Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
Find a file
2025-07-21 19:02:45 +00:00
.github Remove old codeowners (#3875) 2025-07-07 10:28:34 +02:00
3rdparty deps: bump Go to v1.24.4 (#3864) 2025-06-13 15:42:12 +02:00
bazel license: change headers 2025-07-15 23:34:48 +02:00
bootstrapper license: change headers 2025-07-15 23:34:48 +02:00
cli license: change headers 2025-07-15 23:34:48 +02:00
csi license: change headers 2025-07-15 23:34:48 +02:00
debugd license: change headers 2025-07-15 23:34:48 +02:00
dev-docs deps: update Terraform dependencies 2025-07-21 19:02:45 +00:00
disk-mapper license: change headers 2025-07-15 23:34:48 +02:00
docs license: change to BUSL 2025-07-15 23:34:48 +02:00
e2e deps: update Terraform dependencies 2025-07-21 19:02:45 +00:00
hack license: change headers 2025-07-15 23:34:48 +02:00
image license: change headers 2025-07-15 23:34:48 +02:00
internal image: update measurements and image version (#3882) 2025-07-18 09:57:37 +02:00
joinservice license: change headers 2025-07-15 23:34:48 +02:00
keyservice license: change headers 2025-07-15 23:34:48 +02:00
measurement-reader license: change headers 2025-07-15 23:34:48 +02:00
nix mini-constellation: pin swtpm to v0.8.2 (#3756) 2025-04-11 14:09:37 +02:00
operators/constellation-node-operator license: change headers 2025-07-15 23:34:48 +02:00
rfc feat: implement RFC 16 to allow emergency node access (#3557) 2025-03-25 11:28:48 +00:00
s3proxy license: change headers 2025-07-15 23:34:48 +02:00
terraform deps: update Terraform dependencies 2025-07-21 19:02:45 +00:00
terraform-provider-constellation license: change headers 2025-07-15 23:34:48 +02:00
tools bazel: remove bazeldnf and pinned rpms 2023-12-01 09:35:33 +01:00
upgrade-agent license: change headers 2025-07-15 23:34:48 +02:00
verify license: change headers 2025-07-15 23:34:48 +02:00
.bazelignore bazel: add directories to ignore (#2805) 2024-01-09 21:46:53 +01:00
.bazelrc bazel: enable bzlmod 2024-05-23 09:48:04 +02:00
.bazelversion nix: update mkosi to v25.3 (#3726) 2025-04-07 10:26:54 +02:00
.dockerignore ci: run versionsapi as docker action 2023-01-13 10:23:43 +01:00
.envrc nix: allow dev setup via direnv 2024-01-08 10:44:38 +01:00
.gitignore nix: allow dev setup via direnv 2024-01-08 10:44:38 +01:00
.golangci.yml deps: update golangci/golangci-lint to v2 (major) (#3709) 2025-03-25 11:30:13 +01:00
.grype.yaml ci: ignore replaced ghsa (#1392) 2023-03-10 11:13:05 +01:00
.lychee.toml link-checker: add ignored sites 2024-05-23 09:48:04 +02:00
.nixversion deps: update dependency DeterminateSystems/nix-installer to v0.38.1 (#3640) 2025-03-06 12:32:56 +01:00
.shellcheckrc Fix shellcheck warnings 2022-11-11 13:40:13 +01:00
.vale.ini ci: update vale 2024-01-24 09:07:19 +01:00
BUILD.bazel bazel: enable bzlmod 2024-05-23 09:48:04 +02:00
CODE_OF_CONDUCT.md Ref/readme (#375) 2022-08-19 14:54:11 +02:00
CODEOWNERS Remove old codeowners (#3875) 2025-07-07 10:28:34 +02:00
CONTRIBUTING.md license: change to BUSL 2025-07-15 23:34:48 +02:00
flake.lock nix: update mkosi to v25.3 (#3726) 2025-04-07 10:26:54 +02:00
flake.nix nix: update mkosi to v25.3 (#3726) 2025-04-07 10:26:54 +02:00
go.mod deps: update module helm.sh/helm/v3 to v3.18.4 [SECURITY] (#3877) 2025-07-09 08:29:45 +02:00
go.sum deps: update module helm.sh/helm/v3 to v3.18.4 [SECURITY] (#3877) 2025-07-09 08:29:45 +02:00
go.work deps: bump Go to v1.24.4 (#3864) 2025-06-13 15:42:12 +02:00
LICENSE license: change to BUSL 2025-07-15 23:34:48 +02:00
MODULE.bazel deps: update bazel (modules) (#3857) 2025-06-24 10:39:49 +02:00
MODULE.bazel.lock deps: update bazel (modules) (#3857) 2025-06-24 10:39:49 +02:00
netlify.toml Add docs to repo (#38) 2022-09-02 11:52:42 +02:00
README.md license: change to BUSL 2025-07-15 23:34:48 +02:00
renovate.json5 renovate: exclude s3proxy pseudo-versions upgrades (#3814) 2025-05-07 11:22:33 +02:00
SECURITY.md promote new github security reporting feature 2022-11-10 16:31:13 +01:00
version.txt Post v2.23.0 release updates to main (#3790) 2025-05-02 09:09:43 +02:00
WORKSPACE.bzlmod terraform: update AWS LB permissions (#3681) 2025-03-06 16:44:49 +01:00

Constellation

Always Encrypted Kubernetes

Govulncheck Go Report Discord Twitter

Constellation is a Kubernetes engine that aims to provide the best possible data security. It wraps your K8s cluster into a single confidential context that is shielded from the underlying cloud infrastructure. Everything inside is always encrypted, including at runtime in memory. For this, Constellation leverages confidential computing (see the whitepaper) and more specifically Confidential VMs.

Concept

Goals

From a security perspective, Constellation is designed to keep all data always encrypted and to prevent access from the infrastructure layer (i.e., remove the infrastructure from the TCB). This includes access from datacenter employees, privileged cloud admins, and attackers coming through the infrastructure (e.g., malicious co-tenants escalating their privileges).

From a DevOps perspective, Constellation is designed to work just like what you would expect from a modern K8s engine.

Use cases

Encrypting your K8s is good for:

  • Increasing the overall security of your clusters
  • Increasing the trustworthiness of your SaaS offerings
  • Moving sensitive workloads from on-prem to the cloud
  • Meeting regulatory requirements

Features

🔒 Everything always encrypted

🔍 Everything verifiable

🚀 Performance and scale

  • High availability with multi-master architecture and stacked etcd topology
  • Dynamic cluster autoscaling with verification and secure bootstrapping of new nodes
  • Competitive performance

🧩 Easy to use and integrate

Getting started

If you're already familiar with Kubernetes, it's easy to get started with Constellation:

  1. 📦 Install the CLI or use the Terraform provider
  2. ⌨️ Create a Constellation cluster in the cloud or locally
  3. 🏎️ Run your app

Constellation Shell

Learn more: "Getting started with Constellation" videos series.

Documentation

To learn more, see the documentation. You may want to start with one of the following sections.

Support

Contributing

Refer to CONTRIBUTING.md on how to contribute. The most important points:

Warning

Please report any security issue via a private GitHub vulnerability report or write to security@edgeless.systems.

License

Constellation is licensed under the Business Source License 1.1. You may use it free of charge for non-production use. You can find more information in the license section of the docs.