{"id":864,"date":"2019-11-19T00:00:00","date_gmt":"2019-11-19T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/bringing-confidential-computing-to-kubernetes"},"modified":"2025-06-26T23:54:08","modified_gmt":"2025-06-27T06:54:08","slug":"bringing-confidential-computing-to-kubernetes","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/","title":{"rendered":"Bringing confidential computing to Kubernetes"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Historically, data has been protected at rest through encryption in data stores, and in transit using network technologies, however as soon as that data is processed in the CPU of a computer it is decrypted and in plain text. New confidential computing technologies are game changing as they provide data protection, even when the code is running on the CPU, with secure hardware enclaves. Today, we are announcing that we are bringing confidential computing to Kubernetes workloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"confidential-computing-with-azure\">Confidential computing with Azure<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Azure is the first major cloud platform to support confidential computing building on Intel\u00ae Software Guard Extensions (Intel SGX). Last year, we announced the <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protect-data-in-use-with-the-public-preview-of-azure-confidential-computing\/\" target=\"_blank\" rel=\"noopener\">preview of the DC-series of virtual machines<\/a> that run on Intel\u00ae Xeon\u00ae processors and are confidential computing ready.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This confidential computing capability also provides an additional layer of protection even from potentially malicious insiders at a cloud provider, reduces the chances of data leaks and may help address some regulatory compliance needs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Confidential computing enables several previously not possible use-cases. Customers in regulated industries can now collaborate together using sensitive partner or customers data to detect fraud scenarios without giving the other party visibility into that data. In another example customers can perform mission critical payment processing in secure enclaves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-it-works-for-kubernetes\">How it works for Kubernetes<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With confidential computing for Kubernetes, customers can now get this additional layer of data protection for their Kubernetes workloads with the code running on the CPU with secure hardware enclaves. Use the open enclave SDK for confidential computing in code. <a href=\"https:\/\/github.com\/Azure\/aks-engine\/blob\/master\/docs\/topics\/sgx.md\" target=\"_blank\" rel=\"noopener\">Create a Kubernetes cluster<\/a> on hardware that supports Intel SGX, such as the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/linux\/sizes-general#dc-series\">DC-series virtual machines<\/a> running Ubuntu 16.04 or Ubuntu 18.04 and install the confidential computing device plugin into those virtual machines. The device plugin (running as a DaemonSet) surfaces the usage of the Encrypted Page Cache (EPC) RAM as a schedulable resource for Kubernetes. Kubernetes users can then schedule pods and containers that use the Open Enclave SDK onto hardware which supports Trusted Execution Environments (TEE).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The following pod specification demonstrates how you would schedule a pod to have access to a TEE by defining a limit on the specific EPC memory that is advertised to the Kubernetes scheduler by the device plugin available in preview.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\" alt=\"How to schedule a pod to access a TEE\" style=\"border-radius:0px\" title=\"How to schedule a pod to access a TEE\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Now the pods in these clusters can run containers using secure enclaves and take advantage of confidential computing. There is no additional fee for running Kubernetes containers on top of the base DC-series cost.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Open Enclave SDK was recently open sourced by Microsoft and made available to the <a href=\"https:\/\/confidentialcomputing.io\/\" target=\"_blank\" rel=\"noopener\">Confidential Computing Consortium<\/a>, under the Linux Foundation for standardization to create a single uniform API to use with a variety of hardware components and software runtimes across the industry landscape.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Try out confidential computing for <a href=\"https:\/\/aka.ms\/aks-engine-open-enclave\" target=\"_blank\" rel=\"noopener\">Kubernetes with Azure today<\/a>. Let us know what you think in <a href=\"https:\/\/microsoft.qualtrics.com\/jfe\/form\/SV_02plZaaZQ6SDJKl\">our survey<\/a> or on <a href=\"https:\/\/aka.ms\/aks-engine-open-enclave\" target=\"_blank\" rel=\"noopener\">GitHub<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1467,1470],"tags":[],"audience":[3055,3053,3056],"content-type":[1460],"product":[1472],"tech-community":[],"topic":[],"coauthors":[369],"class_list":["post-864","post","type-post","status-publish","format-standard","hentry","category-compute","category-containers","audience-developers","audience-it-decision-makers","audience-it-implementors","content-type-events","product-azure-kubernetes-service-aks","review-flag-new-1680286579-546","review-flag-partn-1680286579-901"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bringing confidential computing to Kubernetes | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bringing confidential computing to Kubernetes | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T06:54:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\" \/>\n<meta name=\"author\" content=\"Lachlan Evenson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lachlan Evenson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/lachlan-evenson\/\",\"@type\":\"Person\",\"@name\":\"Lachlan Evenson\"}],\"headline\":\"Bringing confidential computing to Kubernetes\",\"datePublished\":\"2019-11-19T00:00:00+00:00\",\"dateModified\":\"2025-06-27T06:54:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\",\"articleSection\":[\"Compute\",\"Containers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\",\"name\":\"Bringing confidential computing to Kubernetes | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\",\"datePublished\":\"2019-11-19T00:00:00+00:00\",\"dateModified\":\"2025-06-27T06:54:08+00:00\",\"description\":\"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compute\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bringing confidential computing to Kubernetes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bringing confidential computing to Kubernetes | Microsoft Azure Blog","description":"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/","og_locale":"en_US","og_type":"article","og_title":"Bringing confidential computing to Kubernetes | Microsoft Azure Blog","og_description":"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2019-11-19T00:00:00+00:00","article_modified_time":"2025-06-27T06:54:08+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp","type":"","width":"","height":""}],"author":"Lachlan Evenson","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Lachlan Evenson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/lachlan-evenson\/","@type":"Person","@name":"Lachlan Evenson"}],"headline":"Bringing confidential computing to Kubernetes","datePublished":"2019-11-19T00:00:00+00:00","dateModified":"2025-06-27T06:54:08+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp","articleSection":["Compute","Containers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/","name":"Bringing confidential computing to Kubernetes | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp","datePublished":"2019-11-19T00:00:00+00:00","dateModified":"2025-06-27T06:54:08+00:00","description":"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Compute","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/"},{"@type":"ListItem","position":3,"name":"Bringing confidential computing to Kubernetes"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=864"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/864\/revisions"}],"predecessor-version":[{"id":44001,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/864\/revisions\/44001"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=864"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=864"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=864"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=864"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=864"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=864"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}