๐Ÿš€ AKS Arc Deployment Tool

Sovereign Private Cloud & Sovereign AI โ€” Deploy AKS on Azure Local with full data residency

๐Ÿ›๏ธ Data Sovereignty ๐Ÿค– Foundry Local Ready ๐Ÿ”’ Air-Gap Capable โšก Edge AI Inference

Step 1: Choose Your Environment & Workload

๐Ÿ›๏ธ
Why AKS Arc for Sovereign Cloud?

Your data stays on-premises while maintaining Azure's management capabilities. Ideal for data residency requirements, Foundry Local AI workloads, and regulated industries requiring full control over data location.

Industry & Compliance

Select your industry to view applicable regulatory frameworks and data sovereignty requirements

๐Ÿญ

Manufacturing

ISO 27001, IEC 62443, TISAX

OT/IT Security Supply Chain
๐Ÿ›’

Retail

PCI-DSS, GDPR, CCPA

Payment Security Customer Data
โšก

Energy & Resources

NERC CIP, IEC 62351, NIST CSF

Critical Infrastructure SCADA/ICS
๐Ÿฅ

Healthcare

HIPAA, HITRUST, FDA 21 CFR Part 11

PHI Protection Medical Devices
๐Ÿฆ

Financial Services

PCI-DSS, SOX, SOC 2, GLBA

Transaction Security Regulatory
๐Ÿ›๏ธ

Government

FedRAMP, CJIS, NIST 800-171

Data Sovereignty Critical Infra
๐Ÿ”ง

General / Other

No specific industry requirements

Standard Security

Deployment Stage

Select your target environment to automatically configure appropriate settings

๐Ÿ“˜ AKS Arc Architecture โ€” Sovereign by Design:
  • Control Plane VMs: Run Kubernetes control components locally on your infrastructure โ€” your data never leaves your premises.
  • Node Pool VMs: Run containerized AI/ML workloads, Foundry Local models, and sovereign applications with full data residency.
  • Azure Arc: Provides cloud management while keeping the data plane entirely on-premises โ€” only metadata flows to Azure.
โœ… Compliant with data residency laws โ€ข โœ… Air-gap capable via Arc Gateway โ€ข โœ… Foundry Local & SLM ready
๐Ÿงช

POC / Dev

Minimal resources for testing

1 control plane VM โ€ข 2-3 node pool VMs
= 3-4 total VMs
~$247/mo
๐Ÿš€

Pilot / Test

Basic HA for pre-production

3 control plane VMs โ€ข 3-10 node pool VMs
= 6-13 total VMs
~$1,834/mo
โšก

Production

Full HA with auto-scaling

3 control plane VMs โ€ข 3-100 node pool VMs
= 6-103 total VMs
~$4,291/mo

๐ŸŽฏ Select Your Sovereign AI Workload

Run AI models and applications entirely on-premises โ€” your data never leaves your infrastructure

Azure Arc Extensions Sovereign AI & Edge Solutions

ARC EXT
๐ŸŽฅ

Video Indexer Arc

Video & audio AI analysis on edge

64+ cores โ€ข 256GB RAM โ€ข GPU optional
Manufacturing โ€ข Retail โ€ข Energy
ARC EXT
๐Ÿ’ฌ

Edge RAG Arc

Sovereign AI chat & document search โ€” Foundry Local compatible

64+ cores โ€ข 256GB RAM โ€ข GPU/CPU
Manufacturing โ€ข Retail โ€ข Energy
ARC EXT
๐Ÿญ

Azure IoT Operations

Unified edge data plane for OT/IT

8+ cores โ€ข 16GB RAM โ€ข MQTT/OPC UA
Manufacturing โ€ข Energy โ€ข Industrial IoT

Generic Workloads Standard Kubernetes applications

๐Ÿ“น

Video Analytics

Camera feeds, video processing

32 vCPU โ€ข 128 GB RAM โ€ข GPU
๐Ÿค–

AI Inference

ML model serving and inference

16 vCPU โ€ข 64 GB RAM โ€ข GPU
โš™๏ธ

General Purpose

Web apps and microservices

8 vCPU โ€ข 32 GB RAM
๐Ÿ”ง

Custom

Define your own requirements

Custom configuration

Step 2: Configure Your Deployment

๐Ÿ“‹ Azure Local Prerequisites

AKS Arc requires: Logical Network (IPs), Custom Location, Storage (CSV volumes)

๐Ÿ’ฐ Estimated Cost: $0/mo

Live calculation based on your config

โ–ผ

๐Ÿ”Œ Arc Extensions Included (Auto-deployed with cluster)

๐Ÿ“‹ Generated: 1 cluster template + 3 extension templates + 1 policy assignment template

๐Ÿ“‹ Basic Cluster Settings

Essential identifiers and Azure Local connection details

Name of your Azure Local Custom Location (or full ARM resource ID)
Name of your Azure Local logical network (or full ARM resource ID)
SSH public key for accessing cluster nodes (for troubleshooting and management)
โš™๏ธ Advanced Configuration (click tab to configure)

โš™๏ธ Cluster Sizing & VM Selection (Optional - defaults from Production) โ–ผ

๐ŸŒ Network Configuration โ“˜ Network Security for AKS Arc:
โ€ข Use Calico network policies to control pod-to-pod traffic (defense in depth)
โ€ข Private cluster mode restricts API server to private network only
โ€ข Network segregation prevents lateral movement during attacks
โ€ข Follows NSA/CISA and CIS Kubernetes hardening guidelines
Click to read full documentation โ†’
โ–ผ

๐Ÿ’พ Storage Configuration โ“˜ Storage Security for AKS Arc:
โ€ข BitLocker encryption at rest on Azure Local CSV volumes
โ€ข Secrets stored in Kubernetes encrypted via etcd encryption
โ€ข Volume snapshots for backup/recovery (roadmap feature)
โ€ข Follows NIST SP 800-190 container security guidelines
Click to read full documentation โ†’
โ–ผ

๐Ÿ” Identity & Access Control โ“˜ Identity Security for AKS Arc:
โ€ข Entra ID integration unifies cloud and edge authentication
โ€ข Workload Identity provides pod-level managed identities
โ€ข RBAC enforces least-privilege access controls
โ€ข Pod Security Standards prevent privilege escalation
โ€ข Aligns with Microsoft Zero Trust security framework
Click to read full documentation โ†’
โ–ผ

๐ŸŒ Arc Gateway & Network Connectivity โ–ผ

๐Ÿ”ฅ Firewall Requirements โ–ผ

๐Ÿ“Š Monitoring & Observability โ“˜ Monitoring Best Practices:
โ€ข Azure Monitor Container Insights provides centralized logging
โ€ข Kubernetes audit logs track API server access (compliance)
โ€ข Log retention 90+ days for PCI DSS/HIPAA requirements
โ€ข Prometheus/Grafana for custom metrics and alerting
Click to read full documentation โ†’
โ–ผ

๐Ÿ”’ Security & Compliance (Optional) โ“˜ Advanced Security Options:
โ€ข Defender for Containers: Real-time threat detection, CVE scanning
โ€ข Azure Policy: Enforce Pod Security Standards and compliance
โ€ข Supports PCI DSS, HIPAA, ISO 27001, SOC 2, FedRAMP frameworks
โ€ข Based on Microsoft Threat Matrix for Kubernetes
Click to read full documentation โ†’
โ–ผ

๐ŸŽฏ Extension Configuration

Configure settings for Arc extensions that will be installed on the cluster configured above

Step 3: Review Your Deployment Plan

๐Ÿ”’ Security & Compliance Score

-- /100
Calculating...
Based on 8 security checks