Skip to main content

CNCF Rust Projects Analysis

Executive Summary

The CNCF ecosystem has embraced Rust for its performance, memory safety, and reliability characteristics. Currently, there is 1 graduated project (Linkerd) and 5 sandbox projects written in or significantly utilizing Rust. Beyond official CNCF projects, the landscape includes 9 additional Rust-based cloud native projects, demonstrating Rust's growing importance in the cloud native ecosystem.

Overview

This report analyzes Rust adoption within the Cloud Native Computing Foundation (CNCF) landscape. Data is sourced from the official @cncf/landscape repository, which serves as the single source of truth for CNCF projects. The analysis categorizes projects by their CNCF maturity level: Graduated, Incubating, and Sandbox.

Key Findings

MetricValueNotes
Total Rust Projects15In CNCF landscape
Graduated1Linkerd
Incubating0None currently
Sandbox5Active development stage
Non-CNCF9Popular ecosystem projects
First Accepted2017-01-23Linkerd
Most Recent2022-12-14Paralus

Graduated Projects

Linkerd

Status: Graduated (2021-07-28) | Accepted: 2017-01-23

Linkerd is a service mesh that provides security, observability, and reliability to Kubernetes applications without code changes. It's built with both Go and Rust components, with the data plane (linkerd2-proxy) written entirely in Rust for maximum performance and safety.

PropertyDetails
DescriptionUltra light, ultra simple, ultra powerful service mesh
Repositorylinkerd/linkerd2
Homepagelinkerd.io
LanguagesGo, Rust
Key FeaturesmTLS, observability, multi-cluster, load balancing, traffic authorization, security, zero trust
Target UsersSREs, DevOps Engineers, Architects
Dev Statslinkerd.devstats.cncf.io

Security Audits:

  • 2019-06-01: Security audit by Cure53
  • 2020-06-05: Rustls TLS library audit by Cure53
  • 2022-06-28: Security audit by Trail of Bits

Why Rust? Linkerd's data plane proxy (linkerd2-proxy) is written in Rust to achieve ultra-low overhead, memory safety without garbage collection, and blazing fast performance critical for service mesh operations.

Sandbox Projects

Confidential Containers

Status: Sandbox | Accepted: 2022-03-08

Enables cloud native confidential computing by leveraging Trusted Execution Environments (TEEs) to protect containers and data.

PropertyDetails
Repositoryconfidential-containers/confidential-containers
Homepageconfidentialcontainers.org
Dev Statsconfidentialcontainers.devstats.cncf.io
Slack#confidential-containers
Annual Review2023-06-15

Rust Components: Uses Rust for security-critical components interfacing with TEE technologies.


Keylime

Status: Sandbox | Accepted: 2020-09-22

Bootstrap and maintain trust on the Edge, Cloud, and IoT devices using remote attestation.

PropertyDetails
Repositorykeylime/keylime
Homepagekeylime.dev
Twitter@KeylimeProject
Dev Statskeylime.devstats.cncf.io
Slack#Keylime
Annual Review2022-11-10

Rust Components: Keylime has Rust components for secure, low-level system interactions and cryptographic operations.


Kubewarden

Status: Sandbox | Accepted: 2022-06-17

WebAssembly-powered Kubernetes policy engine supporting policies written in multiple languages including Rust, Go, CEL, Rego, and YAML.

PropertyDetails
Repositorykubewarden/kubewarden-controller
Homepagekubewarden.io
Twitter@kubewarden
Dev Statskubewarden.devstats.cncf.io
Slack#kubewarden
Annual Review2023-10-10

Rust Usage: Core runtime written in Rust; supports policy development in Rust for maximum performance and safety.


Paralus

Status: Sandbox | Accepted: 2022-12-14

Free, open source tool enabling controlled, audited access to Kubernetes infrastructure with zero trust security model.

PropertyDetails
Repositoryparalus/paralus
Homepageparalus.io
Dev Statsparalus.devstats.cncf.io
Slack#paralus

Rust Components: Contains Rust components for security-critical path operations.


kube-rs

Status: Sandbox | Accepted: 2021-11-16

The core Rust ecosystem for building Kubernetes applications, providing idiomatic Rust interfaces for Kubernetes APIs.

PropertyDetails
Repositorykube-rs/kube
Homepagekube.rs
Dev Statskube.devstats.cncf.io
Slack#kube-rs

Pure Rust: Complete Rust client library for Kubernetes, enabling developers to build controllers, operators, and tools entirely in Rust.

Analysis

Key Insight

Rust's adoption in CNCF projects centers on security-critical and performance-sensitive workloads, with Linkerd proving Rust's viability at the graduated level.

  • Service Mesh Leadership: Linkerd, the only graduated Rust project, proves Rust's viability for production-grade cloud native infrastructure
  • Security Focus: 4 of 6 CNCF Rust projects focus on security (Confidential Containers, Keylime, Kubewarden, Paralus)
  • Zero Trust: Multiple projects leverage Rust for implementing zero trust security architectures
  • Performance Critical: Projects choosing Rust typically cite performance, memory safety, and reliability as key factors

Why Rust for Cloud Native?

  1. Memory Safety: No garbage collection, preventing unpredictable latencies
  2. Performance: Near C/C++ performance without memory safety trade-offs
  3. Concurrency: Safe, efficient concurrent programming models
  4. WebAssembly: First-class Wasm support for portable, sandboxed execution
  5. Type Safety: Strong type system catches errors at compile time
  6. Zero-Cost Abstractions: High-level ergonomics with no runtime overhead

Growth Trajectory

  • 2017: First Rust project (Linkerd) accepted into CNCF
  • 2020-2022: Surge in Rust sandbox projects (5 projects accepted)
  • 2023+: Continued focus on security and performance-critical components

Beyond CNCF, several prominent Rust projects power cloud native infrastructure:

Infrastructure & Runtime

ProjectDescriptionRepository
FirecrackerAWS microVM technology powering Lambda and Fargatefirecracker-microvm/firecracker
KrustletKubernetes Kubelet implementation for running WebAssembly workloadskrustlet/krustlet
WasmtimeFast, secure WebAssembly runtime from the Bytecode Alliancebytecodealliance/wasmtime
WasmerLeading WebAssembly runtime supporting WASIwasmerio/wasmer

Observability & Data

ProjectDescriptionRepository
ParseableOpen source log storage and observability platform for Kubernetesparseablehq/parseable
InfluxDBTime series database (v3) rebuilt in Rust using Apache Arrow/Parquetinfluxdata/influxdb
VectorHigh-performance observability data pipelinevectordotdev/vector

Networking & Security

ProjectDescriptionRepository
PomeriumIdentity-aware access proxy for zero-trust securitypomerium/pomerium

Stream Processing

ProjectDescriptionRepository
ArkFlowHigh-performance Rust stream processing enginearkflow-rs/arkflow

Notable Mentions

  • Bottlerocket OS: AWS-built Linux-based OS for running containers (uses Rust extensively)
  • Tremor: Early-stage event processing system designed for high-throughput scenarios
  • rustls: Modern TLS library used by Linkerd and many other projects (audited by Cure53)

References

Associated Issues

IssueStatusPriorityLink
Generate CNCF Rust Projects ReportOpenHighN/A

Report Generated: 2025-01-XX

Data Source: CNCF Landscape (landscape.yml)

Methodology: Analyzed the official CNCF landscape repository to identify all projects with Rust components or implementations. Projects were categorized by CNCF maturity level (Graduated, Incubating, Sandbox). Additional popular cloud native Rust projects were identified through landscape data for the appendix.

Note on Data: This report focuses on projects officially listed in the CNCF landscape. Many CNCF projects may have Rust components that are not explicitly called out in their landscape entries.