[Azure Updates] Availability Sets and the Basic load balancer are being deprecated on September 30 2025. AKS now supports, in public preview, a simple Azure CLI […]
[Azure Updates] Virtual Machines node pools support in AKS is now generally available. With Virtual Machines node pools, Azure Kubernetes Services directly manages the provisioning and […]
[Azure Updates] The max blocked nodes allowed feature for AKS lets you specify how many nodes that fail to drain (blocked nodes) can be tolerated during […]
[Azure Updates] Extension Manager, the core component responsible for managing the lifecycle of AKS cluster extensions, has been moved from customer worker nodes to the AKS […]
[Azure Updates] Managing dynamic workloads in Kubernetes can often lead to overprovisioning, idle resources, and additional operational overhead from maintaining pre-configured node pools. To address this, […]
[Azure Updates] Azure Managed Prometheus sends metrics into Azure Monitor Workspace. Customers can now view and monitor issues with ingestion of Prometheus metrics as part of […]
[Azure Updates] On August 14 2025, Azure Kubernetes Service will no longer support the skip-gpu-driver-install node pool tag to skip automatic driver installation on GPU node […]
[Azure Updates] Ubuntu 24.04 is now available on AKS in Kubernetes version 1.32 and above. Containerd 2.0 is enabled by default. AKS now supports Ubuntu 24.04 […]
[Azure Updates] Kubernetes versions 1.31 and 1.32 are now available in all regions as Long term Support (LTS) versions. Every Kubernetes version supported by community is […]
[Azure Updates] Azure Linux now also supports AKS LTS starting with Kubernetes version 1.28 and above. This means you can now pair a stable, enterprise-grade node […]
[Azure Updates] Announcing the private preview of jaz, a new JVM launcher optimized specifically for Azure. This tool provides better default ergonomics for Java applications running in […]
[Azure Updates] This capability provides comprehensive vulnerability assessment and remediation for container images, regardless of their registry source. With this, organizations expand vulnerability assessment coverage to […]