Blog
Qovery
Product
3
minutes

Bug Hunting and improvements week - what we improve on Qovery

During the past two weeks, our Frontend and Backend teams were busy bees 🐝 with a particular sprint dedicated to bug hunting đŸȘČ and improvements! Yes, both of the two weeks sprints were dedicated to bugs and improvements ONLY: tracking them, then solving them; gotta catch ‘em all 🚀
September 26, 2025
Albane Tonnellier
Product Marketing Manager
Summary
Twitter icon
linkedin icon

Why did we use a full sprint for bug hunting?

While it is true that we fix bugs in every sprint (20% maximum of each sprint is dedicated to bug fixes), sometimes it is not enough to fix them all, and as you can imagine, it’s not good practice to let them live in the backlog forever. A lot of companies, such as Dashlane or MyPorsche, are working with a “Zero bug policy”, and at Qovery, we have our way to make sure that bugs are taken care of:

  • In a standard sprint, we can use up to 20% of each sprint for bugs
  • If our backlog is greater than 20% of bugs, we freeze the next sprint to make it a “bug only sprint.”

The reason behind that is the same as for the “Zero bug policy” if you leave bugs live in your backlog, there is a chance that they will never be fixed, and there is nothing worst for a user than seeing the same bug. Over and over!

What are the improvements?

Frontend

  • (feat) filter logs by pod name
  • (fix) avoid having the same colour for different pods
  • (fix) refresh application metrics when switching between apps and during deployment
    the next step is to add the instance type selection instead of the CPU/RAM during the cluster setup

Backend

  • (fix) Special characters in database credentials can lead to unexpected behaviour (if you were using Postgres and Redis, the special characters were not well supported, and it was causing issues for the passwords that had some inside)
  • (feat) [CLI] Allow using an URL to connect via the qovery shell command
  • (feat) Display in logs if the Docker cache is used correctly
  • (feat) Accept instance type selection in cluster setup + provide an endpoint to list available instance types
  • (fix) Desired nodes should be higher or equal to min node
  • (fix) Can’t switch database from private to public and vice versa (container side)
  • (fix) Stopping containerized databases means losing data
  • (fix) “Delete organization” API call not working when there are no clusters

Wrapping up

While it’s true that we are putting a lot of work and effort to build our V3, we also want to make sure that we keep the V2 as stable and user friendly as possible and make changes like improving the application build-time or avoiding having the same colour for different pods may seem minor. Still, all added up; we believe that it will significantly enhance your product use.

Share on :
Twitter icon
linkedin icon
Tired of fighting your Kubernetes platform?
Qovery provides a unified Kubernetes control plane for cluster provisioning, security, and deployments - giving you an enterprise-grade platform without the DIY overhead.
See it in action

Suggested articles

Kubernetes
7
 minutes
Day 2 operations: an executive guide to Kubernetes operations and scale

Kubernetes success is determined by Day 2 execution, not Day 1 deployment. While migration is a bounded project, maintenance is an infinite loop that often consumes 40% of senior engineering capacity. To protect margins and velocity, enterprises must transition from manual toil to agentic automation that handles scaling, security, and cost.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
8
 minutes
The 2026 guide to Kubernetes management: master day-2 ops with agentic control

Master Kubernetes management in 2026. Discover how Agentic Automation resolves Day-2 Ops, eliminates configuration drift, and cuts cloud spend on vanilla EKS/GKE/AKS.

Romaric PhilogĂšne
CEO & Co-founder
DevOps
Kubernetes
6
 minutes
Day-0, day-1, and day-2 Kubernetes: defining the phases of fleet management

Day-0 is planning, Day-1 is deployment, and Day-2 is the infinite lifecycle of maintenance. While Day-0/1 are foundational, Day-2 is where enterprise operational debt accumulates. At fleet scale (1,000+ clusters), managing these differences manually is impossible, requiring agentic automation to maintain stability and eliminate toil.

Morgan Perry
Co-founder
Kubernetes
7
 minutes
Kubernetes multi-cluster: the Day-2 enterprise strategy

A multi-cluster Kubernetes architecture distributes application workloads across geographically separated clusters rather than a single environment. This strategy strictly isolates failure domains, ensures regional data compliance, and guarantees global high availability, but demands centralized Day-2 control to prevent exponential cloud costs and operational sprawl.

Morgan Perry
Co-founder
Kubernetes
6
 minutes
Kubernetes observability at scale: cutting the noise in multi-cloud environments

Stop overpaying for Kubernetes observability. Learn how in-cluster monitoring and AI-driven troubleshooting with Qovery Observe can eliminate APM ingestion fees, reduce SRE bottlenecks, and make your cloud costs predictable.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
 minutes
Understanding CrashLoopBackOff: Fixing AI workloads on Kubernetes

Stop fighting CrashLoopBackOff on your AI deployments. Learn why traditional Kubernetes primitives fail large models and GPU workloads, and how to orchestrate AI infrastructure without shadow IT.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
Platform Engineering
 minutes
Kubernetes multi-cluster architecture: solving day-2 fleet sprawl

Kubernetes multi-cluster management is the Day-2 operational practice of orchestrating applications, security, and configurations across geographically distributed clusters. Because native Kubernetes was designed for single-cluster orchestration, enterprise platform teams must implement a centralized control plane to prevent configuration drift and manage a global fleet without scaling manual toil.

Mélanie Dallé
Senior Marketing Manager
Engineering
Product
11
 minutes
How to achieve zero downtime on kubernetes: a Day-2 architecture guide

Achieving zero-downtime deployments on Kubernetes requires more than running multiple pods. It demands a standardized architecture utilizing Pod Disruption Budgets (PDBs), precise liveness and readiness probes, pod anti-affinity, and graceful termination handling. At an enterprise scale, these configurations must be enforced via a centralized control plane to prevent catastrophic configuration drift.

Pierre Mavro
CTO & Co-founder

It’s time to change‹the way you manage K8s

Turn Kubernetes into your strategic advantage with Qovery, automating the heavy lifting while you stay in control.