Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

AKS Automation with Terraform: Best Practices & Design

HashiCorp
04/09/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Configure AKS with Entra ID integration for both operator access (via RBAC and AD groups) and workload identity (via managed identities and federated credentials), eliminating embedded secrets
  • Implement private networking by connecting Azure services to AKS virtual networks through private endpoints, private DNS zones, and network interface cards on private subnets
  • Enable Key Vault integration using the AKS Key Vault extension and Kubernetes secret provider classes to expose secrets as environment variables within pods
  • Design for availability zone resiliency by distributing node pools across zones (best-effort or dedicated single-zone pools) and validating configuration with Azure Policy
  • Establish maintenance plans for automatic updates to Kubernetes system components and node operating systems with configurable schedules and update limits

Entra ID Integration for Operators and Workloads

The presentation demonstrates how to configure Azure Kubernetes Service with Microsoft Entra ID (formerly Azure Active Directory) integration for both cluster operators and workload identities. Operators gain kubectl access through Entra ID groups and role-based access control, eliminating the need for shared credentials. Workload identity integration enables pods to authenticate to Azure resources using managed identities and federated identity credentials, connecting Kubernetes service accounts to Azure managed identities. This approach removes the need to embed secrets or certificates within the cluster, with pods accessing services like Key Vault, Cosmos DB, and Azure Container Registry through role assignments on the managed identity.

Private Networking and Key Vault Integration

The session covers implementing private networking for AKS clusters by disabling public endpoints on Azure services and connecting them through private endpoints. The configuration requires provisioning a private DNS zone specific to each service type, linking it to the virtual network, and creating private endpoints that connect the subnet to the target resource. For Key Vault integration specifically, the AKS cluster requires the Key Vault extension enabled, followed by provisioning a secret provider class within Kubernetes that references the specific Key Vault and enumerates required secrets. Pods then mount these secrets as volumes, exposing them as environment variables accessible to application code without managing credentials directly.

Availability Zone Resiliency and Maintenance

The presentation addresses designing for failure through availability zone resiliency across both AKS node pools and supporting Azure services. Node pools can be configured with a zones attribute specifying distribution across multiple availability zones, with AKS making best-effort placement. For guaranteed presence in each zone, the recommended approach involves creating single-zone node pools for each availability zone and distributing workloads across them. Azure Policy provides validation through a preview initiative that scans resources for zone-resilient configuration. The session also covers maintenance plans for automatic updates to both Kubernetes system components and node operating systems, with configurable frequency, intervals, and node update limits to maintain security compliance while controlling availability impact.

Chapters

0:00 - Introduction and Speaker Background
1:54 - Architecture Overview and Tech Stack
4:55 - Agenda: Six Best Practices
7:40 - Entra ID Integration Setup
10:43 - Workload Identity Configuration
13:01 - Private Networking with Private Endpoints
15:52 - Key Vault Integration
18:49 - Availability Zone Resiliency
23:19 - Observability with Azure Monitor
24:48 - Maintenance Plans and Auto-Updates
25:54 - GitHub Repository Walkthrough
28:36 - Closing and Resources

Key Quotes

0:53 "... what tool can really say that they can do all these things and be just as good at it as anybody else, right? ..."
5:24 "... we want Entra integration, that is both operators using the AKS cluster, using kubectl, as well as our workloads that are deployed onto our cluster in pods, such that they can access other Azure resources out within the environment ..."
12:35 "Our pods are now able to impersonate this managed identity whenever they talk to different Azure resources. And we can just add role assignments to grant access to different services ..."
18:37 "And now my pods have access to my Azure Key Vault through that Azure managed identity. No secrets, no certificates to maintain. All managed by Entra ID and the Azure platform."
21:01 "... we're only as good as our weakest link. So if we take the time and configure AKS to be zone resilient and we neglect SQL DB or Redis or whatever we happen to be using, then if there happens to be a zone outage or something like that, our AKS cluster might be up and running. But if our pods can't talk to our Cosmos DB account, we're going to have impact within our workload."

Categories:
  • » Cybersecurity » Application Security
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • DevSecOps
  • Identity & Access
  • Technical Deep Dive
  • How-To
  • Best Practices
  • Azure Kubernetes Service
  • AKS
  • Terraform Infrastructure as Code
  • Microsoft Entra ID Integration
  • Workload Identity
  • Private Networking
  • Azure Key Vault
  • GitHub Actions CI
  • CD
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: AKS Automation with Terraform: Best Practices & Design

              Upcoming Webinar Calendar

              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/

              Upcoming Events

              • Apr
                23

                Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                04/23/202601:00 PM ET
                • Apr
                  29

                  Strategies for Safeguarding AI in Applications, Agents, and APIs

                  04/29/202612:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of a VMware Exit

                      04/30/202601:00 PM ET
                      • May
                        06

                        Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                        05/06/202602:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version