Progressive delivery visualization with traffic shifting

Progressive Delivery with Argo Rollouts: Canary and Blue-Green Deployments

Every deployment is a risk. The question isn’t whether something will go wrong — it’s how much damage it will cause when it does. Traditional Kubernetes deployments are all-or-nothing. You push a new version, and within seconds, 100% of your traffic hits the new code. If there’s a bug, everyone sees it. If the service crashes, all users are affected. Progressive delivery changes this equation. Instead of deploying to everyone at once, you gradually shift traffic to the new version, validating at each step. If something goes wrong, only a fraction of users are affected. ...

June 20, 2025 · 8 min read · Tom Meurs
Configuration drift detection in ArgoCD

Drift Detection with ArgoCD: How to Know If Your Cluster Is Still in Sync

GitOps promises that Git is the source of truth. But what if someone kubectl edits a deployment? What if a mutating webhook changes a resource? What if the cluster silently diverges from what Git says it should be? This is configuration drift, and it’s one of the most insidious problems in Kubernetes operations. ArgoCD can help you detect it — if you configure it correctly. What Is Configuration Drift? Drift happens when the actual state of your cluster differs from the desired state in Git. ...

May 3, 2025 · 5 min read · Tom Meurs
ArgoCD App-of-Apps hierarchy

App-of-Apps Pattern in ArgoCD: Scalable GitOps Architecture

You start with one ArgoCD Application. Then five. Then twenty. Before you know it, you’re managing hundreds of Applications, and the manual overhead is killing your productivity. The App-of-Apps pattern solves this: one root application that manages all other applications. This is how I structure every GitOps repository, and it scales from homelab to enterprise. The Problem: Application Sprawl When you first adopt ArgoCD, you create Applications manually: kubectl apply -f apps/frontend.yaml kubectl apply -f apps/backend.yaml kubectl apply -f apps/database.yaml # ... repeat for every service This works for small deployments. But it creates problems: ...

April 21, 2025 · 6 min read · Tom Meurs
GitOps disaster recovery workflow

GitOps Disaster Recovery: Rebuilding Your Cluster from Git

Your cluster is gone. Complete failure. The cloud region is down, the hardware died, or someone ran the wrong terraform destroy. Everything is gone. Now what? If you’ve been doing GitOps right, the answer is: spin up a new cluster, point ArgoCD at Git, wait. Your entire infrastructure recreates itself. This is the ultimate promise of GitOps: Git is your backup. Why GitOps Changes Disaster Recovery Traditional DR involves: Regular backups of cluster state Backup storage (etcd snapshots, Velero backups) Tested restore procedures Recovery time measured in hours GitOps DR is different: ...

April 9, 2025 · 6 min read · Tom Meurs
Kubernetes running in offline island mode

Running Kubernetes Offline: Edge Computing Without Internet

What happens when your Kubernetes cluster can’t reach the internet? Not “slow connection” — no connection at all. Ships at sea. Remote mining sites. Factory floors with air-gapped networks. Military deployments. This isn’t an edge case. It’s a design requirement for anyone who takes sovereignty seriously. Why This Matters: Beyond the Technical Running Kubernetes offline forces you to confront a question most cloud-native guides ignore: what are you actually depending on? ...

March 4, 2025 · 7 min read · Tom Meurs