Configure Managed Cloud

Current version: 10.1

This topic describes how to scale, size, and tune your Managed Cloud container solutions. It describes how to find and work with the configuration files in the infrastructure and application repositories.

Manage the size of Azure components

You might want to customize your Azure Kubernetes Service (AKS) cluster size, SQL database, and/or Azure Container Registry (ACR) tier size.

To manage the size of Azure components:

  1. In the Infrastructure repository, go to: .\config\resources\resources.json

    resources.json example
  2. Manage the AKS cluster size, SQL database, and/or ACR tier size by updating the following parameters:




    The Windows VM AKS size.


    The Windows Scaled VM Size. Used for more efficient scaling of Content Delivery and XDBCollection pods.


    The amount of Windows nodes. A minimum of two windows nodes is required to support in-place node upgrades.


    The amount of Windows nodes for scaled resources. Could be set to 0 for some SKU tiers. If the value is 0, scaled pods (cd and xdb collection) are deployed to regular Windows VMs.


    The amount of Linux nodes.


    The node priority for Windows. For production scenarios always use regular.


    SQL pool size in Gb.


    SQL pool SKU capacity.


    SQL pool SKU name.


    SQL pool SKU family.


    SQL pool SKU tier.


    ACR tier size.

Schedule maintenance windows for AKS

You can use Planned Maintenance to schedule maintenance windows for your AKS cluster. Planned Maintenance lets you schedule weekly maintenance windows and minimizes workload impact. Once scheduled, all your maintenance will occur during the window you selected.

To add a maintenance window:

  • In Azure CLI, add the az aks maintenanceconfiguration command:

    az aks maintenanceconfiguration add -g MyResourceGroup --cluster-name myAKSCluster --name default --weekday Monday  --start-hour 1

Tune limits for AKS pods

You can manage the limits of every Sitecore deployment pod in the AKS cluster.

To tune limits for AKS pods:

  1. In the Application repository, open .\config\resources\resources.json. You can see the list of all pods running in the AKS cluster. For example:

    Pods in resources.json example
  2. Tune the pods by updating the following parameters:




    The number of Sitecore replicas.


    The default pod memory.


    The default pod CPU.


    The maximum pod memory limit.


    The maximum pod CPU limit.

Use regular Virtual Machines for nonproduction environments

By default, for nonproduction environments, Azure Kubernetes Service uses the Regular instance type of Virtual Machines. If you think the Regular instance is not appropriate for your nonproduction setup, you must switch the Windows node type to Spot. They are cheaper than regular Virtual Machines and can be evicted at any time. This makes Spot instances ideal for nonproduction test environments, but not so much for production.

To switch the Windows node type from Regular to Spot:

  • Go to config/resources/resources.json and change the windows_node_priority to Spot.

    Windows node priority in resources.json

Add a custom image

To store custom images, Sitecore uses Private Azure Container Registry (ACR). Private ACR is created as part of Sitecore Managed Cloud Infrastructure.

To add an image to Private ACR:

  1. Build a new version of an image based on an existing Sitecore image.

  2. Push your image to Private ACR.

  3. Update the docker-images.json file with the new image.


    To change docker-images.json, you must create a pull request to main.

Update external images

To update external images:

  • Update docker-images.json with a new image version.

The application pipeline runs automatically and applies new images from the file as soon as the main branch is updated.

Deploy new images by running the Application pipeline

The Application pipeline uses a set of images to deploy the Sitecore environment. All image names and locations are specified in the Application repository .\config\docker-images\docker-images.json file. Sitecore uses Ansible to deploy your Docker container images. To deploy, Ansible gathers the images from the docker-images.json file located here:


This file contains a list of images that are required to deploy the Sitecore application.

The docker-images.json file has the following structure:

  "sitecore": {
    "sitecore role name": "{image repository}/{role name}:{image tag}"
  "entity name": {
     "image name": "{image repository}/{role name}:{image tag}"

To update Sitecore images:

  • Go to application\config\ and open the docker-images.json file. You can replace existing roles with your custom images based on existing base Sitecore images.

Add a new infrastructure module

You can create new resources in Azure by adding custom infrastructure modules. To add an infrastructure module, you must create a new Terraform module - a set of terraform configuration files in a single directory.

To add a new infrastructure module:

This example deploys the Azure Log Analytics workspace module. You can use a similar procedure to deploy any Azure resource.

  1. Go to the Infrastructure repository and create a new folder for the module, for example: .\modules\log-analytics-workspace.

  2. In the new folder, create with a resource description and the module name:

    resource "azurerm_log_analytics_workspace" "alaw" {
      name                = var.alaw_name
      location            = var.location
      resource_group_name = var.resource_group_name
      sku                 = var.sku
      retention_in_days   = var.retention_in_days
  3. In the new folder, create with a variables list:

    variable "location" {
      type = string
    variable "resource_group_name" {
      type = string
    variable "alaw_name" {
      type = string
    variable "sku" {
      type = string
      default = "PerGB2018"
    variable "retention_in_days" {
      type = string
      default = 30
  4. In the root folder, edit the original .\ and add the new module and pass the desired variable values:

    Module "alaw" {
      count               = 1
      source              = "./modules/log-analytics-workspace"
      location            = local.location
      resource_group_name = var.resource_group_name
      alaw_name           = "${local.infrastructure_id}alaw"
  5. Complete the pull request and the Infrastructure pipeline is executed automatically and the changes are applied.

    Alternatively, you can run the Infrastructure pipeline from the branch - this will not apply the changes and will only show the planned changes.

Change the Sitecore topology size

By default, all parameters are configured based on the original Sitecore topology size. In the .\sku\ folder, there are sets of predefined Sitecore topology sizes. You can use these configuration files to scale topology sizes.

As soon as you commit changes to the main branch, the Infrastructure or Application pipeline is triggered automatically and applies changes from the file. If you must apply a new topology size, make the relevant changes in the Infrastructure repository first. Wait until the Infrastructure pipeline is completed successfully and then apply the necessary changes to the Application repository..\config\resources\resources.json

To change the topology size:

  • In the Infrastructure repository, copy .\sku\resources.{size}.json and rename the file to resources.json.

Change Sitecore administrator credentials

Before you deploy your Sitecore installation, you must change the administrator password to a strong password. After you change these credentials, you must update the following secrets in the Azure Key Vault:

  • Sitecore administrator username: sitecore-admin-username

  • Sitecore administrator password: sitecore-admin-password

Do you have some feedback for us?

If you have suggestions for improving this article,