%3CLINGO-SUB%20id%3D%22lingo-sub-1654171%22%20slang%3D%22en-US%22%3EAzure%20Arc%20enabled%20Kubernetes%20with%20GitOps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1654171%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EThese%20days%2C%20it%20seems%20like%20Kubernetes%20is%20one%20of%20the%20most%20popular%20conversation%20topics%20in%20the%20world%20of%20Cloud%20and%20modern%20applications.%20The%20question%20is%20not%20if%20your%20organization%20uses%20Kubernetes%2C%20it%20is%20when%20the%20organization%20will%20use%20it.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20post%20will%20focus%20on%20the%20need%20for%20standardization%20and%20not%20if%20Kubernetes%20is%20meeting%20your%20business%20and%20technical%20requirements%20or%20not.%20So%20now%20we%20established%20the%20assumption%20that%20you%20already%20use%20it%2C%20let's%20talk%20about%20a%20couple%20of%20challenges.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1229434003%22%20id%3D%22toc-hId-1229434003%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--578020460%22%20id%3D%22toc-hId--578020460%22%3E%3CSPAN%3EChallenges%20%231%20-%20Sprawling%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIf%20you%20are%20in%20the%20process%20of%20modernizing%20your%20applications%20and%20adopting%20cloud-native%20design%20patterns%2C%20you%20know%2C%20like%20%22next-gen%22%20scalability%2C%20availability%2C%20security%2C%20etc.%20you%20probably%20have%20some%20notion%20of%20why%20Kubernetes.%20But%20the%20challenge%2C%20in%20this%20case%2C%20is%20the%20Kubernetes%20cluster%20sprawl%20that%20is%20about%20to%20hit%20you.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ERather%20you%20are%20building%20it%20yourself%20on-premises%2C%20using%20the%20gazillion%20Kubernetes%20flavors%20out%20there%2C%20installing%20on%20bare-metal%20or%20deploying%20one%20of%20the%20managed%20Kubernetes%20offerings%20the%20cloud%20providers%20has%20to%20offer%2C%20the%20problem%20remains%2C%20and%20all%20of%20a%20sudden%20you%20are%20in%20the%20business%20of%20managing%20Kubernetes%20clusters%2C%20well%2C%20all%20over%20the%20place.%20I%20like%20to%20call%20this%20%22my%20fleet%20is%20out%20of%20control%22%20%3A)%3C%2Fimg%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1909492373%22%20id%3D%22toc-hId-1909492373%22%3E%3CSPAN%3EChallenge%20%232%20-%20%22I%20am%20drifting%20away%E2%80%A6%22%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EYou%20got%20your%20clusters%2C%20good%20for%20you!%20But%20how%20do%20you%20keep%20all%20these%20clusters%20configured%20the%20way%20you%20left%20it%3F!%20Don't%20you%20want%20them%20to%20be%20all%20meet%20your%20configuration%20baseline%3F!%20You%20do!%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIt's%20not%20just%20your%20clusters%20that%20matter%20because%20after%20all%2C%20the%20applications%20are%20what%20drives%20the%20business!%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ELooking%20at%20both%20situations%2C%20you%20can%20see%20a%20recurring%20theme.%20This%20is%20really%20about%20making%20sure%20no%20configuration%2C%20rather%20on%20the%20cluster%20and%2For%20the%20applications%20deployed%20on%20it%20are%20drifting%20away.%20You%20want%20this%20because%20otherwise%2C%20you%20might%20be%20facing%20an%20outdated%20application%20or%20a%20cluster%20that%20is%20not%20meeting%20for%20example%20your%20security%20needs.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-102037910%22%20id%3D%22toc-hId-102037910%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--1705416553%22%20id%3D%22toc-hId--1705416553%22%3E%3CSPAN%3EAzure%20Arc%20enabled%20Kubernetes%20%2B%20GitOps%20%3D%3D%20Wining%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ENow%20that%20we%20addressed%20these%20couple%20of%20challenges%2C%20we%20can%20talk%20a%20solution%20-%20enters%20Azure%20Arc%20enabled%20Kubernetes%20with%20GitOps%20configurations.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EBy%20extending%20or%20%E2%80%9Cstretching%E2%80%9D%20the%20Azure%20Resource%20Manager%20(ARM)%20control%20plane%2C%20we%20are%20able%20to%20project%20your%20Kubernetes%20clusters%20which%20are%20deployed%20OUTSIDE%20of%20Azure%20as%201st%20class%20citizens%20inside%20Azure%20next%20to%20existing%20resources%2C%20for%20example%2C%20as%20you%20can%20see%20in%20the%20figure%20below%2C%20Azure%20Kubernetes%20Service%20(AKS)%20clusters%20reside%20next%20to%20Azure%20Arc%20ones.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EBy%20doing%20so%2C%20you%20get%20a%20single%20interface%20to%20rule%20them%20all%20which%20is%20the%20start%20of%20the%20solution%20to%20challenge%20%231%20-%20the%20sprawl%20of%20clusters.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Screen%20Shot%202020-08-25%20at%201.04.03%20PM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F217566i94D9CFB71413206C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screen%20Shot%202020-08-25%20at%201.04.03%20PM.png%22%20alt%3D%22Azure%20Arc%20enabled%20Kubernetes%20clusters%20alongside%20AKS%20clusters%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Arc%20enabled%20Kubernetes%20clusters%20alongside%20AKS%20clusters%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EProjecting%20the%20clusters%20is%20the%20fundamental%20building%20block%20and%20now%20you%20apply%20GitOps%20Configurations%20for%20these%20clusters.%20Azure%20Arc%20with%20Kubernetes%20and%20GitOps%20is%20not%20scary%20as%20one%20might%20think%2C%20the%20concept%20and%20the%20flow%20are%20very%20straight%20forward.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EGenerally%20speaking%2C%20GitOps%20with%20Kubernetes%20is%20about%20deploying%20your%20applications%20based%20on%20Git%20repository%20which%20represents%20the%20%E2%80%9Csource%20of%20truth%E2%80%9D%20or%20the%20baseline%20for%20this%20app%20deployment.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIt%20relays%20on%20a%20Kubernetes%20Operator%2C%20which%20Is%20the%20Flux%20Operator%20in%20the%20Azure%20Arc%20Kubernetes%20case%20to%20%E2%80%9Clisten%E2%80%9D%20if%20changes%20are%20being%20made%20on%20the%20baseline%2C%20meaning%20the%20repo.%20If%20such%20changes%20occur%2C%20the%20operator%20will%20initiate%20a%20rolling%20update%20Kubernetes%20deployment%2C%20deploying%20the%20new%20Pods%20and%20terminating%20the%20old%20one.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20can%20be%20done%20against%20a%20standard%20Kubernetes%20YAML%20manifest%20or%20a%20Helm%20charts%20release%2C%20using%20also%20the%20Help%20Operator%20with%20conjunction%20to%20the%20Flux%20one%20(which%20also%20gets%20deployed%20automatically).%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Screen%20Shot%202020-09-10%20at%2010.59.22%20AM.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F217588iB50E80A8D31033EA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Screen%20Shot%202020-09-10%20at%2010.59.22%20AM.png%22%20alt%3D%22Application%20deployment%20GitOps%20flow%20with%20Azure%20Arc%20enabled%20Kubernetes%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EApplication%20deployment%20GitOps%20flow%20with%20Azure%20Arc%20enabled%20Kubernetes%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EExisting%20Kubernetes%20clusters%20are%20already%20deployed%3C%2FLI%3E%0A%3CLI%3EAzure%20Arc%20Kubernetes%20connected%20cluster%20is%20created%3C%2FLI%3E%0A%3CLI%3EThe%20user%20creates%20Azure%20Arc%20Kubernetes%20cluster%20GitOps%20Configuration%3C%2FLI%3E%0A%3CLI%3EThe%20Flux%20Operator%20(and%20optionally%20the%20Helm%20Operator)%20is%20deployed%20on%20the%20cluster%20and%20starts%E2%80%9D%20listening%E2%80%9D%20to%20the%20git%20repository%20with%20the%20user%E2%80%99s%20application%20code%3C%2FLI%3E%0A%3CLI%3EThe%20Flux%20operator%20initiates%20the%20user%E2%80%99s%20application%20deployment%20on%20the%20cluster%2C%20representing%20the%20current%20desired%20state%3C%2FLI%3E%0A%3CLI%3EUser%20is%20updating%20the%20application%20(creating%20a%20new%20app%20version)%20and%20merge%20changes%20to%20the%20repository%3C%2FLI%3E%0A%3CLI%3EFlux%20pick%20up%20a%20change%20to%20the%20Git%20repository%3C%2FLI%3E%0A%3CLI%3EFlux%20operator%20initiates%20a%20new%20user%E2%80%99s%20application%20version%20deployment%20on%20the%20cluster%20while%20removing%20old%20version%20application%20pods%2C%20resulting%20in%20a%20new%20Desired%20State%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CH3%20id%3D%22toc-hId-782096280%22%20id%3D%22toc-hId-782096280%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--1025358183%22%20id%3D%22toc-hId--1025358183%22%3E%3CSPAN%3ECluster-level%20Configuration%20vs.%20Namespace-level%20Configuration%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CH4%20id%3D%22toc-hId--334796709%22%20id%3D%22toc-hId--334796709%22%3E%26nbsp%3B%3C%2FH4%3E%0A%3CH4%20id%3D%22toc-hId--2142251172%22%20id%3D%22toc-hId--2142251172%22%3E%3CSPAN%3ECluster-level%20Configuration%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWith%20Cluster-level%20GitOps%20Configuration%2C%20the%20goal%20is%20to%20have%20a%20baseline%20for%20the%20%22horizontal%20components%22%20or%20%22management%20components%22%20deployed%20on%20your%20Kubernetes%20cluster%20which%20will%20then%20be%20used%20by%20your%20applications.%20Good%20examples%20are%20Ingress%20Controller%2C%20Service%20Meshes%2C%20Security%20products%2C%20Monitoring%20solutions%2C%20etc.%20Having%20such%20deployments%20as%20part%20of%20your%20GitOps%20Configuration%20will%20assure%20%3CSTRONG%3Eyour%20cluster%3C%2FSTRONG%3E%20is%20meeting%20the%20cluster%20baseline%20standards.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-345261661%22%20id%3D%22toc-hId-345261661%22%3E%26nbsp%3B%3C%2FH4%3E%0A%3CH4%20id%3D%22toc-hId--231322203%22%20id%3D%22toc-hId--231322203%22%3E%3CSPAN%3ENamespace-level%20Configuration%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWith%20Namespace-level%20GitOps%20Configuration%2C%20the%20goal%20is%20to%20have%20the%20Kubernetes%20resources%20deployed%20only%20in%20the%20namespace%20selected.%20The%20most%20obvious%20use-case%20here%20is%20simply%20your%20application%20and%20it%E2%80%99s%20respective%20pods%2C%20services%2C%20ingress%20routes%2C%20etc.%20Having%20such%20deployments%20as%20part%20of%20your%20GitOps%20Configuration%20will%20assure%20%3CSTRONG%3Eyour%20applications%3C%2FSTRONG%3E%20are%20meeting%20the%20Kubernetes%20applications%20baseline%20standards.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%2213.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F217568i12F87D9F5E78B2F8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2213.png%22%20alt%3D%22Azure%20Arc%20enabled%20Kubernetes%20GitOps%20Configurations%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Arc%20enabled%20Kubernetes%20GitOps%20Configurations%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ESo%2C%20as%20you%20can%20see%2C%20by%20having%20the%20same%20GitOps%20Configurations%20for%20all%20your%20Kubernetes%20clusters%2C%20managed%20by%20Azure%20Arc%20you%20are%20solving%20challenge%20%232%20and%20able%20to%20govern%20a%20potential%20cluster%20and%20application%20config%20and%20versioning%20drifts.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-2127107911%22%20id%3D%22toc-hId-2127107911%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-319653448%22%20id%3D%22toc-hId-319653448%22%3E%3CSPAN%3EGet%20Started%20Today!%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20this%20post%20we%20briefly%20touched%20on%20the%20power%20of%20using%20Azure%20Arc%20enabled%20Kubernetes%20alongside%20its%20native%20GitOps%20Configurations%20capabilities.%20Having%20all%20your%20Kubernetes%20clusters%20projected%20as%20Azure%20resources%20and%20have%20the%20same%20GitOps%20Configurations%20for%20all%20of%20them%20will%20allow%20you%20to%20gain%20much%20better%20control%20for%20both%20fleet%20management%20and%20deployment%20baselines%20as%20well%20as%20drift%20avoidance.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20get%20started%2C%20visit%20the%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fazurearcjumpstart%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Arc%20Jumpstart%20GitHub%20repository%3C%2FA%3E%2C%20where%20you%20can%20find%20more%20than%2030%20Azure%20Arc%20deployment%20guides%20and%20automation%2C%20including%20how%20to%20deploy%20end-to-end%20GitOps%20flows%20against%20your%20Azure%20Arc%20enabled%20Kubernetes%20clusters%20as%20well%20as%20visit%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-arc%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eofficial%20Azure%20Arc%20documentation%20page%3C%2FA%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20check%20out%20these%20additional%20great%20Azure%20Arc%20blog%20posts!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FDKirbyIgnite2020BlogArc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EA%20closer%20look%20at%20Azure%20Arc%20enabled%20servers%3C%2FA%3E%3C%2FDIV%3E%0A%3CDIV%3E%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Flighthouse_arc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Arc%20%26amp%3B%20Lighthouse%3A%20Managing%20IT%20infrastructure%20Anywhere%20at-scale%3C%2FA%3E%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22xmsonormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22xmsonormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22xmsonormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22xmsonormal%22%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1654171%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EThese%20days%2C%20it%20seems%20like%20Kubernetes%20is%20one%20of%20the%20most%20popular%20conversation%20topics%20in%20the%20world%20of%20Cloud%20and%20modern%20applications.%20The%20question%20is%20not%20if%20your%20organization%20uses%20Kubernetes%2C%20it%20is%20when%20the%20organization%20will%20use%20it.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThis%20post%20will%20focus%20on%20the%20need%20for%20standardization%20and%20not%20if%20Kubernetes%20is%20meeting%20your%20business%20and%20technical%20requirements%20or%20not.%20So%20now%20we%20established%20the%20assumption%20that%20you%20already%20use%20it%2C%20let's%20talk%20about%20a%20couple%20of%20challenges.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1654171%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EKubernetes%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

These days, it seems like Kubernetes is one of the most popular conversation topics in the world of Cloud and modern applications. The question is not if your organization uses Kubernetes, it is when the organization will use it.

 

This post will focus on the need for standardization and not if Kubernetes is meeting your business and technical requirements or not. So now we established the assumption that you already use it, let's talk about a couple of challenges.

 

Challenges #1 - Sprawling

 

If you are in the process of modernizing your applications and adopting cloud-native design patterns, you know, like "next-gen" scalability, availability, security, etc. you probably have some notion of why Kubernetes. But the challenge, in this case, is the Kubernetes cluster sprawl that is about to hit you.

 

Rather you are building it yourself on-premises, using the gazillion Kubernetes flavors out there, installing on bare-metal or deploying one of the managed Kubernetes offerings the cloud providers has to offer, the problem remains, and all of a sudden you are in the business of managing Kubernetes clusters, well, all over the place. I like to call this "my fleet is out of control" :)

 

Challenge #2 - "I am drifting away…"

 

You got your clusters, good for you! But how do you keep all these clusters configured the way you left it?! Don't you want them to be all meet your configuration baseline?! You do!

 

It's not just your clusters that matter because after all, the applications are what drives the business!

 

Looking at both situations, you can see a recurring theme. This is really about making sure no configuration, rather on the cluster and/or the applications deployed on it are drifting away. You want this because otherwise, you might be facing an outdated application or a cluster that is not meeting for example your security needs.

 

Azure Arc enabled Kubernetes + GitOps == Wining

 

Now that we addressed these couple of challenges, we can talk a solution - enters Azure Arc enabled Kubernetes with GitOps configurations.

 

By extending or “stretching” the Azure Resource Manager (ARM) control plane, we are able to project your Kubernetes clusters which are deployed OUTSIDE of Azure as 1st class citizens inside Azure next to existing resources, for example, as you can see in the figure below, Azure Kubernetes Service (AKS) clusters reside next to Azure Arc ones.

 

By doing so, you get a single interface to rule them all which is the start of the solution to challenge #1 - the sprawl of clusters.

 

Azure Arc enabled Kubernetes clusters alongside AKS clustersAzure Arc enabled Kubernetes clusters alongside AKS clusters

 

Projecting the clusters is the fundamental building block and now you apply GitOps Configurations for these clusters. Azure Arc with Kubernetes and GitOps is not scary as one might think, the concept and the flow are very straight forward.

 

Generally speaking, GitOps with Kubernetes is about deploying your applications based on Git repository which represents the “source of truth” or the baseline for this app deployment.

 

It relays on a Kubernetes Operator, which Is the Flux Operator in the Azure Arc Kubernetes case to “listen” if changes are being made on the baseline, meaning the repo. If such changes occur, the operator will initiate a rolling update Kubernetes deployment, deploying the new Pods and terminating the old one.

 

This can be done against a standard Kubernetes YAML manifest or a Helm charts release, using also the Help Operator with conjunction to the Flux one (which also gets deployed automatically).

 

 

Application deployment GitOps flow with Azure Arc enabled KubernetesApplication deployment GitOps flow with Azure Arc enabled Kubernetes

 

  1. Existing Kubernetes clusters are already deployed
  2. Azure Arc Kubernetes connected cluster is created
  3. The user creates Azure Arc Kubernetes cluster GitOps Configuration
  4. The Flux Operator (and optionally the Helm Operator) is deployed on the cluster and starts” listening” to the git repository with the user’s application code
  5. The Flux operator initiates the user’s application deployment on the cluster, representing the current desired state
  6. User is updating the application (creating a new app version) and merge changes to the repository
  7. Flux pick up a change to the Git repository
  8. Flux operator initiates a new user’s application version deployment on the cluster while removing old version application pods, resulting in a new Desired State

 

Cluster-level Configuration vs. Namespace-level Configuration

 

Cluster-level Configuration

 

With Cluster-level GitOps Configuration, the goal is to have a baseline for the "horizontal components" or "management components" deployed on your Kubernetes cluster which will then be used by your applications. Good examples are Ingress Controller, Service Meshes, Security products, Monitoring solutions, etc. Having such deployments as part of your GitOps Configuration will assure your cluster is meeting the cluster baseline standards.

 

Namespace-level Configuration

 

With Namespace-level GitOps Configuration, the goal is to have the Kubernetes resources deployed only in the namespace selected. The most obvious use-case here is simply your application and it’s respective pods, services, ingress routes, etc. Having such deployments as part of your GitOps Configuration will assure your applications are meeting the Kubernetes applications baseline standards.

 

Azure Arc enabled Kubernetes GitOps ConfigurationsAzure Arc enabled Kubernetes GitOps Configurations

 

So, as you can see, by having the same GitOps Configurations for all your Kubernetes clusters, managed by Azure Arc you are solving challenge #2 and able to govern a potential cluster and application config and versioning drifts.

 

Get Started Today!

 

In this post we briefly touched on the power of using Azure Arc enabled Kubernetes alongside its native GitOps Configurations capabilities. Having all your Kubernetes clusters projected as Azure resources and have the same GitOps Configurations for all of them will allow you to gain much better control for both fleet management and deployment baselines as well as drift avoidance.

 

To get started, visit the Azure Arc Jumpstart GitHub repository, where you can find more than 30 Azure Arc deployment guides and automation, including how to deploy end-to-end GitOps flows against your Azure Arc enabled Kubernetes clusters as well as visit the official Azure Arc documentation page.

 

In addition, check out these additional great Azure Arc blog posts!