In this chapter, we learned how to implement an application that runs on an ACI. We created a container image using a Dockerfile and published it to ACR. Then, we created an AKS and deployed an application to the cluster. Finally, we looked at the monitoring capabilities of AKS.
In the next chapter, we will start the Implementing Authentication and Secure Data objective by learning how to implement authentication.