If you read the previous article on Draft 2, we went from source code to deployed application in a few steps:
az aks draft create
: creates a Dockerfile and Kubernetes manifests (deployment and service manifests)az aks draft setup-gh
: setup GitHub OIDCaz aks draft generate-workflow
: create a GitHub workflow that builds and pushes the container image and deploys the application to Kubernetes
If you answer the questions from the commands above correctly, you should be up and running fairly quickly! π
The manifests default to a Kubernetes service that uses the type LoadBalancer to configure an Azure public load balancer to access your app. But maybe you want to test your app with TLS and you do not want to configure a certificate in your container image? That is where the ingress configuration comes in.
You will need to do two things:
- Configure web application routing: configures Ingress Nginx Controller and relies on Open Service Mesh (OSM) and the Secret Store CSI Driver for Azure Key Vault. That way, you are shielded from having to do all that yourself. I did have some issues with web application routing as described below.
- Use
az aks draft update
to configure the your service to work with web application routing; this command will ask you for two things:- the hostname for your service: you decide this but the name should resolve to the public IP of the Nginx Ingress Controller installed by web application routing
- a URI to a certificate on Azure Key Vault: you will need to deploy a Key Vault and upload or create the certificate
Configure web application routing
Although it should be supported, I could not enable the add-on on one of my existing clusters. On another one, it did work. I decided to create a new cluster with the add-on by running the following command:
az aks create --resource-group myResourceGroup --name myAKSCluster --enable-addons web_application_routing
β οΈ Make sure you use the most recent version of the Azure CLI aks-preview
extension.
On my cluster, that gave me a namespace app-routing-system
with two pods:

Although the add-on should also install Secrets Store CSI Driver, Open Service Mesh, and External DNS, that did not happen in my case. I installed the first two from the portal. I did not bother installing External DNS.


Create a certificate
I created a Key Vault in the same resource group as my AKS cluster. I configured the access policies to use Azure RBAC (role-based access control). It did not work with the traditional access policies. I granted myself and the identity used by web application routing full access:

You need to grant the user-assigned managed identity of web application routing access because a SecretProviderClass will be created automatically for that identity. The Secret Store CSI Driver uses that SecretProviderClass to grab a certificate from Key Vault and generate a Kubernetes secret for it. The secret will later be used by the Kubernetes Ingress resource to encrypt HTTP traffic. How you link the Ingress resource to the certificate is for a later step.
Now, in Key Vault, generate a certificate:

Above, I use nip.io with the IP address of the Ingress Controller to generate a name that resolves to the IP. For example, 10.2.3.4.nip.io will resolve to 10.2.3.4. Try it with ping. It’s truly a handy service. Use kubectl get svc -n app-routing-system
to find the Ingress Controller public (external) IP.
Now we have everything in place for draft to modify our Kubernetes service to use the ingress controller and certificate.
Using az aks draft update
Back on your machine, in the repo that you used in the previous article, run az aks draft update
. You will be asked two questions:
- Hostname: use <IP Address of Nginx>.nip.io (same as in the common name of the cert without CN=)
- URI to the certificate in Key Vault: you can find the URI in the properties of the certificate

Draft will now update your service to something like:
apiVersion: v1
kind: Service
metadata:
annotations:
kubernetes.azure.com/ingress-host: IPADDRESS.nip.io
kubernetes.azure.com/tls-cert-keyvault-uri: https://kvdraft.vault.azure.net/certificates/mycert/IDENTIFIER
creationTimestamp: null
name: super-api
spec:
ports:
- port: 80
protocol: TCP
targetPort: 8080
selector:
app: super-api
type: ClusterIP
status:
loadBalancer: {}
The service type is now ClusterIP. The annotations will be used for several things:
- to create a placeholder deployment that mounts the certificate from Key Vault in a volume AND creates a secret from the certificate; the Secret Store CSI Driver always needs to mount secrets and certs in a volume; rather than using your application pod, they use a placeholder pod to create the secret
- to create an Ingress resource that routes to the service and uses the certificate in the secret created via the placeholder pod
- to create an IngressBackend resource in Open Service Mesh
In my default namespace, I see two pods after deployment:

Note that above, I actually used a Helm deployment instead of a manifest-based deployment. That’s why you see release-name in the pod names.
The placeholder pod creates a csi volume that uses a SecretProviderClass to mount the certificate:

The SecretProviderClass references your Key Vault and managed identity to access the Key Vault:

If you have not assigned the correct access policy on Key Vault for the userAssignedIdentityID, the certificate cannot be retrieved and the pod will not start. The secret will not be created either.
I also have a secret with the cert inside:

And here is the Ingress:

All of this gets created for you but only after running az aks draft update
and when you commit the changes to GitHub, triggering the workflow.
Did all this work smoothly from the first time?
The short answer is NO! πAt first I thought Draft would take care of installing the Ingress components for me. That is not the case. You need to install and configure web application routing on your cluster and configure the necessary access rights.
I also thought web application routing would install and configure Open Service Mesh and Secret Store CSI driver. That did not happen although that is easily fixed by installing them yourself.
I thought there would be some help with certificate generation. That is not the case. Generating a self-signed certificate with Key Vault is easy enough though.
Once you have web application routing installed and you have a Key Vault and certificate, it is simple to run az aks draft update
. That changes your Kubernetes service definition. After pushing that change to your repo, the updated service with the web application routing annotations can be deployed.
I got some 502 Bad Gateway
errors from Nginx at first. I removed the OSM-related annotations from the Ingress object and tried some other things. Finally, I just redeployed the entire app and then it just started working. I did not spend more time trying to find out why it did not work from the start. The fact that Open Service Mesh is used, which has extra configuration like IngressBackends, will complicate troubleshooting somewhat. Especially if you have never worked with OSM, which is what I expect for most people.
Conclusion
Although this looks promising, it’s all still a bit rough around the edges. Adding OSM to the mix makes things somewhat more complicated.
Remember that all of this is in preview and we are meant to test drive it and provide feedback. However, I fear that, because of the complexity of Kubernetes, these tools will never truly make it super simple to get started as a developer. It’s just a tough nut to crack!
My own point of view here is that Draft v2 without az aks draft update
is very useful. In most cases though, it’s enough to use standard Kubernetes services. And if you do need an ingress controller, most are easy to install and configure, even with TLS.