Updates Archives
Monthly updates for Azure Kubernetes Service (AKS): September 2020
New features for Windows Server containers in Azure Kubernetes Service
Learn about new Windows Server container related capabilities in AKS
Confidential computing nodes (DCSv2) support on Azure Kubernetes Service (AKS) in public preview
Orchestrate your container applications with hardware based isolation and data-in-use protection through Intel SGX enclaves. Supporting both enclave aware containers and confidential containers (unmodified container apps)
GA: Azure Kubernetes Service mutate default storage class feature
AKS users now have the flexibility to use a different storage class instead of the default storage class.
Visual Studio Code extension diagnostics + periscope
This Visual Studio Code extension enables developers to use AKS periscope and AKS diagnostics in their development workflow to quickly diagnose and troubleshoot their clusters.
GA: Azure Container Service support for new base image Ubuntu 18.04
Ubuntu 18.04 is now the default node operating system on Azure Container Service (AKS).
Public preview: Azure role-based access control (RBAC) for Kubernetes authorization
Achieve unified management and access control across Azure resources, AKS, and Kubernetes resources.
GA: Policy add-on for Azure Kubernetes Service
You can now set policies beyond the Azure Resource Manager level and drive in-depth compliance across pods, namespaces, ingress, and other Kubernetes resources.
Public preview: AKS start/stop cluster feature
Customers can save on time and costs by using the start/stop AKS clusters.
Azure Kubernetes Service on Azure Stack HCI now in public preview
Azure Kubernetes Services (AKS) on Azure Stack HCI enables developers and admins to deploy and manage containerized apps on Azure Stack HCI.
Public preview: Azure Kubernetes Service support for Kubernetes 1.19
AKS users can now benefit from features in Kubernetes 1.19 release
Azure Kubernetes Service (AKS): Node disk DOS by writing to container /etc/hosts (CVE-2020-8557)
If a pod writes a large amount of data to the etc/hosts file within Azure Kubernetes Service, it can potentially cause the node to fail.
Azure Kubernetes Service (AKS): Privilege escalation from compromised node to cluster (CVE-2020-8559)
There is a potential risk to nodes if an attacker is able to intercept certain requests to the kubelet. See if you’re vulnerable and how to mitigate.
Updates by date
Get answers to your questions from Microsoft and Community experts.
Community supportRead commonly asked questions on Azure updates.
FAQTell us what you think of Azure and what you want to see in the future.
Provide feedbackAzure is available in more regions than any other cloud provider.
Check product availability in your region