featbit-0.8.3
Extends Helm chart compatibility with Azure Kubernetes Service (AKS Standard and AKS Automatic) through optional template enhancements and production-ready deployment example.
Template Enhancements
Added optional fields to all service deployments (API, UI, ELS, DAS):
volumeMounts/volumes- Azure Key Vault CSI Driver integration for secret managementtopologySpreadConstraints- Pod distribution across nodes/zones for AKS Automatic policy complianceinitContainers.resources- Resource limits/requests for init containers (AKS Automatic requirement)
All fields use {{- with }} conditionals for backward compatibility - existing deployments unaffected.
# Example: Azure Key Vault volume mount
api:
volumeMounts:
- name: secrets-store
mountPath: "/mnt/secrets-store"
readOnly: true
volumes:
- name: secrets-store
csi:
driver: secrets-store.csi.k8s.io
volumeAttributes:
secretProviderClass: "featbit-keyvault-secrets"AKS Deployment Example
New charts/featbit/examples/aks/ with production architecture:
Internet → Traffic Manager → Azure LB → NGINX Ingress (TLS) → FeatBit
featbit-aks-values.yaml- External PostgreSQL/Redis, Key Vault secrets, autoscaling configkeyvault-secret-provider.yaml- SecretProviderClass for CSI Drivercluster-issuer.yaml- Let's Encrypt staging/production issuersREADME.md- Complete deployment guide: NGINX Ingress setup, cert-manager, Traffic Manager multi-region, troubleshooting
Configuration highlights:
- External PostgreSQL/Redis with Key Vault-managed credentials
- HPA targeting 80% CPU/memory with 3-10 replicas
- WebSocket-optimized NGINX timeouts (3600s)
- Pod security contexts for RuntimeDefault seccomp profile
Additional Changes
.gitignore- Added*.local.yamlpattern for local config files
What's Changed
- v0.8.3: Add Azure AKS deployment support with Key Vault integration and topology constraints by @cosmic-flood in #60
Full Changelog: featbit-0.8.2...featbit-0.8.3