CNCF Projects
All projects of the Cloud Native Computing Foundation are classified with one of three stages of maturity:
CNCF Graduation Criteria are documented in the CNCF TOC repo. The document describes the maturity stages of the projects.
Graduated Projects
Kubernetes
“Kubernetes is a portable, extensible open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available.
Google open-sourced the Kubernetes project in 2014. Kubernetes builds upon a decade and a half of experience that Google has with running production workloads at scale, combined with best-of-breed ideas and practices from the community." - What is Kubernetes? - kubernetes.io
- Project Repository: https://github.com/kubernetes/kubernetes
- Contributor Guide: kubernetes/community/contributors/guide
- Chat: Slack: slack.k8s.io
- Developer List/Forum: Kubernetes-dev Mailing List
- License: Apache 2.0
- Legal Requirements: CNCF CLA
Prometheus
“Prometheus is an open-source systems monitoring and alerting toolkit originally built at SoundCloud. Since its inception in 2012, many companies and organizations have adopted Prometheus, and the project has a very active developer and user community. It is now a standalone open source project and maintained independently of any company. To emphasize this, and to clarify the project’s governance structure, Prometheus joined the Cloud Native Computing Foundation in 2016 as the second hosted project, after Kubernetes." - Introduction to Prometheus - prometheus.io
- Project Repository: https://github.com/prometheus/prometheus
- Contributor Guide: prometheus/contributing
- Chat: IRC:
#prometheus
on freenode (join via Riot) - Developer Mailing List/Forum: Prometheus-Developers Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Envoy
“Originally built at Lyft, Envoy is a high performance C++ distributed proxy designed for single services and applications, as well as a communication bus and “universal data plane” designed for large microservice “service mesh” architectures. Built on the learnings of solutions such as NGINX, HAProxy, hardware load balancers, and cloud load balancers, Envoy runs alongside every application and abstracts the network by providing common features in a platform-agnostic manner. When all service traffic in an infrastructure flows via an Envoy mesh, it becomes easy to visualize problem areas via consistent observability, tune overall performance, and add substrate features in a single place." - Why Envoy? - envoyproxy.io
- Project Repository: https://github.com/envoyproxy/envoy
- Contributor Guide: envoyproxy/envoy/contributing
- Chat: Slack: envoyslack.cncf.io
- Developer Mailing List/Forum: Envoy-Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
CoreDNS
“CoreDNS is a DNS server. It is written in Go. It can be used in a multitude of environments because of its flexibility. CoreDNS is licensed under the Apache License Version 2, and completely open source." - What is it? - coredns.io
- Project Repository: https://github.com/coredns/coredns
- Contributor Guide: coredns/coredns/contributing
- Chat: Slack:
#coredns
in slack.cncf.io - Developer Mailing List/Forum: Coredns-Discuss Mailing List
- License: Apache 2.0
- Legal Requirements: None
containerd
“containerd is an industry-standard core container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.." - About containerd - containerd.io
- Project Repository: https://github.com/containerd/containerd
- Contributor Guide: containerd/containerd/contributing
- Chat: Slack:
#containerd
in dockercommunity.slack.com - Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: DCO
Fluentd
“Fluentd is an open source data collector for building the unified logging layer. Once installed on a server, it runs in the background to collect, parse, transform, analyze and store various types of data." - What is Fluentd? - fluentd.org faq
- Project Repository: https://github.com/fluent/fluentd
- Contributor Guide: fluent/fluentd/contributing
- Chat: Slack: slack.fluentd.org
- Developer Mailing List/Forum: Fluentd Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Jaeger
“Jaeger, inspired by Dapper and OpenZipkin, is a distributed tracing system released as open source by Uber Technologies. It is used for monitoring and troubleshooting microservices-based distributed systems." - About - jaegertracing.io
- Project Repository: https://github.com/jaegertracing/jaeger
- Contributor Guide: jaegertracing/jaeger/contributing
- Chat: Gitter: gitter.im/jaegertracing/Lobby
- Developer Mailing List/Forum: Jaeger-Tracing Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Vitess
“Vitess is a database solution for deploying, scaling and managing large clusters of MySQL instances. It’s architected to run as effectively in a public or private cloud architecture as it does on dedicated hardware. It combines and extends many important MySQL features with the scalability of a NoSQL database." - Overview - vitess.io
- Project Repository: https://github.com/vitessio/vitess
- Contributor Guide: vitessio/vitess/contributing
- Chat: Slack: vitess.slack.com
- Developer Mailing List/Forum: Vitess Mailing List
- License: Apache 2.0
- Legal Requirements: Google Corporate CLA / Google Individual CLA
TUF
“The Update Framework (TUF) helps developers maintain the security of a software update system, even against attackers that compromise the repository or signing keys. TUF provides a flexible framework and specification that developers can adopt into any software update system." - TUF Readme
- Project Repository: https://github.com/theupdateframework/specification
- Contributor Guide: theupdateframework/tuf/contributors
- Chat: None
- Developer Mailing List/Forum: TUF Mailing List
- License: Dual Licensed Apache 2.0 / MIT
- Legal Requirements: DCO
Helm
“Helm helps you manage Kubernetes applications — Helm Charts helps you define, install, and upgrade even the most complex Kubernetes application. Charts are easy to create, version, share, and publish — so start using Helm and stop the copy-and-paste madness. The latest version of Helm is maintained by the CNCF - in collaboration with Microsoft, Google, Bitnami and the Helm contributor community." - What is Helm? - helm.sh
- Project Repository: https://github.com/helm/helm
- Contributor Guide: helm/helm/contributing
- Chat: Slack
#helm-dev
in slack.k8s.io - Developer List/Forum: CNCF-Helm Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Harbor
“Project Harbor is an an open source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build and run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing." - Harbor Readme
- Project Repository: https://github.com/goharbor/harbor
- Contributor Guide: vmware/harbor/contributing
- Chat: Slack:
#harbor-dev
in slack.cncf.io - Developer Mailing List/Forum: Harbor-Dev Mailing List
- License: Apache 2.0
Rook
“Rook is an open source cloud-native storage orchestrator for Kubernetes, providing the platform, framework, and support for a diverse set of storage solutions to natively integrate with cloud-native environments." - What is Rook? - Rook Readme
- Project Repository: https://github.com/rook/rook
- Contributor Guide: rook/rook/contributing
- Chat: Slack: rook-io.slack.com
- Developer Mailing List/Forum: Rook-Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
TiKV
“TiKV (“Ti” stands for Titanium) is a distributed transactional key-value database, originally created to complement TiDB, a distributed HTAP database compatible with the MySQL protocol. TiKV is built in Rust and powered by Raft, and was inspired by the design of Google Spanner and HBase, but without dependency on any specific distributed file system." - TiKV Readme
- Project Repository: https://github.com/tikv/tikv
- Contributor Guide: tkiv/tkiv/contributing
- License: Apache 2.0
- Legal Requirements: DCO
Incubating Projects
gRPC
“gRPC is a modern open source high performance RPC framework that can run in any environment. It can efficiently connect services in and across data centers with pluggable support for load balancing, tracing, health checking and authentication. It is also applicable in last mile of distributed computing to connect devices, mobile applications and browsers to backend services." - About - grpc.io
- Project Repository: https://github.com/grpc/grpc
- Contributor Guide: grpc/grpc/contributing
- Chat: Gitter: gitter.im/grpc/grpc
- Developer List/Forum: gRPC-io Mailing List
- License: Apache 2.0
- Legal Requirements: CNCF CLA
CNI
“CNI (Container Network Interface), a Cloud Native Computing Foundation project, consists of a specification and libraries for writing plugins to configure network interfaces in Linux containers, along with a number of supported plugins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Because of this focus, CNI has a wide range of support and the specification is simple to implement." - What is CNI?- CNI Readme
- Project Repository: https://github.com/containernetworking/cni
- Contributor Guide: containernetworking/cni/contributing
- Chat: Slack: containernetworking.slack.com
- Developer Mailing List/Forum: CNI-dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Notary
“Notary aims to make the internet more secure by making it easy for people to publish and verify content. We often rely on TLS to secure our communications with a web server, which is inherently flawed, as any compromise of the server enables malicious content to be substituted for the legitimate content." Overview - Notary Readme
- Project Repository: https://github.com/theupdateframework/notary
- Contributor Guide: theupdateframework/notary/contributing
- Chat: None
- Developer Mailing List/Forum: theupateframework Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
NATS
“NATS is an open source, lightweight, high-performance cloud native infrastructure messaging system. It implements a highly scalable and elegant publish-subscribe (pub/sub) distribution model. The performant nature of NATS make it an ideal base for building modern, reliable, scalable cloud native distributed systems." - What is NATS? - nats.io
- Project Repository: https://github.com/nats-io
- Contributor Guide: nats.io/contributing/
- Chat: Slack: natsio.slack.com
- Developer Mailing List/Forum: natsio Mailing List
- License: Apache 2.0
- Legal Requirements: None
Linkerd
“Linkerd is a transparent service mesh, designed to make modern applications safe and sane by transparently adding service discovery, load balancing, failure handling, instrumentation, and routing to all inter-service communication." - Linkerd Readme
- Project Repository: https://github.com/linkerd/linkerd
- Contributor Guide: linkerd/linkerd/contributing
- Chat: Slack: slack.linkerd.io
- Developer Mailing List/Forum: Linkerd Forum
- License: Apache 2.0
- Legal Requirements: DCO
etcd
“etcd is a distributed reliable key-value store for the most critical data of a distributed system, with a focus on being:
- Simple: well-defined, user-facing API (gRPC)
- Secure: automatic TLS with optional client cert authentication
- Fast: benchmarked 10,000 writes/sec
- Reliable: properly distributed using Raft”- etcd readme
- Project Repository: https://github.com/etcd-io/etcd
- Contributor Guide: etcd-io/etcd/contributing
- Chat:
#etcd
on freenode (join via Riot) - Developer List/Forum: etcd-dev Mailing List
- License: Apache 2.0
Open Policy Agent
“OPA is a lightweight general-purpose policy engine that can be co-located with your service. You can integrate OPA as a sidecar, host-level daemon, or library." - What is OPA? - openpolicyagent.org
- Project Repository: https://github.com/open-policy-agent/opa
- Contributor Guide: open-policy-agent/opa/contributing
- Chat: Slack: slack.openpolicyagent.org
- Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: DCO
CRI-O
“CRI-O is an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative) compatible runtimes. It is a lightweight alternative to using Docker as the runtime for kubernetes. It allows Kubernetes to use any OCI-compliant runtime as the container runtime for running pods. Today it supports runc and Kata Containers as the container runtimes but any OCI-conformant runtime can be plugged in principle." - What is CRI-O? - CRI-O.org
- Project Repository: https://github.com/cri-o
- Contributor Guide: cri-o/cri-o/CONTRIBUTING.md
- Chat:
#cri-o
on freenode (join via Riot) - License: Apache 2.0
- Legal Requirements: DCO
CloudEvents
CloudEvents Specification
- Project Repository: https://github.com/cloudevents/spec
- Contributor Guide: cloudevents/spec/contributing
- Chat: Slack:
#cloudevents
in slack.cncf.io - Developer Mailing List/Forum: CNCF-wg-Serverless Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Falco
“Falco is a behavioral activity monitor designed to detect anomalous activity in your applications. Powered by sysdig’s system call capture infrastructure, Falco lets you continuously monitor and detect container, application, host, and network activity… all in one place, from one source of data, with one set of rules." - Overview - Falco Readme
- Project Repository: https://github.com/falcosecurity/falco
- Chat: Slack:
#falco
in slack.sysdig.com - License: Apache 2.0
- Legal Requirements: Falco CLA
Argo
“Open source Kubernetes native workflows, events, CI and CD” - Overview - https://argoproj.github.io/
- Project Repository: https://github.com/argoproj/
- Contributor Guide: argo/community/
- Chat: Argo Slack
- License: Apache 2.0
- Legal Requirements: Argo CLA
Dragonfly
“Dragonfly is an intelligent P2P-based image and file distribution tool. It aims to improve the efficiency and success rate of file transferring, and maximize the usage of network bandwidth, especially for the distribution of larget amounts of data, such as application distribution, cache distribution, log distribution, and image distribution." - Overview - d7y.io
- Project Repository: https://github.com/dragonflyoss/dragonfly
- Contributor Guide: dragonflyoss/dragonfly/CONTRIBUTING
- Chat: gitter.im/alibaba/Dragonfly
- License: Apache 2.0
SPIFFE
“SPIFFE (Secure Production Identity Framework For Everyone) provides a secure identity, in the form of a specially crafted X.509 certificate, to every workload in a modern production environment. SPIFFE removes the need for application-level authentication and complex network-level ACL configuration." - What is SPIFFE? - spiffe.io
- Project Repository: https://github.com/spiffe/spiffe
- Contributor Guide: spiffe/spiffe/contributing
- Chat: Slack: slack.spiffe.io
- Developer Mailing List/Forum: SPIFFE Dev Discussion Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
SPIRE
“SPIRE (the SPIFFE Runtime Environment) is a tool-chain for establishing trust between software systems across a wide variety of hosting platforms. Concretely, SPIRE exposes the SPIFFE Workload API, which can attest running software systems and issue SPIFFE IDs and SVIDs to them." - Spire Readme
- Project Repository: https://github.com/spiffe/spire
- Contributor Guide: spiffe/spire/contributing
- Chat: Slack: slack.spiffe.io
- Developer Mailing List/Forum: SPIFFE Dev Discussion Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Contour
“Contour is an open source Kubernetes ingress controller providing the control plane for the Envoy edge and service proxy. Contour supports dynamic configuration updates and multi-team ingress delegation out of the box while maintaining a lightweight profile." - projectcontour.io
- Project Repository: https://github.com/projectcontour/contour
- Contributor Guide: projectcontour/community
- Chat: Slack:
#contour
in kubernetes.slack.com - License: Apache 2.0
- Legal Requirements: DCO
Flux
“Flux is a collection of tools for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy." - Flux - fluxcd.io
- Project Repository: https://github.com/fluxcd/flux2
- Contributor Guide: fluxcd.io/contributing
- Chat: Slack:
#flux
in slack.cncf.io - Developer List/Forum: Flux Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Dapr
“The Distributed Application Runtime (Dapr) provides APIs that simplify microservice connectivity. Whether your communication pattern is service to service invocation or pub/sub messaging, Dapr helps you write resilient and secured microservices. By letting Dapr’s sidecar take care of the complex challenges such as service discovery, message broker integration, encryption, observability, and secret management, you can focus on business logic and keep your code simple." - Dapr - dapr.io
- Project Repository: https://github.com/dapr
- Contributor Guide: dapr.io/contributing
- Chat: Dapr Discord Server
- License: Apache 2.0
- Legal Requirements: DCO
Cilium
“Cilium uses the revolutionary kernel technology, eBPF, to provide networking, security and observability for cloud native workloads” - cilium.io
- Project Repository: http://github.com/cilium
- Contributor Guide: Cilium contributor guide
- Chat: Slack: slack.cilium.io
- License: Apache 2.0
- Legal Requirements: DCO
Knative
“Knative is a solution to build Serverless and Event Driven Applications. Serverless Containers in Kubernetes environments." - knative.dev
- Project Repository: https://github.com/knative
- Contributor Guide: Knative contributor guide
- Chat: Knative slack
- License: Apache 2.0
- Legal Requirements: Google CLA
Sandbox Projects
Telepresence
“Telepresence is an open source tool that lets you run a single service locally, while connecting that service to a remote Kubernetes cluster." - Overview - telepresence.io
- Project Repository: https://github.com/telepresenceio/telepresence
- Contributor Guide: telepresenceio/telepresence/docs/reference/developing
- Chat: Slack:
#telepresence
in datawire-oss.slack.com - Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: DCO
OpenMetrics
“An effort to create an open standard for transmitting metrics at scale, with support for both text representation and Protocol Buffers." - openmetrics.io
- Project Repository: https://github.com/OpenObservability/OpenMetrics
- Contributor Guide: [TBD]
- Chat: Slack:
#openmetrics
in slack.cncf.io - Developer Mailing List/Forum: OpemMetrics Mailing List
- License: Apache 2.0
Cortex
“Cortex provides horizontally scalable, multi-tenant, long term storage for Prometheus metrics when used as a remote write destination, and a horizontally scalable, Prometheus-compatible query API." - Cortex Readme
- Project Repository: https://github.com/cortexproject/cortex
- Contributor Guide: cortextproject/cortex/readme
- Chat: Slack:
#cortext
in slack.cncf.io - License: Apache 2.0
- Legal Requirements: DCO
Buildpacks
“Buildpacks provide a higher-level abstraction for building apps compared to Dockerfiles." - What Are Buildpacks? - buildpacks.io
- Project Repository: https://github.com/buildpack
- Chat: Slack: slack.buildpacks.io
- License: Apache 2.0
Virtual Kubelet
“Virtual Kubelet is an open source Kubernetes kubelet implementation that masquerades as a kubelet for the purposes of connecting Kubernetes to other APIs. This allows the nodes to be backed by other services like ACI, AWS Fargate, Hyper.sh, IoT Edge etc. The primary scenario for VK is enabling the extension of the Kubernetes API into serverless container platforms like ACI, Fargate, and Hyper.sh, though we are open to others. However, it should be noted that VK is explicitly not intended to be an alternative to Kubernetes federation." - Virtual Kubelet Readme
- Project Repository: https://github.com/virtual-kubelet/virtual-kubelet
- Contributor Guide: virtual-kubelet/virtual-kubelet/contributing
- License: Apache 2.0
- Legal Requirements: CNCF CLA
KubeEdge
“KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge." - KubeEdge website
- Project Repository: https://github.com/kubeedge/kubeedge
- Contributor Guide: KubeEdge-contributor-guide
- Chat: KubeEdge
- Developer List/Forum: KubeEdge
- License: Apache 2.0
Keptn
“Keptn is a control-plane for continuous delivery and automated operations." - Keptn.sh
- Project Repository: https://github.com/keptn/keptn
- Contributor Guide: Keptn-contributor-guide
- Chat: Keptn Slack
- Developer List/Forum: Keptn mailing list
- License: Apache 2.0
Brigade
“Brigade is a tool for running scriptable, automated tasks in the cloud — as part of your Kubernetes cluster." - Brigade-overview
- Project Repository: https://github.com/brigadecore/brigade/
- Contributor Guide: Brigade-contributor-guide
- Chat: Brigade-chat
Network Service Mesh
“Network Service Mesh (NSM) is a novel approach to solving complicated L2/L3 use cases in Kubernetes that are tricky to address withing the existing Kubernetes Network Model. Inspired by Istio, Network Service Mesh maps the concept of a service mesh to L2/L3 payloads." - What is Network Service Mesh? - networkservicemesh.io
- Project Repository: https://github.com/networkservicemesh
- Chat: Slack
#nsm-dev
in slack.cncf.io - Developer List/Forum: Network Service Mesh Mailing List
OpenTelemetry
“OpenTelemetry is made up of an integrated set of APIs and libraries as well as a collection mechanism via an agent and collector. These components are used to generate, collect, and describe telemetry about distributed systems. This data includes basic context propagation, distributed traces, metrics, and other signals in the future. OpenTelemetry is designed to make it easy to get critical telemetry data out of your services and into your backend(s) of choice. For each supported language it offers a single set of APIs, libraries, and data specifications, and developers can take advantage of whichever components they see fit. - What is OpenTelemetry? - opentelemetry.io
- Project Repository: https://github.com/open-telemetry
- Chat: Gitter: open-telemetry/community
- Developer List/Forum: OpenTelemetry Dev Mailing List
- License: Apache 2.0
OpenEBS
“OpenEBS is the leading open-source project for container-attached and container-native storage on Kubernetes. OpenEBS adopts Container Attached Storage (CAS) approach, where each workload is provided with a dedicated storage controller. OpenEBS implements granular storage policies and isolation that enable users to optimize storage for each specific workload. OpenEBS runs in user space and does not have any Linux kernel module dependencies." - Introduction - OpenEBS.io
- Project Repository: https://github.com/openebs
- Contributor Guide: openebs/openebs/CONTRIBUTING
- Chat: Slack: openebs-community.slack.com
- License: Apache 2.0
- Legal Requirements: DCO
Thanos
“Thanos is a set of components that can be composed into a highly available metric system with unlimited storage capacity, which can be added seamlessly on top of existing Prometheus deployments." - Overview - Thanos readme
- Project Repository: https://github.com/thanos-io/thanos
- Contributor Guide: thanos.io/contributing
- Chat: Slack:
#thanos
in slack.cncf.io - License: Apache 2.0
- Legal Requirements: DCO
in-toto
“in-toto provides a framework to protect the integrity of the software supply chain. It does so by verifying that each task in the chain is carried out as planned, by authorized personnel only, and that the product is not tampered with in transit." - in-toto - in-toto Readme
- Project Repository: https://github.com/in-toto/in-toto
- Contributor Guide: Instructions for Contributors
- Developer List/Forum: in-toto mailing list
- License: Apache 2.0
- Legal Requirements: DCO
Litmus
“Litmus is a toolset to perform cloud-native chaos engineering. Litmus provides tools to orchestrate chaos on Kubernetes and helps SREs find weaknesses in their deployments. SREs use Litmus to run chaos experiments initially in the staging environment and eventually in production to find bugs, vulnerabilities. Fixing the weaknesses leads to increased resilience of the system." - Litmus
- Project Repository: https://github.com/litmuschaos/litmus
- Contributor Guide: Litmus-contributor-guide
- Chat: Litmus Slack
- License: Apache 2.0
Tinkerbell
“Tinkerbell is a bare metal provisioning engine. Tinkerbell standardizes infrastructure and application management using the same API-centric, declarative configuration and automation approach pioneered by the Kubernetes community." - Tinkerbell
- Project Repository: https://github.com/tinkerbell
- Contributor Guide: tinkerbell/tink/CONTRIBUTING
- Chat: Slack:
#tinkerbell
in slack.cncf.io - Developer List/Forum: Tinkerbell Contributors Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Meshery
“Meshery is the open source, service mesh management plane that enables the adoption, operation, and management of any service mesh and their workloads." - Meshery
- Project Repository: https://github.com/meshery
- Contributor Guide: docs.meshery.io/project/contributing
- Chat: Slack:
#meshery
in slack.layer5.io - Developer List/Forum: Meshery Mailing Lists
- License: Apache 2.0
- Legal Requirements: DCO
Service Mesh Performance
“Service Mesh Performance is a standard for capturing and characterizing the details of infrastructure capacity, service mesh configuration, and workload metadata." - Service Mesh Performance
- Project Repository: https://github.com/service-mesh-performance
- Contributor Guide: smp-spec.io/contributing. Service Mesh Performance prominently and consistently engages with the Meshery project. For a more complete set of contributing guides see docs.meshery.io/project/contributing
- Chat: Slack:
#performance
in slack.layer5.io - Developer List/Forum: Service Mesh Performance Mailing Lists
- License: Apache 2.0
- Legal Requirements: DCO
MetalLB
“MetalLB is a load-balancer implementation for bare metal Kubernetes clusters, using standard routing protocols." - MetalLB
- Project Repository: https://github.com/metallb/metallb
- Contributor Guide: metallb/metallb/CONTRIBUTING
- Chat: Slack:
#metallb
and#metallb-dev
in slack.k8s.io - Developer List/Forum: MetalLB users
- License: Apache 2.0
- Legal Requirements: DCO
Karmada
“Karmada (Kubernetes Armada) is a Kubernetes management system that enables you to run your cloud-native applications across multiple Kubernetes clusters and clouds, with no changes to your applications." - Karmada
- Project Repository: https://github.com/karmada-io/karmada
- Contributor Guide: karmada-io/karmada/CONTRIBUTING
- Chat: Slack:
#general
and#karmada-dev
in karmada-io.slack - Developer List/Forum: Karmada Mailing Lists
- License: Apache 2.0
- Legal Requirements: DCO
Inclavare Containers
“Inclavare Containers is an innovation of container runtime with the novel approach for launching protected containers in hardware-assisted Trusted Execution Environment (TEE) technology, aka Enclave, which can prevent the untrusted entity, such as Cloud Service Provider (CSP), from accessing the sensitive and confidential assets in use." - Inclavare Containers
- Project Repository: https://github.com/alibaba/inclavare-containers/
- Contributor Guide: inclavare-containers/CONTRIBUTING
- Chat: Slack:
#inclavare-containers
in slack.cncf.io - Developer List/Forum: Inclavare-Containers
- License: Apache 2.0
- Legal Requirements: DCO
WasmEdge
“WasmEdge is a lightweight, high-performance, and extensible WebAssembly runtime for cloud native, edge, and decentralized applications. It is the fastest Wasm VM today. Its use cases include serverless apps, embedded functions, microservices, smart contracts, and IoT devices. WasmEdge supports all standard WebAssembly extensions as well as proprietary extensions for Tensorflow inference, KV store, and image processing, etc. Its compiler toolchain supports not only WebAssembly languages such as C/C++, Rust, Swift, Kotlin, and AssemblyScript but also regular JavaScript." - WasmEdge
- Project Repository: https://github.com/WasmEdge/WasmEdge
- Contributor Guide: WasmEdge/CONTRIBUTING
- Chat: Slack:
#WasmEdge
in slack.cncf.io - Developer List/Forum: WasmEdge email group
- License: Apache 2.0
- Legal Requirements: DCO
SuperEdge
“SuperEdge is a distributed edge container management system. Aims to seamlessly expand the native Kubernetes centralized resource management capabilities to edge computing and distributed resource management scenarios, and centrally manage edge devices and applications." - SuperEdge
- Project Repository: https://github.com/superedge/superedge
- Contributor Guide: superedge/superedge/CONTRIBUTING
- Chat: Slack:
#superedge-community
and#superedge-dev
in superedge.slack - Developer List/Forum: SuperEdge Mailing Lists
- License: Apache 2.0
- Legal Requirements: DCO
Akri
“Akri (A Kubernetes Resource Interface for the Edge) removes the work of finding, using, and monitoring the availability of the IoT devices around Kubernetes clusters. It provides an abstraction layer for device usage, handling the dynamic appearance and disappearance of IoT devices on the Edge. Akri continually detects nodes that have access to IoT devices and schedules workloads based on their availability." - Akri
- Project Repository: https://github.com/project-akri/akri
- Contributor Guide: superedge/superedge/CONTRIBUTING
- Chat: Slack:
#akri
in kubernetes.slack.com - License: Apache 2.0
- Legal Requirements: DCO
Open Cluster Management
“Open Cluster Management (OCM) is a community-driven project focused on multi-cluster and multi-cloud scenarios for Kubernetes apps. Open APIs are evolving within this project for cluster registration, work distribution, dynamic placement of policies and workloads, and much more." - Open Cluster Management
- Project Repository: https://github.com/open-cluster-management-io/ocm
- Contributor Guide: open-cluster-management-io/community/CONTRIBUTING
- Chat: Slack:
##open-cluster-mgmt
in kubernetes.slack.com - Developer List/Forum: Open Cluster Management Mailing Lists
- License: Apache 2.0
- Legal Requirements: DCO
KubeArmor
“KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operation) of containers and nodes at the system level." - KubeArmor
- Project Repository: https://github.com/kubearmor/KubeArmor
- Contributor Guide: kubearmor/KubeArmor/CONTRIBUTING
- Chat: Slack:
##kubearmor-project
in kubearmor.slack - Developer List/Forum: KubeArmor GitHub Discussions
- License: Apache 2.0
Nocalhost
“Nocalhost is a cloud-native dev environment (include VSCode and Jetbrains plug-in), It allows developers to develop applications directly in a Kubernetes cluster using an IDE plug-in, with local coding taking effect in real-time within the container, reducing the development/debugging/testing cycle." - Nocalhost
- Project Repository: https://github.com/nocalhost/nocalhost
- Contributor Guide: nocalhost/nocalhost/CONTRIBUTING
- Chat: Slack:
##nocalhost
in cloud-native.slack.com - Developer List/Forum: Nocalhost Mainling Lists
- License: Apache 2.0
K8up
K8up (pronounced /keɪtæpp/ or simply “ketchup”) is a Kubernetes Operator distributed via a Helm chart, compatible with OpenShift and plain Kubernetes. - K8up
- Project Repository: https://github.com/k8up-io/k8up
- Contributor Guide: K8up Contribution Guide
- Chat: Rocket Chat:
#k8up
in APPUiO Community Chat - Developer List/Forum: K8up GitHub Discussions
- License: BSD-3-Clause
kube-rs
“kube-rs is a set of core libraries for building applications against the kubernetes api in Rust." - kube-rs
- Project Repository: https://github.com/kube-rs/kube-rs
- Contributor Guide: kube-rs/kube-rs/CONTRIBUTING
- Chat: Discord:
##kube
in tokio - Developer List/Forum: Github Discussions
- License: Apache 2.0
- Legal Requirements: DCO
OpenELB
“OpenELB is an open-source load balancer implementation designed for exposing the LoadBalancer type of Kubernetes services in bare metal, edge, and virtualization environments.." - OpenELB
- Project Repository: https://github.com/openelb/openelb
- Contributor Guide: contribute-to-the-openelb-project/
- Chat: Slack:
#openelb
in kubernetes.slack.com - Developer List/Forum: OpenELB GitHub Discussions
- License: Apache 2.0
- Legal Requirements: DCO
Devfile
“Devfile is an open standard defining containerized development environments that enables developer tools to simplify and accelerate workflows." - Devfile
- Project Repository: https://github.com/devfile/api
- Contributor Guide: devfile-contributor-guide
- Chat: Slack:
#devfile
in kubernetes.slack.com - Developer List/Forum: Devfile Discussions
- License: Apache 2.0
- Legal Requirements: DCO
Kyverno
“Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies." - Kyverno
- Project Repository: https://github.com/kyverno/kyverno
- Contributor Guide: kyverno/kyverno/CONTRIBUTING
- Chat: Slack:
#kyverno
and#kyverno-dev
in kubernetes.slack.com - Developer List/Forum: Kyverno Discussions
- License: Apache 2.0
- Legal Requirements: DCO
OpenFunction
“OpenFunction is a cloud-native open source FaaS (Function as a Service) platform aiming to let you focus on your business logic without having to maintain the underlying runtime environment and infrastructure. You only need to submit business-related source code in the form of functions." - OpenFunction
- Project Repository: https://github.com/OpenFunction/OpenFunction
- Contributor Guide: Development Guide
- Chat: Slack:
#openfunction
in slack.cncf.io - Developer List/Forum: OpenFunction Discussions
- License: Apache 2.0
- Legal Requirements: DCO
sealer
“sealer is a tool to seal all your application’s dependencies and kubernetes into one single CloudImage! With sealer, you can build, deliver and run self-customized clusters in one command." - Sealer
- Project Repository: https://github.com/sealerio/sealer
- Contributor Guide: sealerio/sealer/CONTRIBUTING
- Chat: Slack:
#sealer
in kubernetes.slack.com - Developer List/Forum: Sealer Discussions
- License: Apache 2.0
Confidential Containers
“Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data." - Confidential Containers
- Project Repository: https://github.com/confidential-containers
- Contributor Guide: community/CONTRIBUTING
- Chat: Slack:
#confidential-containers
in slack.cncf.io - Developer List/Forum: Confidential Containers Discussions
- License: Apache 2.0
- Legal Requirements: DCO
Teller
“Teller is a universal secret manager for developers” - Teller
- Project Repository: https://github.com/SpectralOps/teller
- Contributor Guide: SpectralOps/teller/CONTRIBUTING
- Chat: GitHub
- Developer List/Forum: Teller GitHub Discussions
- License: Apache 2.0
- Legal Requirements: DCO
Aeraki Mesh
“Aeraki Mesh allows you manage any layer-7 protocols in a service mesh." - Aeraki Mesh
- Project Repository: https://github.com/aeraki-mesh/aerak
- Contributor Guide: Development Guide
- Chat: Slack:
#aeraki-mesh
in slack.cncf.io - Developer List/Forum: Aeraki Mesh Discussions
- License: Apache 2.0
- Legal Requirements: DCO
Clusterpedia
“Clusterpedia is used for complex resources search across multiple clusters, support simultaneous search of a single kind of resource or multiple kinds of resources existing in multiple clusters." - Clusterpedia
- Project Repository: https://github.com/clusterpedia-io/clusterpedia
- Contributor Guide: clusterpedia-io/clusterpedia/CONTRIBUTING
- Chat: Slack:
#clusterpedia
in slack.cncf.io - Developer List/Forum: Clusterpedia Discussions
- License: Apache 2.0
- Legal Requirements: DCO
DevStream
“DevStream: Your DevOps Toolchain Manager." - DevStream
- Project Repository: https://github.com/devstream-io/devstream
- Contributor Guide: Development Guide
- Chat: Slack:
#devstream
in slack.cncf.io - Developer List/Forum: DevStream Discussions
- License: Apache 2.0
- Legal Requirements: DCO
OpenCost
“OpenCost provides visibility into current and historical Kubernetes spend and resource allocation." - OpenCost
- Project Repository: https://github.com/kubecost/opencost
- Contributor Guide: Development Guide
- Chat: Slack:
#opencost
in slack.cncf.io - License: Apache 2.0
- Legal Requirements: DCO
Non-code Projects
Cloud Native Glossary
“The Cloud Native Glossary is a project led by the CNCF Business Value Subcommittee. Its goal is to explain cloud native concepts in clear and simple language without requiring any previous technical knowledge." - Cloud Native Glossary
- Project Repository: https://github.com/cncf/glossary
- Contributor Guide: https://glossary.cncf.io/contribute/
- Chat: CNCF Slack:
#glossary
and#glossary-localizations
in cloudnative.slack.com - License: Apache 2.0 license. Documentation is distributed under CC BY 4.0.
Archived Projects
OpenTracing
Vendor-neutral APIs and instrumentation for distributed tracing.
- Project Repository: https://github.com/opentracing
- Contributor Guide: opentracing-contrib/meta
- Chat: Gitter: gitter.im/opentracing/public
- Developer Mailing List/Forum: OpenTracing Mailing List
- License: Apache 2.0
- Legal Requirements: None
rkt
rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
- Project Repository: https://github.com/rkt/rkt
- Contributor Guide: rkt/rkt/contributing
- Chat:
#rkt-dev
on freenode (join via Riot) - Developer Mailing List/Forum: rkt-dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.