The most actively developed CNCF projects in 2024 were:
1. Kubernetes
2. OpenTelemetry
3. Argo
4. Backstage
5. Prometheus
6. Cilium
7. gRPC
8. Envoy
9. Meshery
10. Keycloak
That’s what the latest review of the CNCF project velocity revealed. This Top 10 is defined by the number of authors contributing to the projects’ repositories. The graph axes also reflect other criteria, such as commits, PRs, and issues.
You can find a full interactive map with all the projects and related data in this spreadsheet. The scripts used to gather and generate this data are available on GitHub.
#news #cncfprojects
1. Kubernetes
2. OpenTelemetry
3. Argo
4. Backstage
5. Prometheus
6. Cilium
7. gRPC
8. Envoy
9. Meshery
10. Keycloak
That’s what the latest review of the CNCF project velocity revealed. This Top 10 is defined by the number of authors contributing to the projects’ repositories. The graph axes also reflect other criteria, such as commits, PRs, and issues.
You can find a full interactive map with all the projects and related data in this spreadsheet. The scripts used to gather and generate this data are available on GitHub.
#news #cncfprojects
🔥5👍1
🎉12👍2❤1
The latest Open Source drama came straight into the CNCF's hands. We haven’t seen such cases before: Synadia, the principal maintainer and original creator of NATS, a CNCF Incubating project, wants to get the ownership for this project back from the vendor-neutral home.
Synadia’s plan involved becoming the owner of the NATS project again and switching to the BSL license—which OSI does not consider Open Source—for future releases to ensure its business sustainability. However, CNCF insists there is no “way out” for the foundation's projects and suggests forking its repositories instead.
While Synadia is undoubtedly the leading developing force for NATS, the CNCF has helped the project thrive in many ways since its donation in 2018. In addition to the obvious marketing benefits, NATS also received funding for two third-party security audits and financial support for trademark legal expenses.
If Synadia stops contributing to NATS and there is not enough interest from other community members in developing a project, it might end up archived in the CNCF. The CNCF TOC has already started evaluating the health of this project.
Find more details about this story in the:
- original blog post by CNCF (posted on April 24th and updated on April 28th);
- official answer from Synadia (April 25th);
- Bluesky thread started by Joe Beda (posted on April 26th and answered by Derek Collison, founder and CEO @ Synadia);
- CNCF TOC issue regarding NATS health state.
#news #cncfprojects
Synadia’s plan involved becoming the owner of the NATS project again and switching to the BSL license—which OSI does not consider Open Source—for future releases to ensure its business sustainability. However, CNCF insists there is no “way out” for the foundation's projects and suggests forking its repositories instead.
While Synadia is undoubtedly the leading developing force for NATS, the CNCF has helped the project thrive in many ways since its donation in 2018. In addition to the obvious marketing benefits, NATS also received funding for two third-party security audits and financial support for trademark legal expenses.
If Synadia stops contributing to NATS and there is not enough interest from other community members in developing a project, it might end up archived in the CNCF. The CNCF TOC has already started evaluating the health of this project.
Find more details about this story in the:
- original blog post by CNCF (posted on April 24th and updated on April 28th);
- official answer from Synadia (April 25th);
- Bluesky thread started by Joe Beda (posted on April 26th and answered by Derek Collison, founder and CEO @ Synadia);
- CNCF TOC issue regarding NATS health state.
#news #cncfprojects
🙈5❤4
Kubernative by Palark | Kubernetes news and goodies
The latest Open Source drama came straight into the CNCF's hands. We haven’t seen such cases before: Synadia, the principal maintainer and original creator of NATS, a CNCF Incubating project, wants to get the ownership for this project back from the vendor…
What could be the best possible outcome of the NATS case? “CNCF and Synadia today announced that the widely-adopted NATS project will continue to thrive in the cloud native open source ecosystem of the CNCF with Synadia’s continued support and involvement.”
It’s not a fiction, it’s for real! Bravo to all the parties involved 🥳
#news #cncfprojects
It’s not a fiction, it’s for real! Bravo to all the parties involved 🥳
#news #cncfprojects
🎉3👍2❤1
Last month, in-toto became the latest (31st) CNCF Graduated project.
in-toto is an SSC (software supply chain) security framework created at the NYU Tandon School of Engineering. Written in Python, it ensures the integrity of a software product from initiation to end-user installation by informing the user which steps are performed and when. The project joined the CNCF Sandbox in 2019, became Incubating in 2022, and was declared Graduated now.
Find more details in the official graduation announcement, project website and main GitHub repo.
#news #cncfprojects
in-toto is an SSC (software supply chain) security framework created at the NYU Tandon School of Engineering. Written in Python, it ensures the integrity of a software product from initiation to end-user installation by informing the user which steps are performed and when. The project joined the CNCF Sandbox in 2019, became Incubating in 2022, and was declared Graduated now.
Find more details in the official graduation announcement, project website and main GitHub repo.
#news #cncfprojects
👍3
The latest CNCF projects' velocity report was published. It names the following projects as the most actively developed (out of 231 hosted in CNCF) during the last year (from July 1st, 2024, to July 1st, 2025):
1. Kubernetes
2. OpenTelemetry
3. Prometheus
4. Argo
5. Backstage
6. Meshery
7. Cilium
8. Envoy
9. gRPC
10. Keycloak
If we compare it with the previous Top 10 for this period (July 1st, 2023, to July 1st, 2024), the most significant difference is:
- Meshery: 11th (a year ago) → 6th place (now);
- Istio: 9th → 15th;
- Prometheus: 5th → 3th.
Other prominent changes in Top 100 include:
- Podman Container Tools debuting at 18th place and CloudNativePG at 29th;
- OpenFGA: 34th → 21st;
- Headlamp: 99th → 50th;
- Buildpacks: 41st → 60th.
You can find all the latest stats on CNCF projects (contributors, commits, PRs, issues, etc.) in this public spreadsheet.
#news #cncfprojects
1. Kubernetes
2. OpenTelemetry
3. Prometheus
4. Argo
5. Backstage
6. Meshery
7. Cilium
8. Envoy
9. gRPC
10. Keycloak
If we compare it with the previous Top 10 for this period (July 1st, 2023, to July 1st, 2024), the most significant difference is:
- Meshery: 11th (a year ago) → 6th place (now);
- Istio: 9th → 15th;
- Prometheus: 5th → 3th.
Other prominent changes in Top 100 include:
- Podman Container Tools debuting at 18th place and CloudNativePG at 29th;
- OpenFGA: 34th → 21st;
- Headlamp: 99th → 50th;
- Buildpacks: 41st → 60th.
You can find all the latest stats on CNCF projects (contributors, commits, PRs, issues, etc.) in this public spreadsheet.
#news #cncfprojects
👍11❤1
External Secrets Operator paused releases and needs maintainers
ESO is a Kubernetes operator that integrates external secret management systems (AWS Secrets Manager, HashiCorp Vault, etc.) to read information from external APIs and automatically inject the values into a Kubernetes Secret. It’s been a CNCF Sandbox project since July 2022.
Yesterday, its maintainer, Gustavo Fernandes de Carvalho, announced that, due to the project's unhealthy status (lack of long-term maintainers), there won’t be new External Secrets Operator releases until more volunteers join the project. This news caught a lot of attention in the Cloud Native community, and hopefully, the situation might improve. Feel free to join this effort:
- GitHub issue
- Reddit discussion
#news #cncfprojects
ESO is a Kubernetes operator that integrates external secret management systems (AWS Secrets Manager, HashiCorp Vault, etc.) to read information from external APIs and automatically inject the values into a Kubernetes Secret. It’s been a CNCF Sandbox project since July 2022.
Yesterday, its maintainer, Gustavo Fernandes de Carvalho, announced that, due to the project's unhealthy status (lack of long-term maintainers), there won’t be new External Secrets Operator releases until more volunteers join the project. This news caught a lot of attention in the Cloud Native community, and hopefully, the situation might improve. Feel free to join this effort:
- GitHub issue
- Reddit discussion
#news #cncfprojects
😢7❤4
Apple hires the creators of Open Policy Agent
Open Policy Agent (OPA) is a general-purpose policy engine that became a CNCF Graduated project in 2021. Yesterday, the project announced that “the creators of Open Policy Agent (along with many team members from Styra) have joined Apple.”
Styra is the company where OPA originated, and Apple is an active user of this project. OPA serves as a key component of Apple’s authorisation infrastructure. After this transition, more OPA-related repositories owned by Styra — such as EOPA (the commercial distribution of OPA), OPA Control Plane, SDKs, and Rental linter for Rego — will be moved to the CNCF OPA GitHub organisation.
#news #cncfprojects
Open Policy Agent (OPA) is a general-purpose policy engine that became a CNCF Graduated project in 2021. Yesterday, the project announced that “the creators of Open Policy Agent (along with many team members from Styra) have joined Apple.”
Styra is the company where OPA originated, and Apple is an active user of this project. OPA serves as a key component of Apple’s authorisation infrastructure. After this transition, more OPA-related repositories owned by Styra — such as EOPA (the commercial distribution of OPA), OPA Control Plane, SDKs, and Rental linter for Rego — will be moved to the CNCF OPA GitHub organisation.
#news #cncfprojects
👍4
Metal³ became a CNCF Incubating project
The Metal³ project (pronounced "Metal Kubed") provides a set of tools for managing bare-metal infrastructure using Kubernetes. Its operator, based on Ironic, automates the provisioning of bare-metal servers. It also offers a provider for Cluster API, enabling users to deploy Cluster API-based clusters on top of bare-metal servers.
The project was started in 2019 by Red Hat and was later joined by Ericsson. Since then, many other organisations, including Fujitsu, Ikea, and SUSE, adopted it. The project was accepted into the CNCF Sandbox in September 2020, and two weeks ago, the CNCF TOC voted for its incubation. The official announcement is available here.
#cncfprojects #news
The Metal³ project (pronounced "Metal Kubed") provides a set of tools for managing bare-metal infrastructure using Kubernetes. Its operator, based on Ironic, automates the provisioning of bare-metal servers. It also offers a provider for Cluster API, enabling users to deploy Cluster API-based clusters on top of bare-metal servers.
The project was started in 2019 by Red Hat and was later joined by Ericsson. Since then, many other organisations, including Fujitsu, Ikea, and SUSE, adopted it. The project was accepted into the CNCF Sandbox in September 2020, and two weeks ago, the CNCF TOC voted for its incubation. The official announcement is available here.
#cncfprojects #news
👍6
Kubernative by Palark | Kubernetes news and goodies
External Secrets Operator paused releases and needs maintainers ESO is a Kubernetes operator that integrates external secret management systems (AWS Secrets Manager, HashiCorp Vault, etc.) to read information from external APIs and automatically inject the…
Quick facts from an official update on the ESO (External Secrets Operator) project status posted yesterday:
1. 300+ people signed up to help ESO.
2. The project introduced a contributor ladder and created contribution tracks (testing, CI, core, providers).
3. Releases are still on pause: “… we need to spend time exercising, testing, adjusting it before we feel confident enough to release it.”
4. An effort to become a CNCF Incubating project is still on and moving forward.
You can find more details in this Reddit post and the related GitHub issue.
#cncfprojects #news
1. 300+ people signed up to help ESO.
2. The project introduced a contributor ladder and created contribution tracks (testing, CI, core, providers).
3. Releases are still on pause: “… we need to spend time exercising, testing, adjusting it before we feel confident enough to release it.”
4. An effort to become a CNCF Incubating project is still on and moving forward.
You can find more details in this Reddit post and the related GitHub issue.
#cncfprojects #news
❤8
Knative became a CNCF Graduated project
Knative is a Kubernetes-based platform to build, deploy, and manage serverless workloads. It consists of three main components:
- Knative Serving for deploying and serving applications and functions on Kubernetes as serverless containers;
- Knative Eventing, an event-driven application platform that supports various workloads, including regular Kubernetes services and Knative Serving services;
- Knative Functions, a developer-focused client library and CLI for development and deployment of functions.
It was accepted to CNCF in March 2022 as an Incubating project, and just about 5 hours ago, it passed the CNCF TOC vote for graduation.
#news #cncfprojects #serverless
Knative is a Kubernetes-based platform to build, deploy, and manage serverless workloads. It consists of three main components:
- Knative Serving for deploying and serving applications and functions on Kubernetes as serverless containers;
- Knative Eventing, an event-driven application platform that supports various workloads, including regular Kubernetes services and Knative Serving services;
- Knative Functions, a developer-focused client library and CLI for development and deployment of functions.
It was accepted to CNCF in March 2022 as an Incubating project, and just about 5 hours ago, it passed the CNCF TOC vote for graduation.
#news #cncfprojects #serverless
🔥6❤3👍3
CNCF projects get access to Docker Sponsored Open Source program
CNCF has just announced a new partnership with Docker, Inc., which provides CNCF projects with direct access to the Docker Sponsored Open Source (DSOS) program. This means they can benefit from unlimited image pulls from Docker Hub, access to Docker Scout for vulnerability analysis and policy enforcement, automated image builds from source, and Docker usage metrics and engagement insights.
#cncfprojects #news
CNCF has just announced a new partnership with Docker, Inc., which provides CNCF projects with direct access to the Docker Sponsored Open Source (DSOS) program. This means they can benefit from unlimited image pulls from Docker Hub, access to Docker Scout for vulnerability analysis and policy enforcement, automated image builds from source, and Docker usage metrics and engagement insights.
#cncfprojects #news
👍9🤔3
CloudNativePG switches to its own Docker images
Last month, the PostgreSQL Docker Community discontinued support for Debian
The PostgreSQL images produced by CNPG are based on Debian
#news #cncfprojects #databases
Last month, the PostgreSQL Docker Community discontinued support for Debian
bullseye for the official postgres image. Following this news, CloudNativePG (a CNCF Sandbox project) decided to switch to its own images. By establishing its build process that uses Docker Bake, the project now fully controls the entire stack provided with its Kubernetes operator.The PostgreSQL images produced by CNPG are based on Debian
stable and oldstable and rebuilt weekly, cover PgSQL v13-v17, support AMD64 and ARM64, include popular extensions (such as PGAudit, pgvector, PostGIS and pgRouting), and come with SBOMs.#news #cncfprojects #databases
👍6
KServe joins CNCF as an Incubating project
KServe is a standardised distributed generative and predictive AI inference platform for scalable, multi-framework deployment on Kubernetes. Technically, it provides CRDs for serving predictive and generative ML models and offers various features for that, such as intelligent routing, advanced deployments, model caching, autoscaling, and many more.
Today, KServe is adopted by numerous well-known organisations, including AMD, Bloomberg, Canonical, Cisco, IBM, NVIDIA, Red Hat, and the Wikimedia Foundation. Partly thanks to that, when a relevant CNCF TOC vote passed, the project was able to join the CNCF at the Incubator level.
#news #cncfprojects #genai
KServe is a standardised distributed generative and predictive AI inference platform for scalable, multi-framework deployment on Kubernetes. Technically, it provides CRDs for serving predictive and generative ML models and offers various features for that, such as intelligent routing, advanced deployments, model caching, autoscaling, and many more.
Today, KServe is adopted by numerous well-known organisations, including AMD, Bloomberg, Canonical, Cisco, IBM, NVIDIA, Red Hat, and the Wikimedia Foundation. Partly thanks to that, when a relevant CNCF TOC vote passed, the project was able to join the CNCF at the Incubator level.
#news #cncfprojects #genai
👍4
Documentary on Flux: 2 parts (out of 4) released
KubeFM and ControlPlane have filmed “The Making of Flux,” a series about Flux. It reveals the story of this project through the words of people directly involved in it. Currently, two episodes have been released on YouTube:
- Ep1 “The Origin” (22 mins), where Alexis Richardson, Andrew Martin, and Chris Aniszczyk cover the foundation of GitOps and creation of Flux, and its path to the CNCF graduation;
- Ep2 “The Rewrite” (45 mins), where Stefan Prodan and Michael Bridgen tell how Flux initially worked and why it needed a complete v2 rewrite.
Two more episodes will follow soon.
#video #gitops #cncfprojects
KubeFM and ControlPlane have filmed “The Making of Flux,” a series about Flux. It reveals the story of this project through the words of people directly involved in it. Currently, two episodes have been released on YouTube:
- Ep1 “The Origin” (22 mins), where Alexis Richardson, Andrew Martin, and Chris Aniszczyk cover the foundation of GitOps and creation of Flux, and its path to the CNCF graduation;
- Ep2 “The Rewrite” (45 mins), where Stefan Prodan and Michael Bridgen tell how Flux initially worked and why it needed a complete v2 rewrite.
Two more episodes will follow soon.
#video #gitops #cncfprojects
❤2👍1
+10 new CNCF Sandbox projects accepted in 2025
Two days ago, a few Open Source projects were accepted to the CNCF Sandbox. This was the second batch of new projects since March, when we announced the latest additions to CNCF. In this post, we list all new arrivals to the CNCF Sandbox from those two batches:
[May 2025]
1. urunc — "runc for unikernels," a CRI-compatible runtime for running unikernels and application kernels as containers. [application request's GitHub issue #353]
2. xRegistry — an abstract model (specification) for managing metadata about resources and a REST-based interface to discover, create, modify and delete those resources. [#357]
3. ModelPack — open standards for packaging, distributing and running AI artifacts in the Cloud Native environment. [#358]
4. kagent — a programming framework for DevOps and platform engineers to run AI agents in Kubernetes. [#360] By the way, we covered the project before in this post.
5. Cadence — a distributed orchestration engine to execute asynchronous long-running business logic. [#368]
[September 2025]
6. OAuth2-Proxy — a generic reverse proxy that provides authentication with Google, Azure, OIDC and other identity providers. [#397]
7. Oxia — a scalable metadata store and coordination system for large-scale distributed systems. [#394]
8. HolmesGPT — an AI agent for investigating problems in cloud, finding the root cause, and suggesting remediations. [#392]
9. Cedar — an authorisation policy language for expressing fine-grained permissions as easy-to-understand policies enforced in applications. [#371]
10. Dalec — a declarative format for building system packages and containers in a secure way for supply chain security. [#396]
#news #cncfprojects
Two days ago, a few Open Source projects were accepted to the CNCF Sandbox. This was the second batch of new projects since March, when we announced the latest additions to CNCF. In this post, we list all new arrivals to the CNCF Sandbox from those two batches:
[May 2025]
1. urunc — "runc for unikernels," a CRI-compatible runtime for running unikernels and application kernels as containers. [application request's GitHub issue #353]
2. xRegistry — an abstract model (specification) for managing metadata about resources and a REST-based interface to discover, create, modify and delete those resources. [#357]
3. ModelPack — open standards for packaging, distributing and running AI artifacts in the Cloud Native environment. [#358]
4. kagent — a programming framework for DevOps and platform engineers to run AI agents in Kubernetes. [#360] By the way, we covered the project before in this post.
5. Cadence — a distributed orchestration engine to execute asynchronous long-running business logic. [#368]
[September 2025]
6. OAuth2-Proxy — a generic reverse proxy that provides authentication with Google, Azure, OIDC and other identity providers. [#397]
7. Oxia — a scalable metadata store and coordination system for large-scale distributed systems. [#394]
8. HolmesGPT — an AI agent for investigating problems in cloud, finding the root cause, and suggesting remediations. [#392]
9. Cedar — an authorisation policy language for expressing fine-grained permissions as easy-to-understand policies enforced in applications. [#371]
10. Dalec — a declarative format for building system packages and containers in a secure way for supply chain security. [#396]
#news #cncfprojects
👍7