Cloud Native 60 min read

Unpacking the CNCF Cloud Native Landscape: A Layer‑by‑Layer Guide

This comprehensive guide breaks down the CNCF cloud native landscape into its four core layers—Provisioning, Runtime, Orchestration & Management, and Application Definition—explaining the problems each layer solves, the key technologies involved, and how they interoperate to enable modern, scalable applications.

Cloud Native Technology Community
Cloud Native Technology Community
Cloud Native Technology Community
Unpacking the CNCF Cloud Native Landscape: A Layer‑by‑Layer Guide

Introduction

The CNCF cloud native landscape visualizes a vast ecosystem of tools and projects that together enable the design, deployment, and operation of cloud native applications. By dividing the landscape into functional layers, engineers can focus on one set of concerns at a time and understand how each category contributes to the overall system.

Provisioning Layer

The provisioning layer provides the foundational infrastructure required to run cloud native workloads. It includes automation and configuration tools, container registries, and security/compliance solutions.

What it is

Automation and configuration tools (e.g., Terraform, Ansible, Puppet, Chef) automate the creation and management of compute, network, and storage resources. Container registries store and distribute container images. Security tools handle image scanning, signing, and secret management.

Problems solved

Eliminate manual, error‑prone provisioning cycles that can take months.

Provide a repeatable, code‑driven way to create infrastructure.

Securely manage secrets, keys, and access policies.

How it solves

By defining infrastructure as code, these tools let engineers provision environments with a single command, ensuring the resulting state matches the declared configuration. They also integrate with security frameworks to enforce compliance.

Corresponding tools

Terraform, Ansible, Puppet, Chef

Harbor, Dragonfly, OCI‑compatible registries

Falco, Open Policy Agent (OPA), Trivy, Notary

Provisioning layer diagram
Provisioning layer diagram

Runtime Layer

The runtime layer supplies the components that actually run containers: storage, container runtimes, and networking.

What it is

Cloud native storage : Persistent volumes that survive pod restarts (e.g., CSI drivers, MinIO, Velero).

Container runtime : Software that starts and isolates containers (e.g., containerd, CRI‑O, Kata, gVisor).

Cloud native network : Overlay networks that give each pod an IP address (e.g., CNI plugins such as Calico, Flannel, Antrea).

Problems solved

Provide durable, portable storage for stateful workloads.

Standardize container execution and resource limits.

Enable reliable inter‑pod communication across heterogeneous infrastructure.

How it solves

CSI abstracts storage providers, allowing pods to request volumes without knowing the underlying hardware. Container runtimes enforce isolation and resource quotas, while CNI plugins create a virtual network overlay that assigns each pod a unique IP.

Corresponding tools

CSI drivers, MinIO, Velero

containerd, CRI‑O, Kata, gVisor

Calico, Flannel, Antrea, Weave Net

Runtime layer diagram
Runtime layer diagram

Orchestration and Management Layer

This layer coordinates containers, provides service discovery, load balancing, and advanced traffic management.

What it is

Orchestration & scheduling : Kubernetes (or alternatives) ensures the desired state of the cluster.

Service discovery : Registers services and resolves their locations (e.g., CoreDNS, etcd).

Remote Procedure Call (RPC) : Structured inter‑service communication (e.g., gRPC).

Service proxy : Sidecar or mesh data plane that intercepts traffic.

API gateway : Central entry point for external traffic, handling auth, rate‑limiting, etc.

Service mesh : Adds reliability, observability, and security to service‑to‑service traffic without code changes.

Problems solved

Automate deployment, scaling, and self‑healing of container workloads.

Allow services to locate each other dynamically in a changing cluster.

Provide consistent, language‑agnostic communication mechanisms.

Externalize cross‑cutting concerns (routing, security, telemetry) from application code.

How it solves

Kubernetes continuously reconciles the actual cluster state with the declared desired state, creating or deleting pods as needed. Service discovery tools keep an up‑to‑date registry of endpoints. Service meshes (e.g., Linkerd, Istio) inject sidecar proxies that handle traffic routing, encryption, and metrics collection.

Corresponding tools

Kubernetes, Docker Swarm, Mesos

CoreDNS, etcd

gRPC

Envoy, Contour, BFE (service proxies)

Kong, Ambassador, Traefik (API gateways)

Linkerd, Istio, Consul Connect (service meshes)

Orchestration layer diagram
Orchestration layer diagram

Application Definition and Development Layer

The topmost layer focuses on building and delivering the actual applications.

Databases

Database management systems (SQL and NoSQL) store persistent application data. Cloud‑native databases such as YugaByte, CockroachDB, and TiKV are designed to run on Kubernetes.

Data flow & messaging

Message brokers and streaming platforms (e.g., Kafka, NATS, RabbitMQ) enable decoupled, publish‑subscribe communication between services.

Application definition & image build

Tools help developers package code into container images and define Kubernetes manifests. Helm charts, Kustomize, and the Cloud Native Buildpacks project simplify this process.

Continuous Integration / Continuous Delivery (CI/CD)

CI systems automatically build and test code changes; CD systems (including GitOps tools like Argo CD and Flux) automatically deploy verified artifacts to clusters.

Corresponding tools

PostgreSQL, MySQL, MongoDB, YugaByte, TiKV

Kafka, NATS, RabbitMQ, Strimzi, Pravega

Helm, Kustomize, Cloud Native Buildpacks, Operator Framework

Jenkins, GitHub Actions, Tekton, Argo CD, Flux, Spinnaker

Application layer diagram
Application layer diagram

Platform Layer

Platforms bundle the previously described layers into a cohesive, production‑ready solution, often centered around Kubernetes.

Kubernetes Distributions

Vendors package upstream Kubernetes with additional components, default configurations, and support. Examples include Kublr, Canonical, VMware Tanzu, and SUSE.

Managed Kubernetes

Cloud providers (AWS EKS, Azure AKS, Google GKE, DigitalOcean) run the control plane as a service, letting teams focus on workloads.

Kubernetes Installers

Tools such as kubeadm, kind, kops, and kubespray automate the installation and upgrade of Kubernetes clusters on‑premise or in the cloud.

PaaS / Container Services

Platforms like Heroku, Cloud Foundry, and various vendor‑specific PaaS offerings abstract away infrastructure, providing developers with a ready‑to‑run environment.

Corresponding tools

kubeadm, kind, kops, kubespray

EKS, AKS, GKE, DigitalOcean Kubernetes

Heroku, Cloud Foundry, OpenShift

Platform layer diagram
Platform layer diagram

Observability & Analysis

Observability tools give insight into system health; chaos engineering validates resilience.

Logging

Collects, stores, and queries application‑generated log streams. In the CNCF, Fluentd is the primary logging collector.

Monitoring

Aggregates metrics and alerts on system behavior. Prometheus (CNCF graduated) is the de‑facto standard, often paired with Grafana for visualization.

Tracing

Tracks the path of a request across microservices. CNCF projects include Jaeger and the OpenTelemetry ecosystem.

Chaos Engineering

Intentionally injects failures to test system resilience. CNCF projects include Chaos Mesh and LitmusChaos.

Corresponding tools

Fluentd (logging)

Prometheus, Grafana (monitoring)

Jaeger, OpenTelemetry (tracing)

Chaos Mesh, LitmusChaos (chaos engineering)

Logging tools
Logging tools
Prometheus monitoring
Prometheus monitoring
Jaeger tracing
Jaeger tracing
Chaos Mesh
Chaos Mesh

Conclusion

By dissecting the CNCF cloud native landscape into logical layers, engineers can methodically select the right tools for each concern—provisioning infrastructure, running containers, orchestrating services, defining applications, and observing system health. Combining these components enables the creation of resilient, scalable, and observable cloud native applications.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Cloud NativeObservabilityRuntimeCNCFOrchestrationProvisioningtechnology landscape
Cloud Native Technology Community
Written by

Cloud Native Technology Community

The Cloud Native Technology Community, part of the CNBPA Cloud Native Technology Practice Alliance, focuses on evangelizing cutting‑edge cloud‑native technologies and practical implementations. It shares in‑depth content, case studies, and event/meetup information on containers, Kubernetes, DevOps, Service Mesh, and other cloud‑native tech, along with updates from the CNBPA alliance.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.