HAProxy: The Reference Architecture for High-Performance Load Balancing & Traffic Control
TL;DR The load balancer is the front door to your infrastructure. Relying on standard cloud services like the AWS Application Load Balancer (ALB) …
Stay up to date with our latest articles about cloud-native technologies, Kubernetes, and DevOps.
TL;DR The load balancer is the front door to your infrastructure. Relying on standard cloud services like the AWS Application Load Balancer (ALB) …
TL;DR The Container Registry is the heart of your software supply chain. Trusting cloud services like AWS ECR blindly treats your images merely as …
TL;DR In a multi-cloud world, security is not about location, but identity. Relying on cloud-specific tools like AWS Secrets Manager fragments your …
TL;DR Security often fails due to usability. While tools like HashiCorp Vault are powerful but operationally complex, and AWS Secrets Manager exists …
TL;DR IoT sensors, application metrics, and financial data have one thing in common: they are time-based and generated in massive quantities. …
Retail is faster than ever today. A new trend on social media, a sudden strategic shift by the competition, or the introduction of a new payment …
The vision of “Omnichannel Retail” sounds perfect in theory: order online, pick up in-store (Click & Collect), digital price tags …
The Era of US Dominance Is Over Yesterday, the European Parliament made a decision that goes far beyond the usual Brussels symbolic politics in its …
In modern retail, the fiercest competition no longer takes place on the shelves, but at the data level. Understanding what the customer will want …
It’s the nightmare of every e-commerce manager and retail CTO: Black Friday is approaching, marketing campaigns are in full swing, and just at …
In retail, timing is ruthless. A system failure on a Saturday afternoon, during the peak sales hours, is not just an “IT problem” for a …
With Polycrate CLI 0.29.15, we have resolved the root cause of a persistent bug where endpoints with tls: false were not correctly serialized into the …
Polycrate CLI version 0.29.13 introduces debug logging for operator startup and an important NetworkPolicy fix. Startup Debug Logging Previously, …
With version 0.29.14, we have implemented two important bug fixes in the Polycrate Operator that significantly enhance the reliability of backup …
Polycrate API 0.11.23 introduces crucial fixes for API key authentication and enhances contact management. API Key Authentication Fix User API keys …
Polycrate CLI version 0.29.12 addresses critical operator stability issues and corrects debug logging. Operator Startup Fix The operator was being …
Polycrate CLI version 0.29.11 enhances the diagnosis of TLS issues in API-managed endpoints. TLS Type-Cast Debug Logging In API-managed endpoints, …
Considering Real Observability Needs Observability determines how well systems can be understood, operated, and evolved. It is not an add-on for …
Service or Architectural Decision? CI/CD is often treated as a tool question: Which service, which pipeline, which provider? In reality, CI/CD is an …
Identity Management as a Control Instrument or Open Infrastructure Identity management is far more than just login and user administration. It …
Storage as a Cloud Feature or as a Controllable Platform Persistent storage is one of the most inconspicuous yet powerful layers of modern platforms. …
Certificates as a Cloud Service or as Part of the Platform Architecture TLS certificates are often considered a necessary security detail. However, …
Data Warehouse as a Cloud Product or as an Open Analytical Platform Analytical data is no longer just an appendage to reporting. It forms the basis …
Secrets as a Cloud Service or as Part of the Kubernetes Platform Secrets are among the most sensitive components of modern applications. Credentials, …
Pipeline Orchestration or GitOps as an Operational Model CI/CD is often treated as a tool question: Which pipeline, which runner, which service? In …
Version Control as a Cloud Component or Platform Core Version control is often reduced to a technical minimum: store code, track changes, done. In …
Monitoring as a Cloud Function or as an Open Observability Layer Monitoring and Observability have long surpassed being mere operational tools. They …
Traffic Control as a Cloud Service or as a Controllable Platform Component Load balancers are the silent foundations of modern infrastructures. They …
Container Registry as a Cloud Service or a Controllable Platform Component Container registries may seem like a technical detail at first glance. …
Secret Management as a Cloud Function or as a Standalone Security Architecture Secrets are not a fringe topic. Credentials, API keys, tokens, and …
Secrets as a Hyperscaler Service or as an Open Developer Security Platform Secrets are among the most inconspicuous yet critical components of modern …
Managed Convenience vs. Technical Control AWS Timestream and InfluxDB solve the same fundamental problem: efficiently storing, querying, and …
Consume or Control Infrastructure AWS MSK and Apache Kafka do not compete on a feature level. They represent two fundamentally different approaches …
Identity as a Service or as Infrastructure Azure Entra ID and Keycloak address the same core issue: managing identities, controlling access, and …
Observability as a Service or as Your Own Infrastructure Azure Monitor and Loki take two fundamentally different approaches to monitoring and logging. …
Buying Dependency or Building Resilience Block storage is one of the invisible yet most critical layers of any cloud and Kubernetes architecture. …
Consuming or Mastering Databases AWS RDS and MariaDB do not represent competing products but rather two fundamentally different models for handling …
Consuming or Controlling Object Storage On paper, AWS S3 and MinIO fulfill the same technical task: providing highly available, scalable object …
Why API Compatibility Is Not a Database Strategy AWS DocumentDB and MongoDB are regularly equated. The reason is quickly stated: Both are supposed to …
Polycrate CLI version 0.29.10 focuses on security, bringing comprehensive Kubernetes hardening for the Operator according to NIST SP 800-190 and CIS …
Polycrate API 0.11.22 fixes the LoadBalancer metrics query. The detail UI now shows correct bandwidth data. LoadBalancer Metrics Fix The LoadBalancer …
Polycrate API 0.11.21 addresses two critical issues: S3 buckets with Ceph backend now display correct storage metrics in the detail UI, and the …
With Polycrate API 0.11.17, we enhance the diagnostic capabilities for the timeline charts in the detail UIs. The Problem After the 0.11.16 release, …
Polycrate API 0.11.20 fixes a JavaScript error and adds debug logging to identify the cause of empty timeline data. Fix: Chart resize TypeError In the …
Polycrate API 0.11.19 enhances the S3 Bucket Table UI with Storage and Objects columns and introduces consistent bar charts for all timeline …
With Polycrate API 0.11.16, we address two critical bugs that could occur in production environments. 🔥 S3 Bucket Reconciliation Fix The Issue: S3 …
Polycrate API 0.11.18 fixes a critical error in timeline data extraction and changes the chart style to bar charts. Hotfix: timezone.utc …
With Polycrate API 0.11.15, we resolve the last remaining collectstatic error in production environments. KaTeX/LaTeX Removed The Milkdown Editor CSS …
With Polycrate API 0.11.14, we address two critical bugs that could occur in production environments. Certificate API Upsert The Polycrate Operator …
With Polycrate API 0.11.13, we address critical production issues that emerged after the 0.11.12 release. collectstatic Fix The milkdown-theme/ …
Managed Cache or Controlled Data Structure AWS ElastiCache and KeyDB address the same need: extremely fast in-memory data storage for caching, …
Polycrate API Version 0.11.12 brings extensive UI modernization with the new Milkdown Editor, S3 Media Storage, and significant performance …
TL;DR Kubernetes clusters should not be managed manually or with fragile scripts. While AWS CodePipeline tries to enforce deployments through external …
TL;DR Modern software development requires more than just code hosting. While hyperscalers like AWS attempt to lock developers into their platforms …
TL;DR Classic browser-based tracking (‘Client-Side’) is dying. Browser restrictions (ITP), AdBlockers, and GDPR make data collection …
TL;DR PDF generation is often a technical debt in modern web development. Outdated tools like wkhtmltopdf are no longer maintained, and embedding …
TL;DR In modern distributed systems, it’s no longer enough to just know if a server is up or down. You need to understand why it’s slow. …
Polycrate API version 0.11.11 delivers massive performance improvements by removing the unused discovery phase and optimizing activity tracking. …
Polycrate API version 0.11.10 addresses several UI bugs and performance issues in the endpoint monitoring system. Highlights Agent Detail Lazy Loading …
Polycrate CLI version 0.29.9 brings significant improvements to endpoint monitoring with a complete redesign of Agent Health data. Agent Health Data …
The classic SaaS model is simple: one cloud, one architecture, all customers share the resources. However, as a SaaS provider becomes more successful …
In the growth phase of a SaaS company, there is a dangerous curve: the Cost of Goods Sold (COGS). As user numbers increase, cloud costs often explode …
How Sovereign is Europe’s Data Really? Amazon Web Services is putting the “AWS European Sovereign Cloud” into operation in …
Polycrate API version 0.11.7 corrects the representation of host objects. Host String Representation The base model ManagedObject uses display_name as …
Polycrate API version 0.11.6 addresses critical validation errors that prevented updates via the operator. UniqueValidator Fixes K8sApp Block …
With version 0.29.7, Polycrate receives important bug fixes for the operator’s API communication. API Schema Update The API client has been …
Polycrate CLI version 0.29.8 significantly improves error diagnosis for all API operations. Enhanced API Error Diagnosis All 42 API client functions …
With version 0.11.5, the Polycrate API receives important bugfixes and UX improvements. Tables now refresh faster, and objects can be directly …
With version 0.29.6, Polycrate receives a critical bug fix: The operator was unable to synchronize K8sApp objects with the API. The Problem The …
With version 0.11.4, the Polycrate API receives extensive UI improvements for better clarity and faster navigation. The new Dynamic Tables, Info …
The promise of the cloud has always been flexibility. Yet, the reality in many IT departments is different: Vendor Lock-in. Those who build their …
Operating a modern IT infrastructure today often feels like being a mechanic who needs a different workshop for every screw. We use Terraform for …
TL;DR Secrets (API keys, database passwords) do not belong in Git code, but their runtime provisioning is often complex. Integrating AWS Secrets …
TL;DR Data is the new oil, but traditional data warehouses (like AWS Redshift) are often expensive, sluggish refineries. ClickHouse has revolutionized …
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies (iptables). While AWS provides a solid base …
TL;DR Encryption is mandatory, but managing it is often a nightmare. While AWS Certificate Manager (ACM) offers free certificates, they are …
TL;DR Storage has traditionally been the heaviest “anchor element” in cloud architecture. Using AWS EBS or S3 ties your data physically …
TL;DR Authentik redefines identity management: moving away from proprietary cloud silos towards a unified identity layer. As an open-source solution, …
Until now, monitoring was often a compromise: Those who wanted to know exactly what was happening in their applications had to install …
In the traditional server world, the mantra was: “Better too much RAM than too little.” In Kubernetes, this mindset leads directly to a …
Imagine getting the same computing power for 70% to 90% less cost. The catch? The cloud provider can take the server away from you at any time with …
TL;DR ArgoCD has established itself as the industry standard for Continuous Delivery in Kubernetes. By implementing the GitOps paradigm, it …
FinOps in Kubernetes - 20 Answers 1. Why is the standard cloud bill for Kubernetes costs unusable? Cloud providers issue bills for instances (VMs). …
The classic Horizontal Pod Autoscaler (HPA) of Kubernetes is like a thermostat: When the room gets too warm (CPU > 80%), the air conditioning …
“Base64 is not encryption.” This phrase should be displayed prominently in every platform engineering team. Default Kubernetes Secrets …
In 2026, compliance is no longer a “paper tiger.” With regulations like the Cyber Resilience Act or certifications such as ISO 27001 and …
“We can’t move that to the cloud, it’s a monolith.” We hear this sentence often. However, modernization in 2026 doesn’t …
For a long time, Kubernetes was considered the operating system for the “big” data center. But in 2026, the most exciting developments …
When companies invest in Platform Engineering, 90% of resources often go into technology: Kubernetes clusters, CI/CD pipelines, and security …
In the traditional IT world, budgeting was simple: you bought a server, depreciated it over five years, and recorded the costs as a fixed expense. In …
Imagine buying a ready-made meal at the supermarket without an ingredient list. For years, this was the standard in software development: we download …
Many IT managers in medium-sized businesses feel secure because they “do backups.” However, in a serious incident—such as a massive cloud …
With version 0.29.5, Polycrate receives a critical bug fix: Endpoints with wildcard hostnames like *.example.com can now be correctly synchronized …
With version 0.11.3, the Polycrate API addresses a critical bug in the K8sCluster filter that impacted operator communication. The Problem The …
With version 0.29.4, Polycrate receives critical bug fixes for the operator: Correct cluster detection with workspace UUIDs, automatic TLS port …
In the IT world of 2026, sustainability is no longer just a marketing buzzword. With the expansion of EU reporting obligations (CSRD), IT …
When an AI model leaves the training phase, the real challenge begins: productive inference operation. Serving a Large Language Model (LLM) in a …
With version 0.29.3, Polycrate introduces Host SSH-Agent Auto-Mount for seamless Git operations within the container, branch-aware Git commands, and …
In a Retrieval Augmented Generation (RAG) architecture, the vector database (Vector DB) is the core component. It provides the Large Language Model …
Anyone operating traditional microservices knows: metrics, logs, and traces are the lifeline. However, conventional monitoring approaches hit their …
Europe likes to see itself as a global guardian of data protection and fundamental rights. GDPR, NIS2, AI Act – the regulatory claim is high, the …
With version 0.11.1, the automatic Alert Notification Loop in the Polycrate API is temporarily disabled. This is a patch release aimed at controlling …
The introduction of Artificial Intelligence in small and medium-sized enterprises has opened a new security front. When we train LLMs or build RAG …
Integrating an NVIDIA H100 or A100 into your cluster today quickly reveals that the classic 1-to-1 allocation (one pod reserves an entire GPU) often …
The excitement around Large Language Models (LLMs) and generative AI has brought a fundamental question back to IT departments: How do we scale …
In the past two years, “Internal Developer Platform” has become a buzzword. However, while Gartner praises the IDP as a remedy for …
When discussing the shift to Cloud-Native and Kubernetes, we often focus on architecture, providers, and costs. However, the most critical variable …
For critical applications, “down-time” is no longer just a technical issue for medium-sized businesses, but a direct business risk. …
We don’t need to explain that FinOps is the answer to uncontrolled cloud spending. The challenge for IT decision-makers in medium-sized …
Kubernetes has long been the standard when it comes to scalable and highly available software platforms. Anyone wanting to operate Kubernetes in the …
The decision by the state government of Schleswig-Holstein to consistently switch its administration to open source software is more than a political …
Digital sovereignty has long been part of every public sector digital strategy. However, the Sovereignty Barometer of public IT by next:public shows …
Current reports of massive data leakage from self-hosted Owncloud, Nextcloud, and ShareFile instances are technically unspectacular – and that is …
Almost every modern company is working on an AI strategy today. Whether it’s Large Language Models (LLMs), image recognition in quality …
With version 0.11.0, the Polycrate API gains two key new features: Downtime Detection & Logging for automatic capture and SLA tracking of service …
“The cloud grows with your needs.” This promise is both a blessing and a curse. For growing businesses, cloud scalability is essential to …
Zero Trust in Production: Why the Firewall Alone Is No Longer Enough For decades, the security strategy in industry was clearly defined: A strong …
With version 0.29.2, Polycrate receives an important bugfix release with corrections for the Kubernetes Operator and critical panic fixes. Operator: …
The grace period for cybersecurity in the industry is coming to an end. With the new EU directive NIS2 (Network and Information Security Directive), …
Avoiding Production Downtime: How Self-Healing Infrastructures Relieve OT In the world of Operational Technology (OT), equipment availability is the …
In modern software development, “always online” is the standard paradigm. However, in industrial manufacturing (OT), healthcare, or …
A portal for more security – on an insecure foundation? With the launch of the central BSI portal for NIS2 reports, the Federal Office for …
With version 0.29.1, Polycrate receives an important maintenance release with an Ansible upgrade for kubernetes.core compatibility. Python & …
A critical analysis of digital sovereignty in Germany and Switzerland While European governments emphasize the importance of digital sovereignty in …
Germany in Third Place – But Not in Patching Shortly before the end of 2025, what had long been practice became known: Over 11,500 MongoDB instances …
The announcement by Kubernetes SIG Network to retire Ingress-NGINX was not an operational accident. It was the result of years of structural overload …
In the software world, “Continuous Delivery” is standard. However, in the industrial sector, the reality is often different: Updates for …
Making Legacy Machines Cloud-Ready: Retrofitting with Container Gateways In many German factories, the backbone of our industry stands strong: …
In theory, the cloud sounds like the perfect solution for everything. In the practice of industrial manufacturing, however, it often reaches its …
Cloud-Native Without Cloud Lock-in: Why Portability is the New Security When discussing modern IT infrastructure today, it’s impossible to …
In modern manufacturing, the question is no longer if data is collected, but how it can be used efficiently. While machines (OT – Operational …
With version 0.29.0, Polycrate receives significant improvements for the Kubernetes Operator and integrated CLI tools. Operator Auto Workspace …
With version 0.28.0, Polycrate receives its most comprehensive feature update yet. Three core areas are in focus: secure workspace encryption, an …
What Operators Face Now – and Which Alternatives Are Truly Viable MinIO has put its Community Edition into maintenance mode. The note in the README …
Nextcloud stands for digital independence, European data protection standards, and an open, trustworthy alternative to US-based collaboration …
How Seemingly “Sovereign” Cloud Offerings Disguise Dependencies – and What ZenDiS Clarifies Digital sovereignty has taken a firm place in …
With the new digital strategy, Bavaria wants to technically mesh state and municipalities more closely, reduce IT security risks, and build a uniform …
The recent outages of central internet services have not only disrupted websites and APIs. They have revealed a structural problem that has been …
Germany has transposed the European NIS2 directive into national law with considerable delay. The late implementation alone would already be …
Kubernetes SIG Network and the Security Response Committee have announced the official end for Ingress NGINX. The component, which for years was …
Containers are the backbone of modern cloud infrastructure. They offer developers and ops teams unmatched agility and efficiency, based on the …
The US government has been demanding a comprehensive agreement on access to biometric police data from Europe for several years. The basis is the …
Evasion Attacks on LLMs: A BSI Guide to Defending Against Prompt Injections and Jailbreaks Large Language Models (LLMs) have become established in …
The rapid development of Artificial Intelligence, particularly Large Language Models (LLMs) like Google Gemini or OpenAI’s ChatGPT, has the …
TL;DR Starting point is a multi-tenant Django SaaS application, which is taken from the first line of code to production operation on the ayedo …
TL;DR Multi-Tenant deployments consolidate many customers in a shared environment with logical isolation (e.g., via namespaces), enabling economies of …
TL;DR Managed Backing Services on the ayedo SDP shift the focus from operations to usage: PostgreSQL, Redis/Valkey, and Kafka are available as robust, …
TL;DR Polycrate is an Ansible-based framework for deployment automation that containerizes all necessary tools, enabling reproducible deployments …
Kubernetes Make or Buy – Considerations for Decision Makers In few other technology sectors is there such passionate debate about self-management …
Kubernetes is the Operating System of the Sovereign Cloud Few technologies have fundamentally transformed modern IT as much as Kubernetes. Originally …
Delos Cloud vs. Stackit Workspace – Wolves in Sheep’s Clothing The discussion around digital sovereignty in Germany and Europe is in full …
Cloud Brokering for True Sovereignty The discussion about digital sovereignty in Europe is old, but it is more relevant than ever. Especially since …
Docker Swarm is Not Kubernetes for Beginners When discussing container orchestration today, two terms quickly come up: Docker Swarm and Kubernetes. …
DevOps Still Isn’t Working Why ego, responsibility, and reality continue to thwart the dream of ‘shared ownership’. Over a decade …
Docker Here, Docker There – I’m Going Back to the Old Ways You hear it more and more often, half-serious, half-annoyed: “Docker here, …
In many discussions with IT leaders, sysadmins, and architecture decision-makers, a recurring pattern emerges: The question of “Swarm or …
Many people nod knowingly when the conversation turns to “containerization” or “virtual machines” – but honestly: those who …
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear severity levels, thoughtful routing, and …
TL;DR Observability is based on three pillars – metrics, logs, and traces – and is translated into a practical monitoring model for modern, often …
The International Criminal Court (ICC) in The Hague is taking a significant step in response to recent political tensions with the USA: it is ending …
The European AI Act, the first comprehensive regulation for artificial intelligence worldwide, was originally set to come into full effect by August …
The German Research Foundation (DFG) has sent a clear message: it is launching a funding program to retrieve endangered research data from foreign …
TL;DR Guardrails are automated guidelines around your deployments: They prevent typical misconfigurations, enforce security by default, and enhance …
TL;DR GitOps describes an approach where Git serves as the central, versioned source for the desired state of your infrastructure and applications; …
TL;DR Secrets in Git, classic Kubernetes secrets, and manual processes are no longer sufficient for zero-trust requirements and modern regulations. …
TL;DR A modern container registry is now a central compliance tool, especially in the context of the Cyber Resilience Act, NIS-2, and DORA. Harbor …
TL;DR Traditional container builds with Docker Daemon, root privileges, and docker.sock in CI systems pose an unnecessary security risk—especially …
With the award ceremony at the Smart Country Convention (SCCON) on October 2, 2025, the open-source movement in public administration celebrated a …
TL;DR GitLab CI/CD is much more than a build tool: When used correctly, it becomes the central backbone of your delivery process – from commit to …
The introduction of AI browsers like OpenAI’s ChatGPT Atlas and Perplexity Comet marks the beginning of a new era in human-computer …
TL;DR GitOps with ArgoCD anchors the desired state of your applications and infrastructure in Git, making deployments reproducible, auditable, and …
TL;DR GitLab CI/CD becomes the central orchestrator of your delivery workflow: clearly structured stages (build, test, package, deploy) make your …
Starting December 2025, Microsoft will enhance its collaboration platform Teams with a feature that automatically detects the actual work location of …
TL;DR ohMyHelm is a universal Helm chart wrapper that delivers production-ready workloads without requiring teams to maintain their own templates – …
TL;DR Delivery Operations describe the journey from code in your version control to running workloads in production – including build, test, …
TL;DR Velero is a mature open-source tool for backups, migration scenarios, and disaster recovery in Kubernetes environments – making it a central …
TL;DR Kyverno is a Kubernetes-native policy engine that allows you to define security and operational policies directly as YAML and enforce them …
TL;DR Keycloak is a mature open-source Identity & Access Management (IAM) solution that supports modern protocols like OAuth2, OpenID Connect …
TL;DR Modern compliance requirements like NIS-2, DORA, and GDPR demand robust, verifiable observability: metrics, logs, and traces must be …
TL;DR Harbor is an open-source container registry (CNCF Graduated Project) that combines registry functionality, security scanning, SBOM generation, …
TL;DR Cilium leverages eBPF to execute network functions directly in the Linux kernel, enabling high-performance, identity-based networking for modern …
TL;DR The ayedo Kubernetes Distribution offers two distinct operational variants: Loopback for European public clouds and a k3s-based solution for …
TL;DR The ayedo Software Delivery Platform combines a production-ready Kubernetes distribution, the automation framework Polycrate, and the Helm …
TL;DR Deterministic security checks in the cloud-native environment are based on three pillars: Policy as Code, automated CVE scanning, and SBOM …
TL;DR The Cloud-Native community has established a comprehensive “software logistics” system with OCI, Helm, and the Kubernetes API: …
The Trojan Horse of the “Sovereign Cloud” Why Europe’s new sovereignty is often just American-painted The meme is brilliant in its …
Many confuse Open Source with sovereignty. Both are interconnected – but one does not automatically guarantee the other. The well-known XKCD meme, …
TL;DR The Cloud Sovereignty Framework of the EU defines what digital sovereignty aims to achieve – the 15-Factor App principles define how a concrete …
The Germany Stack and the Reality of Modern Cloud-Native Development: Digitization is no longer a buzzword – it is a foundation, a competitive …
TL;DR The modern Software Development Lifecycle (SDLC) is based on cloud-native architectures, automated pipelines, and a clear separation of …
TL;DR Extending the classic 12-Factor-App with factors 13–15 (API First, Telemetry, Auth) is not a “nice-to-have” but a prerequisite for …
TL;DR Factors 7–12 of the 15-Factor-App primarily address operations, scaling, and maintainability—exactly where modern container platforms like …
TL;DR Factors 1–6 of the 15-Factor App define the internal lifecycle of an application: from the codebase through dependencies and configuration to …
GitHub will migrate its entire infrastructure to Microsoft Azure within the next 24 months. This information comes from internal documents reported …
What initially seemed like a manageable incident has now officially turned into a complete loss of control: The firewall manufacturer SonicWall has …
TL;DR Heroku’s 12-Factor App set a clear standard for cloud-compatible applications in 2011 – the 15-Factor App extends this foundation with …
The Localmind Case: What Happens When Security Promises Are Not Kept The self-description was promising: “Local & secure AI platform for …
TL;DR The European regulatory landscape is intentionally interconnected: The GDPR forms the foundation, upon which NIS-2, DORA, Cyber Resilience Act, …
New Standards for Compliance and European Cloud Sovereignty Effective immediately, ayedo customers have access to another powerful cloud provider: …
When Google quietly removed the “num=100” parameter from its search engine logic, hardly anyone outside the SEO bubble noticed at first. …
The announcement initially sounded like just another technical partnership in the era of generative AI: OpenAI and AMD have agreed on six gigawatts …
TL;DR The EU’s Cloud Sovereignty Framework makes digital sovereignty precisely measurable for the first time – through eight sovereignty …
The reason given: The storage structure was too large, the transfer rates too slow. A declaration of bankruptcy. Anyone who decides not to maintain …
TL;DR The Data Act comes into effect on September 12, 2025, making data portability, cloud switching, and interoperability mandatory requirements – …
On October 5, 2025, it was revealed that an external support provider for the platform Discord was the target of a cyberattack. Personal data of …
With the pilot project to introduce the AI assistant F13, Saarland is taking a remarkably clear path towards a digitally sovereign administration. …
TL;DR The Cyber Resilience Act (CRA) mandates manufacturers of “Products with Digital Elements” (PDE) to demonstrate cybersecurity …
TL;DR On January 17, 2025, the Digital Operational Resilience Act (DORA) will come into effect for financial institutions and key ICT service …
TL;DR NIS-2 expands the scope of EU cybersecurity regulation to 18 sectors, primarily involving medium and large companies in critical and important …
TL;DR The GDPR has required since May 25, 2018, that personal data be protected according to the “Privacy by Design” principle – …
Bonify and the Loss of Digital Identity On October 1, 2025, a data protection incident came to light that further shook trust in the digital credit …
TL;DR The EU has established a coherent framework with GDPR, NIS‑2, DORA, CRA, Data Act, and the Cloud Sovereignty Framework, systematically enhancing …
Cloudflare is far more than just a CDN provider. In addition to performance optimization and security features, the platform offers numerous tools …
Why the DNA Redefines Europe’s Digital Foundation With the Digital Networks Act (DNA), the EU is preparing one of the most profound reforms of …
Title: OpenAI for Germany – Digital Sovereignty with Azure as the Foundation? Markdown-Content: On September 24, 2025, SAP and OpenAI announced a new …
Title: OpenAI and Nvidia: $100 Billion for the AI Arms Race Markdown-Content: The Reuters report is making waves: Nvidia plans to invest up to $100 …
Why Hyperscalers Only Sell Hardware – and MSPs Are the Future Hyperscalers have shaped the digital world like few other models. With the promise of …
When discussing digital sovereignty and modern IT infrastructures today, Kubernetes is unavoidable. In just a few years, this open-source project has …
Sovereignty Through Architecture Cloud-native software development is more than just a set of methods. It describes a paradigm that designs …
A critical look at CVE-2025-55241 On September 18, golem.de reported a security vulnerability in Microsoft Entra ID, discovered by security …
The news is making waves: Several npm packages from CrowdStrike – a company known for security and protection – have been compromised. What might …
In recent years, Cloud First has been considered an almost unshakeable maxim. Companies of all sizes were encouraged to move their infrastructure to …
The European Union is on the verge of enacting one of the most profound intrusions into digital privacy since the inception of the internet. The …
Since September 8th, concrete evidence has emerged that a number of extremely widespread NPM packages — including debug, chalk, ansi-styles, …
Starting Point: Quarterly Figures and Big Promises At the end of July 2025, Meta released its latest quarterly figures – alongside strong revenues …
The security of software supply chains is one of the central topics in IT security today. Companies are under increasing pressure to ensure …
Storage in Kubernetes is by no means trivial. Stateful workloads impose the highest demands on stability, performance, and availability—handling …
The security of the software supply chain is one of the central topics in modern software development. With every new dependency, external artifact, …
Kubernetes has become the de facto standard for operating cloud-native applications. However, with its flexibility comes immense complexity. In …
Internal Developer Platforms (IDPs) have been a hot topic in software development for several years. Companies face the challenge of managing complex …
The debate about sovereignty in the cloud in Europe often revolves around the question: Do we need our own hyperscalers to be independent? Many see …
The European debate on “sovereign AI” is often reduced to regulation, data protection, and societal acceptance. What is often overlooked: …
Kubernetes v1.34: Precision, Security, and Maturity Kubernetes continues to grow – with version 1.34, the next major release is here. The cycle …
Operating databases in Kubernetes was long considered risky: Stateful workloads, persistent data, and container orchestration seemed incompatible. …
Kubernetes has become the standard for running containerized applications in recent years. As its adoption grows, so does the need to monitor …
Kubernetes has provided proven mechanisms for years to manage incoming traffic into a cluster. Ingress controllers serve as a defined …
Spoiler Alert: Yes, it is – and it’s not only possible but already a standard in many enterprise environments. Does .NET Fit with Kubernetes? …
The transition from OTRS to Zammad is more than just a technical upgrade for many organizations – it’s a step towards a sovereign, modern, and …
The fact that the Bundeswehr will store its data in the Google Cloud is not an IT project. It is a security policy capitulation. Just like the …
Starting November 1, 2025, Microsoft will eliminate traditional volume licenses. Specifically affected are the major licensing models Enterprise …
In industries like manufacturing, finance, or critical infrastructures, automation is not a “nice-to-have” but a mandatory necessity. …
Summary in Three Points Controlplane on demand: With k3k, you can run a fully-fledged k3s control plane as a Kubernetes workload – without agent …
In a world where cloud-native architectures, remote development, and complex multi-cluster infrastructures have become the norm, traditional …
The Invisible Foundation of Modern Software Cloud-native software development is built on a foundation that usually remains invisible: artifacts. …
Developer Platforms by ayedo: Tailored, Flexible, and Future-Oriented At its core, Developer Platforms enable teams to guide software securely, …
How companies can make their GPU-Kubernetes environments secure, compliant, and efficient for AI development using tools like Kyverno, Vault, and …
GPUs in Kubernetes: Practical Guide for H100, MIG & Time-Slicing How to securely, efficiently, and cloud-natively provision GPU resources for …
The numbers are impressive – and alarming: Over an unsecured Elasticsearch database, 324 million log entries from the streaming platform MagentaTV …
An AI influencer is not a human who spontaneously decides whether to post a video or a post today. An AI influencer is a digital persona, fully …
Kubernetes has evolved from an experimental playground to the de facto standard for cloud-native applications in recent years. Its flexibility and …
Sometimes a single sentence is enough to reveal the political reality in all its bitterness. In this case, it is: “The tariff deal with the USA …
The celebration over the recent “deal” between the EU and Donald Trump seems like a macabre staging. While Brussels publicly celebrates …
Palantir in Germany is more than just a software provider. It symbolizes a quiet shift in the state: away from democratic control, towards …
It was a long tug-of-war – now there’s a deal. The EU and the USA have reached a last-minute compromise in the tariff conflict. What initially …
For a long time, digital transformation was considered a technical project: faster, more scalable, more efficient. Those who ventured into the cloud …
Why security vulnerabilities are not just technical risks but should provoke political decisions The newly discovered security vulnerability …
An Oath of Disclosure – in the Truest Sense of the Word We’ve suspected it for a long time, it was downplayed, relativized, dissected in …
One year after the enactment of the Online Access Act 2.0, the results are sobering. The big promises remain, but noticeable progress for citizens …
70% of European companies consider their dependency on non-European technology too high. This is not a gut feeling, but the result of the current …
On October 14, 2025, regular support for Windows 10 will end. What initially appears to many IT departments as a manageable maintenance date reveals …
A sober look at the average IT infrastructure in German companies reveals that the technological needs are mostly manageable. Active Directory, SQL …
The European Union celebrated itself as a pioneer in regulating digital platforms. With the Digital Markets Act (DMA), it aimed to make a statement: …
A software developer, 22 simultaneous jobs, a scandal: The Soham Parekh case reads like a script for a sequel to “Catch Me If You Can.” …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
New Features for More Control, Security, and Flexibility On July 1st, our sister company Loopback released a comprehensive update to their cloud …
How the AI Service Desk of the Federal Network Agency Guides Companies into the Future The European AI Regulation (AI Act) is a milestone: It creates …
Digital administration in Saarland is at a standstill. Only 29% of administrative services have been digitized under the Online Access Act (OZG) …
Saarland ranks last in the current Bitkom Länderindex 2024 in the “digital administration” category. Only 29% of the digital …
In industries where systems must operate with utmost reliability and stringent performance requirements, such as telecommunications, high-performance, …
Why this alliance is a turning point for Europe’s digital self-determination The headline may seem unremarkable, but its content is not: Two …
What Microsoft’s new Sovereign Cloud really means – and what it doesn’t Microsoft has delivered. At least at first glance. With the …
by Leon, 8th Grade I spent three weeks at ayedo – and honestly: The internship was much better than I had imagined. I didn’t just watch; I …
How SAP Evades Responsibility – and What It Reveals About the State of the German Tech Industry On June 21, 2025, the Tagesspiegel published an …
A security incident is systemic when it repeats, scales, and becomes normalized. The current data breach with over 16 billion compromised credentials …
Why Managed Kubernetes with Hyperscalers Doesn’t Lead to Digital Sovereignty Kubernetes has established itself as the de facto standard for …
Satya Nadella introduced a new “Sovereignty Program” for European Microsoft customers in Amsterdam. Three cloud models, Hardware Security …
Everyone is writing software with AI now. Prompt in, code out. A few lines of Typescript here, a Dockerfile there, and somehow everything flies. …
Cyber risks are increasing. Requirements are rising. And to be taken seriously as an IT service provider, you need more than just good technology. At …
With the announcement of macOS 26 (“Tahoe”), Apple quietly but fundamentally reshuffles the cards in the DevOps landscape. For the first …
Vendor lock-in refers to the technically, economically, or legally restricted ability to switch an IT service provider or platform vendor without …
Net neutrality means: All data on the internet is treated equally. Period. It doesn’t matter whether they come from a corporation, a research …
Digital sovereignty refers to an organization’s ability to manage its digital systems, data flows, and technical dependencies in a way that …
Cloud infrastructure has its justification. Scalability, automation, and globalization of IT resources are now standard. Technically, the major …
Modern generative AI and large language models (LLMs) present unique traffic management challenges for Kubernetes. Unlike typical ephemeral, stateless …
Introduction to Managing Sidecar Containers in Kubernetes In the world of Kubernetes, Sidecar containers are useful helpers that extend …
AI in the Classroom: Opportunities and Challenges for the Future of Education The debate around the use of Artificial Intelligence (AI) in education …
Today, every support request influences customer satisfaction, loyalty, and long-term business success. Unstructured processes, lost tickets, and …
We are excited to announce the general availability of Gateway API v1.3.0! Released on April 24, 2025, this version brings exciting new features. …
The Forgotten Vulnerability in Your CI/CD Pipelines: The Registry Everyone talks about build pipelines, deployment automation, GitOps, blue/green …
When running applications in production, you don’t need pretty dashboards, but hard data. Performance issues never arise when there’s …
The question keeps coming up. Development teams deliver features, optimize releases, build clean architectures — yet they still get stuck in …
Everyone is talking about AI, Large Language Models, inference pipelines, custom LLMs, and co-pilots for all conceivable business processes. What is …
Most IIoT projects don’t fail because of the machines. The sensors work. The controllers provide data. The networks transmit packets. The …
Software Development Doesn’t End with Code When developing applications for clients today, the next topic quickly arises: How is the software …
Health Data is a Special Case — Both Technically and Regulatorily Processing health data fundamentally differs from traditional corporate IT. It …
DORA is coming. And this time, it’s not just about a few pretty compliance PDFs. What many banks, payment service providers, and FinTechs are …
OZG Implementation: Software Alone is Not Enough The Online Access Act (OZG) obliges the federal government, states, and municipalities to make …
In most discussions about the Cloud Act, the focus is solely on data location. Data center in Frankfurt? ISO-certified? Encrypted? Sounds good. From …
Why IT and OT Must Converge In modern industrial environments, increasingly complex data streams are emerging at the interface between production and …
The Gap Between Shopfloor and Enterprise IT In more and more companies, IT and OT (Operational Technology) are converging. Production facilities, …
Technological Independence Begins in the Data Center: Why We Rely on European Network Technology Digital sovereignty doesn’t start with legal …
A Technical Project That Raises Political Questions The announcement initially sounded straightforward: The Bundeswehr will build its private cloud …
Digital Sovereignty Begins with Infrastructure Digitalization in Germany is advancing, but it requires a solid foundation. This foundation is the IT …
How Modern IT Sales Build Trust Instead of Disrupting! In the IT industry, traditional sales were long dominated by persistent calls, generic emails, …
The Cloud Loses Its Innocence The cloud was once the epitome of efficiency, scalability, and digital transformation. However, the reality has caught …
Hey, I’m Fabian – engineer, entrepreneur, and European citizen residing in Germany. For over 10 years, I’ve been part of the …
A senior investigator of the International Criminal Court loses access to his emails – because a US President imposes sanctions. Microsoft complies. …
Today, we are excited to announce the release of etcd v3.6.0, the first minor release since etcd v3.5.0. This update brings numerous new features, …
Finally, Secure Access to Private Container Images! In the world of Kubernetes, surprises are not uncommon, and the functionality of imagePullPolicy …
Germany discusses data sovereignty but remains technologically dependent. How this relates to our culture and what needs to change to achieve digital …
A sovereign cloud requires more than just a data center in Europe. How the CLOUD Act collides with the GDPR—and which technologies enable true data …
The CLOUD Act allows US authorities to access European data, conflicting with the GDPR. Learn how companies can protect themselves technically and …
The US Cloud Act allows US authorities to access European servers—a clear conflict with the GDPR. Discover how companies can protect themselves and …
Managing Kubernetes cluster stability becomes increasingly critical as your infrastructure grows. One of the most challenging aspects of operating …
Kubernetes Volume Populators are now generally available (GA)! With the AnyVolumeDataSource feature, users can now specify any suitable custom …
Digital transformation is no longer a thing of the future – it is a reality. It affects not only e-commerce or digital tools in the office but has …
The new supplementalGroupsPolicy feature was introduced as an optional alpha feature in Kubernetes v1.31 and has now moved to beta in v1.33. The …
Image Volumes were introduced as an alpha feature in Kubernetes version v1.31 and have now been promoted to beta status in version v1.33. This is part …
In Kubernetes v1.33, support for user namespaces is enabled by default. This means that Pods, when system requirements are met, have the ability to …
Kubernetes v1.33 introduces exciting innovations that are highly beneficial for both developers and DevOps teams. This version includes 64 …
In a detailed blog series, Nextdoor’s Core Services team provides valuable insights into their strategies for optimizing database and cache …
Beneath the glittering facade of the tech industry, where bean bags, free kombucha, and flexible working hours are touted as perks, lies a deeper, …
In today’s work landscape, the concept of remote work has brought about a remarkable change by offering flexibility while simultaneously …
Kubernetes has established itself as the preferred platform for deploying complex, distributed systems. One of the most powerful yet subtle design …
CVE shutdown averted – but Europe is charting its own course. With the new vulnerability database from ENISA, the EU is strengthening its digital …
The sudden dismissal of Jutta Horstmann as the managing director of the Center for Digital Sovereignty (ZenDiS) raises fundamental questions about …
The US funding for the CVE list has been stopped with immediate effect—potentially dramatic consequences for global IT security. Why Europe must now …
Automation must become manageable again. At ayedo, we are building a framework with Polycrate that brings order to the chaos of complex IT …
Digital sovereignty doesn’t end with tool selection or architecture. It only reaches its full potential when operations are efficient, secure, …
Digital sovereignty is not a feature – it is an architectural principle. After transitioning our toolchain to open source, the next step was to …
Digital sovereignty begins with concrete decisions. In this post, we show how we at ayedo have replaced key SaaS tools with powerful open-source …
The dependency on US SaaS providers is increasingly costing German companies control, money, and innovation power. ayedo demonstrates how Open Source …
Microsoft Bids Farewell to Traditional Server Models – What’s Next? Starting July 2025, the licensing model for Microsoft’s on-premise …
The Kubernetes Scheduler is a crucial component of the Control Plane that determines which node a Pod will run on. Anyone using Kubernetes relies on a …
Kubernetes vs. Docker – Why You Need Both and Shouldn’t Pit Them Against Each Other The question of whether to use Kubernetes or Docker is …
Introduction In the world of Kubernetes orchestration, the Ingress NGINX Controller plays a central role as it serves as the gateway for traffic to …
In the world of Kubernetes development, there’s exciting news: JobSet has been introduced, an open-source API specifically designed for managing …
A Look at SIG etcd In this article, we take a look at the Kubernetes Special Interest Group (SIG) etcd. We spoke with some of the key players to learn …
Introduction In the world of Kubernetes, there are constant developments aimed at improving the performance and efficiency of applications. One of the …
Kubernetes 1.31 has completed the largest migration in Kubernetes history by removing the in-tree cloud provider. Although the migration of components …
The Uncertain Future of EU-US Data Transfer Regulatory uncertainty surrounding data exchange between the EU and the US is increasing once again. …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
Efficient management of Kubernetes clusters is becoming increasingly important, especially as cluster size grows. One of the biggest challenges with …
With Kubernetes 1.32, the storage manager has officially reached General Availability (GA) status. This marks a significant step towards more …
The Kubernetes Scheduler is the core component that determines which nodes will run new pods. It processes these new pods one at a time. Therefore, …
The latest version of Kubernetes, v1.32, brings exciting innovations and improvements! This version, named “Penelope,” marks the tenth …
Kubernetes v1.32: Optimizing Your Container Infrastructure with ayedo In the dynamic world of container orchestration, Kubernetes plays a central …
NIS2 Directive: Why Now is the Perfect Time for Enhanced Security – Ayedo Shows the Way The introduction of the NIS2 Directive has made waves in the …
Kubernetes SIG Network is excited to announce the general availability of Gateway API v1.2! This version of the API was released on October 3rd, and …
We are the organizers of the Kubernetes Upstream Training in Japan. Our team consists of members who actively contribute to Kubernetes, including …
Introduction In today’s software development landscape, where AI-powered tools like GitHub Copilot and similar assistants provide support, many …
Maximize Data Sovereignty with Our Internal RAG Solution and the ayedo Cloud Introduction In today’s digital era, efficiently managing large …
Introduction In the context of Deaf Awareness Month, the CNCF Deaf and Hard-of-Hearing Working Group (DHHWG) takes center stage. We take a look at the …
Kubernetes 1.31 introduces an exciting new feature that enhances the handling of group memberships in containers within Pods. This change aims to …
In Kubernetes v1.31, we are excited to introduce a significant improvement in CPU management: the distribute-cpus-across-cores option for the …
Successful Partnership: ESCRA and ayedo Revolutionize ZTNA with Kubernetes and Cloud Hosting Strategic partnerships are crucial for combining …
Highly Available SaaS Infrastructure for Over 2 Billion Requests Per Month In today’s digital world, resilience and scalability are …
An effective way to minimize these risks is through Cyber Risk Assessment. In this blog post, you will learn what Cyber Risk Assessment is, why it is …
Compliance Made Easy: ISO27001 as the Key to Regulatory Compliance Meeting legal requirements and data protection regulations is a constant challenge …
In this post, we will show you how to deploy the dashboard app getHomepage using Docker Compose and Traefik, and access it through a DNS entry like …
Introduction In this post, we will show you how to deploy Baserow using Docker Compose and Traefik and make it accessible via a DNS entry like …
Introduction In this post, we will show you how to deploy Mattermost using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction In this post, we will show you how to deploy Paperless-ngx using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction: Deploying Portainer with Traefik Labels and Accessing via DNS Entry In this post, we’ll show you how to deploy Portainer using …
Introduction In this post, we demonstrate how to deploy Stirling PDF using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction In this post, we will show you how to deploy the to-do app Vikunja with Docker Compose and Traefik and access it via a DNS entry like …
In this tutorial, you will learn how to set up and configure Traefik as a reverse proxy using Docker Compose. Traefik offers a modern and flexible …
Ten years ago, on June 6, 2014, the first commit of Kubernetes was published on GitHub. This initial commit, comprising 250 files and 47,501 lines of …
Protecting sensitive data is of utmost importance. A Cyber Risk Check is an effective tool to assess and improve your company’s security …
ayedo Cloud: Performance Optimization for Cloud-Native Applications The performance of cloud-native applications is a critical factor for business …
In the world of container orchestration, Kubernetes is the undisputed leader, powering some of the most complex and dynamic applications globally. …
Cybersecurity threats are constantly increasing, and companies face the challenge of protecting their sensitive data. A Cyber Risk Assessment is an …
Following the general release of the Gateway API last October, the Kubernetes SIG Network is excited to announce the release of v1.1 of the Gateway …
The Impact of ISO 27001 Certification on Data Protection and Data Integrity Data breaches and cyber-attacks are ubiquitous threats that can affect …
The Kubernetes Container Runtime Interface (CRI) is the central link between the kubelet and the Container Runtime. These runtimes must provide a …
Linux offers various namespaces to isolate processes from each other. A typical Kubernetes Pod runs in a network namespace to isolate network identity …
Introduction Have you ever thought about creating your own cloud? Maybe you’ve even tried it! With Kubernetes, it’s certainly possible, …
In our series on building your own cloud with the Kubernetes ecosystem, we continue our journey today. In the previous article, we explained how to …
In this exciting continuation of our series on Kubernetes, we explore how you can run Kubernetes in Kubernetes (K8s in K8s). Technologies like Kamaji …
Kubernetes has established itself as a key technology for managing and operating containerized applications, including those used in the Internet of …
Kubernetes can help a software or digitalization agency generate additional revenue through the highly available operation of software in various …
Kubernetes plays a crucial role in supporting open source AI applications by providing a robust, scalable, and flexible platform for deploying, …
Laravel is one of the most popular PHP frameworks, offering a range of features that make it an excellent choice for developing Software-as-a-Service …
By leveraging Kubernetes, developers and operations teams can overcome the challenges of traditional hosting environments, making their PHP …
Welcome to the ayedo Cloud – your ultimate platform for zero-downtime SaaS app hosting. Designed for the creative minds who want to enrich the world …
Kubernetes - Managed or Manual? Should you manage Kubernetes yourself or entrust the responsibility to Managed Service Providers? With Kubernetes …
In the world of container orchestration, two technologies are at the center of the discussion: Docker Swarm and Kubernetes. Both offer powerful …
Docker and Docker Swarm are closely related technologies in the realm of containerization and orchestration, each covering different aspects of …
Netbird is a modern peer-to-peer (P2P) networking solution that enables the creation of a secure, scalable, and easy-to-manage network. It is an …
PostgreSQL and MongoDB are two of the most popular database management systems (DBMS) that fundamentally differ in their approach and use cases. …
Cilium is an open-source project that provides network security and monitoring for container orchestration systems like Kubernetes. It uses a modern …
Apache Kafka and NATS are high-performance messaging systems used in modern distributed architectures to connect components through message exchange. …
PostgreSQL and MariaDB are both popular open-source relational database management systems (RDBMS) used for storing and managing data. Although both …
GitLab and GitHub are both very popular platforms for version control and collaboration on software development projects based on Git. Although they …
Prometheus and VictoriaMetrics are both powerful time-series databases suitable for monitoring and alerting tasks in complex IT environments. …
Redis and KeyDB are both powerful in-memory database systems known for their speed and efficiency in data processing. Despite their similarities, …
In today’s digital world, managing user identities and access permissions is a central challenge for companies of all sizes. Single-Sign-On …
An effective way to minimize these risks is the Cyber Risk Check. In this blog post, you will learn how to identify and mitigate security …
Why ISO 27001 is Important for Businesses of All Sizes Information security is a central concern for businesses. From small start-ups to large …
ArgoCD and Flux are both tools used for Continuous Deployment (CD) and GitOps workflows in Kubernetes clusters. They automate the deployment of …
Criterion Kubernetes VMware Technology Container orchestration platform Virtualization platform Level of Abstraction Virtualizes applications at the …
TL;DR Criterion AWS EKS Azure AKS Google GKE Pricing Complex, based on instances, services, and data transfer Varies depending on node type and …
The digital transformation not only brings advantages but also new challenges in the field of cybersecurity. To address these challenges and ensure …
ISO 27001: The Gold Standard for Information Security – What Does It Mean for Your Business? Today, more than ever, companies must protect their …
Learning about Kubernetes and the entire ecosystem of technologies surrounding it is not without challenges. In this article, we take a look at the …
Criterion Kubernetes OpenShift Developer Open-source project by Google, managed by the CNCF Container platform developed by Red Hat, based on …
Welcome to ayedo: Your Solution for Cost-Efficient Operation of SaaS Products with Kubernetes As a software company, you know that operating …
Deploying Kubernetes on-premise, in a private, self-managed infrastructure, can present several challenges that need to be addressed. Here are some …
Criterion Kubernetes Docker Functionality and Purpose Container orchestration platform for deploying, scaling, and managing container applications …
Docker is an open-source platform for containerizing applications. It allows developers to package applications and their dependencies into …
Kubernetes is a powerful open-source platform designed to simplify the management of container applications. To understand what Kubernetes is and …
Introduction The Release Special Interest Group (SIG Release) is the heart of Kubernetes when it comes to releasing new features and bug fixes every …
In this article, we demonstrate the fastest and most convenient way to self-host Cal.com with Docker in the Hetzner Cloud. With the help of …
Welcome to a topic that is crucial for every Kubernetes user: the Container Network Interface (CNI). In this discussion, we not only explore the …
Network security is often neglected, even though it is of high importance! Both in the private and business sectors, often only one tool is used, and …
In today’s world, where technology plays a central role in our daily lives, the idea of a connected home - a Smart Home - has gained …
The release of Kubernetes 1.29 introduces an exciting new feature: an alpha capability that allows volumes to be modified by changing the …
In a complex IT landscape, monitoring and understanding application performance can become a real challenge. The open-source framework OpenTelemetry …
There is a lot of discussion about whether not using Kubernetes resource limits could actually be beneficial (for example, in articles like For the …
Zero-downtime deployments with Docker Swarm and Portainer Part 2/2 What have we achieved so far? Prerequisites Linking Portainer Stack with GitHub …
Every year, just before the official opening of KubeCon+CloudNativeCon, a very special event takes place that holds a special place in the hearts of …
We are excited to announce the release of Gateway API v1.0 on behalf of the Kubernetes SIG Network! This release marks a significant milestone for the …
Today, we introduce ingress2gateway, a tool that assists you in migrating from Ingress to the Gateway API. The Gateway API is on the verge of its GA …
Efficiency and scalability are often critical factors for the success of a project in the fast-paced world of software development. A technology that …
On September 26, 2023, nearly 50 contributors gathered for the Kubernetes Contributor Summit in Shanghai, as part of the KubeCon + CloudNativeCon + …
Ever wonder how software gets deployed onto a system that is deliberately disconnected from the Internet and other networks? These systems are often …
In the digitally connected world, constantly logging into various services is more than just a nuisance—it’s a challenge for data security and user …
In modern software development, container orchestration is no longer an unfamiliar term but an essential tool for DevOps teams. It enables efficient …
Kubernetes v1.25 introduced support for user namespaces only for stateless Pods. With Kubernetes 1.28, this limitation has been lifted following some …
Zero-downtime deployments with Docker Swarm and Portainer Part 1/2 What are Zero-downtime deployments? Rolling Updates vs Zero-downtime deployments …
On August 15, 2023, the Kubernetes project announced the general availability of the community-managed package repositories for Debian and RPM …
Operating your apps in Kubernetes is a breeze with ayedo. However, sometimes the built-in tools aren’t enough to ensure the smooth operation of …
With ayedo, running your apps in Kubernetes is a breeze. With Docker Swarm, we offer a production-ready alternative to Kubernetes for those who are …
Mattermost is used in many companies as a central communication platform. It is comparable to Microsoft Teams or Slack. So, what sets Mattermost apart …
Introduction The Kubernetes community took a significant step with version v1.24 by digitally signing their container image-based artifacts. With the …
Probes are checks that the Kubelet of a node performs on or against a Pod to verify its status. Using probes, you can check, for example, whether the …
In the latest version of Kubernetes, v1.27, there’s an exciting new feature: the ability to adjust CPU and memory resources for running pods …
Kubernetes v1.27, released in April 2023, introduces improvements in Memory QoS (alpha), enabling more efficient memory management on Linux nodes. …
Five Key Features of Portainer 1. Docker Environments 2. Access Control 3. CI/CD Capabilities 4. Monitoring 5. Kubernetes As mentioned in the …
Since the introduction of the auto-refreshing official CVE feed as an alpha feature in version 1.25, we have made significant improvements and …
Why This Post? What is Portainer? Practical Section Deploying Portainer Setting Up Portainer Deploying an Application Conclusion For those who want …
In my previous article, I introduced the topic of Checkpointing in Kubernetes and explained how it can be set up. This time, I want to show you how to …
Have you ever wondered how to set up a cluster of thousands of nodes in seconds, simulate real nodes with low resource requirements, and test your …
In today’s digital world, cyber-attacks are more complex than ever. Companies providing cloud services continuously invest in security measures, …
Kubernetes has established itself as a leading orchestration engine used by many organizations to efficiently manage workloads. Proper pod scheduling …
Kubernetes v1.26 brings significant advancements in network traffic management. Two features, support for internal traffic policy for Services and …
The release of Kubernetes 1.26 introduces a stable implementation of the Job controller, which reliably tracks a large number of highly parallel jobs. …
Kubernetes v1.26 introduces an exciting new feature: the general availability (GA) of Kubelet Credential Provider Plugins. This extensible plugin …
In Kubernetes 1.26, the first alpha version of Validating Admission Policies is available! These new policies utilize the Common Expression Language …
Introduction With the release of Kubernetes 1.26, the Device Manager is now generally available! This feature, originally introduced in Kubernetes …
Introduction In the latest version of Kubernetes 1.26, there is an exciting new feature: the Alpha API for dynamic resource allocation. This feature …
The long-awaited day has arrived: HostProcess containers, the Windows counterpart to Linux privileged containers, are finally generally available in …
Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows for the creation of stateful copies of a running …
Introduction In the world of cloud-native technologies, OpenTelemetry (OTEL) is often cited as the key to enhancing application monitoring. This …
Infrastructure as Code (IaC) supports DevOps best practices by facilitating the creation of repeatable infrastructure environments using a declarative …
The IT Planning Council adopts the document “German Administrative Cloud Strategy: Framework for Target Architecture 2.0”. Download PDF …
Kubernetes v1.25 introduces a significant new feature: support for user namespaces. This functionality allows for secure workloads in Kubernetes by …
Introduction With the release of Kubernetes 1.25, there are exciting updates for developers and DevOps teams: Two important features, minReadySeconds …
A long-standing wish of the Kubernetes community has been to create a programmatic way to track security issues in Kubernetes (also known as …
Building cloud native software and running it in production is quite a challenge these days. Besides getting the architecture of your software right, …
The release of Kubernetes v1.25 marks a significant milestone for pod security controls: the Pod Security Admission Controller (PSA) has reached …
The PodSecurityPolicy (PSP) was removed with Kubernetes v1.25. This decision was previously announced in the blog post PodSecurityPolicy Deprecation: …
Did you know that Kubernetes v1.24 includes a total of 46 enhancements? In just four months, the team has integrated an impressive number of new …
Introduction The official documentation is the central resource for any open-source project. For Kubernetes, this is a continuously growing Special …
The Working Group for Structured Logging has introduced new features to the logging infrastructure in Kubernetes 1.24. In this article, you’ll …
The release of Kubernetes 1.24 introduces Storage Capacity Tracking as a generally available feature. This innovation enables developers and DevOps …
The Ingress is one of the most frequently targeted components in Kubernetes. An Ingress typically defines an HTTP reverse proxy exposed to the …
Ensuring the reliability of SIG Node upstream code is a continuous effort that takes a lot of behind-the-scenes effort from many contributors. There …
Introduction The SIG Multicluster is the Special Interest Group focused on applying Kubernetes concepts beyond the confines of a single cluster. …
At Box, we use Kubernetes (K8s) to manage hundreds of microservices that enable us to stream data at petabyte scale. As part of our deployment …
The Security Profiles Operator (SPO) is a pivotal extension for Kubernetes, significantly simplifying the management of seccomp, SELinux, and AppArmor …
Kubernetes v1.22, released in August 2021, introduces a new alpha feature that enhances how Linux nodes manage memory resources. This advancement …
Introduction The Kubernetes community is facing a significant change: the removal of the Dockershim component is imminent. This part of Kubernetes, …
Introduction In Kubernetes, a Node represents a single machine in your cluster. SIG Node is responsible for these crucial Node components and supports …
Kubernetes v1.22 introduced an exciting new alpha feature for clusters with Windows nodes: HostProcess Containers. HostProcess Containers extend the …
On April 23, 2021, the release team adopted a Kubernetes Enhancement Proposal (KEP) that changes the release cycle from four releases per year to …
The Kubernetes API is constantly evolving, which means that older APIs are regularly reorganized or updated. With the release of Kubernetes 1.22, …
The Kubernetes community has taken a crucial step towards improving transparency and traceability of its activities. With the introduction of the …
Kubernetes 1.21 introduces the first officially supported stable metrics with the completion of the Metrics Stability Framework. These new stable …
The Ingress resource is one of Kubernetes’ many success stories. It has spawned a diverse ecosystem of Ingress controllers that are deployed in …
In Kubernetes v1.21, the CronJob resource has reached General Availability (GA). This not only means that CronJobs are now stable and ready for …
In October 2020, the Kubernetes Dashboard officially celebrated its fifth anniversary. As the main project maintainers, we can hardly believe that so …
Versuchen Sie es mit einem anderen Suchbegriff oder wählen Sie einen anderen Tag.