Pulumi’s cover photo
Pulumi

Pulumi

Software Development

Seattle, WA 40,885 followers

Infrastructure as Code in any programming language. Now with Agentic AI. Build infrastructure intuitively on any cloud.

About us

Pulumi’s mission is to democratize the cloud for every engineer. Its open-source infrastructure as code tool enables engineers to write infrastructure code in programming languages they already know and love, and deploy infrastructure on any cloud. With the Pulumi Platform, engineers can write and ship infrastructure code faster, leverage AI to boost productivity, do more with less through infrastructure automation, and search resources across any cloud.

Website
https://www.pulumi.com
Industry
Software Development
Company size
51-200 employees
Headquarters
Seattle, WA
Type
Privately Held
Founded
2017
Specialties
Serverless, JavaScript, TypeScript, Cloud Engineering, Infrastructure As Code, and Policy As Code

Products

Locations

Employees at Pulumi

Updates

  • View organization page for Pulumi

    40,885 followers

    Come see Engin Diri in Austin May 15th at KCD Texas. Stop Wasting GPUs: How We Built a Golden Path for GPU Sharing on Kubernetes.

    🚀 The KCD Texas 2026 Schedule is LIVE! We're thrilled to announce the full schedule for #KCDTexas 2026, taking place on Friday, May 15, 2026! Here's a taste of what's in store: 🤖 "Livin' In the Future: Your Platform's Next Interface Is an AI Agent" by Whitney Lee 🏗️ "The 90-Minute IDP: AI Ate My Implementation. Let's Build a Platform Together" by Michael Forrester (Workshop) ⚡ "Stop Wasting GPUs: How We Built a Golden Path for GPU Sharing on Kubernetes" by Engin Diri 🔐 "Identity-Aware Access Control with Reverse Proxies" by Peter ONeill & Chris D. (Workshop) 🧠 "KServe and the Next Step for LLM Workloads: LLMInferenceService in Context" by Jooho L. 💰 "We Migrated to Karpenter, and Our Costs Went Up: A Journey to Real Savings" by Abhinav Dahiya 🛡️ "Cracking the OWASP 10 for Kubernetes" by Dolis Sharma 🔭 "Mastering the Dark Arts of OTel Debugging" by Julia Furst Morgado ...and so much more! Talks covering AI, edge computing, multi-cloud, security, GPU workloads, and everything cloud native. 📅 When: Friday, May 15, 2026 🔗 View the full schedule: https://lnkd.in/eBkRrprG 🎟️ Get tickets: https://kcdtexas.org Whether you're a Kubernetes beginner or a seasoned cloud native practitioner, there's something for everyone. See you there! 👋 #KCDTexas #Kubernetes #CloudNative #CNCF #DevOps #PlatformEngineering supported by Cloud Native Computing Foundation (CNCF)

    • No alternative text description for this image
  • Pulumi reposted this

    View organization page for Sentify

    2,004 followers

    There's something that happens when curious people gather in a room to talk honestly about technology. This week, we saw it firsthand. Four speakers. Four distinct perspectives on AI. And a community willing to sit with the uncomfortable questions as much as the exciting ones. Anbu Rajaraman opened the evening with a story on how he became a Prompt Engineering Python Developer in the AI multiverse - part Marvel Cinematic Universe, part philosophical provocation. His framing was simple and stayed with the room long after he left the stage: What If? In a landscape where AI is constantly forking new realities, it turns out that's exactly the right question to be asking. Paul Hicks brought the practitioner's lens. Taking on the very real challenge of learning infrastructure as code from scratch, he put Pulumi IaC's AI features to the test, the established ones and the new. His reflections on where AI genuinely accelerates a newcomer's learning, and where it quietly gets in the way, were as honest as they were useful. Seb Krueger reminded us that excitement and responsibility are not mutually exclusive. Personal AI assistants are no longer a novelty - they are reshaping how we work, decide, and delegate. His exploration of OpenClaw and the broader implications for data privacy, trust, and autonomy was the grounding the evening needed. Otto Jongerius closed with the question that perhaps cut the deepest. He examined the productivity trap and what it really means when AI enables us to ship faster than we can learn. It's a tension worth sitting with. What made the evening work wasn't just the quality of the talks. It was the quality of the people in the room: the questions asked, the perspectives shared, and the conversations that continued well after the final slide. That's the community we're building. And we couldn't be prouder of it. Thank you to everyone who came and contributed. Special thanks to Pulumi for sponsoring the event and to Bhumika T. for your exceptional MC-ing! We'll see you at the next one.

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • View organization page for Pulumi

    40,885 followers

    We were at KubeCon EU 2026 in Amsterdam last week. The big theme: Most organizations have experimented with AI workloads on Kubernetes, but very few run them in production daily. That gap between experimentation and production defined every conversation at KubeCon EU 2026 in Amsterdam. At our booth, we talked to hundreds of engineers over four days. Almost everyone had a proof of concept. Almost nobody had a production story they were happy with. 67% of AI compute now goes to inference, not training. And that's where the operational complexity lives. The CNCF donations tell the story: llm-d for distributed inference (IBM, Red Hat, Google, NVIDIA, and a dozen more backing it), NVIDIA's DRA driver for fractional GPU allocation, KAI Scheduler for GPU-aware placement, and kagenti giving AI agents cryptographic identity via SPIFFE. These aren't speculative. They're the skeleton of a GPU-native Kubernetes stack. 13,350 attendees, and the community is building fast. But GPU multi-tenancy is still unsolved, shadow AI governance is a growing problem, and sovereignty requirements are reshaping infrastructure architecture. The gap between what exists and what production demands is where the interesting work happens. https://lnkd.in/g4kwDTzu

    • Most organizations have experimented with AI workloads on Kubernetes, but very few run them in production daily.

That gap between experimentation and production defined every conversation at KubeCon EU 2026 in Amsterdam.

At our booth, we talked to hundreds of engineers over four days. Almost everyone had a proof of concept. Almost nobody had a production story they were happy with.

67% of AI compute now goes to inference, not training. And that's where the operational complexity lives.

The CNCF donations tell the story: llm-d for distributed inference (IBM, Red Hat, Google, NVIDIA, and a dozen more backing it), NVIDIA's DRA driver for fractional GPU allocation, KAI Scheduler for GPU-aware placement, and kagenti giving AI agents cryptographic identity via SPIFFE.

These aren't speculative. They're the skeleton of a GPU-native Kubernetes stack.

13,350 attendees, and the community is building fast. But GPU multi-tenancy is still unsolved, shadow AI governance is a growing problem, and sovereignty requirements are reshaping infrastructure architecture.

The gap between what exists and what production demands is where the interesting work happens.

https://www.pulumi.com/blog/kubecon-eu-2026-recap/
  • View organization page for Pulumi

    40,885 followers

    Supply chain attacks on CI pipelines are getting real. If a GitHub Action in your pipeline is compromised… what does it get? For most teams: • Everything in secrets. • Long-lived credentials • Tokens that work for weeks We weren’t comfortable with that. So across 70+ repos, we removed all static GitHub Secrets. Now: • Credentials are short-lived (OIDC) • Nothing is stored • Nothing persists If something runs in CI that shouldn’t, there’s nothing useful to steal. https://lnkd.in/gvVXnDCH

  • View organization page for Pulumi

    40,885 followers

    Pulumi IAM just got a lot more powerful. Earlier this year when we launched custom IAM roles, the feedback we got was that while the model was just what was needed, applying it at scale (across hundreds of stacks, environments, and accounts) was still too manual. We've addressed that with three new capabilities: 🏷️ Tag-based access control: Create rules within a custom role that grant permissions based on entity tags — across IaC stacks, ESC environments, and Insights accounts. 👥 Team role assignments: Assign custom roles directly to teams. When someone joins, they inherit the team's roles automatically. 🙋 User role assignments: Assign custom roles directly to individual members. Permissions are additive, so a user on two teams gets the union of both teams’ roles, plus any role assigned directly to them. Available now! Read the full launch post here: https://lnkd.in/gzAK4bk9

  • Pulumi reposted this

    View organization page for Pulumi

    40,885 followers

    We just launched Terraform State Backend support in Pulumi Cloud (public beta). Platform teams can now store and manage Terraform state alongside Pulumi stacks — no code changes required. Your team keeps using the Terraform or OpenTofu CLI while you get encrypted state, update history, state locking, RBAC, audit policies, and unified resource visibility through Pulumi Insights. Migration from S3, Azure Blob, or GCS takes minutes. Read more about how it works and how to get started. https://hubs.ly/Q045PJ7l0

  • View organization page for Pulumi

    40,885 followers

    We just launched Terraform State Backend support in Pulumi Cloud (public beta). Platform teams can now store and manage Terraform state alongside Pulumi stacks — no code changes required. Your team keeps using the Terraform or OpenTofu CLI while you get encrypted state, update history, state locking, RBAC, audit policies, and unified resource visibility through Pulumi Insights. Migration from S3, Azure Blob, or GCS takes minutes. Read more about how it works and how to get started. https://hubs.ly/Q045PJ7l0

  • View organization page for Pulumi

    40,885 followers

    Pulumi Insights gives you visibility and governance across your entire cloud footprint, but enterprises with strict data residency, private network, or regulatory requirements need that work to run in their own environments. Today, Pulumi Insights supports customer-managed workflow runners for both SaaS and self-hosted Pulumi Cloud. Discovery Scans: Catalog every resource across AWS, Azure, GCP, and more, even inside private VPCs. Policy Evaluations: Enforce compliance with CIS, NIST, PCI DSS, and other frameworks using policy-as-code. Data Residency: All scan execution and credential handling stays entirely within your network. Flexible Hosting: Run on Linux, macOS, Docker, or Kubernetes — wherever your infrastructure lives. Teams already using customer-managed runners for Pulumi Deployments can handle Insights workflows with no additional infrastructure. Read the full announcement: https://hubs.ly/Q045cBxC0

  • View organization page for Pulumi

    40,885 followers

    Managing infrastructure on #GoogleCloud often starts simply but becomes more complex as projects and environments grow. This hands-on workshop introduces Infrastructure as Code on Google Cloud using familiar programming languages and established software engineering practices. You will see how infrastructure can be defined, deployed, and managed as code, and how this approach connects application and infrastructure workflows. The session focuses on practical #GCP use cases and shows how teams manage infrastructure consistently across projects and environments. It is designed for engineers who want a clearer, more reliable foundation for working with Google Cloud. Demo code: https://lnkd.in/gVinH-eW #InfrastructureAsCode #DevOps

    Getting Started with Infrastructure as Code on Google Cloud

    Getting Started with Infrastructure as Code on Google Cloud

    www.linkedin.com

  • View organization page for Pulumi

    40,885 followers

    Every failed deployment starts with an undetected config error. Pulumi ESC fn::validate enforces JSON Schema when you save an environment so invalid values fail immediately, not during deploy or in production. Define your rules once. Catch misconfigurations before they break production. Learn how it works: https://hubs.ly/Q043qsBl0 #DevOps #InfrastructureAsCode #DevSecOps #CloudSecurity

Similar pages

Browse jobs

Funding

Pulumi 4 total rounds

Last Round

Series C

US$ 41.0M

See more info on crunchbase