Upgrades and Maintenance

Managing the lifecycle of your AKS cluster is a critical part of operating Kubernetes in production. This includes managing both the version of Kubernetes, and the Operating System running on your nodes.

Azure provides several tools and features to help you keep your cluster secure, up to date, and running smoothly with minimal disruption.

Kubernetes Version Upgrades

AKS supports in-place upgrades of the Kubernetes control plane and node pools. You can:

  • Upgrade manually using the Azure CLI, Portal or Infrastructure as Code.
    • This can include automated pipelines used to manage upgrades
  • Use auto-upgrade channels to stay current with minimal effort

Keeping your cluster on a supported version ensures access to the latest features, bug fixes, and security patches. Microsoft provides 12 months of support for each GA version of Kubernetes. If you are on a version that is n-3 or older it means you are out of support and should plan to upgrade as soon as possible.

If you deploy a cluster in premium tier, you can also take advantage of the extended support lifecycle, which provides an additional 12 months of support for each version. This is particularly useful for regulated industries or mission-critical applications that require longer upgrade cycles.

Node Image Updates

Azure regularly publishes updated node images that include OS patches and runtime updates. You can:

  • Trigger updates manually
  • Enable automatic node image upgrades

This helps maintain security compliance and performance without needing to rebuild your node pools.

Auto-Upgrade Channels

For hands-off cluster management, AKS offers an auto-upgrade process that will apply updates for you automatically. These upgrades are split into two types:

  • Kubernetes updates - manages the version of Kubernetes on your control plane and nodes
  • Node updates - manages patching the operating system and software deployed to your nodes

Each of these types have different channels that allow you to select what level of updates are applied.

Kubernetes Update Channels

ChannelDescriptionExample BehaviourNotes
noneDisables auto-upgrades and keeps the cluster at its current versionCluster stays at 1.31.7 even if newer versions like 1.31.9, 1.32.6, or 1.33.3 are availableDefault setting if left unchanged
patchUpgrades to the latest supported patch version within the same minor versionCluster at 1.31.7 upgrades to 1.31.9 when availableMinor version remains unchanged
stableUpgrades to the latest patch on minor version N-1Cluster at 1.31.7 upgrades to 1.32.6 if 1.33.3 is the latest minor versionBalances stability and currency
rapidUpgrades to the latest patch on the latest minor versionCluster at 1.31.7 upgrades to 1.32.6, then to 1.33.3Fastest path to latest supported version

These channels help balance stability and agility based on your workload needs.

Node Updates Channels

ChannelDescription
NoneNodes do not receive automatic security updates. You are fully responsible for patching and maintenance.
UnmanagedOS updates are applied automatically via the OS’s built-in patching tools. Newly created nodes may be unpatched initially.
SecurityPatchAKS-tested security patches are applied using safe deployment practices. Nodes may be re-imaged or patched live depending on the update. This option incurs extra cost for hosting VHDs.
NodeImageWeekly updates apply a new AKS-tested node image with security and bug fixes. Updates follow maintenance windows and surge settings. No extra VHD cost.

Maintenance Windows

To reduce disruption, AKS allows you to define maintenance windows — specific time periods when auto-upgrades are run. This gives you control over when changes occur, helping avoid impact during critical business hours.

Avoid Breaking API Changes

When upgrading your AKS cluster, it is important to be aware of any breaking changes that may affect your workloads. The default configuration of AKS enables a feature to prevent Kubernetes upgrades if breaking API changes are detected. This feature is used when triggering upgrades through the portal, CLI or through auto-upgrade channels.

You can view the list of breaking changes affecting your clusters through the Azure Portal in the “Diagnose and Solve Problems” blade for your AKS cluster. This will show you any breaking changes that have been detected, and allow you to take action to resolve them before upgrading.

Breaking Changes Breaking Changes