Observability in Detail: VictoriaMetrics, VictoriaLogs, Grafana
TL;DR Observability is based on three pillars – metrics, logs, and traces – and is translated into a …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
The classic 12-Factor methodology set a standard for modern web applications. However, many of these principles were developed at a time when APIs, observability, and Zero-Trust did not have the significance they do today.
We now operate distributed systems on Kubernetes, are part of complex data ecosystems, and navigate an environment where European regulations like GDPR, NIS-2, DORA, and the Data Act are not just “frameworks” but have concrete technical implications.
The three additional factors
transform a solid cloud application into a truly modern, cloud-native, and regulation-secure architecture.
The difference from legacy systems is particularly evident here: Where APIs were once an incidental byproduct, monitoring consisted of a few metrics, and security ended at the perimeter, these three topics are now central to design.
API First means that the interface to the system – your API – is understood as the primary product artifact. Technically, this means:
In contrast to “Code First” (API emerges from existing implementation), “Contract-First” is fundamental: It forces your organization to think early about data models, error behavior, versioning, and compatibility.
An OpenAPI specification document becomes the central artifact on which you can build:
This creates an ecosystem around your API that enables parallel work by multiple teams. Frontend teams can start with mocks while the backend is being implemented. External integration partners can develop early without waiting for a “finished” system.
With API First, API governance becomes a leadership task, not a spontaneous developer decision. Important organizational elements:
In a cloud-native environment, especially in microservice architectures on Kubernetes, a consistently API-centric mindset reduces coupling and prevents your system from “getting tangled” when multiple teams work in parallel.
The European Data Act, in force since January 11, 2024, and applicable from September 12, 2025, addresses fair access to and use of data. Technically, this means, among other things:
A structured API architecture following the API-First principle makes it significantly easier to implement these requirements:
API First is thus not only an engineering best practice but a building block of a modern compliance strategy.
Legacy monitoring often limits itself to CPU, RAM, and a few service checks. In distributed cloud-native systems, this is no longer sufficient.
Telemetry in the sense of the 15-Factor-App includes:
These three types of telemetry together enable true observability: You can not only detect that something is wrong but also understand why.
In cloud-native environments, some open-source tools have established themselves as de-facto standards:
On Kubernetes, these components can be well integrated and centrally operated. The architecture behind it is more important than the tool:
Thus, telemetry becomes a central planning tool, not just an “alarm bell.”
The European NIS-2 directive (NIS-2, in force since January 16, 2023, with implementation obligation into national law by October 17, 2024) and the Digital Operational Resilience Act regulation (DORA, in force since January 16, 2023, applicable from January 17, 2025) require critical and essential entities to:
Well-designed telemetry directly supports these requirements:
Thus, telemetry becomes an integral part of your compliance architecture – not just a comfort feature for the operations team.
Classic systems often rely on the model “inside is safe, outside is dangerous.” Firewalls and VPNs play the central role, and internal applications largely trust each other blindly.
In distributed cloud-native architectures and hybrid scenarios, this model is no longer viable. Zero Trust essentially means:
The practical implementation today usually builds on three layers:
Instead of individual auth solutions per service, you have a central Identity Provider (IdP) that issues tokens and makes them verifiable. In modern setups, solutions like Keycloak or Authentik take on this role: Single Sign-On for people, service-to-service authentication for machines, standardized protocols for all.
On a modern platform – typically based on Kubernetes – central authentication and authorization can be deeply embedded:
This creates a continuous security model across all layers that is significantly more robust than distributed, proprietary auth solutions.
Article 32 of the GDPR (applicable since May 25, 2018) requires “appropriate technical and organizational measures” to ensure a level of security appropriate to the risk. These explicitly include:
A consistent authentication and authorization architecture is central to this:
NIS-2 also places strong demands on identity and access management, especially for operators of essential services. Auth is thus clearly no longer just an “implementation detail” but a strategic compliance factor.
Factors 13–15 mark the dividing line between Cloud-Native and Legacy in many organizations:
These differences are technical but also cultural. Teams that embrace API First, Tel
TL;DR Observability is based on three pillars – metrics, logs, and traces – and is translated into a …
TL;DR Secrets in Git, classic Kubernetes secrets, and manual processes are no longer sufficient for …
TL;DR GitOps with ArgoCD anchors the desired state of your applications and infrastructure in Git, …