Skip to main content

Command Palette

Search for a command to run...

Azure Kubernetes Application Network: Making Service Mesh Invisible

What Microsoft announced at KubeCon Europe 2026 and why it matters for platform teams

Published
7 min read
Azure Kubernetes Application Network: Making Service Mesh Invisible
M

Handling MinistryofDevOps(Pun intended)

At KubeCon + CloudNativeCon Europe 2026 in Amsterdam, Microsoft launched Azure Kubernetes Application Network (App Net) — a fully managed networking layer for Azure Kubernetes Service (AKS) that delivers mutual TLS, application-aware authorization, and traffic telemetry without requiring teams to deploy or operate a traditional service mesh.

This post breaks down what App Net is, why it matters, and what it means for teams running workloads on Kubernetes.


The Problem: IP-Based Networking Doesn't Scale

As Kubernetes deployments grow more distributed — spanning multiple clusters, regions, and increasingly AI-powered workloads — IP-based networking becomes harder to reason about. Visibility degrades, security policies become difficult to audit, and encrypting communication between workloads has historically required either adopting a full service mesh or doing a significant amount of custom work.

Most organisations found themselves stuck between two unappealing options: take on the operational complexity of a service mesh like Istio with its sidecar proxies, or accept the security and observability gaps that come without one. According to Mitch Connors, a principal software engineer at Microsoft and Istio maintainer who led the App Net effort, roughly 60% of Kubernetes clusters still don't run any service mesh at all.

What Is Azure Kubernetes Application Network?

App Net is Microsoft's answer to this gap. Built on top of Istio's ambient mode, it moves networking intelligence to the application layer where it's more meaningful and easier to operate. The key capabilities include:

Mutual TLS (mTLS) by Default — Every AKS cluster with App Net enabled gets encrypted service-to-service communication out of the box. Under the hood, Istio ambient mode uses a lightweight per-node Rust-based proxy (ztunnel) for encryption, removing the need for sidecar containers alongside every application pod.

Application-Aware Authorization — Rather than relying on IP-based network policies, App Net lets teams write authorization rules based on service identity and request attributes. This is a significant step up from traditional Kubernetes NetworkPolicy, which only operates at L3/L4.

Traffic Telemetry — Detailed metrics about ingress and in-cluster communication are surfaced without requiring custom instrumentation. This integrates with Azure's managed Prometheus and Grafana stack for unified observability.

Multi-Region Connectivity — Built-in support for cross-cluster communication, which is increasingly important as organisations distribute workloads across regions for resilience or to chase GPU capacity.

Architecture Overview

The diagram below illustrates how App Net's components fit together within an AKS cluster. The ztunnel handles L4 encryption per node, while the waypoint proxy manages L7 concerns like authorization and routing — all without injecting sidecar proxies into application pods.

Why "Application Network" and Not "Service Mesh"?

The naming is deliberate. As Connors explained at KubeCon, many customers explicitly said they didn't want a service mesh — they just needed encrypted communication and basic traffic policies. By packaging these capabilities under a simpler identity, Microsoft is meeting teams where they are rather than asking them to adopt an intimidating category.

The philosophy is that once teams start with mTLS and gradually add authorization policies, telemetry, and traffic management, they'll effectively be running a service mesh — but the experience will feel nothing like the complex sidecar-based deployments of the past.

What's Different About Istio Ambient Mode?

Traditional Istio used sidecar proxies injected alongside every application pod. This worked, but created real operational pain. Upgrading Istio didn't upgrade the sidecars — teams had to restart all their application pods to pick up new proxy versions. Connors noted that roughly 85% of ambient installations weren't keeping up with CVE patches under the old model.

Ambient mode changes this architecture fundamentally. Encryption is handled by a per-node ztunnel proxy written in Rust, while Layer 7 features (like HTTP routing and authorization) are handled by independently managed waypoint proxies. The result is that infrastructure upgrades no longer require application restarts, and the resource overhead per pod drops significantly.

The AI Angle: Why This Matters Now

App Net also arrives at a moment when AI workloads are changing what networks need to do. Traditional HTTP routing assumes each request costs roughly the same to serve. That assumption breaks completely with LLM inference, where one request might be trivial and another might consume significant GPU time.

Microsoft is addressing this through the Gateway API's inference extension, which App Net ships with. A small model acts as a token estimator to score request complexity upfront, and token usage in responses feeds rate limits distributed across the cluster. This means platform teams can implement intelligent load balancing that accounts for the actual cost of serving different AI requests.

There's also a governance dimension. Platform teams often provide approved LLM endpoints, but historically had no way to enforce that developers actually used them. App Net can inspect request bodies to identify LLM traffic and enforce routing policies — ensuring requests go to approved model endpoints rather than shadow deployments.

For emerging protocols like MCP and A2A, Microsoft is taking a two-speed approach. Stable networking features live in the core Istio/App Net stack, while cutting-edge AI protocol support flows through Agent Gateway, a Linux Foundation project built by engineers with deep Istio experience.

What This Means for Platform Teams

If you're running AKS today, App Net represents a meaningful reduction in the effort required to achieve encrypted, observable, and policy-driven service communication:

  • Lower barrier to mTLS adoption. Teams that have put off encrypted service communication because of service mesh complexity now have a managed path forward. mTLS comes enabled by default, with Microsoft handling proxy lifecycle management, upgrades, and CVE patches.

  • Unified observability stack. Traffic telemetry flowing into the same Prometheus and Grafana dashboards you already use for CPU, memory, and network metrics means fewer tools to maintain and a single pane of glass for debugging.

  • Multi-cluster readiness. If you're running workloads across multiple AKS clusters — whether for resilience, data residency, or GPU availability — App Net provides a consistent root of trust and communication layer across all of them.

  • AI workload preparedness. As inference workloads land on your clusters, having a networking layer that understands token-based costing and can enforce model endpoint policies will become increasingly valuable.

The Broader KubeCon Context

App Net was one piece of a much larger set of announcements from Microsoft at KubeCon Europe 2026. The broader theme was positioning Kubernetes as the operational foundation for AI infrastructure, with announcements including Dynamic Resource Allocation (DRA) reaching general availability for GPU scheduling, the launch of AI Runway as an open-source inference deployment platform, container network metrics filtering for cost-effective observability, GPU performance metrics in managed Prometheus, and new CNCF Sandbox projects like HolmesGPT (agentic troubleshooting) and Dalec (declarative package building).

Together, these announcements signal that the gap between running containers and running AI workloads on Kubernetes is closing rapidly — and the networking layer is a critical piece of that puzzle.

Getting Started

Azure Kubernetes Application Network is available as a preview feature on AKS. If your team is evaluating service mesh options or looking to add mTLS to existing clusters, this is worth exploring as a managed alternative that avoids the traditional operational overhead.

For more details, check out the Microsoft Open Source Blog post from KubeCon Europe 2026.


Sources: Microsoft Open Source Blog (March 2026), The New Stack, HPCwire, and KubeCon Europe 2026 coverage.