Summary
In this chapter, we have learned what we can do to improve our basic AKS cluster used in the use case of Chapter 14. Some technologies were already discussed in earlier chapters (such as Azure AD integration, role-based access control, and integration with Azure Key Vault). However, we have introduced the basics of scaling nodes and Pods and how the cluster autoscaler and the HPA both operate on different levels but complement each other. We have learned how writing and managing Helm charts is a valuable skill as it helps with scaling your deployments without having to write extensive customized YAML files per customer.
We closed with a section on Windows containers, where we briefly touched upon some specifics we need to take into account when running Windows containers. We learned about use cases and have seen that there is definitely a use case for Windows containers out there.
In the next chapter, we are going to dive into more technologies related to containers,...