GitOps Platform Independence through Polycrate Automation
GitOps Platform Independence through Polycrate Automation Understanding the automation layer that creates a coherent, reproducible deployment pipeline …
Tags
Content with this tag
GitOps Platform Independence through Polycrate Automation Understanding the automation layer that creates a coherent, reproducible deployment pipeline …
TL;DR Polycrate-driven automation offers cross-architecture, declarative infrastructure control that enables platform independence. Through a central …
TL;DR Cloud independence in Kubernetes landscapes is not achieved through isolated clusters but through orchestrated abstraction that centralizes …
TL;DR Zero-Trust architecture provides the necessary security and governance foundation for digital sovereignty in heterogeneous environments. Core …
Introduction For a long time, digital sovereignty was discussed as a political buzzword—vague, elusive, and often without immediate consequence for …
What Risks Companies Specifically Underestimate Introduction The use of US cloud services is commonplace for many companies today. Platforms like …
Introduction Many cloud strategies in European companies are based on an assumption long considered a pragmatic compromise: As long as data is stored …
Why Control is More Important than Server Location Introduction Cloud computing is far more than just an infrastructure topic. For many companies, …
In a traditional cloud environment, customers receive their IP addresses from the cloud provider. This is convenient but creates a dangerous …
When companies decide to distribute their Kubernetes platform across two data centers, they face a directional decision: Do they build a single, …
In traditional high availability scenarios, DNS (Domain Name System) is the standard tool for failover. If location A fails, the DNS entry is …
Industrial corporations today face a paradoxical challenge: they must adapt the agility and innovative power of cloud startups while maintaining the …
In an industrial concept, millions of data points are generated daily. When these data flow into Apache Kafka, the next critical question arises: …
In modern manufacturing, data is generated not in batches, but as a continuous stream. Sensors on rolling mills, flow meters in chemical reactors, …
In industrial data processing, ETL processes (Extract, Transform, Load) are the nervous system of production. When sensor data from plants worldwide …
In industrial AI development, the GPU (Graphics Processing Unit) is the new gold. Whether for training complex neural networks for quality control or …
Artificial Intelligence is no longer a hype in e-commerce but a tool for scaling. Whether it’s generating product descriptions from technical …
In modern e-commerce, data is the foundation for every growth decision. However, traditional client-side tracking is reaching its limits: ad …
In modern e-commerce, the search function is much more than just an input field. It is the most important salesperson in the shop. Users who use the …
For an online shop in the mid-sized business or D2C sector, downtime is much more than a technical nuisance. Every minute of unavailability means …
When building a modern IT infrastructure today, one faces a strategic decision: either buy into the convenience (and dependency) of large US SaaS …
In many technical service teams, there is a dangerous pragmatism when it comes to communication: When things need to move quickly on-site or at the …
In many companies, the process of digital signing is the last “analog island” or a dangerous compliance breach. Maintenance logs are …
In customer service and technical support, the ticketing system is the central nervous system. Many companies instinctively turn to market leaders …
For a long time, IT infrastructure in B2B sales was a peripheral issue. Companies relied on major US SaaS providers because they were considered the …
Since the breakthrough of ChatGPT, it’s clear: AI can do more than just analyze numbers. It can write reports, summarize maintenance …
In the traditional IT world, things are binary: A server is either running or it’s not. A database either responds or throws an error. In the …
In the industry, a fundamental architectural question arises: Should AI make decisions directly at the machine (Edge) or should the data be sent to a …
In the realm of IT infrastructure, few things are as costly as a modern NVIDIA GPU doing nothing. An H100 or A100 instance with major hyperscalers …
In a pilot project, many things are forgiven in AI. If an anomaly prediction takes two seconds, it’s not the end of the world. But in …
Why the EVB-IT Reform is a Turning Point for Government IT Public IT procurement in Germany has long been characterized by a structural …
In industrial AI, such as predictive maintenance for sensor data analysis software, data streams are the lifeblood. Thousands of sensors provide …
In many machine learning teams, an unwritten rule prevails: first come, first served. Whoever starts the first training job in the morning occupies …
A Term Without Substance An open letter from 25 European cloud and digital companies reveals what European digital policy has been avoiding for …
Structure Instead of Symbolic Politics Since 2021, the French government has been pursuing a well-structured approach to the digital transformation …
The recent warnings from CISA and Amazon about active attacks on Cisco FMC, Microsoft SharePoint, and Zimbra initially appear to be a routine process …
Digital sovereignty is often discussed in abstract terms, but it can be technically delineated quite clearly: the key is what systems are bound to. …
TL;DR Migrating from centralized hyperscaler platforms to modern decentralized architectural approaches requires precise planning and execution. Best …
TL;DR Declarative operating models provide companies with an effective method for automating and standardizing complex infrastructure management …
TL;DR Vendor lock-in is one of the central challenges companies face when using cloud services. Strategies like multi-cloud approaches, the use of …
TL;DR Modern cloud architectures play a crucial role in Europe’s digital sovereignty. By gaining independence from hyperscalers and …
But Rather Better Cloud Architectures For years, the European cloud debate has been dominated by a seemingly simple question: Does Europe need its …
Europe’s Missed Opportunity – and Why It’s Not Yet Lost Over the past decade, the cloud has evolved into the central infrastructure of …
Why Every Cloud Strategy Needs an Exit Plan Many IT strategies begin with the same question: Which platform offers us the best opportunities today? …
TL;DR Milliseconds determine conversion rates and user experience. If every database query has to be read from the disk, the application will collapse …
TL;DR For logistics companies, delivery services, and fleet managers, routing is the heart of the business. However, using the Google Maps Directions …
TL;DR For a long time, Elasticsearch was the undisputed standard for log analytics and full-text search. But then Elastic changed its license, …
TL;DR Artificial Intelligence (AI) is the new standard, but using cloud APIs like OpenAI (ChatGPT) or Anthropic comes with a significant catch: data …
TL;DR Every online shop, logistics app, and fleet management system requires geocoding: the conversion of addresses into coordinates (and vice versa). …
Why European Companies Need to Rethink Their Infrastructure Strategy Artificial intelligence is currently transforming not only products, processes, …
Why License Freedom Alone Does Not Create Control In the European digital debate, Open Source is often seen as synonymous with digital sovereignty. …
Why Two Clouds Do Not Mean Independence In many companies, Multi-Cloud is now considered a shortcut to digital sovereignty. The common assumption is …
Why Dependencies Are Becoming More Dangerous Cloud lock-in is not a new topic. For years, companies have been discussing how challenging it can be to …
The cloud market is entering a new phase. For a long time, the equation was simple: those who wanted to scale went to the hyperscalers. Those who …
TL;DR In the modern web stack, application code (PHP, Python, Node.js) is expensive and slow. Nginx is the exact opposite: lightweight, asynchronous, …
TL;DR In a world where Microsoft 365 and Google Workspace set the standard, companies often pay with their data. The GDPR compliance of US clouds is …
TL;DR The classic VPN (“Hub-and-Spoke”) is a relic. It forces all traffic through a central bottleneck, slowing down the connection and …
TL;DR In the microservices world, services need a way to communicate. Tools like RabbitMQ (based on Erlang) or Kafka (JVM) often come with significant …
TL;DR Storage in Kubernetes is often a nightmare of complexity (Ceph) or vendor lock-in (AWS EBS). Longhorn takes a third path. As a CNCF project, it …
TL;DR Email delivery is one of the most critical functions of modern applications (password resets, invoices). However, testing is risky: a wrong …
TL;DR Relational databases force developers to squeeze data into rigid tables. MongoDB breaks this mold. It stores data as modern applications use it: …
How a Platform Makes European Technology Visible Digital sovereignty has become one of the central topics in European technology policy. In political …
In the gold rush surrounding Artificial Intelligence, a critical aspect is often overlooked: the security of the underlying data. When companies …
March has begun – and with it, the final phase for one of the most widely used components in the Kubernetes network stack: Ingress-NGINX is …
The Cloud-Native transformation is in full swing, yet the reality in German data centers often looks different: alongside cutting-edge Kubernetes …
The era of “Harvest Now, Decrypt Later” has begun. While quantum computers capable of breaking commonly used asymmetric encryption …
By 2026, the threat landscape for medium-sized businesses has fundamentally worsened. Regulatory requirements such as NIS-2 and DORA no longer demand …
In 2026, sustainability in the IT sector is no longer a “nice-to-have” for marketing but a regulatory necessity. With the tightening of …
In 2026, regulatory requirements for the European economy have reached a new level of quality. With the fully effective EU Data Act and the tightened …
In 2026, the threat landscape for European SMEs is more precarious than ever. Identity theft has become the number one attack vector, as traditional …
The hype around proprietary SaaS AI models gives way to a sober cost-benefit analysis by 2026. While companies initially paid token fees to …
Is Sovereignty Becoming Unaffordable Now? Hetzner will increase prices for its entire portfolio starting April 1, 2026. In the cloud sector, many …
Anyone managing modern Cloud-Native infrastructures knows the problem: data is everywhere, but insights are rare. A system is only considered …
Digital Sovereignty in Live Streaming: How ayedo Strategically Strengthens STREAMLAB’s Cloud Operations Live streaming has long been critical …
With ‘Recall’, Microsoft integrates a feature into Windows 11 that takes screenshots of all open applications at short intervals, …
Why Digital Sovereignty is Less Radical Than Many Believe Geopolitical tensions, extraterritorial laws, sanction regimes – all these have long been …
Why the Open-Source Technology is More Than Just Container Orchestration When digital sovereignty is discussed today, one name almost always comes …
Why Germany’s Digital Sovereignty Has Become a Security Issue Digital sovereignty is no longer just an industrial policy buzzword. It is a …
Europe’s Economic Power The trade conflict with the USA is reflexively narrated in Europe as a power asymmetry. Washington imposes tariffs, …
The BSI draws a clear line: From the end of 2031, the sole use of classical key agreement methods like RSA and ECC will no longer be recommended. For …
Why Digital Sovereignty Without Competition Remains an Illusion The debate on digital sovereignty in Europe is often oversimplified. It usually …
Europe is Working on Its Own Digital Payment Infrastructure The European payment landscape has long been dominated by international providers. A …
Europe’s Structural Dependence on Big Tech The debate on digital sovereignty is no longer a technological detail. It is a question of political …
In a traditional IT infrastructure, there was a clear causal chain: an administrator changed a line of code, and the system responded. In the world …
Today’s internet security relies almost entirely on the difficulty of factoring large numbers into prime factors (RSA) or computing discrete …
And what this figure means for Europe’s digital capability. The federal administration spent 481.4 million euros on Microsoft licenses in 2025. …
In IT security, the “fortress” principle long prevailed: high walls, deep moats (firewalls). But the reality in 2026 shows: Once an …
European Cloud Platforms vs. Hyperscalers Sovereignty, Scalability, Security, and Strategic Reality in the Corporate Context Few IT topics are …
Edge Computing in the Enterprise Context: Opportunities and Limitations Architectural Models, Security Implications, and Operational Reality Edge …
Multi-Cloud Strategies for SMEs and Enterprises Architectural Principles, Governance, Security, and Operational Reality Multi-Cloud is no longer just …
The Saarlouis Economic Development and the IHK Saarland invited to the economic policy kickoff of the year at the RAG representation in Ensdorf. The …
TL;DR Google Analytics, Matomo Cloud and other SaaS tracking tools are problematic from a GDPR perspective: data flows to third parties, cookie …
For decades, almost all computers have followed the Von Neumann architecture: a strict separation of processor (CPU) and memory. Data must constantly …
In traditional business economics, IT infrastructure is often seen as a necessary evil—a cost center to be minimized. However, in the age of digital …
In the past decade, the direction was clear: all data and processes were moving to the central cloud. However, we are reaching physical and economic …
A silent act of rebellion occurs daily in German offices. When the official process for data exchange with an architectural firm via the …
Every year, billions of taxpayer dollars are funneled into the digitalization of public administration. Yet, this money often ends up in proprietary …
A Smart City is a vast, distributed data ecosystem. Sensors measure air quality, soil moisture in parks, parking occupancy, or traffic flows. The …
The goal of the Online Access Act is ambitious: all administrative services should be digitally available. However, the implementation often failed …
The logistics industry has ambitious goals: carbon-neutral fleets and green warehouses. While discussions revolve around alternative drives and …
In a globally connected economy, no logistics company is an island. Success depends on how efficiently information flows between shippers, freight …
Data is the gold of modern logistics. Knowing when and where each package is, who calculates the most efficient routes, and who controls the …
Digital sovereignty is not a stance or a strategic paper. It is the result of concrete technical decisions. Those who operate software inevitably …
Scaling at the Limit: How Track & Trace Processes Millions of Events in Real-Time During the “Peak Season” – from Black Friday to …
In a highly automated logistics center, time is the most critical currency. When an autonomous guided vehicle (AGV) approaches an intersection or a …
The Year European Regulation Becomes Operational 2026 is not a year of new grand digital policy announcements. It is the year when European digital …
Skill Shortage in Hospital IT: Managed Platforms as a Strategic Lever The skill shortage in hospital IT presents a significant challenge. To address …
In theory, the promise of the cloud is enticing: all data is stored and processed centrally. However, in the highly sensitive environment of a …
In modern acute medicine, IT is no longer a supporting process – it is part of the treatment. If imaging procedures (PACS), lab results, or digital …
TL;DR Identity is the new perimeter. Outsourcing login and user management to SaaS services like Auth0 or AWS Cognito initially offers convenience …
TL;DR Redis is the undisputed king of in-memory databases, but it has an architectural Achilles’ heel: it is single-threaded. Even on an …
TL;DR Logs are the indispensable “memory” of any application, but their storage often becomes the largest cost item in the cloud. …
The digitization of healthcare promises enormous advancements: from telemedicine support to AI-assisted diagnostics and electronic patient records. …
1. Executive Summary Retail is undergoing the greatest transformation in its history. The separation between brick-and-mortar and e-commerce no …
Nothing is more frustrating for a customer than a “Click & Collect” experience that ends in cancellation. You see online: …
The Architecture of Independence: What Sovereignty Really Looks Like What was decided last week in the EU Parliament marks far more than a political …
TL;DR The load balancer is the front door to your infrastructure. Relying on standard cloud services like the AWS Application Load Balancer (ALB) …
TL;DR The Container Registry is the heart of your software supply chain. Trusting cloud services like AWS ECR blindly treats your images merely as …
TL;DR In a multi-cloud world, security is not about location, but identity. Relying on cloud-specific tools like AWS Secrets Manager fragments your …
TL;DR IoT sensors, application metrics, and financial data have one thing in common: they are time-based and generated in massive quantities. …
The vision of “Omnichannel Retail” sounds perfect in theory: order online, pick up in-store (Click & Collect), digital price tags …
The Era of US Dominance Is Over Yesterday, the European Parliament made a decision that goes far beyond the usual Brussels symbolic politics in its …
In modern retail, the fiercest competition no longer takes place on the shelves, but at the data level. Understanding what the customer will want …
It’s the nightmare of every e-commerce manager and retail CTO: Black Friday is approaching, marketing campaigns are in full swing, and just at …
Considering Real Observability Needs Observability determines how well systems can be understood, operated, and evolved. It is not an add-on for …
Data Warehouse as a Cloud Product or as an Open Analytical Platform Analytical data is no longer just an appendage to reporting. It forms the basis …
Secrets as a Cloud Service or as Part of the Kubernetes Platform Secrets are among the most sensitive components of modern applications. Credentials, …
Monitoring as a Cloud Function or as an Open Observability Layer Monitoring and Observability have long surpassed being mere operational tools. They …
Traffic Control as a Cloud Service or as a Controllable Platform Component Load balancers are the silent foundations of modern infrastructures. They …
Secret Management as a Cloud Function or as a Standalone Security Architecture Secrets are not a fringe topic. Credentials, API keys, tokens, and …
Consume or Control Infrastructure AWS MSK and Apache Kafka do not compete on a feature level. They represent two fundamentally different approaches …
Buying Dependency or Building Resilience Block storage is one of the invisible yet most critical layers of any cloud and Kubernetes architecture. …
Consuming or Mastering Databases AWS RDS and MariaDB do not represent competing products but rather two fundamentally different models for handling …
Consuming or Controlling Object Storage On paper, AWS S3 and MinIO fulfill the same technical task: providing highly available, scalable object …
Managed Cache or Controlled Data Structure AWS ElastiCache and KeyDB address the same need: extremely fast in-memory data storage for caching, …
TL;DR PDF generation is often a technical debt in modern web development. Outdated tools like wkhtmltopdf are no longer maintained, and embedding …
TL;DR In modern distributed systems, it’s no longer enough to just know if a server is up or down. You need to understand why it’s slow. …
How Sovereign is Europe’s Data Really? Amazon Web Services is putting the “AWS European Sovereign Cloud” into operation in …
The promise of the cloud has always been flexibility. Yet, the reality in many IT departments is different: Vendor Lock-in. Those who build their …
TL;DR Secrets (API keys, database passwords) do not belong in Git code, but their runtime provisioning is often complex. Integrating AWS Secrets …
TL;DR Data is the new oil, but traditional data warehouses (like AWS Redshift) are often expensive, sluggish refineries. ClickHouse has revolutionized …
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies (iptables). While AWS provides a solid base …
TL;DR Encryption is mandatory, but managing it is often a nightmare. While AWS Certificate Manager (ACM) offers free certificates, they are …
TL;DR Storage has traditionally been the heaviest “anchor element” in cloud architecture. Using AWS EBS or S3 ties your data physically …
TL;DR Authentik redefines identity management: moving away from proprietary cloud silos towards a unified identity layer. As an open-source solution, …
Until now, monitoring was often a compromise: Those who wanted to know exactly what was happening in their applications had to install …
In the traditional server world, the mantra was: “Better too much RAM than too little.” In Kubernetes, this mindset leads directly to a …
FinOps in Kubernetes - 20 Answers 1. Why is the standard cloud bill for Kubernetes costs unusable? Cloud providers issue bills for instances (VMs). …
The classic Horizontal Pod Autoscaler (HPA) of Kubernetes is like a thermostat: When the room gets too warm (CPU > 80%), the air conditioning …
“We can’t move that to the cloud, it’s a monolith.” We hear this sentence often. However, modernization in 2026 doesn’t …
In the IT world of 2026, sustainability is no longer just a marketing buzzword. With the expansion of EU reporting obligations (CSRD), IT …
When an AI model leaves the training phase, the real challenge begins: productive inference operation. Serving a Large Language Model (LLM) in a …
Europe likes to see itself as a global guardian of data protection and fundamental rights. GDPR, NIS2, AI Act – the regulatory claim is high, the …
The introduction of Artificial Intelligence in small and medium-sized enterprises has opened a new security front. When we train LLMs or build RAG …
We don’t need to explain that FinOps is the answer to uncontrolled cloud spending. The challenge for IT decision-makers in medium-sized …
The decision by the state government of Schleswig-Holstein to consistently switch its administration to open source software is more than a political …
Digital sovereignty has long been part of every public sector digital strategy. However, the Sovereignty Barometer of public IT by next:public shows …
Current reports of massive data leakage from self-hosted Owncloud, Nextcloud, and ShareFile instances are technically unspectacular – and that is …
Almost every modern company is working on an AI strategy today. Whether it’s Large Language Models (LLMs), image recognition in quality …
“The cloud grows with your needs.” This promise is both a blessing and a curse. For growing businesses, cloud scalability is essential to …
Zero Trust in Production: Why the Firewall Alone Is No Longer Enough For decades, the security strategy in industry was clearly defined: A strong …
The grace period for cybersecurity in the industry is coming to an end. With the new EU directive NIS2 (Network and Information Security Directive), …
Avoiding Production Downtime: How Self-Healing Infrastructures Relieve OT In the world of Operational Technology (OT), equipment availability is the …
A portal for more security – on an insecure foundation? With the launch of the central BSI portal for NIS2 reports, the Federal Office for …
A critical analysis of digital sovereignty in Germany and Switzerland While European governments emphasize the importance of digital sovereignty in …
The announcement by Kubernetes SIG Network to retire Ingress-NGINX was not an operational accident. It was the result of years of structural overload …
In the software world, “Continuous Delivery” is standard. However, in the industrial sector, the reality is often different: Updates for …
Making Legacy Machines Cloud-Ready: Retrofitting with Container Gateways In many German factories, the backbone of our industry stands strong: …
In theory, the cloud sounds like the perfect solution for everything. In the practice of industrial manufacturing, however, it often reaches its …
Cloud-Native Without Cloud Lock-in: Why Portability is the New Security When discussing modern IT infrastructure today, it’s impossible to …
In modern manufacturing, the question is no longer if data is collected, but how it can be used efficiently. While machines (OT – Operational …
Nextcloud stands for digital independence, European data protection standards, and an open, trustworthy alternative to US-based collaboration …
How Seemingly “Sovereign” Cloud Offerings Disguise Dependencies – and What ZenDiS Clarifies Digital sovereignty has taken a firm place in …
The recent outages of central internet services have not only disrupted websites and APIs. They have revealed a structural problem that has been …
Germany has transposed the European NIS2 directive into national law with considerable delay. The late implementation alone would already be …
The US government has been demanding a comprehensive agreement on access to biometric police data from Europe for several years. The basis is the …
Evasion Attacks on LLMs: A BSI Guide to Defending Against Prompt Injections and Jailbreaks Large Language Models (LLMs) have become established in …
Kubernetes Make or Buy – Considerations for Decision Makers In few other technology sectors is there such passionate debate about self-management …
Kubernetes is the Operating System of the Sovereign Cloud Few technologies have fundamentally transformed modern IT as much as Kubernetes. Originally …
Delos Cloud vs. Stackit Workspace – Wolves in Sheep’s Clothing The discussion around digital sovereignty in Germany and Europe is in full …
Cloud Brokering for True Sovereignty The discussion about digital sovereignty in Europe is old, but it is more relevant than ever. Especially since …
The International Criminal Court (ICC) in The Hague is taking a significant step in response to recent political tensions with the USA: it is ending …
The European AI Act, the first comprehensive regulation for artificial intelligence worldwide, was originally set to come into full effect by August …
With the award ceremony at the Smart Country Convention (SCCON) on October 2, 2025, the open-source movement in public administration celebrated a …
The introduction of AI browsers like OpenAI’s ChatGPT Atlas and Perplexity Comet marks the beginning of a new era in human-computer …
Starting December 2025, Microsoft will enhance its collaboration platform Teams with a feature that automatically detects the actual work location of …
TL;DR The ayedo Kubernetes Distribution offers two distinct operational variants: Loopback for European public clouds and a k3s-based solution for …
The Trojan Horse of the “Sovereign Cloud” Why Europe’s new sovereignty is often just American-painted The meme is brilliant in its …
Many confuse Open Source with sovereignty. Both are interconnected – but one does not automatically guarantee the other. The well-known XKCD meme, …
TL;DR The Cloud Sovereignty Framework of the EU defines what digital sovereignty aims to achieve – the 15-Factor App principles define how a concrete …
The Germany Stack and the Reality of Modern Cloud-Native Development: Digitization is no longer a buzzword – it is a foundation, a competitive …
What initially seemed like a manageable incident has now officially turned into a complete loss of control: The firewall manufacturer SonicWall has …
TL;DR The European regulatory landscape is intentionally interconnected: The GDPR forms the foundation, upon which NIS-2, DORA, Cyber Resilience Act, …
The announcement initially sounded like just another technical partnership in the era of generative AI: OpenAI and AMD have agreed on six gigawatts …
TL;DR The EU’s Cloud Sovereignty Framework makes digital sovereignty precisely measurable for the first time – through eight sovereignty …
TL;DR The Data Act comes into effect on September 12, 2025, making data portability, cloud switching, and interoperability mandatory requirements – …
With the pilot project to introduce the AI assistant F13, Saarland is taking a remarkably clear path towards a digitally sovereign administration. …
Bonify and the Loss of Digital Identity On October 1, 2025, a data protection incident came to light that further shook trust in the digital credit …
Why the DNA Redefines Europe’s Digital Foundation With the Digital Networks Act (DNA), the EU is preparing one of the most profound reforms of …
Title: OpenAI for Germany – Digital Sovereignty with Azure as the Foundation? Markdown-Content: On September 24, 2025, SAP and OpenAI announced a new …
Title: OpenAI and Nvidia: $100 Billion for the AI Arms Race Markdown-Content: The Reuters report is making waves: Nvidia plans to invest up to $100 …
Why Hyperscalers Only Sell Hardware – and MSPs Are the Future Hyperscalers have shaped the digital world like few other models. With the promise of …
When discussing digital sovereignty and modern IT infrastructures today, Kubernetes is unavoidable. In just a few years, this open-source project has …
The news is making waves: Several npm packages from CrowdStrike – a company known for security and protection – have been compromised. What might …
In recent years, Cloud First has been considered an almost unshakeable maxim. Companies of all sizes were encouraged to move their infrastructure to …
The European Union is on the verge of enacting one of the most profound intrusions into digital privacy since the inception of the internet. The …
The security of software supply chains is one of the central topics in IT security today. Companies are under increasing pressure to ensure …
Kubernetes has become the de facto standard for operating cloud-native applications. However, with its flexibility comes immense complexity. In …
The debate about sovereignty in the cloud in Europe often revolves around the question: Do we need our own hyperscalers to be independent? Many see …
The European debate on “sovereign AI” is often reduced to regulation, data protection, and societal acceptance. What is often overlooked: …
Kubernetes v1.34: Precision, Security, and Maturity Kubernetes continues to grow – with version 1.34, the next major release is here. The cycle …
Operating databases in Kubernetes was long considered risky: Stateful workloads, persistent data, and container orchestration seemed incompatible. …
Kubernetes has become the standard for running containerized applications in recent years. As its adoption grows, so does the need to monitor …
Kubernetes has provided proven mechanisms for years to manage incoming traffic into a cluster. Ingress controllers serve as a defined …
Spoiler Alert: Yes, it is – and it’s not only possible but already a standard in many enterprise environments. Does .NET Fit with Kubernetes? …
The transition from OTRS to Zammad is more than just a technical upgrade for many organizations – it’s a step towards a sovereign, modern, and …
The fact that the Bundeswehr will store its data in the Google Cloud is not an IT project. It is a security policy capitulation. Just like the …
Starting November 1, 2025, Microsoft will eliminate traditional volume licenses. Specifically affected are the major licensing models Enterprise …
Summary in Three Points Controlplane on demand: With k3k, you can run a fully-fledged k3s control plane as a Kubernetes workload – without agent …
In a world where cloud-native architectures, remote development, and complex multi-cluster infrastructures have become the norm, traditional …
How companies can make their GPU-Kubernetes environments secure, compliant, and efficient for AI development using tools like Kyverno, Vault, and …
Kubernetes has evolved from an experimental playground to the de facto standard for cloud-native applications in recent years. Its flexibility and …
Sometimes a single sentence is enough to reveal the political reality in all its bitterness. In this case, it is: “The tariff deal with the USA …
The celebration over the recent “deal” between the EU and Donald Trump seems like a macabre staging. While Brussels publicly celebrates …
Palantir in Germany is more than just a software provider. It symbolizes a quiet shift in the state: away from democratic control, towards …
It was a long tug-of-war – now there’s a deal. The EU and the USA have reached a last-minute compromise in the tariff conflict. What initially …
For a long time, digital transformation was considered a technical project: faster, more scalable, more efficient. Those who ventured into the cloud …
Why security vulnerabilities are not just technical risks but should provoke political decisions The newly discovered security vulnerability …
An Oath of Disclosure – in the Truest Sense of the Word We’ve suspected it for a long time, it was downplayed, relativized, dissected in …
One year after the enactment of the Online Access Act 2.0, the results are sobering. The big promises remain, but noticeable progress for citizens …
70% of European companies consider their dependency on non-European technology too high. This is not a gut feeling, but the result of the current …
On October 14, 2025, regular support for Windows 10 will end. What initially appears to many IT departments as a manageable maintenance date reveals …
A sober look at the average IT infrastructure in German companies reveals that the technological needs are mostly manageable. Active Directory, SQL …
The European Union celebrated itself as a pioneer in regulating digital platforms. With the Digital Markets Act (DMA), it aimed to make a statement: …
A software developer, 22 simultaneous jobs, a scandal: The Soham Parekh case reads like a script for a sequel to “Catch Me If You Can.” …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
How the AI Service Desk of the Federal Network Agency Guides Companies into the Future The European AI Regulation (AI Act) is a milestone: It creates …
Digital administration in Saarland is at a standstill. Only 29% of administrative services have been digitized under the Online Access Act (OZG) …
Saarland ranks last in the current Bitkom Länderindex 2024 in the “digital administration” category. Only 29% of the digital …
In industries where systems must operate with utmost reliability and stringent performance requirements, such as telecommunications, high-performance, …
Why this alliance is a turning point for Europe’s digital self-determination The headline may seem unremarkable, but its content is not: Two …
What Microsoft’s new Sovereign Cloud really means – and what it doesn’t Microsoft has delivered. At least at first glance. With the …
by Leon, 8th Grade I spent three weeks at ayedo – and honestly: The internship was much better than I had imagined. I didn’t just watch; I …
How SAP Evades Responsibility – and What It Reveals About the State of the German Tech Industry On June 21, 2025, the Tagesspiegel published an …
A security incident is systemic when it repeats, scales, and becomes normalized. The current data breach with over 16 billion compromised credentials …
Why Managed Kubernetes with Hyperscalers Doesn’t Lead to Digital Sovereignty Kubernetes has established itself as the de facto standard for …
Satya Nadella introduced a new “Sovereignty Program” for European Microsoft customers in Amsterdam. Three cloud models, Hardware Security …
Everyone is writing software with AI now. Prompt in, code out. A few lines of Typescript here, a Dockerfile there, and somehow everything flies. …
Vendor lock-in refers to the technically, economically, or legally restricted ability to switch an IT service provider or platform vendor without …
Net neutrality means: All data on the internet is treated equally. Period. It doesn’t matter whether they come from a corporation, a research …
Digital sovereignty refers to an organization’s ability to manage its digital systems, data flows, and technical dependencies in a way that …
Cloud infrastructure has its justification. Scalability, automation, and globalization of IT resources are now standard. Technically, the major …
Modern generative AI and large language models (LLMs) present unique traffic management challenges for Kubernetes. Unlike typical ephemeral, stateless …
Introduction to Managing Sidecar Containers in Kubernetes In the world of Kubernetes, Sidecar containers are useful helpers that extend …
AI in the Classroom: Opportunities and Challenges for the Future of Education The debate around the use of Artificial Intelligence (AI) in education …
Today, every support request influences customer satisfaction, loyalty, and long-term business success. Unstructured processes, lost tickets, and …
We are excited to announce the general availability of Gateway API v1.3.0! Released on April 24, 2025, this version brings exciting new features. …
When running applications in production, you don’t need pretty dashboards, but hard data. Performance issues never arise when there’s …
Health Data is a Special Case — Both Technically and Regulatorily Processing health data fundamentally differs from traditional corporate IT. It …
DORA is coming. And this time, it’s not just about a few pretty compliance PDFs. What many banks, payment service providers, and FinTechs are …
In most discussions about the Cloud Act, the focus is solely on data location. Data center in Frankfurt? ISO-certified? Encrypted? Sounds good. From …
Why IT and OT Must Converge In modern industrial environments, increasingly complex data streams are emerging at the interface between production and …
The Gap Between Shopfloor and Enterprise IT In more and more companies, IT and OT (Operational Technology) are converging. Production facilities, …
Technological Independence Begins in the Data Center: Why We Rely on European Network Technology Digital sovereignty doesn’t start with legal …
A Technical Project That Raises Political Questions The announcement initially sounded straightforward: The Bundeswehr will build its private cloud …
Digital Sovereignty Begins with Infrastructure Digitalization in Germany is advancing, but it requires a solid foundation. This foundation is the IT …
How Modern IT Sales Build Trust Instead of Disrupting! In the IT industry, traditional sales were long dominated by persistent calls, generic emails, …
The Cloud Loses Its Innocence The cloud was once the epitome of efficiency, scalability, and digital transformation. However, the reality has caught …
Hey, I’m Fabian – engineer, entrepreneur, and European citizen residing in Germany. For over 10 years, I’ve been part of the …
A senior investigator of the International Criminal Court loses access to his emails – because a US President imposes sanctions. Microsoft complies. …
Today, we are excited to announce the release of etcd v3.6.0, the first minor release since etcd v3.5.0. This update brings numerous new features, …
Finally, Secure Access to Private Container Images! In the world of Kubernetes, surprises are not uncommon, and the functionality of imagePullPolicy …
Germany discusses data sovereignty but remains technologically dependent. How this relates to our culture and what needs to change to achieve digital …
A sovereign cloud requires more than just a data center in Europe. How the CLOUD Act collides with the GDPR—and which technologies enable true data …
The CLOUD Act allows US authorities to access European data, conflicting with the GDPR. Learn how companies can protect themselves technically and …
The US Cloud Act allows US authorities to access European servers—a clear conflict with the GDPR. Discover how companies can protect themselves and …
Managing Kubernetes cluster stability becomes increasingly critical as your infrastructure grows. One of the most challenging aspects of operating …
Kubernetes Volume Populators are now generally available (GA)! With the AnyVolumeDataSource feature, users can now specify any suitable custom …
Digital transformation is no longer a thing of the future – it is a reality. It affects not only e-commerce or digital tools in the office but has …
The new supplementalGroupsPolicy feature was introduced as an optional alpha feature in Kubernetes v1.31 and has now moved to beta in v1.33. The …
Image Volumes were introduced as an alpha feature in Kubernetes version v1.31 and have now been promoted to beta status in version v1.33. This is part …
In Kubernetes v1.33, support for user namespaces is enabled by default. This means that Pods, when system requirements are met, have the ability to …
Kubernetes v1.33 introduces exciting innovations that are highly beneficial for both developers and DevOps teams. This version includes 64 …
In a detailed blog series, Nextdoor’s Core Services team provides valuable insights into their strategies for optimizing database and cache …
Beneath the glittering facade of the tech industry, where bean bags, free kombucha, and flexible working hours are touted as perks, lies a deeper, …
In today’s work landscape, the concept of remote work has brought about a remarkable change by offering flexibility while simultaneously …
Kubernetes has established itself as the preferred platform for deploying complex, distributed systems. One of the most powerful yet subtle design …
CVE shutdown averted – but Europe is charting its own course. With the new vulnerability database from ENISA, the EU is strengthening its digital …
The sudden dismissal of Jutta Horstmann as the managing director of the Center for Digital Sovereignty (ZenDiS) raises fundamental questions about …
The US funding for the CVE list has been stopped with immediate effect—potentially dramatic consequences for global IT security. Why Europe must now …
Digital sovereignty doesn’t end with tool selection or architecture. It only reaches its full potential when operations are efficient, secure, …
Digital sovereignty is not a feature – it is an architectural principle. After transitioning our toolchain to open source, the next step was to …
Digital sovereignty begins with concrete decisions. In this post, we show how we at ayedo have replaced key SaaS tools with powerful open-source …
The dependency on US SaaS providers is increasingly costing German companies control, money, and innovation power. ayedo demonstrates how Open Source …
Microsoft Bids Farewell to Traditional Server Models – What’s Next? Starting July 2025, the licensing model for Microsoft’s on-premise …
The Kubernetes Scheduler is a crucial component of the Control Plane that determines which node a Pod will run on. Anyone using Kubernetes relies on a …
Kubernetes vs. Docker – Why You Need Both and Shouldn’t Pit Them Against Each Other The question of whether to use Kubernetes or Docker is …
Introduction In the world of Kubernetes orchestration, the Ingress NGINX Controller plays a central role as it serves as the gateway for traffic to …
In the world of Kubernetes development, there’s exciting news: JobSet has been introduced, an open-source API specifically designed for managing …
A Look at SIG etcd In this article, we take a look at the Kubernetes Special Interest Group (SIG) etcd. We spoke with some of the key players to learn …
Introduction In the world of Kubernetes, there are constant developments aimed at improving the performance and efficiency of applications. One of the …
Kubernetes 1.31 has completed the largest migration in Kubernetes history by removing the in-tree cloud provider. Although the migration of components …
The Uncertain Future of EU-US Data Transfer Regulatory uncertainty surrounding data exchange between the EU and the US is increasing once again. …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
Efficient management of Kubernetes clusters is becoming increasingly important, especially as cluster size grows. One of the biggest challenges with …
With Kubernetes 1.32, the storage manager has officially reached General Availability (GA) status. This marks a significant step towards more …
The Kubernetes Scheduler is the core component that determines which nodes will run new pods. It processes these new pods one at a time. Therefore, …
The latest version of Kubernetes, v1.32, brings exciting innovations and improvements! This version, named “Penelope,” marks the tenth …
Kubernetes v1.32: Optimizing Your Container Infrastructure with ayedo In the dynamic world of container orchestration, Kubernetes plays a central …
Kubernetes SIG Network is excited to announce the general availability of Gateway API v1.2! This version of the API was released on October 3rd, and …
We are the organizers of the Kubernetes Upstream Training in Japan. Our team consists of members who actively contribute to Kubernetes, including …
Introduction In today’s software development landscape, where AI-powered tools like GitHub Copilot and similar assistants provide support, many …
Maximize Data Sovereignty with Our Internal RAG Solution and the ayedo Cloud Introduction In today’s digital era, efficiently managing large …
Introduction In the context of Deaf Awareness Month, the CNCF Deaf and Hard-of-Hearing Working Group (DHHWG) takes center stage. We take a look at the …
Kubernetes 1.31 introduces an exciting new feature that enhances the handling of group memberships in containers within Pods. This change aims to …
In Kubernetes v1.31, we are excited to introduce a significant improvement in CPU management: the distribute-cpus-across-cores option for the …
Successful Partnership: ESCRA and ayedo Revolutionize ZTNA with Kubernetes and Cloud Hosting Strategic partnerships are crucial for combining …
In this post, we will show you how to deploy the dashboard app getHomepage using Docker Compose and Traefik, and access it through a DNS entry like …
Introduction In this post, we will show you how to deploy Baserow using Docker Compose and Traefik and make it accessible via a DNS entry like …
Introduction In this post, we will show you how to deploy Mattermost using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction In this post, we will show you how to deploy Paperless-ngx using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction: Deploying Portainer with Traefik Labels and Accessing via DNS Entry In this post, we’ll show you how to deploy Portainer using …
Introduction In this post, we demonstrate how to deploy Stirling PDF using Docker Compose and Traefik, and access it via a DNS entry like …
Introduction In this post, we will show you how to deploy the to-do app Vikunja with Docker Compose and Traefik and access it via a DNS entry like …
In this tutorial, you will learn how to set up and configure Traefik as a reverse proxy using Docker Compose. Traefik offers a modern and flexible …
Ten years ago, on June 6, 2014, the first commit of Kubernetes was published on GitHub. This initial commit, comprising 250 files and 47,501 lines of …
ayedo Cloud: Performance Optimization for Cloud-Native Applications The performance of cloud-native applications is a critical factor for business …
In the world of container orchestration, Kubernetes is the undisputed leader, powering some of the most complex and dynamic applications globally. …
Following the general release of the Gateway API last October, the Kubernetes SIG Network is excited to announce the release of v1.1 of the Gateway …
The Impact of ISO 27001 Certification on Data Protection and Data Integrity Data breaches and cyber-attacks are ubiquitous threats that can affect …
The Kubernetes Container Runtime Interface (CRI) is the central link between the kubelet and the Container Runtime. These runtimes must provide a …
Linux offers various namespaces to isolate processes from each other. A typical Kubernetes Pod runs in a network namespace to isolate network identity …
Introduction Have you ever thought about creating your own cloud? Maybe you’ve even tried it! With Kubernetes, it’s certainly possible, …
In our series on building your own cloud with the Kubernetes ecosystem, we continue our journey today. In the previous article, we explained how to …
In this exciting continuation of our series on Kubernetes, we explore how you can run Kubernetes in Kubernetes (K8s in K8s). Technologies like Kamaji …
Kubernetes has established itself as a key technology for managing and operating containerized applications, including those used in the Internet of …
Kubernetes can help a software or digitalization agency generate additional revenue through the highly available operation of software in various …
Kubernetes plays a crucial role in supporting open source AI applications by providing a robust, scalable, and flexible platform for deploying, …
Laravel is one of the most popular PHP frameworks, offering a range of features that make it an excellent choice for developing Software-as-a-Service …
By leveraging Kubernetes, developers and operations teams can overcome the challenges of traditional hosting environments, making their PHP …
Kubernetes - Managed or Manual? Should you manage Kubernetes yourself or entrust the responsibility to Managed Service Providers? With Kubernetes …
In the world of container orchestration, two technologies are at the center of the discussion: Docker Swarm and Kubernetes. Both offer powerful …
Docker and Docker Swarm are closely related technologies in the realm of containerization and orchestration, each covering different aspects of …
Netbird is a modern peer-to-peer (P2P) networking solution that enables the creation of a secure, scalable, and easy-to-manage network. It is an …
PostgreSQL and MongoDB are two of the most popular database management systems (DBMS) that fundamentally differ in their approach and use cases. …
Cilium is an open-source project that provides network security and monitoring for container orchestration systems like Kubernetes. It uses a modern …
Apache Kafka and NATS are high-performance messaging systems used in modern distributed architectures to connect components through message exchange. …
PostgreSQL and MariaDB are both popular open-source relational database management systems (RDBMS) used for storing and managing data. Although both …
GitLab and GitHub are both very popular platforms for version control and collaboration on software development projects based on Git. Although they …
Prometheus and VictoriaMetrics are both powerful time-series databases suitable for monitoring and alerting tasks in complex IT environments. …
Redis and KeyDB are both powerful in-memory database systems known for their speed and efficiency in data processing. Despite their similarities, …
In today’s digital world, managing user identities and access permissions is a central challenge for companies of all sizes. Single-Sign-On …
ArgoCD and Flux are both tools used for Continuous Deployment (CD) and GitOps workflows in Kubernetes clusters. They automate the deployment of …
Criterion Kubernetes VMware Technology Container orchestration platform Virtualization platform Level of Abstraction Virtualizes applications at the …
TL;DR Criterion AWS EKS Azure AKS Google GKE Pricing Complex, based on instances, services, and data transfer Varies depending on node type and …
Learning about Kubernetes and the entire ecosystem of technologies surrounding it is not without challenges. In this article, we take a look at the …
Criterion Kubernetes OpenShift Developer Open-source project by Google, managed by the CNCF Container platform developed by Red Hat, based on …
Deploying Kubernetes on-premise, in a private, self-managed infrastructure, can present several challenges that need to be addressed. Here are some …
Criterion Kubernetes Docker Functionality and Purpose Container orchestration platform for deploying, scaling, and managing container applications …
Kubernetes is a powerful open-source platform designed to simplify the management of container applications. To understand what Kubernetes is and …
Introduction The Release Special Interest Group (SIG Release) is the heart of Kubernetes when it comes to releasing new features and bug fixes every …
Welcome to a topic that is crucial for every Kubernetes user: the Container Network Interface (CNI). In this discussion, we not only explore the …
Network security is often neglected, even though it is of high importance! Both in the private and business sectors, often only one tool is used, and …
In today’s world, where technology plays a central role in our daily lives, the idea of a connected home - a Smart Home - has gained …
The release of Kubernetes 1.29 introduces an exciting new feature: an alpha capability that allows volumes to be modified by changing the …
In a complex IT landscape, monitoring and understanding application performance can become a real challenge. The open-source framework OpenTelemetry …
There is a lot of discussion about whether not using Kubernetes resource limits could actually be beneficial (for example, in articles like For the …
Zero-downtime deployments with Docker Swarm and Portainer Part 2/2 What have we achieved so far? Prerequisites Linking Portainer Stack with GitHub …
Every year, just before the official opening of KubeCon+CloudNativeCon, a very special event takes place that holds a special place in the hearts of …
We are excited to announce the release of Gateway API v1.0 on behalf of the Kubernetes SIG Network! This release marks a significant milestone for the …
Today, we introduce ingress2gateway, a tool that assists you in migrating from Ingress to the Gateway API. The Gateway API is on the verge of its GA …
Efficiency and scalability are often critical factors for the success of a project in the fast-paced world of software development. A technology that …
On September 26, 2023, nearly 50 contributors gathered for the Kubernetes Contributor Summit in Shanghai, as part of the KubeCon + CloudNativeCon + …
Ever wonder how software gets deployed onto a system that is deliberately disconnected from the Internet and other networks? These systems are often …
In the digitally connected world, constantly logging into various services is more than just a nuisance—it’s a challenge for data security and user …
In modern software development, container orchestration is no longer an unfamiliar term but an essential tool for DevOps teams. It enables efficient …
Kubernetes v1.25 introduced support for user namespaces only for stateless Pods. With Kubernetes 1.28, this limitation has been lifted following some …
Zero-downtime deployments with Docker Swarm and Portainer Part 1/2 What are Zero-downtime deployments? Rolling Updates vs Zero-downtime deployments …
On August 15, 2023, the Kubernetes project announced the general availability of the community-managed package repositories for Debian and RPM …
Operating your apps in Kubernetes is a breeze with ayedo. However, sometimes the built-in tools aren’t enough to ensure the smooth operation of …
With ayedo, running your apps in Kubernetes is a breeze. With Docker Swarm, we offer a production-ready alternative to Kubernetes for those who are …
Mattermost is used in many companies as a central communication platform. It is comparable to Microsoft Teams or Slack. So, what sets Mattermost apart …
Introduction The Kubernetes community took a significant step with version v1.24 by digitally signing their container image-based artifacts. With the …
Probes are checks that the Kubelet of a node performs on or against a Pod to verify its status. Using probes, you can check, for example, whether the …
In the latest version of Kubernetes, v1.27, there’s an exciting new feature: the ability to adjust CPU and memory resources for running pods …
Kubernetes v1.27, released in April 2023, introduces improvements in Memory QoS (alpha), enabling more efficient memory management on Linux nodes. …
Five Key Features of Portainer 1. Docker Environments 2. Access Control 3. CI/CD Capabilities 4. Monitoring 5. Kubernetes As mentioned in the …
Since the introduction of the auto-refreshing official CVE feed as an alpha feature in version 1.25, we have made significant improvements and …
Why This Post? What is Portainer? Practical Section Deploying Portainer Setting Up Portainer Deploying an Application Conclusion For those who want …
In my previous article, I introduced the topic of Checkpointing in Kubernetes and explained how it can be set up. This time, I want to show you how to …
Have you ever wondered how to set up a cluster of thousands of nodes in seconds, simulate real nodes with low resource requirements, and test your …
In today’s digital world, cyber-attacks are more complex than ever. Companies providing cloud services continuously invest in security measures, …
Kubernetes has established itself as a leading orchestration engine used by many organizations to efficiently manage workloads. Proper pod scheduling …
Kubernetes v1.26 brings significant advancements in network traffic management. Two features, support for internal traffic policy for Services and …
The release of Kubernetes 1.26 introduces a stable implementation of the Job controller, which reliably tracks a large number of highly parallel jobs. …
Kubernetes v1.26 introduces an exciting new feature: the general availability (GA) of Kubelet Credential Provider Plugins. This extensible plugin …
In Kubernetes 1.26, the first alpha version of Validating Admission Policies is available! These new policies utilize the Common Expression Language …
Introduction With the release of Kubernetes 1.26, the Device Manager is now generally available! This feature, originally introduced in Kubernetes …
Introduction In the latest version of Kubernetes 1.26, there is an exciting new feature: the Alpha API for dynamic resource allocation. This feature …
The long-awaited day has arrived: HostProcess containers, the Windows counterpart to Linux privileged containers, are finally generally available in …
Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows for the creation of stateful copies of a running …
Introduction In the world of cloud-native technologies, OpenTelemetry (OTEL) is often cited as the key to enhancing application monitoring. This …
The IT Planning Council adopts the document “German Administrative Cloud Strategy: Framework for Target Architecture 2.0”. Download PDF …
Kubernetes v1.25 introduces a significant new feature: support for user namespaces. This functionality allows for secure workloads in Kubernetes by …
Introduction With the release of Kubernetes 1.25, there are exciting updates for developers and DevOps teams: Two important features, minReadySeconds …
A long-standing wish of the Kubernetes community has been to create a programmatic way to track security issues in Kubernetes (also known as …
Building cloud native software and running it in production is quite a challenge these days. Besides getting the architecture of your software right, …
The release of Kubernetes v1.25 marks a significant milestone for pod security controls: the Pod Security Admission Controller (PSA) has reached …
The PodSecurityPolicy (PSP) was removed with Kubernetes v1.25. This decision was previously announced in the blog post PodSecurityPolicy Deprecation: …
Did you know that Kubernetes v1.24 includes a total of 46 enhancements? In just four months, the team has integrated an impressive number of new …
Introduction The official documentation is the central resource for any open-source project. For Kubernetes, this is a continuously growing Special …
The Working Group for Structured Logging has introduced new features to the logging infrastructure in Kubernetes 1.24. In this article, you’ll …
The release of Kubernetes 1.24 introduces Storage Capacity Tracking as a generally available feature. This innovation enables developers and DevOps …
The Ingress is one of the most frequently targeted components in Kubernetes. An Ingress typically defines an HTTP reverse proxy exposed to the …
Ensuring the reliability of SIG Node upstream code is a continuous effort that takes a lot of behind-the-scenes effort from many contributors. There …
Introduction The SIG Multicluster is the Special Interest Group focused on applying Kubernetes concepts beyond the confines of a single cluster. …
At Box, we use Kubernetes (K8s) to manage hundreds of microservices that enable us to stream data at petabyte scale. As part of our deployment …
The Security Profiles Operator (SPO) is a pivotal extension for Kubernetes, significantly simplifying the management of seccomp, SELinux, and AppArmor …
Kubernetes v1.22, released in August 2021, introduces a new alpha feature that enhances how Linux nodes manage memory resources. This advancement …
Introduction The Kubernetes community is facing a significant change: the removal of the Dockershim component is imminent. This part of Kubernetes, …
Introduction In Kubernetes, a Node represents a single machine in your cluster. SIG Node is responsible for these crucial Node components and supports …
Kubernetes v1.22 introduced an exciting new alpha feature for clusters with Windows nodes: HostProcess Containers. HostProcess Containers extend the …
On April 23, 2021, the release team adopted a Kubernetes Enhancement Proposal (KEP) that changes the release cycle from four releases per year to …
The Kubernetes API is constantly evolving, which means that older APIs are regularly reorganized or updated. With the release of Kubernetes 1.22, …
The Kubernetes community has taken a crucial step towards improving transparency and traceability of its activities. With the introduction of the …
Kubernetes 1.21 introduces the first officially supported stable metrics with the completion of the Metrics Stability Framework. These new stable …
The Ingress resource is one of Kubernetes’ many success stories. It has spawned a diverse ecosystem of Ingress controllers that are deployed in …
In Kubernetes v1.21, the CronJob resource has reached General Availability (GA). This not only means that CronJobs are now stable and ready for …
In October 2020, the Kubernetes Dashboard officially celebrated its fifth anniversary. As the main project maintainers, we can hardly believe that so …