Individual Provider Block Storage vs. Longhorn
Buying Dependency or Building Resilience Block storage is one of the invisible yet most critical …

Many companies today consider themselves technologically independent once their applications run on Kubernetes.
The argument initially sounds plausible. Containers abstract infrastructure, Kubernetes standardizes deployments, and workloads become inherently portable. In theory, applications can be run on AWS, Azure, Google Cloud, OpenStack, or on-premises without needing fundamental redevelopment.
Technically, this is even true.
Strategically, however, this perspective often falls short.
The real dependency in modern platform architectures no longer primarily arises at the infrastructure level. It emerges where companies begin to adapt their operational reality to proprietary platform logics. It is precisely at this point that control gradually shifts from the company itself to the platform provider.
And this happens much more subtly today than it did a few years ago.
In the past, vendor lock-in was relatively visible. Companies specialized in proprietary hardware, specific hypervisors, or non-portable database systems. The dependency was obvious and was usually consciously accepted.
Cloud-native platforms work differently.
The modern form of lock-in today no longer arises from individual products but from the sum of many small architectural decisions, each of which seems sensible when considered in isolation.
A company first uses a managed Kubernetes service. Then follows a cloud-native identity provider. Subsequently, network policies, secret management, eventing systems, and CI/CD processes are directly tied to the respective platform model. Eventually, AI services, proprietary data platforms, or specific security mechanisms are added.
None of these decisions seem problematic.
The strategic dependency only arises through their combination.
This is precisely why many companies today believe they are portable, even though they are already deeply operationally tied to individual providers.
The problem is not Kubernetes itself. Kubernetes indeed solves an important part of the classic infrastructure lock-in. Compute resources become more interchangeable, deployments more standardized, and operational models more consistent. That’s precisely why Kubernetes was so successful.
But Kubernetes only standardizes the orchestration layer.
The truly critical dependencies often arise a level above.
The crucial question today is no longer:
“Can we run our containers elsewhere?”
But rather:
“Can we switch our platform operationally without having to restructure our entire organization?”
Because this is where the difference between technical portability and genuine strategic capability begins.
| Level | Formally Portable | Practically Often Bound |
|---|---|---|
| Containers & Workloads | Docker containers run almost anywhere | Dependency through proprietary runtime integrations |
| Kubernetes Cluster | Kubernetes exists on almost all platforms | Cloud-specific network, storage, and security models |
| CI/CD | GitOps and pipelines are fundamentally standardizable | Deep coupling with GitHub, GitLab, Azure DevOps, or Cloud Build |
| Identity & Access Management | Standards like OIDC exist | Proprietary roles, policy, and permission models |
| Data Platforms | PostgreSQL or Kafka are fundamentally portable | Managed services create operational special dependencies |
| AI Workloads | Models can be containerized | Proprietary APIs and AI services prevent interchangeability |
| Operational Processes | Infrastructure-as-Code enables standardization | Teams and processes adapt to platform logics |
This is precisely why many modern platforms are never “hard” locked-in — but are gradually made operationally dependent.
The infrastructure remains theoretically interchangeable. The organization eventually does not.
This development is particularly visible in security and identity models. Modern cloud platforms no longer just control infrastructure. They increasingly control the entire operational security architecture of a company.
Role models, policies, service identities, network segmentation, and workload authentication are deeply intertwined in many platforms. Companies are increasingly building their operational processes directly on these models.
The stronger this coupling becomes, the more difficult a later platform switch becomes.
And not because applications can no longer be migrated. But because the organization itself begins to adapt its operational logic to proprietary platform mechanisms.
At a certain point, it is no longer the infrastructure that is the problem, but the operational reality.
This is where modern vendor lock-in becomes economically relevant.
Because a provider change suddenly no longer means just an infrastructure project. It means the migration of security models, deployment processes, compliance structures, audit trails, monitoring concepts, and internal operational procedures.
This is why many platforms are technically never “unleavable” — but practically still almost unmigratable.
This development is currently particularly critical in the AI field.
Many companies are currently integrating proprietary LLM APIs, cloud-native AI services, and specific data platforms directly into their business processes. In the short term, this seems efficient. In the long term, however, new operational dependencies arise that go much deeper than classic infrastructure bindings.
Because AI is not just developing into an additional feature of modern platforms.
AI is developing into the central operational layer of many digital processes.
Those who do not consider portability here are actively building the next generation of strategic dependency themselves.
This is why the current discussion about digital sovereignty often falls short. Many organizations continue to focus heavily on the location of data centers or the geographic origin of a cloud provider.
The real power problem of modern platforms does not primarily arise where data is stored.
It arises where operational processes are technically bound to proprietary platform logics.
Digital sovereignty therefore does not automatically mean dispensing with hyperscalers. It primarily means maintaining real operational change possibilities.
And this is exactly why at ayedo, we do not simply view Kubernetes as an infrastructure product, but as a strategic abstraction layer. For us, it is not only important that workloads can be run containerized. What is crucial is that platforms remain controllable, migratable, and organizationally manageable in the long term.
Therefore, we consistently rely on open standards, provider-independent operational models, and portable platform architectures instead of deep proprietary platform couplings. Our managed Kubernetes platform deliberately runs on both European providers and international clouds or on-premises infrastructures. Not for ideological reasons, but because technological capability is only preserved where real exit capability exists.
We follow the same principle with Polycrate.
Because many operational dependencies do not arise directly in the cluster, but in the processes around the cluster: deployments, provisioning, CI/CD, secrets, environment management, and developer workflows.
This is where we standardize operational logics across providers so that platforms do not gradually become unportable due to operational habits.
The real strategic challenge of modern platform architectures today is no longer the question of whether companies should use Kubernetes.
The real challenge lies in how much operational dependency is actively built above Kubernetes — often without organizations fully grasping the long-term consequences.
Because modern vendor lock-in today does not begin where infrastructure ends.
It begins where companies adapt their operational reality to the logic of foreign platforms.
Buying Dependency or Building Resilience Block storage is one of the invisible yet most critical …
TL;DR Storage has traditionally been the heaviest “anchor element” in cloud …
Criterion Kubernetes VMware Technology Container orchestration platform Virtualization platform …