|
536 | 536 | "name": "Confidential Containers",
|
537 | 537 | "path": "Security & Compliance",
|
538 | 538 | "description": "Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data.",
|
539 |
| - "homepage_url": "https://github.com/confidential-containers", |
| 539 | + "homepage_url": "https://confidentialcontainers.org/", |
540 | 540 | "project": "sandbox",
|
541 |
| - "repo_url": "https://github.com/confidential-containers/operator", |
| 541 | + "repo_url": "https://github.com/confidential-containers/confidential-containers", |
542 | 542 | "logo": "https://landscape.cncf.io/logos/32603dde3b0138451d55951ac54e834246977114ac68dae8cce7fcf896ad3b35.svg",
|
543 | 543 | "twitter": null,
|
544 | 544 | "crunchbase": "https://www.crunchbase.com/organization/cloud-native-computing-foundation",
|
|
547 | 547 | "dev_stats_url": "https://confidentialcontainers.devstats.cncf.io/",
|
548 | 548 | "artwork_url": "https://github.com/cncf/artwork/tree/master/projects/confidential-containers",
|
549 | 549 | "stack_overflow_url": null,
|
550 |
| - "blog_url": null, |
| 550 | + "blog_url": "https://confidentialcontainers.org/blog/", |
551 | 551 | "mailing_list_url": null,
|
552 | 552 | "slack_url": "https://cloud-native.slack.com/",
|
553 | 553 | "gitter_url": null,
|
554 |
| - "youtube_url": null, |
555 |
| - "language": "Go" |
| 554 | + "youtube_url": "https://www.youtube.com/@confidentialcontainers3845", |
| 555 | + "language": null |
556 | 556 | },
|
557 | 557 | {
|
558 | 558 | "name": "Container Network Interface (CNI)",
|
|
1241 | 1241 | "path": "Monitoring",
|
1242 | 1242 | "description": "Data first monitoring agent using (e)BPF, built on RedBPF",
|
1243 | 1243 | "homepage_url": "https://ingraind.org/",
|
1244 |
| - "project": "sandbox", |
| 1244 | + "project": "archived", |
1245 | 1245 | "repo_url": "https://github.com/foniod/foniod",
|
1246 | 1246 | "logo": "https://landscape.cncf.io/logos/7dfcbcbb913754cb361f72788d952c1a5402a371b9d587b707510ba8f5be249c.svg",
|
1247 | 1247 | "twitter": null,
|
|
1576 | 1576 | "logo": "https://landscape.cncf.io/logos/9625e4ed1f66baeedc6cfeb225aa984a5e4f51ba7adee8d9b82525d4d05598b8.svg",
|
1577 | 1577 | "twitter": null,
|
1578 | 1578 | "crunchbase": "https://www.crunchbase.com/organization/cloud-native-computing-foundation",
|
1579 |
| - "chat_channel": "#k8up", |
| 1579 | + "chat_channel": null, |
1580 | 1580 | "accepted": "2021-11-16",
|
1581 | 1581 | "dev_stats_url": "https://k8up.devstats.cncf.io/",
|
1582 | 1582 | "artwork_url": "https://github.com/cncf/artwork/blob/master/examples/sandbox.md#k8up-logos",
|
1583 | 1583 | "stack_overflow_url": null,
|
1584 | 1584 | "blog_url": null,
|
1585 | 1585 | "mailing_list_url": null,
|
1586 |
| - "slack_url": "https://community.appuio.ch/channel/k8up", |
| 1586 | + "slack_url": "https://cloud-native.slack.com/messages/k8up", |
1587 | 1587 | "gitter_url": null,
|
1588 | 1588 | "youtube_url": null,
|
1589 | 1589 | "language": "Go"
|
|
1901 | 1901 | "path": "Application Definition & Image Build",
|
1902 | 1902 | "description": "Kubernetes Rust State Machine Operator",
|
1903 | 1903 | "homepage_url": "https://docs.rs/crate/krator/latest",
|
1904 |
| - "project": "sandbox", |
| 1904 | + "project": "archived", |
1905 | 1905 | "repo_url": "https://github.com/krator-rs/krator",
|
1906 | 1906 | "logo": "https://landscape.cncf.io/logos/858ff7c5e36ed7aabeea1116a5ab151d347b17605208b21c2dd815899e804ca3.svg",
|
1907 | 1907 | "twitter": null,
|
|
1918 | 1918 | "youtube_url": null,
|
1919 | 1919 | "language": "Rust"
|
1920 | 1920 | },
|
| 1921 | + { |
| 1922 | + "name": "Krkn", |
| 1923 | + "path": "Chaos Engineering", |
| 1924 | + "description": "Chaos testing tool for Kubernetes to identify bottlenecks and improve resilience and performance under failure conditions.", |
| 1925 | + "homepage_url": "https://krkn-chaos.github.io/krkn", |
| 1926 | + "project": "sandbox", |
| 1927 | + "repo_url": "https://github.com/krkn-chaos/krkn", |
| 1928 | + "logo": "https://landscape.cncf.io/logos/d410598a868f54d96492b04acada6642438c4675994dbf11f0217560ea353134.svg", |
| 1929 | + "twitter": null, |
| 1930 | + "crunchbase": "https://www.crunchbase.com/organization/red-hat", |
| 1931 | + "chat_channel": null, |
| 1932 | + "accepted": "2023-12-19", |
| 1933 | + "dev_stats_url": "https://krknchaos.devstats.cncf.io", |
| 1934 | + "artwork_url": null, |
| 1935 | + "stack_overflow_url": null, |
| 1936 | + "blog_url": null, |
| 1937 | + "mailing_list_url": null, |
| 1938 | + "slack_url": "https://kubernetes.slack.com/messages/C05SFMHRWK1", |
| 1939 | + "gitter_url": null, |
| 1940 | + "youtube_url": null, |
| 1941 | + "language": "Python" |
| 1942 | + }, |
1921 | 1943 | {
|
1922 | 1944 | "name": "Krustlet",
|
1923 | 1945 | "path": "Container Runtime",
|
|
2847 | 2869 | "path": "Cloud Native Storage",
|
2848 | 2870 | "description": "Most popular & widely deployed Open Source Container Native Storage platform for Stateful Persistent Applications on Kubernetes.",
|
2849 | 2871 | "homepage_url": "https://www.openebs.io/",
|
2850 |
| - "project": "sandbox", |
| 2872 | + "project": "archived", |
2851 | 2873 | "repo_url": "https://github.com/openebs/openebs",
|
2852 | 2874 | "logo": "https://landscape.cncf.io/logos/3647fe181cab75c3b3c3d718e7dde9478b800fea605a9fd65421a7297e7d675e.svg",
|
2853 | 2875 | "twitter": "https://twitter.com/openebs",
|
|
3683 | 3705 | "path": "Streaming & Messaging",
|
3684 | 3706 | "description": "Apache Kafka\u00ae running on Kubernetes",
|
3685 | 3707 | "homepage_url": "https://strimzi.io/",
|
3686 |
| - "project": "sandbox", |
| 3708 | + "project": "incubating", |
3687 | 3709 | "repo_url": "https://github.com/strimzi/strimzi-kafka-operator",
|
3688 | 3710 | "logo": "https://landscape.cncf.io/logos/5ce4fad59df15a185e3dc1130ddbc62e6f25b02eb38a3268de4658cbc16155d0.svg",
|
3689 | 3711 | "twitter": "https://twitter.com/strimziio",
|
|
0 commit comments