Edenic Case Study

HomesUSA - Azure App Services → AKS modernization

Edenic delivered an end-to-end modernization program to migrate distributed Azure App Services and supporting workloads to a secure, scalable AKS platform across DEV, QA/STG, and PROD - with private networking, standardized CI/CD, and production-grade observability.

Client
HomesUSA
Project
Azure App Services → Azure Kubernetes Service (AKS)
Date
2025
Scale
300+ Azure resources assessed
Apps
30+ services containerized & deployed (required set)
Context

Executive summary

A high-signal overview of the business and platform shift.

-HomesUSA ran a large Azure footprint with 300+ resources across App Services, SQL, Storage, Key Vault, App Insights, and networking components.
-The environment faced cost pressure, inconsistent deployments, and scaling constraints inherent to the existing PaaS model.
-Edenic delivered a phased migration to AKS, enabling containerized apps, secure identity, private networking, GitOps CD, and standardized CI.
What changed

Target architecture snapshot

The core platform decisions that unlocked scale and control.

Component → Target solution
App ServicesContainers running on AKS
Function AppsContainers on AKS with KEDA scaling
SecretsAzure Key Vault + CSI Driver
ConfigurationAzure App Configuration
CI/CDAzure DevOps (CI) + ArgoCD (GitOps CD)
MonitoringPrometheus & Grafana (all env) + App Insights (PROD)
NetworkingAzure CNI, Private DNS, Private Endpoints
IngressNGINX Ingress Controller
Certificatescert-manager + Let’s Encrypt
GitBitbucket
RollbacksArgoCD sync history + Helm rollback
Before

Core challenges

Why a platform-level reset was necessary.

-Rising infrastructure cost
-Operational overhead across a large distributed Azure footprint
-Lack of containerization and limited modernization
-Fragmented CI/CD pipelines
-Multi-environment inconsistencies
-Scalability limits with App Services
-Siloed configuration and secrets handling
Intent

Migration goals

The business outcomes mapped to technical bets.

-Reduce cloud spend
-Standardize deployments across DEV, QA/STG, and PROD
-Increase scalability and resiliency
-Implement best-practice identity and networking
-Improve observability and automation
-Establish CI with Azure DevOps and GitOps CD with ArgoCD
Platform model

Environment isolation

Each environment received a complete, independent AKS implementation to avoid cross-environment blast radius.

DEV

-Isolated AKS implementation
-Dedicated VNET, subnets, namespaces, config & Key Vault
-Separate pipeline triggers and ArgoCD project boundaries

QA / STAGE

-Pre-prod validation environment
-Independent network + private endpoints
-Environment-scoped DNS and configuration

PROD

-Private AKS cluster posture
-NAT gateway for controlled outbound
-Full production-grade monitoring with App Insights
Execution

Phased delivery

A structured migration plan designed to de-risk cutover, validate dependencies early, and enforce platform standards.

Phase 0 - Assessment, Discovery & Planning

-Discovery of ~300 Azure resources
-Dependency mapping across App Services, Functions, SQL, Storage, DNS, certificates, Key Vault usage
-Workload criticality and migration priority strategy
-Cutover and rollback plan
-Validated inventory and risk analysis

Phase 1 - AKS & Core Infrastructure Foundation

-Private AKS clusters per environment
-Azure CNI with separated system and workload node pools
-Linux + Windows pools for hybrid workloads
-VNET per environment with dedicated subnets
-VNET peering to VPN and production NAT gateway
-Private endpoints for AKS API, ACR, Key Vault, Storage
-Azure AD RBAC integration
-Workload Identity (OIDC) for pod-to-cloud auth
-Prometheus operator and Grafana dashboards across all env
-Production-grade validation evidence for DNS, ACR pulls, Key Vault CSI mounts, RBAC

Phase 2 - Application Refactoring & Containerization

-Dockerization of required .NET services
-Helm charts for all containerized apps
-Environment-specific values structure
-Liveness/readiness, resource limits, and HPA where applicable
-Azure DevOps CI builds and pushes images to ACR
-ArgoCD GitOps CD deploying Helm releases per environment
-Non-blocking documentation of apps not required for immediate cutover

Phase 3 - Databases & Security

-Full Azure SQL inventory by environment
-Environment-isolated AKS → DB access
-Private endpoint strategy prioritized for PROD
-Connection strings centralized in Key Vault
-PITR and backup posture validated
-DR recommendations and restore-drill guidance

Phase 4 - CI/CD, Security & Observability Hardening

-Standardized CI triggers for develop, release/*, hotfix/*, master
-GitOps guardrails to reduce manifest drift
-Pod security standards and network policies
-Ingress TLS enforcement and trusted registry posture
-Alerting for CPU/memory thresholds and failure patterns

Phase 5 - Testing, Validation & Production Deployment

-Functional testing of key services
-Ingress, routing, secret rotation, DNS checks
-Production cutover using GitOps promotion workflow
-Rollback readiness validated
-Post-deploy telemetry reviewed with stakeholders

Phase 6 - Documentation & Knowledge Transfer

-Deployment manuals and rollback procedures
-Incident response guidance
-Namespace and resource standards
-ArgoCD and Helm operational playbooks
-Hands-on training for platform and app onboarding
Outcome

What was delivered

High-level deliverables safe for public portfolio representation.

-Full modernization path from App Services to AKS with private cluster posture where required
-30+ services containerized and deployed for the migration-critical set
-CI with Azure DevOps and GitOps CD with ArgoCD established across environments
-Key Vault CSI + App Configuration standardized secret and config delivery
-Azure CNI networking with private endpoints and private DNS aligned to least-privilege design
-Prometheus/Grafana across all environments with production App Insights for deep visibility
Business impact

Value delivered

Platform improvements mapped to measurable operational leverage.

Cost Reduction

-Reduced App Service consumption by shifting workloads to AKS
-Consolidated runtime and standardized resource controls
-Removed or avoided redundant PaaS patterns where not needed

Modern DevOps Transformation

-Repeatable multi-environment CI/CD
-Declarative GitOps model for safer releases
-Helm-based versioning and controlled rollbacks

Scalability & Performance

-HPA for service scaling and KEDA for function-style event scaling
-Improved resiliency through Kubernetes restart and scheduling primitives
-Better environment parity for predictable performance testing

Enhanced Security

-Azure AD RBAC for cluster access control
-Workload Identity to eliminate static secrets in pods
-Private endpoints + private DNS to reduce public exposure
-Zero secrets stored in code or pipeline definitions

Operational Efficiency

-Unified observability posture
-Faster deployments with confidence-backed rollbacks
-Cleaner onboarding path for new services
Tooling

Technology stack

The core services and patterns used to deliver stability, security, and repeatability.

Azure Kubernetes Service (AKS)Azure CNIAzure DevOps (CI)ArgoCD (GitOps CD)HelmNGINX Ingress Controllercert-manager + Let’s EncryptAzure Key Vault + CSI DriverAzure App ConfigurationAzure Container Registry (ACR)Prometheus OperatorGrafanaApplication Insights (Production)External-DNS
Snapshot

Engagement facts

A clean reference block for quick scanning.

Client
HomesUSA
Project
Azure App Services → Azure Kubernetes Service (AKS)
Date
2025
Scale
300+ Azure resources assessed
Apps
30+ services containerized & deployed (required set)

Note: This case study intentionally excludes internal endpoints, credentials, private repository links, or client-only access details.

Want this level of migration for your platform?

Edenic helps teams modernize PaaS-heavy Azure estates into secure, scalable Kubernetes platforms with GitOps, private networking, and production-grade observability.

Typical engagement includes assessment, target architecture, phased migration, CI/CD standardization, and cutover/rollback planning.
Ask for an Edenic migration blueprint tailored to your current Azure footprint.