11 Integrations with k0rdent
View a list of k0rdent integrations and software that integrates with k0rdent below. Compare the best k0rdent integrations as well as features, ratings, user reviews, and pricing of software that integrates with k0rdent. Here are the current k0rdent integrations in 2026:
-
1
Calico Cloud
Tigera
Pay-as-you-go security and observability SaaS platform for containers, Kubernetes, and cloud. Get a live view of dependencies and how all the services are communicating with each other in a multi-cluster, hybrid and multi-cloud environment. Eliminate setup and onboarding steps and troubleshoot your Kubernetes security and observability issues within minutes. Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.Starting Price: $0.05 per node hour -
2
Komodor
Komodor
Komodor takes the complexity out of K8s troubleshooting, providing all of the tools you need to troubleshoot with confidence. Komodor monitors your entire k8s stack, identifies issues, uncovers their root cause and delivers the context you need to troubleshoot efficiently and independently. Auto-identify k8s anomalies, failed deploys, misconfigurations, bottlenecks and other health issues. Spot emerging problems before they spread out and affect the end-users. Use ready-made playbooks to streamline root cause analysis, sidestep disruptive escalations and save hours of precious dev time. Provide your teams with straightforward remediation instructions that turn every responder into a troubleshooting expert.Starting Price: $10 per node per month -
3
Storidge
Storidge
Storidge was built on the idea that operating storage for enterprise applications should be really simple. We take a fundamentally different approach to Kubernetes storage and Docker volumes. By automating storage operations for orchestration systems, such as Kubernetes and Docker Swarm, it saves you time and money by eliminating the need for expensive expertise to setup, and operate storage infrastructure. This enables developers to focus their best energies on writing applications and creating value, and operators on delivering the value faster to market. Add persistent storage to your single node test cluster in seconds. Deploy storage infrastructure as code, and minimize operator decisions while maximizing operational workflow. Automated updates, provisioning, recovery, and high availability. Keep your critical databases and apps running with auto failover and automatic data recovery. -
4
Mirantis OpenStack for Kubernetes
Mirantis
Whether your workloads are restricted to on-prem data centers or you’re battling out-of-control public cloud costs, private cloud virtualization is a crucial piece of your infrastructure puzzle. Mirantis OpenStack for Kubernetes gives you the power of public cloud and the time-tested reliability of OpenStack—all built on a flexible and resilient foundation of Kubernetes, putting you back in control of your cloud. OpenStack is the leading open source private cloud infrastructure-as-a-service (IaaS) framework, providing a feature-rich, mature environment for hosting virtual machines, networks, and storage. Mirantis OpenStack for Kubernetes brings virtualized infrastructure into the cloud native world, providing an easy-to-use virtualization platform built on Kubernetes for optimal flexibility and resilience. -
5
Entrust Identity Enterprise
Entrust
The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card. -
6
Entrust Identity Essentials
Entrust
Fast, cost effective multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach. Start with an easy-to-use, easy-to-deploy on-premises MFA solution, then, if and when it makes sense, migrate to the cloud with Identity as a Service. Seamless integration between the two ensures a frictionless experience while benefitting from three extra authentication options: device fingerprint, mobile push, and grid cards. Secure and enable your company´s digital business with one solution, one license. Limit user friction with adaptive authentication and self-service password resets. Provision different authentication methods for different users and requirements. Available authenticators include SMS, email, voice, and OTP. Option to leverage smart phone biometrics including fingerprint and facial match. ActiveSync for Outlook protects unauthorized devices from accessing users’ email without requiring MDM integration. -
7
Netvisor ONE
Pluribus Networks
Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise. -
8
VIOLIN Maestro OS
VIOLIN
Demanding enterprises worldwide depend on storage that can deliver results. The storage operating system for the next generation is here now with Maestro OS. Valuable enterprise data needs protection with enterprise data services. Meanwhile, the business requires any new storage to be cost-effective. Complex enterprise workloads demand performance that is more than a point solution. VIOLIN's Maestro OS delivers all of this and more. Synchronous replication, WAN-optimized replication, and consistency groups for replication. Snapshots (crash consistent), consistency groups for snapshots, transparent LUN mirroring, and backup app integration. Scale-up to 737.28 TB raw, online expansion of capacity, and online LUN expansion. Start now by connecting with our experts to assess your storage needs. See how the QV-Series works with a quick setup of an online test environment. Partner with the right team to start driving down your total cost of ownership. -
9
Magma
Meta Platforms
Communications service providers leverage Magma's open network core solution to connect people using LTE, 5G, Wi-Fi, and beyond. A cost-effective, open, flexible, and commercial-grade EPC. Meta Connectivity is a development contributor to Magma, an Evolved Packet Core (EPC) that enables Communication Service Providers (CSPs) to deliver fast, reliable internet connectivity with innovative features that only a robust open-source community of developers can bring. Magma is an open-source software platform enabling operators to easily deploy mobile networks in hard-to-reach areas at a price point that makes sense. When working with qualified partners to deploy and operate Magma, CSPs can rest assured that their most stringent requirements are met. Magma is vendor, hardware, and network agnostic. CSPs can use what makes sense for them from radio access network (RAN) equipment to commodity hardware to licensed or un-licensed spectrum. -
10
Tetrate
Tetrate
Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network. -
11
A10 Defend DDoS Mitigator
A10 Networks
A10 Defend DDoS Mitigator (formerly Thunder TPS) is a scalable and automated DDoS protection solution powered by advanced machine learning, leading the industry in precision, scalability, and performance. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.
- Previous
- You're on page 1
- Next