KubeCon + Cloud Native Con is happening this week in Salt Lake City, UT, bringing together the Kubernetes community in one location, and providing the opportunity for companies in the space to launch new offerings and update their products.
We’ve collected the news announcements from those companies all in one place so you can stay up to date. Keep checking back here, as we will be updating this list as new news comes in.
Last updated: 11/12 at 9:45 AM ET
Red Hat adds new AI capabilities for Red Hat Developer Hub
Red Hat today announced new capabilities and enhancements for Red Hat Developer Hub, the company’s enterprise-grade internal developer platform based on the Backstage project.
The new features are designed to help organizations, whether already implementing an AI strategy or just coming to grips with its possibilities, more quickly and easily harness the power of AI to deliver smarter applications and services to their customers and end-users.
To help accelerate developer competencies for building AI-enabled applications, Red Hat Developer Hub is introducing five new AI-focused software templates for organizations to get started developing applications for common AI use cases.
The new templates include:
- Audio to text application: An AI-enabled audio transcription application where users can upload an audio file to be transcribed.
- Chatbot application: An LLM-enabled chat application to create a bot that replies with AI-generated responses.
- Code generation application: An LLM-enabled code generation application for a specialized bot that helps with code related queries.
- Object detection application: Enables developers to upload an image to identify and locate objects in the image.
- Retrieval Augmented Generation (RAG) chatbot application: Enables developers to embed files containing relevant information to allow the model to provide more accurate responses.
With Red Hat Developer Hub’s integration with Red Hat OpenShift, organizations can also more easily deploy their applications to the platform.
As AI assets within organizations grow exponentially, having a central resource to locate, manage and access these vital assets is paramount to enabling developers to move more quickly. With the Red Hat Developer Hub’s software catalog, developers and platform engineers are able to record and share the details of their organization’s AI assets, LLMs, AI servers and associated APIs and more.
The latest AI enhancements are generally available with Red Hat Developer Hub.
Observe introduces AI capabilities to troubleshoot faster in Kubernetes environments
Observability platform provider Observe, Inc. today launched Kubernetes Explorer, designed to simplify visualizing and troubleshooting for cloud-native environments. Kubernetes Explorer enables DevOps teams, site reliability engineers (SREs) and software engineers to easily understand disparate Kubernetes components, detect issues quickly, uncover root causes and resolve them faster than ever before.
According to the 2024 Gartner Critical Capabilities for Container Management report, “by 2027, more than 75% of all AI deployments will use container technology as the underlying compute environment, up from less than 50% today.” As Kubernetes adoption continues to grow, driven by AI and edge computing trends, the complexity of observing distributed applications and infrastructure has increased. Observe addresses this challenge by unifying fragmented data across metrics, traces, and logs, providing insights that span applications, the Kubernetes platform, and cloud-native infrastructure.
Observe’s AI Investigator tightly integrates with Kubernetes Explorer to create custom, incident-specific visualizations and suggestions, providing on-call engineers with an expert Kubernetes assistant while troubleshooting. Observe launched its new AI Investigator – based on an agentic AI approach – last month as part of its most significant product update to date, along with $145 million in Series B funding.
Additional Kubernetes Explorer features include:
- Kubernetes Hindsight: Provides historical visibility so teams can do retrospective analysis and performance optimization in ephemeral container environments.
- Cluster Optimization: Offers a visual map of workload distribution across the Kubernetes cluster, enabling quick identification of underutilized capacity and optimization of resources. This capability is crucial as the latest CNCF cloud-native FinOps survey found half of organizations overspend on Kubernetes infrastructure, primarily due to over-provisioning.
- Resource Descriptors: Delivers comprehensive visibility into full YAML configurations of Kubernetes resources, maintaining deployment descriptor history for easy version comparison.
For more information about Kubernetes Explorer, visit www.observeinc.com.
Komodor Introduces Single Pane of Glass K8s Management Solution
Komodor announced a new version of its platform that extends its existing Kubernetes management capabilities to support the full ecosystem of K8 add-ons (including popular CRDs and operators).
Komodor now enables Platform Engineering teams and developers to visualize, operate, detect, investigate, remediate and optimize all the components in Kubernetes clusters including workloads, native resources and its complex ecosystem of add-ons. The company will demonstrate the Komodor platform at KubeCon 2024 booth R9.
As Kubernetes adoption grows, so does an organization’s reliance on add-ons such as package managers, workflow automation, data streaming and networking – that extend its core functionalities. These tools are vital, but require specialized expertise to manage and can introduce operational risks when misconfigured. Komodor centralizes and automates the daily operation, health management and troubleshooting of issues associated with add-ons along with native Kubernetes resources, to prevent cascading failures, latency, and performance degradation and enhance long-term reliability.
One example is cert-manager (the leading certificate manager add-on), which is present in virtually every Kubernetes environment. When misconfigured, certificates can expire unnoticed, leading to application outages. Komodor’s automated detection and root cause analysis not only identifies these issues before they can impact operations, but also provides a clear path to remediation, saving hours of manual troubleshooting and avoiding downtime.
“Kubernetes has evolved from a container orchestration platform into a sprawling ecosystem that requires a multitude of add-ons—ranging from autoscaling and security to storage and networking—to meet modern operational demands,” said Itiel Shwartz, Co-Founder & CTO of Komodor.
The new capabilities include:
- Centralized Visibility & Management: Komodor provides a central console for visibility and control over all Kubernetes add-ons. This single pane of glass simplifies daily operations and enables DevOps engineers to understand how each add-on interacts with other assets in their environment.
- Proactive Risk Discovery & Automated Troubleshooting: Using Komodor’s proprietary technology and AI-driven root cause analysis, the new capabilities provide out-of-the-box detection of pending issues before they impact operations with real-time alerts and actionable insights. Whether it’s a misconfigured cert-manager causing certificate renewal failures or a failing autoscaler, Komodor rapidly pinpoints the root cause of issues and offers intuitive, automated remediation playbooks.
- Reduced Operational Complexity: By automating the root cause analysis of issues, Komodor reduces the complexity associated with manually maintaining multiple add-ons, shortens mean time to repair (MTTR), and enables developers to fix problems on their own.
Mezmo unveils Mezmo Flow for guided data onboarding and log volume optimizatio
Mezmo today unveiled Mezmo Flow, a guided experience for building telemetry pipelines. With Mezmo Flow, users can quickly onboard new log sources, profile data, and implement recommended optimizations with a single click, to reduce log volumes by more than 40%. With this release, Mezmo enables next generation log management, a pipeline-first log analysis solution that helps companies control incoming data volumes, identify the most valuable data, and glean insights faster, without the need to index data in expensive observability tools.
Developers should not have to choose between how much they can log and how fast they can debug and troubleshoot issues, especially with custom applications. SREs need an easy way to understand logs, monitor any data spikes, solve any infrastructure issues, and easily provision data to downstream teams and systems. The new release from Mezmo streamlines both developer and SRE workflows.
With Mezmo Flow, users can create their first log volume reduction pipeline in less than 15 minutes, retaining the most valuable data and preventing unnecessary charges, overages, and spikes. Next generation log management is a pipeline-first log analysis that improves the quality of critical application logs to improve signal-to-noise ratio for increased developer productivity. Alerts and notifications on data in motion can help users take timely actions for accidental application log volume spikes or changes in metrics.
As part of its recent release, Mezmo is also introducing a series of new capabilities to simplify action and control for developers and SREs. These include:
- Data profiler enhancements: Analyze and understand structured and unstructured logs while continuously monitoring log volume trends across applications.
- Processor groups: Create multifunctional, reusable pipeline components, improving pipeline development time and ensuring standardization and governance over data management.
- Shared resources: Configure sources once and use them for multiple pipelines. This ensures data is delivered to the right users in their preferred tools with as little overhead as possible.
- Data aggregation for insights: Collect and aggregate telemetry metrics such as log volume or errors per application, host, and user-defined label. The aggregated data is available as interactive reports to gain insights such as application log volume or error trends and can be used to detect anomalies such as volume surges and alert users to help prevent overages.
Tigera Enhances Calico with Major Network and Runtime Security Updates
Tigera, the creator of Project Calico, the most adopted technology for container networking and security, today announced several new features that significantly advance Calico’s network security and runtime security capabilities. Tigera will debut the latest updates to Calico Cloud, Calico Enterprise, and Calico Open Source during KubeCon North America at Booth #H7.
With the rise in Artificial Intelligence (AI) applications, and the infrastructure trend of migrating from virtual machines (VMs) to Kubernetes, network security has become critical. Tigera’s new updates to Calico extend its network security and visibility capabilities to VMs and hosts, and provide several new enhancements for implementing network security.
The new release of Calico also includes essential capabilities for security teams. Today, there is a critical need to simplify security monitoring. Security operations teams are overwhelmed with the number of security events and false positives, and need solutions that help them become more efficient and effective in their roles. Tigera has enhanced Calico’s runtime security capabilities, including fine-tuning the detectors to eliminate noise and make the detection more targeted.
Network Security Enhancements
- Policy Tiers and Support for AdminNetwork and BaselineNetwork Policies – Calico now supports new Kubernetes policies and Calico policy tiers that provide granular control over policy precedence, ensuring predictable, consistent enforcement and enabling better collaboration between teams.
- Extend Calico Network Security Beyond Kubernetes to VMs and Hosts – Calico can protect VMs and hosts running outside of a Kubernetes cluster, significantly expanding the scope of how users can leverage Calico to secure application workloads.
- Native Support for nftables – Calico introduces native support for nftables, ensuring that Kubernetes users can smoothly transition from iptables to nftables while maintaining performance and compatibility.
- New Sidecar Deployment for Envoy in Calico – Ensures greater levels of compatibility with certain Kubernetes platforms such as GKE, AKS, EKS and Wireguard.
Runtime Security Enhancements
- Fine-Tuned Runtime Threat Detection for Accuracy and Efficiency – Calico allows administrators to select which types of detectors to enable in their cluster, enabling teams to phase their deployment and tune and customize threat detection.
- Significant Reduction of False Positives – Calico enables operators to bypass threat detection for certain known processes, thereby eliminating false positives.
- Bolstered Network-Based Threat Detection – Calico supports the ability to customize SNORT rules for Deep Packet Inspection (DPI) on a workload basis to improve accuracy.
- Insight into the Exploitability of Vulnerabilities to Prioritize Remediation – Calico introduces new meta data including Exploit Prediction Scoring System (EPSS) and information on known exploits to estimate the likelihood that the software vulnerability will be exploited in the wild.
“We are pleased to extend Calico’s renowned network security beyond Kubernetes clusters to virtual machines and hosts,” said Amit Gupta, Chief Product Officer, Tigera. “Organizations can now use a single pane of glass to visualize and manage network security across their Kubernetes and non-Kubernetes environments. All network security features, including egress access controls and microsegmentation, will work in the same way they do in Kubernetes clusters. These updates further our mission to equip users with robust, comprehensive networking and security solutions to meet their modern business needs.”
With these new updates, Calico provides platform and security engineers with more control, visibility, and efficiency in securing and managing their Kubernetes and hybrid environments. Calico’s latest enhancements offer both flexibility for development teams and strict controls for platform and security teams. Learn more about Calico’s new capabilities here.