The Modern Software Development Lifecycle: From Cloud-Native to Compliance
TL;DR The modern Software Development Lifecycle (SDLC) is based on cloud-native architectures, …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
The ayedo Software Delivery Platform (SDP) is an integrated environment for the entire lifecycle of modern applications: from the initial commit pipeline to ongoing operations in production-ready Kubernetes clusters.
At its core, the SDP combines three components:
Building on this, the SDP provides a set of curated platform services and over 50 managed apps. The goal is an environment where:
Instead of stacking individual tools, the SDP is understood as a coherent system – including operational, security, and compliance perspectives.
The ayedo Kubernetes Distribution provides the container platform on which all applications run – managed apps as well as custom workloads. It bundles proven CNCF components and is designed to be operable both in European cloud environments and on-premises.
Key features:
This distribution is not just a “Kubernetes cluster,” but a pre-configured operational environment with integrated core services.
Polycrate is the automation framework of the SDP. It encapsulates complex processes – from cluster bootstrap to platform service installation, updates, and backups – into reusable units.
Strategically, the focus is less on technical details and more on impact:
Polycrate transforms complex platform operations into standardized processes.
ohMyHelm bridges the gap to development teams. Instead of maintaining individual Helm charts for each application, ohMyHelm provides flexible, reusable templates.
For stakeholders, this means:
This creates a unified developer experience without forcing teams into rigid guidelines.
A modern delivery platform is more than just a bare cluster. The SDP includes a range of core platform services directly – pre-integrated, with operational and update paths via Polycrate.
Cilium acts as an eBPF-based network and security backend:
From a compliance perspective, Cilium helps implement segmentation and access concepts consistently.
VictoriaMetrics serves as the metrics backend, supplemented by log-centric components:
This creates an observability-capable foundation that both platform and delivery teams can build upon.
Harbor serves as a central container registry with an integrated security focus:
In conjunction with Git-based workflows, Harbor enables transparent and controlled software supply chains – a central element for upcoming requirements such as the Cyber Resilience Act, effective January 16, 2024.
Keycloak provides central identity and access functions:
This allows consistent mapping of rights and role concepts, which is increasingly mandatory under NIS2 and similar frameworks.
Kyverno brings policy-as-code directly into the Kubernetes ecosystem:
For stakeholders, this means governance requirements can be explicitly defined and technically verified – rather than just documented.
Cert-Manager automates the management of TLS certificates:
This reduces operational risks from expiring certificates while increasing the enforcement of encryption requirements.
Velero ensures backup and recovery:
This addresses not only daily operations but also resilience requirements – an increasingly important aspect in regulatory contexts.
Beyond the platform core, the SDP provides more than 50 managed apps: from GitLab to databases to streaming and observability components.
Typical categories:
The advantage of this catalog lies less in “click and run,” but in standardization:
This significantly reduces the number of individual integration projects and frees up time for domain-specific differentiating topics.
A central element of the SDP is the standardized delivery workflow. A typical path looks like this:
Development in GitLab
Developers work in GitLab or a similar repository manager. Pipelines build container images and execute tests.
Artifacts in Harbor
The generated images are stored in Harbor, scanned, and signed. Policies can determine which images are approved for production environments.
GitOps with Argo CD
Deployments are described declaratively in Git repositories. Argo CD synchronizes these desired states with the target clusters. Changes to application versions or configurations occur as Git commits – including history and review process.
Execution in Kubernetes
The target environment is production-ready Kubernetes clusters of the ayedo distribution. There, the following automatically apply:
Day-2 Operations with Polycrate
Cluster extensions, platform updates, scaling, or rollout of new managed apps run through Polycrate workflows. This ensures consistency and traceability over extended periods.
From a stakeholder perspective, this creates a process that supports both developer productivity and auditability.
A common issue in Kubernetes-based environments is the blurred line between platform and application teams. The SDP emphasizes a structured distribution of responsibilities.
Platform Operations is responsible for the operation of the fundamental infrastructure:
Polycrate is the central tool here to establish repeatable, versioned processes.
Delivery Operations (often in close cooperation with application teams) is responsible for:
TL;DR The modern Software Development Lifecycle (SDLC) is based on cloud-native architectures, …
The question keeps coming up. Development teams deliver features, optimize releases, build clean …
Nextcloud stands for digital independence, European data protection standards, and an open, …