CNCF Projects
All projects of the Cloud Native Computing Foundation are classified with one of three stages of maturity:
CNCF Graduation Criteria are documented in the CNCF TOC repo. The document describes the maturity stages of the projects.
Graduated Projects
Kubernetes
“Kubernetes is a portable, extensible open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available.
Google open-sourced the Kubernetes project in 2014. Kubernetes builds upon a decade and a half of experience that Google has with running production workloads at scale, combined with best-of-breed ideas and practices from the community." - What is Kubernetes? - kubernetes.io
- Project Repository: https://github.com/kubernetes/kubernetes
- Contributor Guide: kubernetes/community/contributors/guide
- Chat: Slack: slack.k8s.io
- Developer List/Forum: Kubernetes-dev Mailing List
- License: Apache 2.0
- Legal Requirements: CNCF CLA
Prometheus
“Prometheus is an open-source systems monitoring and alerting toolkit originally built at SoundCloud. Since its inception in 2012, many companies and organizations have adopted Prometheus, and the project has a very active developer and user community. It is now a standalone open source project and maintained independently of any company. To emphasize this, and to clarify the project’s governance structure, Prometheus joined the Cloud Native Computing Foundation in 2016 as the second hosted project, after Kubernetes." - Introduction to Prometheus - prometheus.io
- Project Repository: https://github.com/prometheus/prometheus
- Contributor Guide: prometheus/contributing
- Chat: IRC:
#prometheus
on freenode (join via Riot) - Developer Mailing List/Forum: Prometheus-Developers Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Envoy
“Originally built at Lyft, Envoy is a high performance C++ distributed proxy designed for single services and applications, as well as a communication bus and “universal data plane” designed for large microservice “service mesh” architectures. Built on the learnings of solutions such as NGINX, HAProxy, hardware load balancers, and cloud load balancers, Envoy runs alongside every application and abstracts the network by providing common features in a platform-agnostic manner. When all service traffic in an infrastructure flows via an Envoy mesh, it becomes easy to visualize problem areas via consistent observability, tune overall performance, and add substrate features in a single place." - Why Envoy? - envoyproxy.io
- Project Repository: https://github.com/envoyproxy/envoy
- Contributor Guide: envoyproxy/envoy/contributing
- Chat: Slack: envoyslack.cncf.io
- Developer Mailing List/Forum: Envoy-Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
CoreDNS
“CoreDNS is a DNS server. It is written in Go. It can be used in a multitude of environments because of its flexibility. CoreDNS is licensed under the Apache License Version 2, and completely open source." - What is it? - coredns.io
- Project Repository: https://github.com/coredns/coredns
- Contributor Guide: coredns/coredns/contributing
- Chat: Slack:
#coredns
in slack.cncf.io - Developer Mailing List/Forum: Coredns-Discuss Mailing List
- License: Apache 2.0
- Legal Requirements: None
containerd
“containerd is an industry-standard core container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.." - [About containerd - containerd.io][about-containerd]
- Project Repository: https://github.com/containerd/containerd
- Contributor Guide: containerd/containerd/contributing
- Chat: Slack:
#containerd
in dockercommunity.slack.com - Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: DCO
Fluentd
“Fluentd is an open source data collector for building the unified logging layer. Once installed on a server, it runs in the background to collect, parse, transform, analyze and store various types of data." - What is Fluentd? - fluentd.org faq
- Project Repository: https://github.com/fluent/fluentd
- Contributor Guide: fluent/fluentd/contributing
- Chat: Slack: slack.fluentd.org
- Developer Mailing List/Forum: Fluentd Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Jaeger
“Jaeger, inspired by Dapper and OpenZipkin, is a distributed tracing system released as open source by Uber Technologies. It is used for monitoring and troubleshooting microservices-based distributed systems." - About - jaegertracing.io
- Project Repository: https://github.com/jaegertracing/jaeger
- Contributor Guide: jaegertracing/jaeger/contributing
- Chat: Gitter: gitter.im/jaegertracing/Lobby
- Developer Mailing List/Forum: Jaeger-Tracing Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Vitess
“Vitess is a database solution for deploying, scaling and managing large clusters of MySQL instances. It’s architected to run as effectively in a public or private cloud architecture as it does on dedicated hardware. It combines and extends many important MySQL features with the scalability of a NoSQL database." - Overview - vitess.io
- Project Repository: https://github.com/vitessio/vitess
- Contributor Guide: vitessio/vitess/contributing
- Chat: Slack: vitess.slack.com
- Developer Mailing List/Forum: Vitess Mailing List
- License: Apache 2.0
- Legal Requirements: Google Corporate CLA / Google Individual CLA
TUF
“The Update Framework (TUF) helps developers maintain the security of a software update system, even against attackers that compromise the repository or signing keys. TUF provides a flexible framework and specification that developers can adopt into any software update system." - TUF Readme
- Project Repository: https://github.com/theupdateframework/specification
- Contributor Guide: theupdateframework/tuf/contributors
- Chat: None
- Developer Mailing List/Forum: TUF Mailing List
- License: Dual Licensed Apache 2.0 / MIT
- Legal Requirements: DCO
Helm
“Helm helps you manage Kubernetes applications — Helm Charts helps you define, install, and upgrade even the most complex Kubernetes application. Charts are easy to create, version, share, and publish — so start using Helm and stop the copy-and-paste madness. The latest version of Helm is maintained by the CNCF - in collaboration with Microsoft, Google, Bitnami and the Helm contributor community." - What is Helm? - helm.sh
- Project Repository: https://github.com/helm/helm
- Contributor Guide: helm/helm/contributing
- Chat: Slack
#helm-dev
in slack.k8s.io - Developer List/Forum: CNCF-Helm Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Harbor
“Project Harbor is an an open source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build and run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing." - Harbor Readme
- Project Repository: https://github.com/goharbor/harbor
- Contributor Guide: vmware/harbor/contributing
- Chat: Slack:
#harbor-dev
in slack.cncf.io - Developer Mailing List/Forum: Harbor-Dev Mailing List
- License: Apache 2.0
Rook
“Rook is an open source cloud-native storage orchestrator for Kubernetes, providing the platform, framework, and support for a diverse set of storage solutions to natively integrate with cloud-native environments." - What is Rook? - Rook Readme
- Project Repository: https://github.com/rook/rook
- Contributor Guide: rook/rook/contributing
- Chat: Slack: rook-io.slack.com
- Developer Mailing List/Forum: Rook-Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
TiKV
“TiKV (“Ti” stands for Titanium) is a distributed transactional key-value database, originally created to complement TiDB, a distributed HTAP database compatible with the MySQL protocol. TiKV is built in Rust and powered by Raft, and was inspired by the design of Google Spanner and HBase, but without dependency on any specific distributed file system." - TiKV Readme
- Project Repository: https://github.com/tikv/tikv
- Contributor Guide: tkiv/tkiv/contributing
- License: Apache 2.0
- Legal Requirements: DCO
Incubating Projects
OpenTracing
Vendor-neutral APIs and instrumentation for distributed tracing.
- Project Repository: https://github.com/opentracing
- Contributor Guide: opentracing-contrib/meta
- Chat: Gitter: gitter.im/opentracing/public
- Developer Mailing List/Forum: OpenTracing Mailing List
- License: Apache 2.0
- Legal Requirements: None
gRPC
“gRPC is a modern open source high performance RPC framework that can run in any environment. It can efficiently connect services in and across data centers with pluggable support for load balancing, tracing, health checking and authentication. It is also applicable in last mile of distributed computing to connect devices, mobile applications and browsers to backend services." - About - grpc.io
- Project Repository: https://github.com/grpc/grpc
- Contributor Guide: grpc/grpc/contributing
- Chat: Gitter: gitter.im/grpc/grpc
- Developer List/Forum: gRPC-io Mailing List
- License: Apache 2.0
- Legal Requirements: CNCF CLA
CNI
“CNI (Container Network Interface), a Cloud Native Computing Foundation project, consists of a specification and libraries for writing plugins to configure network interfaces in Linux containers, along with a number of supported plugins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Because of this focus, CNI has a wide range of support and the specification is simple to implement." - What is CNI?- CNI Readme
- Project Repository: https://github.com/containernetworking/cni
- Contributor Guide: containernetworking/cni/contributing
- Chat: Slack: containernetworking.slack.com
- Developer Mailing List/Forum: CNI-dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Notary
“Notary aims to make the internet more secure by making it easy for people to publish and verify content. We often rely on TLS to secure our communications with a web server, which is inherently flawed, as any compromise of the server enables malicious content to be substituted for the legitimate content." Overview - Notary Readme
- Project Repository: https://github.com/theupdateframework/notary
- Contributor Guide: theupdateframework/notary/contributing
- Chat: None
- Developer Mailing List/Forum: theupateframework Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
NATS
“NATS is an open source, lightweight, high-performance cloud native infrastructure messaging system. It implements a highly scalable and elegant publish-subscribe (pub/sub) distribution model. The performant nature of NATS make it an ideal base for building modern, reliable, scalable cloud native distributed systems." - What is NATS? - nats.io
- Project Repository: https://github.com/nats-io
- Contributor Guide: nats.io/contributing/
- Chat: Slack: natsio.slack.com
- Developer Mailing List/Forum: natsio Mailing List
- License: Apache 2.0
- Legal Requirements: None
Linkerd
“Linkerd is a transparent service mesh, designed to make modern applications safe and sane by transparently adding service discovery, load balancing, failure handling, instrumentation, and routing to all inter-service communication." - Linkerd Readme
- Project Repository: https://github.com/linkerd/linkerd
- Contributor Guide: linkerd/linkerd/contributing
- Chat: Slack: slack.linkerd.io
- Developer Mailing List/Forum: Linkerd Forum
- License: Apache 2.0
- Legal Requirements: DCO
etcd
“etcd is a distributed reliable key-value store for the most critical data of a distributed system, with a focus on being:
- Simple: well-defined, user-facing API (gRPC)
- Secure: automatic TLS with optional client cert authentication
- Fast: benchmarked 10,000 writes/sec
- Reliable: properly distributed using Raft”- etcd readme
- Project Repository: https://github.com/etcd-io/etcd
- Contributor Guide: etcd-io/etcd/contributing
- Chat:
#etcd
on freenode (join via Riot) - Developer List/Forum: etcd-dev Mailing List
- License: Apache 2.0
Open Policy Agent
“OPA is a lightweight general-purpose policy engine that can be co-located with your service. You can integrate OPA as a sidecar, host-level daemon, or library." - What is OPA? - openpolicyagent.org
- Project Repository: https://github.com/open-policy-agent/opa
- Contributor Guide: open-policy-agent/opa/contributing
- Chat: Slack: slack.openpolicyagent.org
- Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: None
CRI-O
“CRI-O is an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative) compatible runtimes. It is a lightweight alternative to using Docker as the runtime for kubernetes. It allows Kubernetes to use any OCI-compliant runtime as the container runtime for running pods. Today it supports runc and Kata Containers as the container runtimes but any OCI-conformant runtime can be plugged in principle." - What is CRI-O? - CRI-O.org
- Project Repository: https://github.com/cri-o
- Contributor Guide: cri-o/cri-o/CONTRIBUTING.md
- Chat:
#cri-o
on freenode (join via Riot) - License: Apache 2.0
- Legal Requirements: DCO
CloudEvents
CloudEvents Specification
- Project Repository: https://github.com/cloudevents/spec
- Contributor Guide: cloudevents/spec/contributing
- Chat: Slack:
#cloudevents
in slack.cncf.io - Developer Mailing List/Forum: CNCF-wg-Serverless Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Falco
“Falco is a behavioral activity monitor designed to detect anomalous activity in your applications. Powered by sysdig’s system call capture infrastructure, Falco lets you continuously monitor and detect container, application, host, and network activity… all in one place, from one source of data, with one set of rules." - Overview - Falco Readme
- Project Repository: https://github.com/falcosecurity/falco
- Chat: Slack:
#falco
in slack.sysdig.com - License: Apache 2.0
- Legal Requirements: Falco CLA
Argo
“Open source Kubernetes native workflows, events, CI and CD” - [https://argoproj.github.io/ ][$Argo overview]
- Project Repository: https://github.com/argoproj/
- Contributor Guide: [argo/community/][(https://github.com/argoproj/argo/tree/master/community#contributing-to-argo)
- Chat: Argo Slack
- License: Apache 2.0
- Legal Requirements: Argo CLA
Dragonfly
“Dragonfly is an intelligent P2P-based image and file distribution tool. It aims to improve the efficiency and success rate of file transferring, and maximize the usage of network bandwidth, especially for the distribution of larget amounts of data, such as application distribution, cache distribution, log distribution, and image distribution." - Overview - d7y.io
- Project Repository: https://github.com/dragonflyoss/dragonfly
- Contributor Guide: dragonflyoss/dragonfly/CONTRIBUTING
- Chat: gitter.im/alibaba/Dragonfly
- License: Apache 2.0
SPIFFE
“SPIFFE (Secure Production Identity Framework For Everyone) provides a secure identity, in the form of a specially crafted X.509 certificate, to every workload in a modern production environment. SPIFFE removes the need for application-level authentication and complex network-level ACL configuration." - What is SPIFFE? - spiffe.io
- Project Repository: https://github.com/spiffe/spiffe
- Contributor Guide: spiffe/spiffe/contributing
- Chat: Slack: slack.spiffe.io
- Developer Mailing List/Forum: SPIFFE Dev Discussion Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
SPIRE
“SPIRE (the SPIFFE Runtime Environment) is a tool-chain for establishing trust between software systems across a wide variety of hosting platforms. Concretely, SPIRE exposes the SPIFFE Workload API, which can attest running software systems and issue SPIFFE IDs and SVIDs to them." - Spire Readme
- Project Repository: https://github.com/spiffe/spire
- Contributor Guide: spiffe/spire/contributing
- Chat: Slack: slack.spiffe.io
- Developer Mailing List/Forum: SPIFFE Dev Discussion Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Contour
“Contour is an open source Kubernetes ingress controller providing the control plane for the Envoy edge and service proxy. Contour supports dynamic configuration updates and multi-team ingress delegation out of the box while maintaining a lightweight profile." - projectcontour.io
- Project Repository: https://github.com/projectcontour/contour
- Contributor Guide: projectcontour/community
- Chat: Slack:
#contour
in kubernetes.slack.com - License: Apache 2.0
- Legal Requirements: DCO
Sandbox Projects
Telepresence
“Telepresence is an open source tool that lets you run a single service locally, while connecting that service to a remote Kubernetes cluster." - Overview - telepresence.io
- Project Repository: https://github.com/telepresenceio/telepresence
- Contributor Guide: telepresenceio/telepresence/docs/reference/developing
- Chat: Slack:
#telepresence
in datawire-oss.slack.com - Developer Mailing List/Forum: None
- License: Apache 2.0
- Legal Requirements: DCO
OpenMetrics
“An effort to create an open standard for transmitting metrics at scale, with support for both text representation and Protocol Buffers." - openmetrics.io
- Project Repository: https://github.com/OpenObservability/OpenMetrics
- Contributor Guide: [TBD]
- Chat: Slack:
#openmetrics
in slack.cncf.io - Developer Mailing List/Forum: OpemMetrics Mailing List
- License: Apache 2.0
Cortex
“Cortex provides horizontally scalable, multi-tenant, long term storage for Prometheus metrics when used as a remote write destination, and a horizontally scalable, Prometheus-compatible query API." - Cortex Readme
- Project Repository: https://github.com/cortexproject/cortex
- Contributor Guide: cortextproject/cortex/readme
- Chat: Slack:
#cortext
in slack.cncf.io - License: Apache 2.0
- Legal Requirements: DCO
Buildpacks
“Buildpacks provide a higher-level abstraction for building apps compared to Dockerfiles." - What Are Buildpacks? - buildpacks.io
- Project Repository: https://github.com/buildpack
- Chat: Slack: slack.buildpacks.io
- License: Apache 2.0
Virtual Kubelet
“Virtual Kubelet is an open source Kubernetes kubelet implementation that masquerades as a kubelet for the purposes of connecting Kubernetes to other APIs. This allows the nodes to be backed by other services like ACI, AWS Fargate, Hyper.sh, IoT Edge etc. The primary scenario for VK is enabling the extension of the Kubernetes API into serverless container platforms like ACI, Fargate, and Hyper.sh, though we are open to others. However, it should be noted that VK is explicitly not intended to be an alternative to Kubernetes federation." - Virtual Kubelet Readme
- Project Repository: https://github.com/virtual-kubelet/virtual-kubelet
- Contributor Guide: virtual-kubelet/virtual-kubelet/contributing
- License: Apache 2.0
- Legal Requirements: CNCF CLA
KubeEdge
“KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge." - KubeEdge website
- Project Repository: https://github.com/kubeedge/kubeedge
- Contributor Guide: KubeEdge-contributor-guide
- Chat: KubeEdge
- Developer List/Forum: KubeEdge
- License: Apache 2.0
Keptn
“Keptn is a control-plane for continuous delivery and automated operations." - Keptn.sh
- Project Repository: https://github.com/keptn/keptn
- Contributor Guide: Keptn-contributor-guide
- Chat: Keptn Slack
- Developer List/Forum: Keptn mailing list
- License: Apache 2.0
Brigade
“Brigade is a tool for running scriptable, automated tasks in the cloud — as part of your Kubernetes cluster." - Brigade-overview
- Project Repository: https://github.com/brigadecore/brigade/
- Contributor Guide: Brigade-contributor-guide
- Chat: Brigade-chat
Network Service Mesh
“Network Service Mesh (NSM) is a novel approach to solving complicated L2/L3 use cases in Kubernetes that are tricky to address withing the existing Kubernetes Network Model. Inspired by Istio, Network Service Mesh maps the concept of a service mesh to L2/L3 payloads." - What is Network Service Mesh? - networkservicemesh.io
- Project Repository: https://github.com/networkservicemesh
- Chat: Slack
#nsm-dev
in slack.cncf.io - Developer List/Forum: Network Service Mesh Mailing List
OpenTelemetry
“OpenTelemetry is made up of an integrated set of APIs and libraries as well as a collection mechanism via an agent and collector. These components are used to generate, collect, and describe telemetry about distributed systems. This data includes basic context propagation, distributed traces, metrics, and other signals in the future. OpenTelemetry is designed to make it easy to get critical telemetry data out of your services and into your backend(s) of choice. For each supported language it offers a single set of APIs, libraries, and data specifications, and developers can take advantage of whichever components they see fit. - What is OpenTelemetry? - opentelemetry.io
- Project Repository: https://github.com/open-telemetry
- Chat: Gitter: open-telemetry/community
- Developer List/Forum: OpenTelemetry Dev Mailing List
- License: Apache 2.0
OpenEBS
“OpenEBS is the leading open-source project for container-attached and container-native storage on Kubernetes. OpenEBS adopts Container Attached Storage (CAS) approach, where each workload is provided with a dedicated storage controller. OpenEBS implements granular storage policies and isolation that enable users to optimize storage for each specific workload. OpenEBS runs in user space and does not have any Linux kernel module dependencies." - Introduction - OpenEBS.io
- Project Repository: https://github.com/openebs
- Contributor Guide: openebs/openebs/CONTRIBUTING
- Chat: Slack: openebs-community.slack.com
- License: Apache 2.0
- Legal Requirements: DCO
Thanos
“Thanos is a set of components that can be composed into a highly available metric system with unlimited storage capacity, which can be added seamlessly on top of existing Prometheus deployments." - Overview - Thanos readme
- Project Repository: https://github.com/thanos-io/thanos
- Contributor Guide: thanos.io/contributing
- Chat: Slack:
#thanos
in slack.cncf.io - License: Apache 2.0
- Legal Requirements: DCO
Flux
“Flux is a tool that automatically ensures that the state of your Kubernetes cluster matches the configuration you’ve supplied in Git. It uses an operator in the cluster to trigger deployments inside Kubernetes, which means that you don’t need a separate continuous delivery tool." - Flux - fluxcd.io
- Project Repository: https://github.com/fluxcd/flux
- Contributor Guide: fluxcd/flux/CONTRIBUTING
- Chat: Slack:
#flux
in slack.cncf.io - Developer List/Forum: Flux Dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
in-toto
“in-toto provides a framework to protect the integrity of the software supply chain. It does so by verifying that each task in the chain is carried out as planned, by authorized personnel only, and that the product is not tampered with in transit." - in-toto - in-toto Readme
- Project Repository: https://github.com/in-toto/in-toto
- Contributor Guide: Instructions for Contributors
- Developer List/Forum: in-toto mailing list
- License: Apache 2.0
- Legal Requirements: DCO
Litmus
“Litmus is a toolset to perform cloud-native chaos engineering. Litmus provides tools to orchestrate chaos on Kubernetes and helps SREs find weaknesses in their deployments. SREs use Litmus to run chaos experiments initially in the staging environment and eventually in production to find bugs, vulnerabilities. Fixing the weaknesses leads to increased resilience of the system." - Litmus
- Project Repository: https://github.com/litmuschaos/litmus
- Contributor Guide: Litmus-contributor-guide
- Chat: Litmus Slack
- License: Apache 2.0
Tinkerbell
“Tinkerbell is a bare metal provisioning engine. Tinkerbell standardizes infrastructure and application management using the same API-centric, declarative configuration and automation approach pioneered by the Kubernetes community." - Tinkerbell
- Project Repository: https://github.com/tinkerbell
- Contributor Guide: tinkerbell/tink/CONTRIBUTING
- Chat: Slack:
#tinkerbell
in slack.cncf.io - Developer List/Forum: Tinkerbell Contributors Mailing List
- License: Apache 2.0
- Legal Requirements: DCO
Archived Projects
rkt
rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
- Project Repository: https://github.com/rkt/rkt
- Contributor Guide: rkt/rkt/contributing
- Chat:
#rkt-dev
on freenode (join via Riot) - Developer Mailing List/Forum: rkt-dev Mailing List
- License: Apache 2.0
- Legal Requirements: DCO