All about the topic

Tutorial

Last post

AI & Cloud: best practices and examples

AI & Cloud: best practices and examples

AI and cloud technologies are closely linked. Companies are increasingly relying on AI to automate processes, optimize decisions and develop innovative products. At the same time, the demands on infrastructure, scalability and security are increasing in order to operate complex AI workloads efficiently. Managed cloud services offer the perfect solution here: they simplify deployment, speed up processing and allow companies to focus on their core business. In this article, we show why AI and...

read more

All contributions

Cloud Deployment in 15 Minutes with Terraform and Docker

Cloud Deployment in 15 Minutes with Terraform and Docker

In today's world of the cloud, it's easy to lose track: VMs, Kubernetes, Serverless, the possibilities are almost endless, and the "best" way to run applications is not always clear. It is often worth creating a proof of concept and going through a cloud deployment...

Immutable Backups with S3: How to Protect Your Data

Immutable Backups with S3: How to Protect Your Data

Object Storage offers a number of technical features that can look complicated and seemingly superfluous when taken out of context. When combined, however, they become extremely handy for certain use‑cases - ​for example, immutable backups with S3. In this hands‑on...

Kubernetes Policies with OPA Gatekeeper

Kubernetes Policies with OPA Gatekeeper

Once you have got started with Kubernetes and are in productive operation, new requirements are often added to the existing environments over time. These can be diverse: from consistent labels for rolled-out applications to security-relevant settings, there are many...

VM rescue on OpenStack

VM rescue on OpenStack

Accidentally terminated the SSH service, deleted the boot partition, or complications after updating the operating system? Most of us have stood in front of an inaccessible, misconfigured or otherwise broken server at some point and no longer had access. Fortunately,...

Nextcloud configuration with Kustomize

Nextcloud configuration with Kustomize

In this guide, we will show you how to implement your Nextcloud configuration with Kustomize on a Kubernetes cluster. Note: These instructions are not intended for productive use. It only serves as a basic illustration of how you can customize applications with...

LUKS Encrypted storage in Kubernetes

LUKS Encrypted storage in Kubernetes

Today, more and more stateful applications are finding their way into production Kubernetes clusters. Therefore, it is likely that you are already using persistent volumes or persistent volume claims(PVs/PVCs) for the workloads you or your organization deploy. If you...

LUKS encrypted storage on OpenStack

LUKS encrypted storage on OpenStack

Conscientiously securing your IT landscape has become increasingly important in recent years. With a steady increase in (user) data that needs to be managed, processed and stored, encrypting this data should be on your agenda for a holistically secured IT...

Secure Ingress-NGINX with Cert-Manager

Secure Ingress-NGINX with Cert-Manager

In one of the first tutorials on our site, we showed you how to install and set up Ingress-NGINX in your cluster. Today we'll go one step further and look at how you can secure Ingress-NGINX and your services with the help of TLS certificates through Cert-Manager!...

Migration of servers on VMware to OpenStack

Migration of servers on VMware to OpenStack

In this tutorial we look at migrating servers on VMware to OpenStack. Following the recent acquisition of VMware by Broadcom, many smaller Cloud Service Providers (CSPs) have received notices to terminate their membership in VMWare's partner program in recent weeks....

Kubernetes with Cilium: Traffic filtering based on L7

Kubernetes with Cilium: Traffic filtering based on L7

With the new version of the Cilium CNI on our Kubernetes service, you get the ability to filter traffic based on L7 properties. This is normally reserved for service meshes and can be very helpful in securing your services. In this tutorial, we will secure an API...

Terraform and OpenStack

Terraform and OpenStack

Many of you are probably already familiar with the use of Terraform in combination with Azure or AWS. And although these are the most commonly used platforms, there are uncertainties - often with regard to data protection (GDPR) - and therefore still a need for...

RWX with the NFS Ganesha Provisioner

RWX with the NFS Ganesha Provisioner

You have the requirement that your application must scale across multiple nodes for load balancing, but need access to a common PVC? For this purpose, you need a PVC that is ReadWriteMany (RWX)-capable. As part of our Managed Kubernetes Cluster, it is possible to...

Increase persistent volumes in Kubernetes

Increase persistent volumes in Kubernetes

Do you want to enlarge a PersistentVolume (PV) in Kubernetes? This tutorial will show you how to do this. What PVs are and how to create them is explained in the tutorial Creating persistent volumes in Kubernetes, on which this tutorial is based. You need more...

Manage and assign security groups

Manage and assign security groups

Once you have clicked on the first new instance in our cloud web interface and assigned an SSH public key with which you want to connect to this VM, you are faced with the small problem that you cannot access the instance from outside; we have the "default" security...

Monitoring for machines with Icinga 2 Master

Monitoring for machines with Icinga 2 Master

With our OpenStack Cloud, it is child's play to set up your own environment according to your own ideas. Start a few machines quickly and easily using Terraform, make the service available to the outside world via an attached floating IP and associated security group...