Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Kubeshark | 10,088 | 3 days ago | 120 | apache-2.0 | Go | |||||
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes | ||||||||||
Redpanda | 8,129 | 2 | an hour ago | 2 | November 30, 2023 | 1,551 | C++ | |||
Redpanda is a streaming data platform for developers. Kafka API compatible. 10x faster. No ZooKeeper. No JVM! | ||||||||||
Share_ppt | 5,176 | 2 months ago | 4 | |||||||
🚗 个人做过的技术分享... ( topic: 高性能架构, 中间件原理实践,云原生,Golang 等) | ||||||||||
Kafdrop | 4,906 | 3 days ago | 47 | apache-2.0 | Java | |||||
Kafka Web UI | ||||||||||
Pipeline | 4,158 | a year ago | 85 | July 18, 2017 | 1 | apache-2.0 | Jsonnet | |||
PipelineAI | ||||||||||
Strimzi Kafka Operator | 4,135 | 4 | 6 hours ago | 49 | October 12, 2023 | 138 | apache-2.0 | Java | ||
Apache Kafka® running on Kubernetes | ||||||||||
Go Zero Looklook | 3,661 | a month ago | 6 | mit | Go | |||||
🔥基于go-zero(go zero) 微服务全技术栈开发最佳实践项目。Develop best practice projects based on the full technology stack of go zero (go zero) microservices. | ||||||||||
Vanus | 2,313 | 7 | 10 days ago | 3 | September 07, 2023 | 57 | apache-2.0 | Go | ||
Vanus is a Serverless, event streaming system with processing capabilities. It easily connects SaaS, Cloud Services, and Databases to help users build next-gen Event-driven Applications. | ||||||||||
Devops Bash Tools | 2,008 | 12 days ago | 3 | mit | Shell | |||||
1000+ DevOps Bash Scripts - AWS, GCP, Kubernetes, Docker, CI/CD, APIs, SQL, PostgreSQL, MySQL, Hive, Impala, Kafka, Hadoop, Jenkins, GitHub, GitLab, BitBucket, Azure DevOps, TeamCity, Spotify, MP3, LDAP, Code/Build Linting, pkg mgmt for Linux, Mac, Python, Perl, Ruby, NodeJS, Golang, Advanced dotfiles: .bashrc, .vimrc, .gitconfig, .screenrc, tmux.. | ||||||||||
Examples | 1,802 | 25 days ago | 642 | November 09, 2023 | 100 | apache-2.0 | Shell | |||
Apache Kafka and Confluent Platform examples and demos |
Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. See our website for more details about the project.
To get up and running quickly, check our Quick Start for Minikube, OKD (OpenShift Origin) and Kubernetes Kind.
Documentation to the current main branch as well as all releases can be found on our website.
The roadmap of the Strimzi Operator project is maintained as GitHub Project.
If you encounter any issues while using Strimzi, you can get help using:
You can join our regular community meetings:
Resources:
You can contribute by:
All bugs, tasks or enhancements are tracked as GitHub issues. Issues which might be a good start for new contributors are marked with "good-start" label.
The Dev guide describes how to build Strimzi. Before submitting a patch, please make sure to understand, how to test your changes before opening a PR Test guide.
The Documentation Contributor Guide describes how to contribute to Strimzi documentation.
If you want to get in touch with us first before contributing, you can use:
Strimzi is licensed under the Apache License, Version 2.0
From the 0.38.0 release, Strimzi containers are signed using the cosign
tool.
Strimzi currently does not use the keyless signing and the transparency log.
To verify the container, you can copy the following public key into a file:
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET3OleLR7h0JqatY2KkECXhA9ZAkC
TRnbE23Wb5AzJPnpevvQ1QUEQQ5h/I4GobB7/jkGfqYkt6Ct5WOU2cc6HQ==
-----END PUBLIC KEY-----
And use it to verify the signature:
cosign verify --key strimzi.pub quay.io/strimzi/operator:latest --insecure-ignore-tlog=true
From the 0.38.0 release, Strimzi publishes the software bill of materials (SBOM) of our containers.
The SBOMs are published as an archive with SPDX-JSON
and Syft-Table
formats signed using cosign.
For releases, they are also pushed into the container registry.
To verify the SBOM signatures, please use the Strimzi public key:
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET3OleLR7h0JqatY2KkECXhA9ZAkC
TRnbE23Wb5AzJPnpevvQ1QUEQQ5h/I4GobB7/jkGfqYkt6Ct5WOU2cc6HQ==
-----END PUBLIC KEY-----
You can use it to verify the signature of the SBOM files with the following command:
cosign verify-blob --key cosign.pub --bundle <SBOM-file>.bundle --insecure-ignore-tlog=true <SBOM-file>
Strimzi is a Cloud Native Computing Foundation sandbox project.