NIS2 in Germany: A Law Between Late Implementation and Structural Half-Heartedness
Germany has transposed the European NIS2 directive into national law with considerable delay. The …

Kubernetes has provided proven mechanisms for years to manage incoming traffic into a cluster. Ingress controllers serve as a defined “bottleneck” through which external requests enter and are handled with clear rules – such as for routing, TLS, or authentication. However, the situation for outgoing traffic, known as egress traffic, is less clear. By default, egress traffic leaves the cluster via the node where the pod initiating the connection is running. There is no central control instance comparable to the ingress controller.
For companies with compliance requirements or complex network scenarios, this poses a problem: outgoing traffic should be traceable, controllable, and, if necessary, routed through specific IP addresses. In this article, we present two approaches to solving this – Cilium Egress Gateway and kube-vip – and examine their advantages and disadvantages in practical use.
While ingress is clearly structured through controllers, egress is fragmented and unregulated in standard operation.
Cilium is a CNI (Container Network Interface) that uses eBPF to efficiently and granularly control network issues in Kubernetes. With the Egress Gateway, Cilium offers the ability to route outgoing traffic through dedicated gateways within the cluster.
kube-vip was originally developed as a solution for load balancing and VIP (Virtual IP) management in Kubernetes clusters. In addition to ingress and control plane scenarios, kube-vip can also be used to manage egress traffic.
| Criterion | Cilium Egress Gateway | kube-vip |
|---|---|---|
| Complexity | High (Cilium introduction necessary) | Low (easy to integrate) |
| Granularity | Selective (namespace/label-based) | Global (uniform VIP) |
| Performance | Very high (eBPF-based) | Dependent on IP handling |
| Dependency | Strongly tied to Cilium | Independent, standalone |
| Use Case | Complex multi-tenant/policy scenarios | Uniform IP for external systems |
| IP Address Management | Manual preconfiguration of IPs on gateway nodes | Automated assignment via Kubernetes LoadBalancer |
| Monitoring & Auditing | Integrated via Hubble | External tools required |
Managing egress traffic in Kubernetes is not a peripheral issue but a central element for security, compliance, and stability. While ingress has been cleanly abstracted by controllers for years, egress requires additional solutions.
Both approaches show that egress traffic can also be structured and rule-based controlled in Kubernetes – the choice depends on the degree of control needed, the existing runtime environment, and organizational requirements.
Germany has transposed the European NIS2 directive into national law with considerable delay. The …
What initially seemed like a manageable incident has now officially turned into a complete loss of …
Today, we are excited to announce the release of etcd v3.6.0, the first minor release since etcd …