NashTech Insights

Enabling Monitoring for Azure Kubernetes Service (AKS) with Terraform

Atisha Shaurya
Atisha Shaurya
Table of Contents
silver laptop and white cup on table

Monitoring is a crucial aspect of managing and maintaining your Azure Kubernetes Service (AKS) clusters. Azure provides robust monitoring capabilities through Azure Monitor and Azure Log Analytics, allowing you to gain insights into the performance, health, and activity of your AKS clusters. In this blog post, we’ll explore the importance of AKS cluster monitoring and guide you through enabling it using Terraform.

Why Enable Monitoring for AKS Clusters?

Enabling monitoring for your AKS clusters offers several benefits:

  1. Performance Insights: Monitoring helps you gain visibility into the performance of your AKS clusters, including resource utilization, node performance, and pod health. This data can be used to identify and address performance bottlenecks.
  2. Resource Optimization: By monitoring AKS clusters, you can identify underutilized resources and optimize node scaling, helping you reduce costs and improve resource efficiency.
  3. Troubleshooting: Monitoring provides detailed logs and metrics, making it easier to troubleshoot issues, diagnose errors, and ensure the overall health of your applications running on AKS.
  4. Security and Compliance: Monitoring helps you detect and respond to security threats and compliance violations by providing insights into activities and changes within your AKS clusters.

Enabling Monitoring with Terraform

To enable monitoring for your AKS clusters using Terraform, follow these steps:

1. Define AKS Cluster Configuration

provider "azurerm" {
  features {}

resource "azurerm_resource_group" "aks" {
  name     = "my-aks-rg"
  location = "East US"

resource "azurerm_kubernetes_cluster" "example" {
  name                = "my-aks-cluster"
  location            = azurerm_resource_group.aks.location
  resource_group_name =
  dns_prefix          = "myakscluster"

  default_node_pool {
    name       = "default"
    node_count = 1
    vm_size    = "Standard_D2s_v3"

  addon_profile {
    oms_agent {
      enabled                    = true
      log_analytics_workspace_id  =

In this Terraform configuration:

  • We define an Azure Resource Group and an AKS cluster.
  • Within the addon_profile, we enable the Azure Monitor for Containers (formerly known as Container Insights) add-on, which is the monitoring solution for AKS clusters.
  • We specify the Log Analytics workspace ID, which is required for storing monitoring data.

2. Define Log Analytics Workspace Configuration

You should also create a Log Analytics workspace to store the monitoring data. Add the following code to your Terraform configuration to create the workspace:

resource "azurerm_log_analytics_workspace" "container_insight" {
  name                = "log-analytics"
  location            = azurerm_resource_group.aks.location
  resource_group_name =
  sku                 = "PerGB2018"

3. Initialize Terraform and Apply Configuration

Run the following Terraform commands in your terminal:

terraform init
terraform apply

Terraform will initialize the project and create the AKS cluster with monitoring enabled. This process may take some time.

4. Verify Monitoring

After the deployment is complete, you can verify that monitoring is enabled for your AKS cluster:

  • Access the Azure portal, navigate to your AKS cluster, and open the “Monitoring” section to view container insights, performance metrics, and logs.
  • You can also use Azure Monitor and Azure Log Analytics to create custom alerts and queries to monitor and troubleshoot your AKS cluster effectively.

Finally we have conclusion.


Enabling monitoring for your Azure Kubernetes Service clusters is a critical step in ensuring their performance, security, and reliability. By using Terraform to automate the process, you can consistently and efficiently enable monitoring for your AKS clusters, allowing you to gain valuable insights and make informed decisions about the health and performance of your containerized applications.

Atisha Shaurya

Atisha Shaurya

Leave a Comment

Your email address will not be published. Required fields are marked *

Suggested Article

%d bloggers like this: