Final thoughts
This chapter also concludes this book. During the course of this book, you've learned how to work with AKS through a series of hands-on examples.
The book started by covering the basics; you learned about containers and Kubernetes and you created an AKS cluster.
The next section focused on application deployment on AKS. You learned different ways of deploying applications to AKS, how to scale applications, how to debug failures, and how to secure services using HTTPS.
The next sections focused on security in AKS. You learned about role-based access control in Kubernetes and how you can integrate AKS with Azure Active Directory. Then, you learned about pod identities, and pod identities were used in a couple of follow-up chapters. After that, you learned how to securely store secrets in AKS, and then we focused on network security.
The final section of this book focused on a number of advanced integrations of AKS with other services. You deployed an Azure...