724 Integrations with Kubernetes

View a list of Kubernetes integrations and software that integrates with Kubernetes below. Compare the best Kubernetes integrations as well as features, ratings, user reviews, and pricing of software that integrates with Kubernetes. Here are the current Kubernetes integrations in 2024:

  • 1
    PortX

    PortX

    Modusbox

    Unlock the true power of your team with coding-optional tools at their fingertips. Harness additional capabilities by enabling developers and non-developers alike to create APIs and integrations using browser-based configuration and management. Automated testing and coverage reporting out-of-the-box will speed up your ability to launch new PortX APIs and integrations with confidence. Gain peace of mind knowing your code will stand up to the rigors of your users. It doesn’t take an army of engineers to manage highly reliable infrastructure. This enterprise-ready integration platform bundles the capabilities of an enterprise integration manager and API management platform. The best part is that we manage it for you! Design end-to-end integration on a single screen. Organize endpoints, routes, and maps, all without code. Visual presentations simplify API management, workflow design, and diagnosing the health and status of your ecosystem.
  • 2
    Virtalica StorageFabric
    Enterprises often find it challenging to keep up with the rapid proliferation and availability of various on-premise and cloud storage solutions across the organization. The result is an increasingly complex, difficult to secure, and often expensive vendor-locked ecosystem. Dozens of legacy systems are patched together. Vendor lock-in comes with significant hidden costs. Consuming public cloud efficiently and securely is not easy. It is a customer-hosted global scale-out software platform that enables enterprises to integrate, protect and unify tens of on-prem and in-cloud storage providers. It seamlessly offers unified virtual namespaces through standard APIs to enterprise users worldwide. StorageFabric frees the enterprise from expensive vendor lock-in and integration complexity while handling the significant security vulnerabilities that come with the cloud. StorageFabric is the highest-performance least-friction data layer to unify, protect, migrate, and commoditize storage.
  • 3
    Tintri IntelliFlash
    Forward-looking enterprises choose Tintri IntelliFlash because it is the industry’s most versatile storage portfolio and the easiest to manage, with generalist-friendly administration and a single, all-inclusive license. You can maximize operational efficiency and TCO savings by running all your apps on a single unified storage system with concurrent multimedia and multi-protocol support. AI-driven analytics and autonomous workload optimization give you effortless IT productivity and an exceptional user experience. Cloud-based intelligent analytics for IntelliFlash collects millions of data points from participating systems, including capacity usage, configuration details, and comprehensive system health and performance. AI-driven data analysis then detects issues and identifies patterns that can predict trends far in advance and help you make better decisions and maximize resource efficiency.
  • 4
    Spring Cloud Data Flow
    Microservice-based streaming and batch data processing for Cloud Foundry and Kubernetes. Spring Cloud Data Flow provides tools to create complex topologies for streaming and batch data pipelines. The data pipelines consist of Spring Boot apps, built using the Spring Cloud Stream or Spring Cloud Task microservice frameworks. Spring Cloud Data Flow supports a range of data processing use cases, from ETL to import/export, event streaming, and predictive analytics. The Spring Cloud Data Flow server uses Spring Cloud Deployer, to deploy data pipelines made of Spring Cloud Stream or Spring Cloud Task applications onto modern platforms such as Cloud Foundry and Kubernetes. A selection of pre-built stream and task/batch starter apps for various data integration and processing scenarios facilitate learning and experimentation. Custom stream and task applications, targeting different middleware or data services, can be built using the familiar Spring Boot style programming model.
  • 5
    NexClipper

    NexClipper

    NexClipper

    Get onboard NexClipper for a relaxed cloud-native trip! Our managed Prometheus service offers the easiest way to implement observability for Kubernetes or hybrid environments. Lean back and enjoy a smooth ride as we take the wheel. Our service provides hassle-free migration and management of cloud-native environments. We are keeping it simple but won’t compromise when it comes to security or scalability. Rest assured with a solution that grows with you, offering all features you need at any stage of your business. Benefit from the simplicity of a managed service. Benefit from the best that the open-source community has to offer without the need to develop your own architectures. NexClipper is your dock to an extended Prometheus ecosystem with its proven solutions and our own open-source projects. Work with the technology you know and trust, while we do the heavy lifting for you!
  • 6
    Kubestone

    Kubestone

    Kubestone

    Welcome to Kubestone, the benchmarking operator for Kubernetes. Kubestone is a benchmarking operator that can evaluate the performance of Kubernetes installations. Supports a common set of benchmarks to measure, CPU, disk, network and application performance. Fine-grained control over Kubernetes scheduling primitives, affinity, anti-affinity, tolerations, storage classes, and node selection. New benchmarks can easily be added by implementing a new controller. Benchmarks runs are defined as custom resources and executed in the cluster using Kubernetes resources, pods, jobs, deployments, and services. Follow the quickstart guide to see how Kubestone can be deployed and how benchmarks can be run. Benchmarks can be executed via Kubestone by creating custom resources in your cluster. After the namespace is created you can use it to post a benchmark request to the cluster. The resulting benchmark executions will reside in this namespace.
  • 7
    Cider

    Cider

    Cider

    Gain granular visibility with engineering technologies, systems, and processes, all the way from code to deployment. Easily connect Cider to your ecosystem and seamlessly integrate security without interrupting engineering. Optimize your CI/CD security, based on a set of prioritized risks and recommendations tailored to your environment. Cider seamlessly integrates with all systems across your CI/CD and provides you with a comprehensive and accurate analysis of all technologies, frameworks, and integrations which exist in the environment. Cider maps all intelligent connections within your environment to create end-to-end visibility over the full CI/CD journey, all the way from SCM user to an artifact deployed to production. Assess the posture of your engineering systems and processes. Analyze your environment against realistic attack scenarios and identify the controls required to reduce your CI/CD attack surface.
  • 8
    Checkov

    Checkov

    Bridgecrew

    Verify changes to hundreds of supported resource types in all major cloud providers. Scan cloud resources in build-time for misconfigured attributes with a simple Python policy-as-code framework. Analyze relationships between cloud resources using Checkov’s graph-based YAML policies. Execute, test, and modify runner parameters in the context of a subject repository CI/CD and version control integrations. Extend Checkov to define your own custom policies, providers, and suppressions terms. Prevent misconfigurations from being deployed by embedding it into existing developer workflows. Enable automated pull/merge request annotations on your repositories without having to build a CI pipeline or run scheduled checks. The Bridge crew platform will automatically scan new pull requests and annotate them with comments for any policy violations discovered.
  • 9
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
  • 10
    ThreatStryker

    ThreatStryker

    Deepfence

    Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior.
  • 11
    ThreatMapper

    ThreatMapper

    Deepfence

    Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.
  • 12
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 13
    OpenFaaS

    OpenFaaS

    OpenFaaS

    Serverless functions, made simple. OpenFaaS® makes it simple to deploy both functions and existing code to Kubernetes. Avoid lock-in through the use of Docker. Run-on any public or private cloud. Build both microservices & functions in any language. Legacy code and binaries. Auto-scale for demand or to zero when idle. Bring your laptop, your own on-prem hardware, or create a cluster in the cloud. Let Kubernetes do the heavy lifting enabling you to build a scalable, fault-tolerant event-driven serverless platform for your applications. You can try out OpenFaaS in 60 seconds or write and deploy your first Python function in around 10-15 minutes. From there you can take the OpenFaaS workshop, a series of tried-and-tested self-paced labs which teach you everything you need to know about functions, and more. An ecosystem for sharing, reusing, and collaborating on functions. Reduce boilerplate code, and share code in the templates store.
  • 14
    Oxeye

    Oxeye

    Oxeye

    Oxeye is designed to expose vulnerable flows in distributed cloud native application code. We incorporate next-generation SAST, DAST, IAST, and SCA capabilities to ensure verification of risks in both Dev and Runtime environments. Built for developers and AppSec teams, Oxeye helps to shift-left security while accelerating development cycles, reducing friction, and eliminating vulnerabilities. We deliver reliable results with high accuracy. Oxeye analyzes code vulnerabilities across microservices delivering contextualized risk assessment enriched with infrastructure configuration data. With Oxeye developers can easily track and resolve vulnerabilities. We deliver the vulnerability visibility flow, steps to reproduce, and the exact line of code. Oxeye offers a seamless integration as Daemonset with a single deployment that doesn’t require performing changes in the code. We deliver frictionless security to your cloud-native apps.
  • 15
    QANplatform

    QANplatform

    QANplatform

    Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 16
    Bionic

    Bionic

    Bionic

    Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards.
  • 17
    Crossplane

    Crossplane

    Crossplane

    Crossplane is an open-source Kubernetes add-on that enables platform teams to assemble infrastructure from multiple vendors, and expose higher-level self-service APIs for application teams to consume, without having to write any code. Provision and manage cloud infrastructure and services using kubectl. Crossplane extends your Kubernetes cluster, providing you with CRDs for any infrastructure or managed service. Compose these granular resources into higher-level abstractions that can be versioned, managed, deployed, and consumed using your favorite tools and existing processes you've already integrated with your clusters. We built Crossplane to help organizations build their clouds like the cloud vendors build theirs, with a control plane. Crossplane is a CNCF project which extends the Kubernetes API to manage and compose infrastructure. Operators can encapsulate policies, permissions, and other guardrails behind a custom API line generated by Crossplane.
  • 18
    Cluster.dev

    Cluster.dev

    Cluster.dev

    Cluster.dev, the only manager for cloud-native infrastructures. Combine the power of all your infrastructure tools. Create platform-as-a-service for your teams. Customize your projects and infrastructures. Observe changes and the state of your infrastructure in a single place, your Git repo. Use a common solution for all types of changes. Forget about manual runbooks and CI/CD magic. You deserve to have an overview of all your infrastructure in a single place! Confidence in infrastructure changes. Be sure that your tools are doing what you expect them to do. Everything in Cluster.dev has a state. Even scripts and k8s manifest. Security, and independence from third-party vendors. Pass secrets to third-party tools even if they don't support your secrets store. Customization for every piece of infrastructure. With its amazing template engine, Cluster.dev allows you to customize configs, scripts, manifests, Terraform code, and whole infrastructures.
  • 19
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 20
    Lightbits

    Lightbits

    Lightbits Labs

    We help our customers achieve hyperscale efficiency and cost savings for their own private cloud or public storage as a service offering. With our software-defined block storage solution, Lightbits, customers scale their business effortlessly, accelerate IT operations, and reduce cost – at the speed of local flash. Break the dependency between compute and storage to allocate resources independently to bring the flexibility and efficiency of the cloud on-premises. Deliver low latency and high performance while guaranteeing high availability for your distributed databases and cloud native applications such as SQL, NoSQL, and “in memory”. With the constant growth of data in the forever available data center, one of the critical challenges is that applications and services running at scale must stay stateful as they migrate around the data center in order to keep services available and efficient in the presence of constant failures.
  • 21
    Calamu Protect

    Calamu Protect

    Calamu Protect

    Calamu Protect automatically fragments data across multiple separate storage locations while at rest, in an environment called a data harbor, which instantly nullifies the impact of a data breach or ransomware attack. Protects against data theft and extortion. Fragmented data is worthless to cyber attackers. Automatically self-heals from cyber attacks. Data remains available as if nothing happened. Meets data privacy regulations. Geo-fragmented storage enables compliance with international laws and standards. Calamu Drive works seamlessly with existing employee data and document workflows using Windows File Explorer or macOS Finder. It’s transparent to users that files are being protected in a virtual data harbor, safe from ransomware and evolving threats. Calamu Connectors provide nearly unlimited access to a data harbor, whether you’re protecting data in an Amazon S3 bucket, on local servers, or database snapshots.
  • 22
    Commvault Backup & Recovery
    Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation.
  • 23
    Werf

    Werf

    Werf

    The CLI tool gluing Git, Docker, Helm & Kubernetes with any CI system to implement CI/CD and Giterminism. Establish and benefit from efficient, robust, and integrated CI/CD pipelines on top of proven technologies. With Werf, it’s easy to start, apply best practices, and avoid reinventing the wheel. Werf not only builds & deploys but also continuously syncs the current Kubernetes state with changes made in Git. Werf introduces Giterminism, use git as a single source of truth, and make the entire delivery pipeline deterministic and idempotent. Werf supports 2 ways to deploy an application. converge application from git commit into the Kubernetes, publish application from git commit into the container registry as a bundle, then deploy bundle into the Kubernetes. Werf just works out of the box with a minimal configuration. You don't even need to be a DevOps/SRE engineer to use werf. Many guides are provided to quickly deploy your app into Kubernetes.
  • 24
    PipeCD

    PipeCD

    PipeCD

    A unified continuous delivery solution for multiple application kinds on multi-cloud that empowers engineers to deploy faster with more confidence. A GitOps tool that enables doing deployment operations by pull request on Git. Deployment pipeline UI shows clarify what is happening. Separate logs viewer for each individual deployment. Real-time visualization of application state. Deployment notifications to slack, and webhook endpoints. Insights show the delivery performance. Automated deployment analysis based on metrics, logs, and emitted requests. Automatically roll back to the previous state as soon as analysis or a pipeline stage fails. Automatically detect configuration drift to notify and render the changes. Automatically trigger a new deployment when a defined event has occurred (e.g. container image pushed, helm chart published, etc). Support single sign-on and role-based access control. Credentials are not exposed outside the cluster and not saved in the control plane.
  • 25
    Atlantis

    Atlantis

    Atlantis

    Atlantis is self-hosted. Your credentials don't leave your infrastructure. Runs as a Golang binary or Docker image and can be deployed on VMs, Kubernetes, Fargate, etc. Listens for webhooks from GitHub/GitLab/Bitbucket/Azure DevOps. Runs terraform commands remotely and comment back with their output. Used by one of the world's top companies to manage over 600 Terraform repos with 300 developers. In production use for over 2 years. Each pull request now holds a detailed log of what infrastructure changes were made and when; along with who made the change and who approved it. Atlantis can be configured to require approvals on every production change. Pass audits without compromising your workflow. Developers can submit Terraform pull requests without needing credentials. Operators can require approvals prior to allowing an application. Ensure that you apply changes before merging to master.
  • 26
    Jenkins X

    Jenkins X

    The Linux Foundation

    Automate the continuous delivery of change through your environments via GitOps and create previews on pull requests to help you accelerate. Rather than having to have deep knowledge of Kubernetes, containers, or Tekton, Jenkins X will automate awesome Tekton pipelines for your projects that fully implement CI and CD which you can manage via GitOps. Each team gets a set of environments. Jenkins X then automates the management of the environments and the promotion of new versions of applications between environments via GitOps and pull requests. Jenkins X automatically spins up preview environments for your pull requests so you can get fast feedback before changes are merged to the main branch. Jenkins X automatically comments on your commits, issues, and pull requests with feedback as code is ready to be previewed, is promoted to environments, or if pull requests are generated automatically to upgrade versions.
  • 27
    kpt

    kpt

    kpt

    kpt is a package-centric toolchain that enables a WYSIWYG configuration authoring, automation, and delivery experience, which simplifies managing Kubernetes platforms and KRM-driven infrastructure at scale by manipulating declarative configuration as data, separated from the code that transforms it. Most Kubernetes users either manage their resources using conventional imperative graphical user interfaces, command-line tools (kubectl), and automation (e.g., operators) that operate directly against Kubernetes APIs, or declarative configuration tools, such as Helm, Terraform, cdk8s, or one of the dozens of other tools. At a small scale, this is largely driven by preference and familiarity. As companies expand the number of Kubernetes development and production clusters they use, creating and enforcing consistent configurations and security policies across a growing environment becomes difficult.
  • 28
    Weave GitOps

    Weave GitOps

    Weaveworks

    Weave GitOps is a free and open source continuous delivery product to run apps in any Kubernetes. Experience how easy it is to enable GitOps and run your apps in a cluster. Use git to collaborate with team members making new deployments easy and secure. Weave GitOps makes CI pipelines a launchpad to Continuous Delivery. Enable your dev teams to deliver value continuously, and centralize day 2 app operations all in git. Artifacts as code, Infrastructure as code, Policy as code. Ops, Platform and DevOps deliver value to Git only. One pull request at a time. Weave GitOps takes care of scanning for new versions and managing dependencies to update the deployment. Continuously. From actual state, Weave GitOps brings back cluster and workload health management and alerts.
  • 29
    Nutanix Self-Service
    NCM Self-Service (formerly Calm) streamlines how teams manage, deploy and scale applications across hybrid clouds with self-service, automation, and centralized role-based governance. One-click self-service with centralized role-based IT governance across private and public clouds. End-to-end automation of application provisioning, scaling, and management. Deploy applications with centralized visibility across private and public clouds. Blueprints can be published directly to end-users through the Nutanix Marketplace and be created in a UI or via Python code enabling self-service provisioning of complex applications. Provision, configure, scale, upgrade and delete applications across cloud environments. Begin with automation of common lifecycle activities and eventually design complex blueprints. Automate the provisioning of hybrid cloud architectures and manage multi-tiered and distributed applications across different cloud environments, from a single control plane.
  • 30
    Nutanix Kubernetes Engine
    Fast-track your way to production-ready Kubernetes and simplify lifecycle management with Nutanix Kubernetes Engine, an enterprise Kubernetes management solution. NKE empowers you to deliver and manage an end-to-end, production-ready Kubernetes environment with push-button simplicity while preserving a native user experience. Deploy and configure production-ready Kubernetes clusters in minutes, as opposed to days or weeks. Automatically configure and deploy your Kubernetes clusters for high availability through NKE’s simple, streamlined workflow. Every NKE Kubernetes cluster is deployed with a Nutanix full-featured CSI driver, which natively integrates with Volumes Block Storage and Files Storage to easily provide persistent storage for containerized applications. Add Kubernetes worker nodes with a single click. When additional physical resources are needed, expanding the cluster is just as simple.
  • 31
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 32
    CloudVision
    CloudVision is a modern, multi-domain network management plane built on cloud networking principles for telemetry, analytics, and automation. Designed for use in data centers, wired and wireless campuses, multi-cloud, and routing use-cases, CloudVision provides a consistent operational model across domains, helping enterprises to simplify network operations by breaking down traditional network management silos. CloudVision’s abstraction of the physical network to this broader, network-wide perspective allows for a more efficient approach for several operational and network telemetry capabilities. Turn-key automation with CloudVision Studios for initial and ongoing provisioning, ZTP as-a-Service, configuration management, and network-wide change control, including automated upgrades, network rollback, and network snapshots. Real-time state streaming for network telemetry and analytics - a modern approach to replace legacy polling per device.
  • 33
    Opal

    Opal

    Opal

    Opal is a security platform that enables organizations to scale least privilege, creating new ways for teams to work smarter. We believe access should be decentralized, self-service, and integrated with the technologies your team already uses. Remove bottlenecks. Delegate access requests to those who have the most context. More context = faster and better decisions. Intelligent automation. Let Opal handle it all, giving access when it matters most, sending automatic reminders, and removing access when no longer needed. Transparency matters. Be on the same page about who approves access, who has access to what, the status of requests, and more. Skip the game of telephone! Companies give out far too much access. Access is granted in a way that is overly coarse and often for an indefinite amount of time. Most companies have painfully manual and inconsistent ways of granting just-in-time access.
  • 34
    Argo

    Argo

    Argo

    Open-source tools for Kubernetes to run workflows, manage clusters and do GitOps right. Kubernetes-native workflow engine supporting DAG and step-based workflows. Declarative continuous delivery with a fully-loaded UI. Advanced Kubernetes deployment strategies such as Canary and Blue-Green made easy. Argo Workflows is an open-source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows is implemented as a Kubernetes CRD. Model multi-step workflows as a sequence of tasks or capture the dependencies between tasks using a graph (DAG). Easily run compute-intensive jobs for machine learning or data processing in a fraction of the time using Argo Workflows on Kubernetes. Run CI/CD pipelines natively on Kubernetes without configuring complex software development products. Designed from the ground up for containers without the overhead and limitations of legacy VM and server-based environments.
  • 35
    Buoyant Cloud
    Fully managed Linkerd, right on your cluster. Running a service mesh shouldn’t require a team of engineers. Buoyant Cloud manages Linkerd so that you don’t have to. Automate away the toil. Buoyant Cloud automatically keeps your Linkerd control plane and data plane up to date with the latest versions and handles installs, trust anchor rotation, and more. Automate upgrades, installs, and more. Keep data plane proxy versions always in sync. Rotate TLS trust anchors without breaking a sweat. Never get taken unaware. Buoyant Cloud continuously monitors the health of your Linkerd deployments and proactively alerts you of potential issues before they escalate. Automatically track service mesh health. Get a global, cross-cluster view of Linkerd's behavior. Monitor and report Linkerd best practices. Forget overly-complicated solutions that pile one layer of complexity on top of another. Linkerd just works, and Buoyant Cloud makes Linkerd easier than ever.¿
  • 36
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 37
    Meshery

    Meshery

    Meshery

    Describe all of your cloud native infrastructure and manage as a pattern. Design your service mesh configuration and workload deployments. Apply intelligent canary strategies and performance profiles with service mesh pattern management. Assess your service mesh configuration against deployment and operational best practices with Meshery's configuration validator. Validate your service mesh's conformance to Service Mesh Interface (SMI) specifications. Dynamically load and manage your own WebAssembly filters in Envoy-based service meshes. Service mesh adapters provision, configure, and manage their respective service meshes.
  • 38
    Cisco Service Mesh Manager
    The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language. With the accelerating demand for digital transformation, businesses are increasingly adopting cloud-native architectures. Microservice-based applications are created with software functionality spread across multiple services that are independently deployable, easier to maintain and test, and can be more rapidly updated.
  • 39
    Argon

    Argon

    ArgonSec

    The first unified security solution protecting the integrity of your software throughout the entire DevOps CI CD pipeline. Track all events and actions across your software supply chain with unparalleled clarity, get actionable information and make decisions faster. Bolster your security posture by enforcing security best practices at all stages of the software delivery process with real-time alerts and auto-remediation. Ensure source code integrity with automated validity checks on each release, so you can be sure the code you committed is the source code deployed. Argon continuously monitors your DevOps infrastructure to identify security risks, code leaks, misconfigurations, and anomalies, and provide insights about the posture of your CI CD pipeline.
  • 40
    Fermyon

    Fermyon

    Fermyon

    Fermyon greatly reduces the hassle, complexity, and cost of building cloud applications by offering a complete WebAssembly-based execution environment with an associated easy-to-use web interface. Build and run microservices and web applications with WebAssembly. Get up and running within minutes with the Spin CLI. Easily compose apps from functions & components with Spin. Powerful versioning and release management with Bindle. Manage auto deploys and view logs through the web dashboard. Seamlessly run your WebAssembly services & containers side by side. We are building open-source, WebAssembly-powered cloud tools, with the aim of simplifying and unlocking new technologies for all. You can rapidly compose and run web apps and microservices with startup times measured in milliseconds instead of seconds, scale up or down almost instantly and execute in a secure, sandboxed environment. A faster, lighter way to run your services in the cloud, and to harness the power of WebAssembly.
  • 41
    dynamic content
    Our content management system is custom-made for digital brand and shopping environments. Design and create stunning websites, landing pages and web shops. Manage content like texts, banners, photo galleries, forms, blogs or social media feeds in a swift and easy manner. Our content management system has all important types of content on board to design comprehensive business websites. With a few clicks texts, banners and contact forms can be drag-and-drop positioned on the sites. Collections through which individually structured contents like blogs, job offers and event listings can be created are a feature highlight. The software has been developed from scratch based on a modern technology stack aimed at: Security, performance, scaleability, expandability and reliability. The API-first application consists of several micro services which can be scaled flexibly. Via Open-API or your own identity provider you can exchange data and logins with external applications in a secure way.
  • 42
    Diego

    Diego

    Tech Amigos

    Between Kubernetes, AWS, and observability tools, deploying new software has become nightmarishly complex. Diego offers a simpler way. Automate code-to-cloud setup and ship software faster with Diego: - Build with confidence on a well-architected cloud setup (ArgoCD, Kubernetes, Prometheus) - Ready-to-use environments and pipelines – no config required - Saves months of DevOps work and slashes cycle times Diego gives you everything you need to deploy secure, scalable, and resilient containerized applications – fast.
  • 43
    TDX360

    TDX360

    SilentiumIT

    TDX360 platform provides complete booking lifecycle management and fulfillment automation from the initial inquiry right up to travel accounts ledger entry generation. End-to-end automation includes monitoring queues, batch processing, automated documents, customer communication via AI chatbots, and reports for all stages of your business. Enhance revenue and grow your distribution reach with our extendible API integration platform and price formulation techniques. Embrace a 360-degree sales strategy via multiple channels such as call centers, B2B, B2C, and APIs. TDX360 provides a comprehensive end-to-end back-office system that will cater to the most complex and demanding businesses in the travel and tourism sector by offering a fully-fledged sales and distribution platform. TDX360 smart caching techniques and scalable architecture phenomenally increase the speed at which search results are delivered to your customers.
  • 44
    Isovalent

    Isovalent

    Isovalent

    Isovalent Cilium Enterprise enables cloud-native networking, security, and observability. Your cloud-native infrastructure, powered by eBPF. Connect, secure, and observe cloud-native applications in multi-cluster, multi-cloud environments. A highly scalable CNI and a multi-cluster networking solution that offers high-performance load balancing, advanced network policy management, etc. Shifting security to a process behavior instead of packet header enabling. Open source is at the core of Isovalent. We think, innovate, and breathe open source and are fully committed to the principles and values of open source communities. Request a personalized live demo with an Isovalent Cilium Enterprise expert. Engage with the Isovalent sales team to assess an enterprise-grade deployment of Cilium. Step through our interactive labs in a sandbox environment. Advanced application monitoring. Runtime security, transparent encryption, compliance monitoring, and CI/CD & GitOps integration.
  • 45
    Rafay

    Rafay

    Rafay

    Delight developers and operations teams with the self-service and automation they need, with the right mix of standardization and control that the business requires. Centrally specify and manage configurations (in Git) for clusters encompassing security policy and software add-ons such as service mesh, ingress controllers, monitoring, logging, and backup and restore solutions. Blueprints and add-on lifecycle management can easily be applied to greenfield and brownfield clusters centrally. Blueprints can also be shared across multiple teams for centralized governance of add-ons deployed across the fleet. For environments requiring agile development cycles, users can go from a Git push to an updated application on managed clusters in seconds — 100+ times a day. This is particularly suited for developer environments where updates are very frequent.
  • 46
    Kata Containers

    Kata Containers

    Kata Containers

    Kata Containers is Apache 2 licensed software consisting of two main components: the Kata agent, and the Kata Containerd shim v2 runtime. It also packages a Linux kernel and versions of QEMU, Cloud Hypervisor and Firecracker hypervisors. Kata Containers are as light and fast as containers and integrate with the container management layers—including popular orchestration tools such as Docker and Kubernetes (k8s)—while also delivering the security advantages of VMs. Kata Containers supports Linux (host and guest) for now. On the host side, we have installation instructions for several popular distributions. We also have out-of-the-box support for Clear Linux, Fedora, and CentOS 7 rootfs images through the OSBuilder which can also be used to roll your own guest images.
  • 47
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 48
    PredictKube

    PredictKube

    PredictKube

    Make your Kubernetes autoscaling proactivе. From reactive scaling to proactive, with PredictKube, you’ll be able to finish autoscaling before the load rise thanks to predictions made by our AI model. Our AI model can start working with the data for 2 weeks to provide you with reliable prediction and autoscaling. The predictive Keda scaler named PredictKube helps you to minimize time-wasting on manual setup of autoscaling and gives you an automated performance. We made our KEDA scaler out of the top-notch technologies available for Kubernetes and AI. Input the data for 1+ week and get proactive autoscaling up to 6 hours horizon based on AI prediction. The right time for scaling is selected by our trained AI model that analyzes your historical data and can utilize the data of custom and public business metrics that can affect the traffic load. We’ll support free access to API in general with all basic features available to provide autoscaling possibilities.
  • 49
    Worldr

    Worldr

    Worldr

    Worldr defends the data you share in Microsoft Teams from external breaches while prohibiting outside organizations from exploiting your most sensitive digital assets. It can be utilized in any environment, whether that be cloud based or on-premise; our lightweight architecture can be deployed in minutes for any size organization. Ensure full ownership of data so no one, not even Microsoft, can access it. Messages, user details, and metadata are stored in a database protected by a transparent data encryption layer while encryption keys are stored in Hashicorp Vault. Store your data anywhere in the world based on compliance, legal or regulatory requirements. Adhere to sector specific data transfer and processing regulations and meet mandates enforced by various countries to ensure data sovereignty.
  • 50
    Submariner

    Submariner

    Submariner

    As Kubernetes gains adoption, teams are finding they must deploy and manage multiple clusters to facilitate features like geo-redundancy, scale, and fault isolation for their applications. With Submariner, your applications and services can span multiple cloud providers, data centers, and regions. The Broker must be deployed on a single Kubernetes cluster. This cluster’s API server must be reachable by all Kubernetes clusters connected by Submariner. It can be a dedicated cluster, or one of the connected clusters. Once Submariner is deployed on a cluster with the proper credentials to the Broker it will exchange Cluster and Endpoint objects with other clusters (via push/pull/watching), and start forming connections and routes to other clusters. Worker node IPs on all connected clusters must be outside of the Pod/Service CIDR ranges.