 Okay, who's ready for cloud native project updates part two? We have so many amazing updates We're excited to present this part two. So let's get ready That's right without further ado. Let's dive into the achievements made by our by our incubating projects Cncf projects are like our cloud native cars There's something for everyone and they help get you to where you need to be So let's learn how they're building for the road ahead with these project updates All right. You ready? Let's do this if you've seen this before it will take a while, but we can handle this Let's start with kubvert. So kubvert is a virtual machine management add-on for kubernetes It offers virtualization solutions on top of kubernetes the recent initiatives from the project include the alignment with kubernetes releases for improved operations The introduction of instance type and preference custom resources for a human friendly way of defining virtual machine resources And seamless integration with service meshes with pasts A new user mode network binding that can connect VMs to pod networks Moving from a monthly release cycle to an alignment with kubernetes release has simplified this upgrade path Which was a common remark from end users while also simplifying planning and communication The version 0.57 focus on continuing stabilization integration with the with the brothery cloud native ecosystem While making steady traction on initiatives for the future It adds usb support VM VM snapshots as an export resource and improved virtual ctl support with windows consoles Expanding functionality for day-to-day operations kubvert has also improved virtual ctl to support connections proxied by rencher And added trillium volt as their first integrated backup and recovery provider A friendly reminder from the project to be kind with criticisms patient with the reviewers And always run your local tests Now we have flux fluxes provides github's for both applications and infrastructure With a set of continuous and progressive delivery solutions for kubernetes that are open Extensible and secure and scalable Recent highlights from the project include the advanced support for oci and cosine bringing greater security and scalability to github's Improvements in the controller and security including fuzzing and docs for best practices as well as api Consolidation putting it near to ga The terraform controller is something that got the users excited as one of flux tools that help help strengthen the ecosystem Users have shown excitement as well about the support of oci in flux With the manifests alongside app image layers the ecosystem continues growing with terraform integration as well As vs code and using flux with open shift version 0.32 Brings greater security for enterprise users oci support across all types all source types And this is helm customized plain yaml terraform q etc The helm support retains release info supports dynamic functions and hooks The flux project asks everyone to go ahead and try the terraform controller the vs code extensions and ui Which is fully supported by the project Next up we have k native. So k native was recently included in incubation earlier this year It's a project that adds components for deploying running and managing serverless cloud native applications to kubernetes Focusing on improved productivity and operational cost reduction with k native k native 1.8 Functions is now generally available and the same happens for rabbit and q apis for broker and source K native is also moving from a six week release cycle to quarter releases On the adopter side the project's downstream vendors os s and end users will have a better update experience with these fewer releases per year The rabbit and q apis provide a high performance out of order Message delivery alternative to kafka for those who need it The project recommends checking the blog post called enterprise grade serverless on your own terms With c-suit stakeholders to understand the value of using k native in kubernetes it projects Finally, the project is asking also for feedback and contributions to reduce friction and improve the event operating model Key initiatives include the focus on s bombs self-compliance image and binary signing They would love to hear more from both developers and companies All right emissary ingratz is an open source kubernetes native api gateway layer seven load balancer and kubernetes ingratz built on omboy proxy Recent initiatives of the project include adding support for http3 to downstream clients increased stability and performance and the project is now built on the latest version of omboy proxy Http3 is the latest version of the protocol that powers the internet So organizations aiming to adopt http3 protocol can do so with emissary ingratz and version 3.0 It provides improved performance and increased stability Particularly on lossy networks and use cases such as edge and internet of things Version 3.0 also provides an upgrade to omboy proxy 122 addressing cvs and older versions of the project And expanding on performance improvements The project would love to see users experiment with http3 and welcome feedback from the community Backstage is a framework for building developer portals. It restores order to your microservices and infrastructure without compromising autonomy The project has a lot of initiatives to report the core framework saw 1.0 release a third party security audit sponsored by ostif resulted in 12 main findings And with eight fixed in 1.5.0 and four being assessed in the newly introduced threat model They've established new communication channels with the software catalog sig with more in development And finally the growth of the plug-in ecosystem has over 70 in the pipeline today Users have been giving very good feedback from the 1.0 release and the improved security posture through the threat model documentation And the project has grown in maturity due to a huge spike in public adopters starting at just 80 at the beginning of this year and well over 200 today The 1.0 release with a huge milestone for the project with the current 1.6 version the project set on a solid release cadence With callouts to security fixes new plugins and back end services for improved scalability and maintenance The project asked you all to join the community check the existing plug-in ecosystem And we'd love to see more plug-in contributions, particularly from maintainers of other cncf projects Cilium is a networking observability and security solution built on abpf As a cni it provides a simple flat l3 network layer that can span multiple clusters Ingress and egress gateways service mesh visibility and monitoring among many other features of the project Project initiatives include the side car list cilium service mesh and their 1.12 release, which is all the buzz An ongoing third party security and fuzzing audit and the project is thrilled to announce Microsoft aks cno is now powered by cilium Ciliums continued focus on security will strengthen the defenses of infrastructures adopting cilium and is a required preparation for graduation The side car list cilium service mesh is less complex and has high throughput lower latency and reduced resource consumption The cilium project also has an lfx mentee to improve its software supply chain security The project encourages folks to stop by their booth for demos to learn more about the project and to fill out the cilium user survey Nats is a connective fabric to exchange data between digital endpoints from microservices to modern cloud native applications and kubernetes It's cloud agnostic and can be deployed anywhere to bridge kubernetes bare metal vms and low resource hardware The top initiatives from the project include improving memory usage for kubernetes Ultra high-scale ability and mobility features and runtime placement and migration of stream key value store and objects This moves data closer to applications and ensures business continuity during upgrades with the ability to directly access Data with a lightweight api nats can support millions of consumers of persisted streams kv and object stores This is useful for internet of things mobile and any type of application at scale The 2.9 releases a milestone with improved performance under kubernetes greater scale mobility and improved stability towards operation at massive scale With zero down time the project is asking folks to try installing via help charts and would love your feedback Cloud events defines common event metadata and how to expose it in various formats and transports It enables the quick processing of events without the need to understand the schema and semantics Recent project initiatives include a draft specification It standardizes the component lifecycle of eventing such as service discovery subscription management and event delivery To new cloud events supported formats like xml CBR and translation of cloud event specifications to chinese and hebru Release 1.0.2 has seen steady adoption growth with an increase in end user participation in the working group and request for new features Falco is a runtime security project enabling threat detection at scale It observes the application and container behavior extending threat detection with plugins Recent project initiatives include a new ebbf probe with core and btf support Support for arm and g visor with falco being able to monitor g visor sandboxes And new plugins to detect security threats in github and octa activity g visor has adopted falco as a complementary solution for threat detection in their security project The real world impact from end users have benefited from this collaboration to simultaneously use the enhanced Isolation in g visor and the threat detection audits in falco improve container security Version 0.33 brings support for inspecting multiple data sources simultaneously Improved kernel compatibility stabilize support for arm architecture and falco control a new first-class tool to keep rules and plugins up to date Falco is looking into increasing diversity and participation In the community and is actively seeking new c c++ and go developers and also non-code contributors Cryo is an oci compliant implementation of the kubernetes container runtime interface strictly built for kubernetes Cryo is reimagining pieces of its stack to be better compatible with edge use cases with recent initiatives including progress on a Rewrite of its container monitor in rust Bringing better accounting of pod level resources and a reduction of virtual memory for pods with many containers It is also added support for alpha caps such as username spaces checkpoint and restore and release artifact verification with s bombs and six store Release 1.25.0 was done soon after kubernetes 1.25 And as always has been tested in lockstep with kubernetes release and follows the features added to it Cryo is eager for new contributors of any variety and you can reach out on the cryo slack channel Open telemetry provides high quality ubiquitous and portable telemetry to enable effective observability After metrics become stable after metrics became stable in may they've become generally available for java javascript python and net The project is now focusing on completing and releasing logs as a new signal type with support for existing file based logs And eventually a new strongly typed binary format New work streams launch for client instrumentation capturing poor client performance and things like high latency A new cool demo has been created by the community which includes different infrastructures databases and services written in almost every language A great way to learn how to quickly gather critical signals signals from systems and and seeing advanced configurations In action go and check out the demo and as always it's also a great way to get started as a contributor We did it Well done everyone. I think we had made a lot of progress again from from valencian just six months. It's always good to see the updates