ohMyHelm: Helm Charts for 15-Factor Apps Without Kubernetes Complexity
TL;DR ohMyHelm is a universal Helm chart wrapper that delivers production-ready workloads without …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
Factors 1–6 of the 15-Factor-App lay the foundation: codebase, configuration, dependencies, and statelessness. From Factor 7 onwards, the focus shifts clearly towards operations: How is an application exposed, scaled, monitored, and operated in the cluster?
For those responsible who no longer deploy themselves but bear overall responsibility, these factors are crucial. They define whether an application integrates smoothly into a platform—or constantly requires special handling.
In a Kubernetes-centered infrastructure, this means: Any deviation from Factors 7–12 creates operational debt. Those who systematically consider these factors, however, create a platform where teams can operate securely, compliantly, and efficiently.
The Port Binding factor requires that an application independently offers its service over a port, rather than relying on external web servers or application containers. The application thus brings its own HTTP server.
In a Kubernetes environment, Port Binding is more than a design detail:
Without this clear port-binding model, platform teams must build workarounds—such as sidecar proxy containers or complex ingress rules. This increases complexity and error susceptibility.
With CNI solutions like Cilium, network security can be defined at the policy level: “This Pod may only communicate with this specific service.” Port Binding creates the prerequisite for fine-grained traffic and security rules.
For compliance and security-by-design, this means:
Port Binding is thus a small but central prerequisite for robust, traceable platform architectures.
Concurrency in the 15-Factor sense means: Scaling occurs horizontally through multiple instances of the same process type, not through ever-larger single instances. The application is built to:
Kubernetes is fundamentally a platform for horizontal scaling. The alignment with 15-Factor is direct:
Instead of operating monolithic “all-purpose Pods,” a clean process model is recommended: separate Deployments for web frontends, asynchronous workers, schedulers, and admin processes. This makes load distribution predictable and simplifies capacity management.
From an operational perspective, consistent concurrency results in:
Concurrency becomes compliance-relevant where service-level commitments or regulatory availability requirements exist. A horizontally scalable system is much easier to secure against SLAs or statutory minimum availabilities than a vertically scaled single node.
Disposability requires two things:
An application must be able to start, stop, or be relocated at any time without destabilizing the overall system.
In Kubernetes, disposability translates into concrete mechanisms:
When applications support these mechanisms cleanly, rolling updates, node maintenance, or automatic re-schedulings become routine operations—without manual intervention.
For Business Continuity Planning (BCP) and Disaster Recovery (DR), disposability is a strong lever:
Regulatory requirements, such as in the financial sector or increasingly under the European Data Act (which came into force on January 11, 2024, and applies from September 12, 2025), increasingly demand traceable BCP/DR concepts. A disposability-capable architecture demonstrates technical maturity and reduces the operational burden of such proofs.
Dev/Prod Parity means: Development, test, and production environments differ as little as possible—especially in:
In a Kubernetes-centered organization, this specifically means:
This makes errors that only occur in production much rarer. At the same time, it becomes easier to consistently roll out compliance-relevant changes (such as new security policies) from test to production.
High Dev/Prod Parity also facilitates the consistent implementation of Compliance rules:
Thus, parity is not just a comfort issue for developers but a prerequisite for sustainable governance.
The 11th factor views logs as continuous event streams, not local files. Applications and containers write to stdout/stderr; the platform handles collection, persistence, analysis, and retention.
In a container world, this is standard: Each Pod writes to its streams, and the platform forwards them to central systems. Typical architectural components include:
With a system like Loki, logs from the entire platform can be centrally collected, efficiently stored, and searched by labels (namespaces, applications, tenants).
From a compliance perspective, logs are not just “error logs,” but:
Regulatory requirements—such as in NIS2 environments or in the context of the Data Act—demand traceable logging and defined retention periods. A 15-Factor-compliant logging strategy helps with this:
Important: If applications internally rotate, archive, or delete log files, this central governance is undermined. The 15-Factor principle “Logs as Event Streams” thus makes a very concrete contribution to structured, auditable logging concepts.
Admin processes are one-time or irregular tasks: data migrations, backfills, manual reports, maintenance scripts. The 12th factor requires that these processes:
as the main application.
In Kubernetes, mature admin-process concepts are evident in the following patterns:
This creates a consistent picture: Every change to data or state is associated with a release and can be traced.
For governance and compliance, this is invaluable:
When admin processes are cleanly integrated into the platform, logs and pipelines (e.g., based on Loki) provide answers—without the need to laboriously search local scripts and shell histories.
Yes, but often in iterations. Not every legacy application can immediately be transformed into an ideal 15-Factor form. A practical approach is a step-by-step process:
TL;DR ohMyHelm is a universal Helm chart wrapper that delivers production-ready workloads without …
TL;DR Polycrate is an Ansible-based framework for deployment automation that containerizes all …
TL;DR Guardrails are automated guidelines around your deployments: They prevent typical …