Analytical Databases in the Cluster: ClickHouse and TimescaleDB for High-Volume Data
In an industrial concept, millions of data points are generated daily. When these data flow into Apache Kafka, the next critical question arises: …
Tags
Content with this tag
In an industrial concept, millions of data points are generated daily. When these data flow into Apache Kafka, the next critical question arises: …
In modern manufacturing, data is generated not in batches, but as a continuous stream. Sensors on rolling mills, flow meters in chemical reactors, …
In many data engineering teams, starting a new project follows a frustrating pattern: First, Python versions, R libraries, SQL drivers, and CUDA …
TL;DR A well-named, clearly structured Polycrate workspace is half the battle: a consistent name (e.g., acme-corp-automation) and a simple directory …
In many companies, the process of digital signing is the last “analog island” or a dangerous compliance breach. Maintenance logs are …
In many data science teams, the workday begins with frustration: A shared notebook won’t run because a library is missing. A model trained on …
TL;DR Plain Ansible is a powerful tool for ad-hoc automation, quick scripts, and simple setups – but teams quickly hit limits with dependencies, …
TL;DR Unencrypted SSH keys, plaintext passwords, and credentials in wikis pose a compliance risk—especially under GDPR (since 25.05.2018) and NIS-2 …
The Invisible Modernization of Critical Infrastructure It’s often not the visible features that determine the stability of modern platforms, …
Why the Next Evolutionary Stage of the Platform Has Already Begun The discussion around AI infrastructure is noticeably shifting: away from mere …
Why We Consciously Don’t Have a Booth This Year – and Expect More Than Ever Before CloudFest is one of the few events where the term …
TL;DR In Polycrate, multi-cluster automatically means multi-workspace: one workspace manages exactly one Kubernetes cluster. That keeps …
TL;DR In this post, we build a Polycrate workspace that manages on-premise servers and Azure VMs in a shared inventory—including Resource Groups, …
TL;DR Ansible can fully automate Azure Entra ID (formerly Azure AD) via the azure.azcollection: users, groups, app registrations, and even …
TL;DR Most environments are hybrid: Windows servers for AD, file services, and specialized applications, Linux for web, databases, and automation – …
TL;DR Migrating from centralized hyperscaler platforms to modern decentralized architectural approaches requires precise planning and execution. Best …
TL;DR Active Directory changes via GUI or non-versioned PowerShell scripts are error-prone, hard to track, and not very collaborative. With Ansible …
Europe’s Missed Opportunity – and Why It’s Not Yet Lost Over the past decade, the cloud has evolved into the central infrastructure of …
Why Every Cloud Strategy Needs an Exit Plan Many IT strategies begin with the same question: Which platform offers us the best opportunities today? …
For years, the cloud debate has been dominated by a simple narrative: those who want to run modern software cannot bypass the major hyperscalers. …
Why Dependencies Are Becoming More Dangerous Cloud lock-in is not a new topic. For years, companies have been discussing how challenging it can be to …
Why the Supposed Alternative is Already a Reality In many companies, Microsoft 365 is still considered the standard for digital collaboration. Teams …
TL;DR In a world where Microsoft 365 and Google Workspace set the standard, companies often pay with their data. The GDPR compliance of US clouds is …
TL;DR Set up WinRM properly once with HTTPS, certificate, and firewall rules, and you’ll have a stable foundation for Ansible automation on …
TL;DR You build a reusable Polycrate workflow that automatically executes backup → update → verify on your Linux servers – including rollback via …
TL;DR Managing a single server with Ansible is quick and easy, but once you add 10, 50, or 200 hosts, the inventory becomes a critical scaling factor. …
Those deploying Large Language Models (LLMs) or complex deep learning pipelines in production quickly realize: A standard Kubernetes cluster …
In modern IT infrastructure, the GPU has become the new CPU. Whether it’s Large Language Models (LLMs), computer vision, or complex data …
TL;DR Polycrate structures Ansible automation into three building blocks: Blocks, Actions, and Workspaces – eliminating the classic playbook sprawl …
TL;DR Install Polycrate with a single curl command – no pip, no virtualenv, no local Ansible installation required. Initialize a workspace, understand …
TL;DR Ansible is a strong foundation: agentless, idempotent, human-readable YAML, and a vast module ecosystem make it the de facto standard for …
The era of purely manual intervention in infrastructure incidents is coming to an end. While GitOps with ArgoCD defines the state-of-the-art for …
Anyone seriously running Infrastructure-as-Code knows the problem: the workspace in the Git repository contains kubeconfigs, SSH keys, passwords, and …
Anyone working with Polycrate daily inevitably runs into recurring tasks: checking TLS certificates, verifying DNS records, calculating subnets, …
Europe’s Structural Dependence on Big Tech The debate on digital sovereignty is no longer a technological detail. It is a question of political …
The classic “Data Lake” model has failed. Companies have invested millions in infrastructure to collect data in one place, only to find …
European Cloud Platforms vs. Hyperscalers Sovereignty, Scalability, Security, and Strategic Reality in the Corporate Context Few IT topics are …
Data is the gold of modern logistics. Knowing when and where each package is, who calculates the most efficient routes, and who controls the …
Scaling at the Limit: How Track & Trace Processes Millions of Events in Real-Time During the “Peak Season” – from Black Friday to …
Skill Shortage in Hospital IT: Managed Platforms as a Strategic Lever The skill shortage in hospital IT presents a significant challenge. To address …
TL;DR In modern IT, data doesn’t rest; it flows. Apache Kafka serves as the central nervous system for these real-time data streams. While …
TL;DR Security often fails due to usability. While tools like HashiCorp Vault are powerful but operationally complex, and AWS Secrets Manager exists …
Retail is faster than ever today. A new trend on social media, a sudden strategic shift by the competition, or the introduction of a new payment …
In modern retail, the fiercest competition no longer takes place on the shelves, but at the data level. Understanding what the customer will want …
It’s the nightmare of every e-commerce manager and retail CTO: Black Friday is approaching, marketing campaigns are in full swing, and just at …
Considering Real Observability Needs Observability determines how well systems can be understood, operated, and evolved. It is not an add-on for …
Service or Architectural Decision? CI/CD is often treated as a tool question: Which service, which pipeline, which provider? In reality, CI/CD is an …
Storage as a Cloud Feature or as a Controllable Platform Persistent storage is one of the most inconspicuous yet powerful layers of modern platforms. …
Certificates as a Cloud Service or as Part of the Platform Architecture TLS certificates are often considered a necessary security detail. However, …
Data Warehouse as a Cloud Product or as an Open Analytical Platform Analytical data is no longer just an appendage to reporting. It forms the basis …
Pipeline Orchestration or GitOps as an Operational Model CI/CD is often treated as a tool question: Which pipeline, which runner, which service? In …
Version Control as a Cloud Component or Platform Core Version control is often reduced to a technical minimum: store code, track changes, done. In …
Container Registry as a Cloud Service or a Controllable Platform Component Container registries may seem like a technical detail at first glance. …
Secrets as a Hyperscaler Service or as an Open Developer Security Platform Secrets are among the most inconspicuous yet critical components of modern …
In the traditional server world, the mantra was: “Better too much RAM than too little.” In Kubernetes, this mindset leads directly to a …
The classic Horizontal Pod Autoscaler (HPA) of Kubernetes is like a thermostat: When the room gets too warm (CPU > 80%), the air conditioning …
“Base64 is not encryption.” This phrase should be displayed prominently in every platform engineering team. Default Kubernetes Secrets …
“We can’t move that to the cloud, it’s a monolith.” We hear this sentence often. However, modernization in 2026 doesn’t …
When companies invest in Platform Engineering, 90% of resources often go into technology: Kubernetes clusters, CI/CD pipelines, and security …
With version 0.11.3, the Polycrate API addresses a critical bug in the K8sCluster filter that impacted operator communication. The Problem The …
In the past two years, “Internal Developer Platform” has become a buzzword. However, while Gartner praises the IDP as a remedy for …
When discussing the shift to Cloud-Native and Kubernetes, we often focus on architecture, providers, and costs. However, the most critical variable …
Kubernetes has long been the standard when it comes to scalable and highly available software platforms. Anyone wanting to operate Kubernetes in the …
With version 0.29.2, Polycrate receives an important bugfix release with corrections for the Kubernetes Operator and critical panic fixes. Operator: …
With version 0.29.0, Polycrate receives significant improvements for the Kubernetes Operator and integrated CLI tools. Operator Auto Workspace …
With version 0.28.0, Polycrate receives its most comprehensive feature update yet. Three core areas are in focus: secure workspace encryption, an …
With the new digital strategy, Bavaria wants to technically mesh state and municipalities more closely, reduce IT security risks, and build a uniform …
The recent outages of central internet services have not only disrupted websites and APIs. They have revealed a structural problem that has been …
TL;DR Starting point is a multi-tenant Django SaaS application, which is taken from the first line of code to production operation on the ayedo …
TL;DR Multi-Tenant deployments consolidate many customers in a shared environment with logical isolation (e.g., via namespaces), enabling economies of …
TL;DR Managed Backing Services on the ayedo SDP shift the focus from operations to usage: PostgreSQL, Redis/Valkey, and Kafka are available as robust, …
Delos Cloud vs. Stackit Workspace – Wolves in Sheep’s Clothing The discussion around digital sovereignty in Germany and Europe is in full …
DevOps Still Isn’t Working Why ego, responsibility, and reality continue to thwart the dream of ‘shared ownership’. Over a decade …
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear severity levels, thoughtful routing, and …
TL;DR Observability is based on three pillars – metrics, logs, and traces – and is translated into a practical monitoring model for modern, often …
The International Criminal Court (ICC) in The Hague is taking a significant step in response to recent political tensions with the USA: it is ending …
TL;DR GitOps describes an approach where Git serves as the central, versioned source for the desired state of your infrastructure and applications; …
TL;DR Secrets in Git, classic Kubernetes secrets, and manual processes are no longer sufficient for zero-trust requirements and modern regulations. …
TL;DR A modern container registry is now a central compliance tool, especially in the context of the Cyber Resilience Act, NIS-2, and DORA. Harbor …
TL;DR GitLab CI/CD becomes the central orchestrator of your delivery workflow: clearly structured stages (build, test, package, deploy) make your …
Starting December 2025, Microsoft will enhance its collaboration platform Teams with a feature that automatically detects the actual work location of …
TL;DR ohMyHelm is a universal Helm chart wrapper that delivers production-ready workloads without requiring teams to maintain their own templates – …
TL;DR Velero is a mature open-source tool for backups, migration scenarios, and disaster recovery in Kubernetes environments – making it a central …
TL;DR Kyverno is a Kubernetes-native policy engine that allows you to define security and operational policies directly as YAML and enforce them …
TL;DR Keycloak is a mature open-source Identity & Access Management (IAM) solution that supports modern protocols like OAuth2, OpenID Connect …
TL;DR Modern compliance requirements like NIS-2, DORA, and GDPR demand robust, verifiable observability: metrics, logs, and traces must be …
TL;DR Harbor is an open-source container registry (CNCF Graduated Project) that combines registry functionality, security scanning, SBOM generation, …
TL;DR Cilium leverages eBPF to execute network functions directly in the Linux kernel, enabling high-performance, identity-based networking for modern …
TL;DR The ayedo Software Delivery Platform combines a production-ready Kubernetes distribution, the automation framework Polycrate, and the Helm …
TL;DR The Cloud-Native community has established a comprehensive “software logistics” system with OCI, Helm, and the Kubernetes API: …
TL;DR The modern Software Development Lifecycle (SDLC) is based on cloud-native architectures, automated pipelines, and a clear separation of …
TL;DR Factors 7–12 of the 15-Factor-App primarily address operations, scaling, and maintainability—exactly where modern container platforms like …
TL;DR Factors 1–6 of the 15-Factor App define the internal lifecycle of an application: from the codebase through dependencies and configuration to …
TL;DR Heroku’s 12-Factor App set a clear standard for cloud-compatible applications in 2011 – the 15-Factor App extends this foundation with …
The Localmind Case: What Happens When Security Promises Are Not Kept The self-description was promising: “Local & secure AI platform for …
TL;DR The European regulatory landscape is intentionally interconnected: The GDPR forms the foundation, upon which NIS-2, DORA, Cyber Resilience Act, …
TL;DR The EU’s Cloud Sovereignty Framework makes digital sovereignty precisely measurable for the first time – through eight sovereignty …
TL;DR The Data Act comes into effect on September 12, 2025, making data portability, cloud switching, and interoperability mandatory requirements – …
On October 5, 2025, it was revealed that an external support provider for the platform Discord was the target of a cyberattack. Personal data of …
TL;DR The Cyber Resilience Act (CRA) mandates manufacturers of “Products with Digital Elements” (PDE) to demonstrate cybersecurity …
TL;DR On January 17, 2025, the Digital Operational Resilience Act (DORA) will come into effect for financial institutions and key ICT service …
TL;DR NIS-2 expands the scope of EU cybersecurity regulation to 18 sectors, primarily involving medium and large companies in critical and important …
TL;DR The GDPR has required since May 25, 2018, that personal data be protected according to the “Privacy by Design” principle – …
Cloudflare is far more than just a CDN provider. In addition to performance optimization and security features, the platform offers numerous tools …
A critical look at CVE-2025-55241 On September 18, golem.de reported a security vulnerability in Microsoft Entra ID, discovered by security …
The news is making waves: Several npm packages from CrowdStrike – a company known for security and protection – have been compromised. What might …
Internal Developer Platforms (IDPs) have been a hot topic in software development for several years. Companies face the challenge of managing complex …
Summary in Three Points Controlplane on demand: With k3k, you can run a fully-fledged k3s control plane as a Kubernetes workload – without agent …
The Invisible Foundation of Modern Software Cloud-native software development is built on a foundation that usually remains invisible: artifacts. …
The numbers are impressive – and alarming: Over an unsecured Elasticsearch database, 324 million log entries from the streaming platform MagentaTV …
Kubernetes has evolved from an experimental playground to the de facto standard for cloud-native applications in recent years. Its flexibility and …
An Oath of Disclosure – in the Truest Sense of the Word We’ve suspected it for a long time, it was downplayed, relativized, dissected in …
70% of European companies consider their dependency on non-European technology too high. This is not a gut feeling, but the result of the current …
The European Union celebrated itself as a pioneer in regulating digital platforms. With the Digital Markets Act (DMA), it aimed to make a statement: …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
New Features for More Control, Security, and Flexibility On July 1st, our sister company Loopback released a comprehensive update to their cloud …
Digital administration in Saarland is at a standstill. Only 29% of administrative services have been digitized under the Online Access Act (OZG) …
Saarland ranks last in the current Bitkom Länderindex 2024 in the “digital administration” category. Only 29% of the digital …
In industries where systems must operate with utmost reliability and stringent performance requirements, such as telecommunications, high-performance, …
by Leon, 8th Grade I spent three weeks at ayedo – and honestly: The internship was much better than I had imagined. I didn’t just watch; I …
Vendor lock-in refers to the technically, economically, or legally restricted ability to switch an IT service provider or platform vendor without …
Cloud infrastructure has its justification. Scalability, automation, and globalization of IT resources are now standard. Technically, the major …
Introduction to Managing Sidecar Containers in Kubernetes In the world of Kubernetes, Sidecar containers are useful helpers that extend …
Managing Kubernetes cluster stability becomes increasingly critical as your infrastructure grows. One of the most challenging aspects of operating …
Kubernetes Volume Populators are now generally available (GA)! With the AnyVolumeDataSource feature, users can now specify any suitable custom …
Image Volumes were introduced as an alpha feature in Kubernetes version v1.31 and have now been promoted to beta status in version v1.33. This is part …
Beneath the glittering facade of the tech industry, where bean bags, free kombucha, and flexible working hours are touted as perks, lies a deeper, …
In today’s work landscape, the concept of remote work has brought about a remarkable change by offering flexibility while simultaneously …
Kubernetes has established itself as the preferred platform for deploying complex, distributed systems. One of the most powerful yet subtle design …
The Kubernetes Scheduler is a crucial component of the Control Plane that determines which node a Pod will run on. Anyone using Kubernetes relies on a …
Kubernetes is the de facto standard for container orchestration, but when it comes to handling specialized hardware like GPUs and other accelerators, …
We are the organizers of the Kubernetes Upstream Training in Japan. Our team consists of members who actively contribute to Kubernetes, including …
Introduction In the context of Deaf Awareness Month, the CNCF Deaf and Hard-of-Hearing Working Group (DHHWG) takes center stage. We take a look at the …
Kubernetes 1.31 introduces an exciting new feature that enhances the handling of group memberships in containers within Pods. This change aims to …
Ten years ago, on June 6, 2014, the first commit of Kubernetes was published on GitHub. This initial commit, comprising 250 files and 47,501 lines of …
Introduction Have you ever thought about creating your own cloud? Maybe you’ve even tried it! With Kubernetes, it’s certainly possible, …
In our series on building your own cloud with the Kubernetes ecosystem, we continue our journey today. In the previous article, we explained how to …
In this exciting continuation of our series on Kubernetes, we explore how you can run Kubernetes in Kubernetes (K8s in K8s). Technologies like Kamaji …
Kubernetes has established itself as a key technology for managing and operating containerized applications, including those used in the Internet of …
Kubernetes plays a crucial role in supporting open source AI applications by providing a robust, scalable, and flexible platform for deploying, …
In the world of container orchestration, two technologies are at the center of the discussion: Docker Swarm and Kubernetes. Both offer powerful …
PostgreSQL and MongoDB are two of the most popular database management systems (DBMS) that fundamentally differ in their approach and use cases. …
Cilium is an open-source project that provides network security and monitoring for container orchestration systems like Kubernetes. It uses a modern …
GitLab and GitHub are both very popular platforms for version control and collaboration on software development projects based on Git. Although they …
Redis and KeyDB are both powerful in-memory database systems known for their speed and efficiency in data processing. Despite their similarities, …
Learning about Kubernetes and the entire ecosystem of technologies surrounding it is not without challenges. In this article, we take a look at the …
Welcome to ayedo: Your Solution for Cost-Efficient Operation of SaaS Products with Kubernetes As a software company, you know that operating …
Docker is an open-source platform for containerizing applications. It allows developers to package applications and their dependencies into …
Kubernetes is a powerful open-source platform designed to simplify the management of container applications. To understand what Kubernetes is and …
In this article, we demonstrate the fastest and most convenient way to self-host Cal.com with Docker in the Hetzner Cloud. With the help of …
Welcome to a topic that is crucial for every Kubernetes user: the Container Network Interface (CNI). In this discussion, we not only explore the …
There is a lot of discussion about whether not using Kubernetes resource limits could actually be beneficial (for example, in articles like For the …
Every year, just before the official opening of KubeCon+CloudNativeCon, a very special event takes place that holds a special place in the hearts of …
Efficiency and scalability are often critical factors for the success of a project in the fast-paced world of software development. A technology that …
On September 26, 2023, nearly 50 contributors gathered for the Kubernetes Contributor Summit in Shanghai, as part of the KubeCon + CloudNativeCon + …
Ever wonder how software gets deployed onto a system that is deliberately disconnected from the Internet and other networks? These systems are often …
In the digitally connected world, constantly logging into various services is more than just a nuisance—it’s a challenge for data security and user …
On August 15, 2023, the Kubernetes project announced the general availability of the community-managed package repositories for Debian and RPM …
Operating your apps in Kubernetes is a breeze with ayedo. However, sometimes the built-in tools aren’t enough to ensure the smooth operation of …
Probes are checks that the Kubelet of a node performs on or against a Pod to verify its status. Using probes, you can check, for example, whether the …
In the latest version of Kubernetes, v1.27, there’s an exciting new feature: the ability to adjust CPU and memory resources for running pods …
Kubernetes v1.27, released in April 2023, introduces improvements in Memory QoS (alpha), enabling more efficient memory management on Linux nodes. …
In my previous article, I introduced the topic of Checkpointing in Kubernetes and explained how it can be set up. This time, I want to show you how to …
Kubernetes has established itself as a leading orchestration engine used by many organizations to efficiently manage workloads. Proper pod scheduling …
Kubernetes v1.26 brings significant advancements in network traffic management. Two features, support for internal traffic policy for Services and …
The release of Kubernetes 1.26 introduces a stable implementation of the Job controller, which reliably tracks a large number of highly parallel jobs. …
Introduction With the release of Kubernetes 1.26, the Device Manager is now generally available! This feature, originally introduced in Kubernetes …
Infrastructure as Code (IaC) supports DevOps best practices by facilitating the creation of repeatable infrastructure environments using a declarative …
Introduction With the release of Kubernetes 1.25, there are exciting updates for developers and DevOps teams: Two important features, minReadySeconds …
Building cloud native software and running it in production is quite a challenge these days. Besides getting the architecture of your software right, …
Did you know that Kubernetes v1.24 includes a total of 46 enhancements? In just four months, the team has integrated an impressive number of new …
Introduction The official documentation is the central resource for any open-source project. For Kubernetes, this is a continuously growing Special …
Ensuring the reliability of SIG Node upstream code is a continuous effort that takes a lot of behind-the-scenes effort from many contributors. There …
Introduction The SIG Multicluster is the Special Interest Group focused on applying Kubernetes concepts beyond the confines of a single cluster. …
Kubernetes v1.22, released in August 2021, introduces a new alpha feature that enhances how Linux nodes manage memory resources. This advancement …
Introduction In Kubernetes, a Node represents a single machine in your cluster. SIG Node is responsible for these crucial Node components and supports …
In Kubernetes v1.21, the CronJob resource has reached General Availability (GA). This not only means that CronJobs are now stable and ready for …