effective Solu...
Unit-4-ARTIFICIAL NEURAL NETWORKS.pptx ANN ppt Artificial neural network
API-First Architecture in Financial Systems
Ethics in AI - Artificial Intelligence Fundamentals.pptx
Safeguarding AI-Based Financial Infrastructure
Kanban India 2025 | Daksh Gupta | Modeling the Models, Generative AI & Kanban
GPUS and How to Program Them by Manya Bansal
ElyriaSoftware — Powering the Future with Blockchain Innovation
Dev Dives: AI that builds with you - UiPath Autopilot for effortless RPA & AP...
Internet_of_Things_IoT_for_Next_Generation_Smart_Systems_Utilizing.pdf
AI in Cybersecurity: Digital Defense by Yasir Naveed Riaz
Decoding the DNA: The Digital Networks Act, the Open Internet, and IP interco...
Protecting Data in an AI Driven World - Cybersecurity in 2026
Chapter 3 Introduction to number system.pptx

Azure Kubernetes Service 2019 ふりかえり

  • 1.
    Azure Kubernetes Service真壁徹日本マイクロソフト株式会社クラウドソリューションアーキテクト2019/12/42019年を ふりかえる
  • 2.
    自己紹介apiVersion: selfIntroduction/v1name: “真壁徹(まかべ とおる)”company:name: “日本マイクロソフト株式会社”role: “クラウド ソリューションアーキテクト”career:- name: “大和総研”- name: ”HP Enterprise”cert : “CNCF Certified Kubernetes Admin.”
  • 3.
  • 4.
    Azure Kubernetes Service(AKS) 主なリリース補足のないものはGAしてますAPI ServerのIPアドレス ホワイトリスト制御APIサーバー 監査ログAzure Monitor for containersVirtual Node in ACIユーザー定義ルートのサポートAzure Arc による管理 (Preview)Kubernetes 1.12、1.13、1.14、1.15(Preview)Availability Zones複数Node PoolCluster Autoscaler & VMSSNetwork PolicyJapan East/West両リージョン対応
  • 5.
    Azure Kubernetes Service(AKS) 主なリリース補足のないものはGAしてますAKS Pod Security Policy(Preview)Azure PolicyとOpen Policy Agentの統合 (Preview)Azure Monitor for containers ライブデータ表示 (Preview)Azure Monitor PrometheusMetric スクレイピング (Preview)Standard Load BalancerサポートApp Gateway Ingress Controller証明書ローテーションEgress lockdown対話型診断Managed Identity 統合 (Preview)Windowsノード (Preview)
  • 6.
    Azure Container Registry(ACR) 主なリリース補足のないものはGAしてますリポジトリスコープ RBACサポート (Preview)監査と診断ログ (Preview)Azure Security Centerによるイメージの脆弱性スキャン(Preview)署名済みイメージのサポートACR Tasks スケジューリングACR in VNet (Preview)Helm Chartリポジトリ (Preview)ACR Tasks Cloud Native Buildpackサポート (Preview)
  • 7.
  • 8.
    そのほかリリースマイクロソフトがリード/関与が強い CNCFプロジェクトなどKubernetes ConfidentialcomputingDistributedApplication Runtime(Dapr)Cloud Native Application Bundle(CNAB) with BrigadeKEDA (Kubernetes-based EventDriven Autoscaling)GitHub Actions for deploying toKubernetes serviceService Mesh InterfaceHelm 3
  • 9.
  • 10.
  • 11.
    Ignite 2019 BreakoutSessionBRK4006 Applying best practices to Azure Kubernetes Service (AKS)AKSを本番で使うなら必見高可用性バックアップ&リストアマルチクラスター & マルチリージョンアップグレードなどなど
  • 12.
    不安定な時はノードのディスク性能を疑うkubeletやtunnnelfrontなど、ノード上にはアプリ以外にも重要コンポーネントが動いているIOPSの高いディスクにすると安定することが とても とても多いPodのResource Limitも重要 暴れん坊を抑え込もう特にメモリ周辺リソースと合わせてInfrastructure as Code化するアップグレードや新機能の検証など、運用しているとクラスターを作る機会は多いKubernetesだけで完結するシステムは稀データストアやネットワーク系サービスなど周辺リソースも合わせて作れるようにするTerraformでもARM Templateでも お好みで俺のベストプラクティス
  • 13.
    おかしいな、という時はGitHubのIssueを検索するサポート窓口ではありません が、PMがIssueを見て対応していますズバリな解決策が見つかることもとはいえ サポート要求はサポート窓口、新機能リクエストはAzureFeedbackへ話題の機能/OSSだからといって あれもこれも使う必要はない運用するなら腹落ちしたもの、ビジネス目標に合うものを選んで使いましょう華やかな 事例の裏には 生存者バイアスがみなぎらないなら その時を待つどんどん進化するので 追従には組織としてのモチベーションが重要です流行ってるっぽいから、誰かにやれって言われたから、では続きませんAKS/Kubernetesの代替方式は多くあります (App Service、Functions、ACI、etc)俺のベストプラクティス
  • 14.
  • 15.
  • 16.
    Additionalnodes neededPods areinpending stateCluster AutoscalerPod PodNodePod PodNodePod PodAKS clusterClusterAutoscalerAzureNode is grantedPending podsare scheduledThe cluster autoscaler watches for pods that can't be scheduled on nodes because ofresource constraints. The cluster then automatically increases the number of nodes.1. HPA obtains resource metrics andcompares them to user-specifiedthreshold2. HPA evaluates whether user specifiedthreshold is met or not3. HPA increases/decreases the replicasbased on the specified threshold4. The Deployment controller adjuststhe deployment based onincrease/decrease in replicas
  • 17.
    • Elastically provisioncompute capacityin seconds• No infrastructure to manage• Built on open sourced Virtual Kubelettechnology, donated to the Cloud NativeComputing Foundation (CNCF)Serverless Kubernetes using AKS virtual nodesNodePodsNodePodsKubernetescontrol planeAzure ContainerInstances (ACI)PodsVirtual node
  • 18.
    Application Gateway IngressController• Application Gateways as Ingress for AKS• Deployed using Helm• Utilizes pod-AAD for ARM authentication.• Tighter integration with AKS add on support upcoming• Supports URI path based, host based, SSL termination,SSL re-encryption, redirection, custom health probes,draining, cookie affinity• Support for Let’s Encrypt provided TLS certificates• WAF fully supported with custom listener policies• Support for multiple AKS as backend• Support for mixed mode – both AKS and other backendtypes on the same Application Gateway!ApplicationGatewayAzure ARMAzure Key VaultAzure KubernetesServices (AKS)APIserverAGIngressControllerIngressresourcePodsConfigure routing rules
  • 19.
    Accelerate containerized developmentKubernetesand DevOpsbetter togetherDevelop• Native containers and Kubernetes support in IDE• Remote debugging and iteration for multi-containers• Effective code merge• Automatic containerizationDeliver• CI/CD pipeline with automated tasks in a fewclicks• Pre-configured canary deployment strategy• In depth build and delivery process review andintegration testing• Private registry with Helm supportOperate• Out-of-box control plane telemetry, logaggregation, and container health• Declarative resource management• Auto scalingInner loopTestDebugAzureDevSpacesAKS devclusterCI/CD PipelinesGitHub reposAzureContainerRegistryHelm chartContainerimageAKSproductionclusterAzureMonitorScaleTerraformDevelop Deliver OperateBoards
  • 20.
    GitHub Actions forKubernetes on Azure1. Authenticate and login securely to an Azuresubscription2. Set the target AKS cluster3. Create Kubernetes secret objects to managesensitive information4. Connect to the Kubernetes cluster and deploymanifests, etc.Actiondocker-loginActionk8s-create-secretActionaks-set-contextActionk8s-deploy
  • 21.
    Pull Request flowin Dev Spaces1. John is working out of branch “feature-x”locally2. John commits his code and pushes hisbranch to his remote GitHub repo3. John creates a pull request beforemerging the changes into theapplication’s main branch4. GitHub Actions workflow is triggeredupon PR creation; a delta namespace forthe pull request is created and the codeis deployed to the namespaceSourcecode controlmasternamespacefeature-xnamespaceGitHub Actionsworkflow builds anddeploysfeature-xJohnDeveloperLisaReviewerOpen pullrequest, deployfeature-branchPull request merged,master updatedPR namespacecreated, changesdeployedAzure Dev Spaces + AKS cluster5. A team member reviews the changes inthe context of the entire application6. The pull request is approved and aGitHub workflow is triggered to updatethe master namespace with the mergedcode changes
  • 22.
    AKS with RBACStorageSQLDatabaseCosmosDBVNetNodeNodePod PodAAD Pod IdentityKey VaultActiveDirectoryActiveDirectoryIdentityUse familiar tools like AAD for fine-grained identity and access control to Kubernetes resources fromcluster to containers
  • 23.
    1. Kubernetes operatordefines anidentity map for K8s service accountsAAD Pod identity2. Node Managed Identity (NMI)watches for mapping reaction andsyncs to Managed Service Identify(MSI)3. Developer creates a pod witha service account, and pod usesstandard Azure SDK to fetcha token bound to MSI4. Pod uses access token to consumeother Azure services; services validatetokenKubernetesKubernetescontrollerAzure MSIAzureIdentityBindingActiveDirectoryPod IdentityNMI + EMSIPodTokenAzure SQLServerDeveloper<¥>
  • 24.
    1. Cloud architectassigns a deploymentpolicy across cluster(s)2. Developer uses standard KubernetesAPI to deploy to the cluster3. Real-time deployment enforcement(acceptance/denial) provided todeveloper based on policy4. Cloud architect obtains compliancereport for the entire environment andcan drill down to individual pod levelAzure Policy for clusters (OPA Integration)CloudArchitectDeveloperCluster-1Cluster-2 Cluster-3AKSAzurePolicyCluster-3Cluster-2Cluster-1Compliance reports
  • 25.
    2. Node andcluster level security• Automatic security patching nightly• Nodes deployed in private virtual networksubnet w/o public addresses• Network policy to secure communicationpaths between namespaces (and nodes)• Pod Security Policies using Gatekeeper• K8s RBAC and AAD for authentication• Threat protection on nodesAKS with RBACSecurity overview1. Image and container level security• AAD authenticated Container registryaccess• ACR image scanning and content trust forimage validation3. Pod level security• Pod level control using AAD Pod Identity• Pod Security Context4. Workload level security• Azure Role-based Access Control (RBAC)& security policy groups• Secure access to resources & services(e.g. Azure Key Vault) via Pod Identity• Storage Encryption• App Gateway with WAF to protect againstthreats and intrusionsDeveloperAzureContainerRegistryKubernetesAdminAzure Storage SQL Database Cosmos DBInternalUserInternalLoad BalancerExternalUserExternalLoad BalancerAzure VNetNode NodePod PodAAD Pod IdentityIngressControllerEncrypted StorageAzureKey VaultIngressControllerApp GatewayExternalDNSActiveDirectory
  • 26.
    AKS Support inAzure Security Center1. For managed subscriptions, each new AKScluster and node are discovered in ASC2. ASC monitors AKS cluster for securitymisconfigurations and providesactionable recommendations forcompliance with security best practices3. ASC continuously analyzes AKS forpotential threats based on:a. Raw security events such as networkdata and process creationb. Kubernetes log auditAzureSecurityCenterContinuous discovery ofmanaged AKS instancesActionable recommendationsfor security best practicesDetect threats across AKSnodes and clusters usingadvanced analyticsAzure Kubernetes ServiceAKS security configurationAPI ServerMasterWorkersNode1Container runtimeSecurity centerNode2Container runtimeSecurity centerNode3Container runtimeSecurity centerVerified by Security CenterAudit logRaw security events…and reports any threats and maliciousactivity detected (e.g., “API requests to yourcluster from a suspicious IP was detected”)
  • 27.
    Threat protectionAutomated threatdetection and best practices recommendation for Kubernetes clusters using advancedanalytics from Azure Security CenterCluster Cluster ClusterAzureSecurityCenterContinuous discovery ofmanaged AKS instancesActionable recommendationsfor security best practicesDetect threats across AKSnodes and clusters usingadvanced analyticsAzure Kubernetes Service
  • 28.
    Image SecurityDeveloperCI/CDPipelinesAzure ContainerRegistryAzureKubernetesServiceImage scanningFail PassYour private registry, with built-in Helm chart support, only deploys validated images and can beautomatically geo-replicated to the data center close to where your users areVulnerabilityscanningActionablerecommendationsAdmin
  • 29.
    Secure network communicationswith VNET and CNIAKS subnetBackendservices subnetAzure VNet AOn-premisesinfrastructureEnterprisesystemOther peered VNetsVNet peeringAzureExpressRouteAKS cluster SQL Server1. Uses Azure subnet for both yourcontainers and cluster VMs2. Allows for connectivity to existingAzure services in the same VNetAKS VNet integration works seamlesslywith your existing network infrastructure3. Use Express Route to connect to on-premises infrastructure4. Use VNet peering to connect to otherVNetsServiceEndpointAzure SQLPaaS DB5. Connect AKS cluster securely andprivately to other Azure resourcesusing VNet endpoints
  • 30.
    1. A developerauthenticates to the AADtoken issuance endpoint and requestsan access tokenIdentity and access management through AAD and RBACAzure delivers a streamlined identity andaccess management solution with AzureActive Directory (AAD) and AzureKubernetes Services (AKS)2. The AAD token issuance endpointissues the access token3. The access token is used toauthenticate to the secured resource4. Data from the secured resource isreturned to the web applicationAKSAzure ActiveDirectoryTokenTokenDeveloper
  • 31.
    Azure Pipelines buildaudit & enforcement using Azure Policy1. Cloud architect assigns a policy acrossclusters; policy can be set to block non-compliance (deny) or generate non-compliance warnings (audit)2. Developer makes code change that kicksoff a build on Azure Pipelines3. Azure Pipelines evaluates the request forpolicy compliance4. If policy is set to deny, Azure Pipelinesrejects the build attempt if any non-compliance is identified5. If policy is set to audit, a non-complianceevent is logged and the build is allowedto proceedCloudArchitectDeveloperCluster-1 Cluster-2 Cluster-3AKSAzurePolicyCI/CD PipelinesPassFailDeny policy</>Yes NoCompliance check</>
  • 32.
    Azure managementexperiencesAzure PortalAzureCLIAzure SDKHybrid Agentand Services:Azure Arc for Kubernetes - ComponentsAzureIdentityRBACPolicyIndexGroupsEtc.Azure ResourceManagerAzureContainerRegistryKubernetesK8s API serverCluster provisioningCluster upgrade and patchmanagementCluster lifecycle managementCluster monitoringAdministrative accessK8s native toolsCustomer locationsConfig ServiceK8s ConnectServiceSource RepoGitOpsManagerConfig AgentConnect Agent
  • 33.
    k8s cluster1: security.yamlClusterAdmin3:Arcoperators4:KubernetesCluster –Azure Arc2: PolicySecurityAdmin6: configto cluster8: get manifestfrom repo7: Git Url9: apply andenforce rulesAzure Arc for Kubernetes - Workflow5
  • 34.
    Azure Monitor forcontainers AzureMonitorfor containersVisualizationInsightsMonitor &analyzeResponseNative alerting with integrationto issue management andITSM toolsMonitor and analyzeKubernetes and containerdeployment performance,events, health, and logsProvide insights withcluster health rollup viewVisualize overall health andperformance from cluster tocontainers with drilldownsand filtersCloud native experiencefor Azure Monitor withPrometheus integrationAzureKubernetesServiceAzurePipelinesObservabilityObserve live containerlogs and Kubernetesevent log on containerdeployment statusVirtualnodePrometheus1. Get detailed insights about yourworkloads with Azure Monitor3. See graphical insights about clusters2. Filter for details about nodes,controllers, and containers4. Pull events and logs for detailedactivity analysis
  • 35.
    1. Deploy AzureArc for Kubernetesagent2. Azure Arc agent registers cluster withARM3. Cluster operator applies clusterconfiguration via ARM4. Configuration agent picks upconfiguration and syncs statefrom git repo5. Configuration agent informs Azurepolicy of status6. Cluster operator or applicationdeveloper pushes changes via GitHubClusterConnect RPClusteroperatorAzureResourceManagerClusterConfig RPAzurePolicyGitHubConfigagentAzure ArcagentCluster operator/Application devAzure Monitor for containersConfiguration management scenarioKubernetes on-prem
  • 36.
    AKS DiagnosticsAzurebackendtelemetry Node1 Node 2AKSproductionclusterUserAzureportalZero configurationand zero costIntelligent detectors basedon AKS-specific telemetryCluster-specificobservationsRecommended actionsfor troubleshooting<¥>Cluster InsightsCluster Node IssuesNode Issues DetectedNode Insufficient Resources DetectedCreate, Read, Update & Delete OperationsIdentity and Security ManagementAKS DiagnosticsSample diagnostics web portal!!!xAn interactive and intelligent experiencefor self-troubleshooting your app issuesDiagnose and guide you through eachproblem with best practicesrecommendationsIntelligent search capabilities to help youfind right answers fastStraight out-of-the box, no extraconfiguration necessary
  • 37.
    Open-source component jointlybuilt by Microsoft andRedHat• Event-driven container creation & scalingAllows containers to “scale to zero” until an eventcomes in, which will then create the container andprocess the event, resulting in more efficientutilization and reduced costs• Native triggers supportContainers can consume events directly from theevent source, instead of routing events throughHTTP• Can be used in any Kubernetes serviceThis includes in the cloud (e.g., AKS, EKS, GKE, etc.)or on-premises with OpenShift—any Kubernetesworkload that requires scaling by events instead oftraditional CPU or memory scaling can leverage thiscomponent.Kubernetes-based event-driven auto-scaling (KEDA)Kubernetes clusterExternaltrigger sourceKEDAAKS clusterScalerControllerMetrics adapter
  • 38.
    SMI defines aset of APIs that can be implementedby individual mesh providers. Service meshes and toolscan either integrate directly with SMI or an adapter canconsume SMI and drive native mesh APIs.• Standard interface for service mesh on Kubernetes• Basic feature set to address most commonscenarios• Extensible to support new features as they becomewidely availableService Mesh Interface (SMI)Apps Tooling Ecosystem…and moreService Mesh InterfaceRouting Telemetry PolicyKubernetes
  • 39.
  • 40.
    Bosch Increases VehicleSafety Using PrecisionGPS Algorithms and Azure Kubernetes ServiceChallenge: Bosch designed a software development kit (SDK) thatcan be used by original equipment manufacturers (OEMs)to embed driving safety information at scale. For such aservice to work commercially, they had to build a real-time data ingestion and processing pipeline capable ofdetecting hazards and notifying drivers within secondsSolution: The solution is deployed as multiple microservicesrunning in containers behind an Azure API Managementgateway. AKS provided the simplicity a serverlessKubernetes experience that provided the elasticprovisioning they wanted without the need to manage theinfrastructure.Outcome: By running their solution, which has been downloaded by12 million users, on Azure and AKS, the average time todetect driving hazards dropped to approximately 60milliseconds.What we like about AKS is the simplifiedKubernetes experience. It's click and deploy,it’s click and scale. It’s infrastructure as codetoo, which is quite cool for us.”— Christian Jeschke, Product Owner, BoschClick icon to learn more“
  • 41.
    Bosch: architecture1. Sensordata is generated and streamed toAzure API Management2. AKS cluster runs microservice that are deployedas containers behind a service mesh; containersare built using a DevOps process and stored inAzure Container Registry3. Ingest service stores data in an Azure CosmosDB and other data storage destinations4. Asynchronously, the map matching servicereceives the data from Kafka Streams on AzureHDInsight5. Data is processed and stored the result inAzure Database for PostgreSQL and maps arecontinuously updated using Azure Databricks6. A web app running in Azure App Service is usedto visualize the resultsVNetSecurityPublic API Key VaultSDKHotspotsWDW ServiceBlobStorageWeb AppsACRAKSServiceKafka Streamson HD InsightsAKSMap matchingData ExplorerClustersCosmosDBCache forRedisPostgreSQLServerDatabricksmVISE
  • 42.
    Power grid operatoruses containerized softwareto promote smart utility initiatives for 1.5M peopleChallenge: Legacy systems for reading meter data needed greatercapacity to process large volumes of IoT data—butimplementing the necessary system enhancements wasdifficult and expensiveSolution: Hafslund chose to develop its own software forprocessing meter data. The company used MicrosoftAzure as its cloud platform, AKS to manage softwarecontainers, and Azure Monitor for containers to optimizecontainer performance.Outcome: Halfslund now has a standard way to create, monitor,scale, and manage applications, which means it canrespond to customer needs faster.We wanted a platform to speed developmentand testing but do it safely, without losingcontrol over security and performance. That’swhy Azure and AKS are the perfect fit for us.”— Ståle Heitmann, Chief Technology OfficerHafslund NettClick icon to learn more“
  • 43.
    Hafslund Nett: architecture1.Azure Pipelines automates containerimage build, push and release to AzureKubernetes service, triggered by sourcecode updates.2. Azure Kubernetes Services provides thealways-on service for meter reading andconnects with Azure managed databasesto process the massive amounts of datathe IoT devices generate3. Azure API Management serves as thesecure gateway that helps connect todata and services anywhere.4. Azure network and Active Directoryprovides fine-grain controls for externaland inter-service communication.5. Azure Monitor provides a single pane ofglass for cluster-to-container monitoring.…TerraformInfrastructureAKS…Namespace…Namespace NamespaceHalsfundNettCSS StylesExpressRoutesVirtualNetworkTableStorageGitHubVMActiveDirectoryKey Vault…Application InsightsLogAnalyticsCosmosDBSQLServerAzureSearchContainerMonitorOn-premservicesVM VM VMLoadBalancerInternalACRDevOpsLoadBalancerExternalAPIMgmt.
  • 44.
    DNV GL scalesup machine learning using AzureKubernetes ServiceChallenge: Initially, the group trained machine learning modelslocally and deployed each application to Azure VirtualMachines. This process took up to 2 weeks and consumedmore Azure resources than needed.Solution: DNV GL created a service using that builds and deployseach machine learning application as a container on AKS.They’re able to use the Kubernetes Cluster Autoscaler toadd resources on demand as the need for more computepower arises.Outcome: Data scientists and developers at DNV GL can now delivermore solutions to their internal and external customerswith more speed, for less money, and with a more elasticsoftware stack. Now the data scientists and engineers atDNV GL can focus on developing new, predictive solutionsand providing real business value.Click icon to learn moreWe decided to address the friction areasof our internal company deployment,management, and operations, and afterevaluating commercial offerings, we choseto develop ML Factory based on Azureservices.”— Kristian Ramsrud, Machine Learning groupDNV GL Maritime“
  • 45.
    DNV GL: architecture1.Data scientists create their machine learningapplications as containers using the ML Factorydevelopment tools2. ML Apps are built using automatically using AzureContainer Registry Tasks and are deployed to AzureKubernetes Service3. Realtime logs can be streamed directly fordebugging purposes. Azure Log Analytics alsoprovides access to historical logs within definedretention periods4. As the data flows through the platform, multiplefunctions hosted in Azure Functions work togetherto fire alerts or trigger actions, triggered by signalsfrom Azure Event Grid5. Published applications are automatically added tothe company’s corporate API Management gatewayand the internal API catalogML developmentand monitoringSupportcomponentsML FactoryEventGridFunctionAppsML FactoryDeveloper toolsActiveDirectoryBlobStorageAPIManagementKeyVaultML FactoryWeb portalAKSSQLServerStorageAccountsAppServiceAPIGatewayConsumingapplicationsACR
  • 46.
    Click icon tolearn moreMaersk uses AKS for a customer service processto elevate NSAT, an industry-wide challengeNeeds: Get near-real-time data to provide better customerserviceCollect data for future Machine Learning driven featuresChallenges: Compute & memory intensive featuresData integration difficultiesLimited organisational experience in Cloud & KubernetesRequirements: Spend less time on container software managementAutomation and continuous deliveryFull visibility to application, container and infrastructureFine grained security and access controlOutcomes: Reduced environment provisioning time from 1+ weeksto 2.5 hoursAKS and CaaS can potentially save 33% on run costUsing Kubernetes on Azure satisfies ourobjectives for efficient software development.It aligns well with our digital plans and ourchoice of open-source solutions for specificprogramming languages.”“— Rasmus Hald, Head of Cloud Architecture,A.P. Moller - Maersk
  • 47.
    1. Azure Pipelinesfor automationand CI/CD pipelines; addingTerraform for further automation2. Key Vault to secure secrets andfor persistent configurationstore3. Azure Monitor for containers toprovide better logging,troubleshooting, with no directcontainer access4. RBAC control for fine grainedKubernetes resources accesscontrolFirewallApp GatewayAKS w/RBACAzureMonitorAppInsightsSQLDatabaseCosmosDBPerformanceDocument DBKey VaultVaultEvent HubBatch processingEvent SimulationDataFactoryDataManagementGatewayOn-premisesdatabaseExpressRouteService BusInternal QueuingSQLDatabaseAzurePipelinesMaersk: architecture
  • 48.
    © Copyright MicrosoftCorporation. All rights reserved.

[8]ページ先頭

©2009-2025 Movatter.jp