enhancements VS connaisseur

Compare enhancements vs connaisseur and see what are their differences.

InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com
featured
Stream - Scalable APIs for Chat, Feeds, Moderation, & Video.
Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.
getstream.io
featured
enhancements connaisseur
69 4
3,685 457
1.1% 0.4%
9.9 8.4
2 days ago 9 days ago
Go Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

enhancements

Posts with mentions or reviews of enhancements. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2025-06-19.
  • What Would a Kubernetes 2.0 Look Like
    17 projects | news.ycombinator.com | 19 Jun 2025
    Various pieces support pieces for pod to pod mTLS are slowly being brought into the main Kubernetes project.

    Take a look at https://github.com/kubernetes/enhancements/tree/master/keps/..., which is hopefully landing as alpha in Kubernetes 1.34. It lets you run a controller that issues certificates, and the certificates get automatically plumbed down into pod filesystems, and refresh is handled automatically.

    Together with ClusterTrustBundles (KEP 3257), these are all the pieces that are needed for someone to put together a controller that distributes certificates and trust anchors to every pod in the cluster.

  • Kubernetes 1.33 "Octarine": Key Features and Security Enhancements
    1 project | dev.to | 30 Apr 2025
    More information can be found in the Kubernetes Enhancement Proposal (KEP) for in-place resizing.
  • Securing Kubernetes API Server Health Checks Without Anonymous Access
    1 project | dev.to | 13 Apr 2025
    Digging into the Kubernetes source code led me to KEP-4633: Make anonymous authentication configuration endpoints configurable. This KEP addresses the exact concern of wanting to disable anonymous access globally while still allowing essential health checks (which don't necessarily need full TCP checks to be useful).
  • kuberc: an exciting new feature for kubectl
    1 project | dev.to | 8 Apr 2025
    Kubernetes 1.33, scheduled for late April, introduces kuberc, a new feature that allows you to customize kubectl. This feature, described in KEP-3104, enables you to create aliases and enforce options for kubectl subcommands.
  • Zero-Downtime Kubernetes Deployments on AWS with EKS
    1 project | news.ycombinator.com | 11 Mar 2025
    Might be noteworthy that in recent enough k8s the lifecycle.preStop.sleep.seconds is implemented https://github.com/kubernetes/enhancements/blob/master/keps/...
  • The Kubernetes Cloud Controller Manager
    13 projects | dev.to | 7 Dec 2024
    In September of 2016 the enhancement #88 (KEP) issue is created to support out-of-tree cloud providers (pluggable).
  • A skeptic's first contact with Kubernetes
    8 projects | news.ycombinator.com | 28 Jul 2024
    The motivation is more the latter, but it's not at all clear the proposed removal of the embedded kustomize will proceed, given the compatibility implications. See discussion at https://github.com/kubernetes/enhancements/issues/4706#issue... and following.
  • Debugging Distroless Images with kubectl and cdebug
    2 projects | dev.to | 31 May 2024
    (I do see there are some proposed enhancements related to profiles that might help here)
  • Design Docs at Google
    3 projects | news.ycombinator.com | 7 May 2024
    Thanks for these links!

    I picked out one at random just to check if my skeptical reaction is fair: https://github.com/kubernetes/enhancements/tree/master/keps/...

    - OK, this is actually a really good and useful doc!

    - However, it's not an up-front design doc, it has clearly been written after the bulk of the work has been done, to explain and justify rolling out a big change. (See the "implementation history" timeline: https://github.com/kubernetes/enhancements/tree/master/keps/...)

    - It looks like the template wasn't very useful; most of the required sections are marked "N/A", and there are comments like The best test for work like this is, more or less, "did it work?"

  • IBM to buy HashiCorp in $6.4B deal
    1 project | news.ycombinator.com | 25 Apr 2024
    > was always told early on that although they supported vault on kubernetes via a helm chart, they did not recommend using it on anything but EC2 instances (because of "security" which never really made sense their reasoning).

    The reasoning is basically that there are some security and isolation guarantees you don't get in Kubernetes that you do get on bare metal or (to a somewhat lesser extent) in VMs.

    In particular for Kubernetes, Vault wants to run as a non-root user and set the IPC_LOCK capability when it starts to prevent its memory from being swapped to disk. While in Docker you can directly enable this by adding capabilities when you launch the container, Kubernetes has an issue because of the way it handles non-root container users specified in a pod manifest, detailed in a (long-dormant) KEP: https://github.com/kubernetes/enhancements/blob/master/keps/... (tl;dr: Kubernetes runs the container process as root, with the specified capabilities added, but then switches it to the non-root UID, which causes the explicitly-added capabilities to be dropped).

    You can work around this by rebuilding the container and setting the capability directly on the binary, but the upstream build of the binary and the one in the container image don't come with that set (because the user should set it at runtime if running the container image directly, and the systemd unit sets it via systemd if running as a systemd service, so there's no need to do that except for working around Kubernetes' ambient-capability issue).

    > It always surprised me how these conversations went. "Well we don't really recommend kubernetes so we won't support (feature)."

connaisseur

Posts with mentions or reviews of connaisseur. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2025-01-08.

What are some alternatives?

When comparing enhancements and connaisseur you can also consider the following projects:

klipper-lb - Embedded service load balancer in Klipper

cosign - Code signing and transparency for containers and binaries

pixie - Instant Kubernetes-Native Application Observability

gatekeeper - 🐊 Gatekeeper - Policy Controller for Kubernetes

kubernetes-json-schema - Schemas for every version of every object in every version of Kubernetes

magtape - MagTape Policy-as-Code for Kubernetes

InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com
featured
Stream - Scalable APIs for Chat, Feeds, Moderation, & Video.
Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.
getstream.io
featured

Did you know that Go is
the 4th most popular programming language
based on number of references?