Who is using Cilium? ==================== Sharing experiences and learning from other users is essential. We are frequently asked who is using a particular feature of Cilium so people can get in contact with other users to share experiences and best practices. People also often want to know if product/platform X has integrated Cilium. While the [Cilium Slack community](https://cilium.herokuapp.com/) allows users to get in touch, it can be challenging to find this information quickly. The following is a directory of adopters to help identify users of individual features. The users themselves directly maintain the list. Adding yourself as a user ------------------------- If you are using Cilium or it is integrated into your product, service, or platform, please consider adding yourself as a user with a quick description of your use case by opening a pull request to this file and adding a section describing your usage of Cilium. If you are open to others contacting you about your use of Cilium on Slack, add your Slack nickname as well. N: Name of user (company) D: Description U: Usage of features L: Link with further information (optional) Q: Contacts available for questions (optional) Example entry: * N: Cilium Example User Inc. D: Cilium Example User Inc. is using Cilium for scientific purposes U: ENI networking, DNS policies, ClusterMesh Q: @slacknick1, @slacknick2 Requirements to be listed ------------------------- * You must represent the user listed. Do *NOT* add entries on behalf of other users. * There is no minimum deployment size but we request to list permanent production deployments only, i.e., no demo or trial deployments. Commercial use is not required. A well-done home lab setup can be equally interesting as a large-scale commercial deployment. Users (Alphabetically) ---------------------- * N: AccuKnox D: AccuKnox uses Cilium for network visibility and network policy enforcement. U: L3/L4/L7 policy enforcement using Identity, External/VM Workloads, Network Visibility using Hubble L: https://www.accuknox.com/spifee-identity-for-cilium-presentation-at-kubecon-2021, https://www.accuknox.com/cilium Q: @nyrahul * N: Acoss D: Acoss is using cilium as their main CNI plugin (self hosted k8s, On-premises) U: CiliumNetworkPolicy, Hubble, BPF NodePort, Direct routing L: @JrCs * N: Adobe, Inc. D: Adobe's Project Ethos uses Cilium for multi-tenant, multi-cloud clusters U: L3/L4/L7 policies L: https://youtu.be/39FLsSc2P-Y * N: AirQo D: AirQo uses Cilium as the CNI plugin U: CNI, Networking, NetworkPolicy, Cluster Mesh, Hubble, Kubernetes services L: @airqo-platform * N: Alibaba Cloud D: Alibaba Cloud is using Cilium together with Terway CNI as the high-performance ENI dataplane U: Networking, NetworkPolicy, Services, IPVLAN L: https://www.alibabacloud.com/blog/how-does-alibaba-cloud-build-high-performance-cloud-native-pod-networks-in-production-environments_596590 * N: Amazon Web Services (AWS) D: AWS uses Cilium as the default CNI for EKS Anywhere U: Networking, NetworkPolicy, Services L: https://isovalent.com/blog/post/2021-09-aws-eks-anywhere-chooses-cilium * N: APPUiO by VSHN D: VSHN uses Cilium for multi-tenant networking on APPUiO Cloud and as an add-on to APPUiO Managed, both on Red Hat OpenShift and Cloud Kubernetes. U: CNI, Networking, NetworkPolicy, Hubble, IPAM, Kubernetes services L: https://products.docs.vshn.ch/products/appuio/managed/addon_cilium.html and https://www.appuio.cloud * N: ArangoDB Oasis D: ArangoDB Oasis is using Cilium in to separate database deployments in our multi-tenant cloud environment U: Networking, CiliumNetworkPolicy(cluster & local), Hubble, IPAM L: https://cloud.arangodb.com Q: @ewoutp @Robert-Stam * N: Ascend.io D: Ascend.io is using Cilium as a consistent CNI for our Data Automation Platform on GKE, EKS, and AKS. U: Transparent Encryption, Overlay Networking, Cluster Mesh, Egress Gateway, Network Policy, Hubble L: https://www.ascend.io/ Q: @Joe Stevens * N: Ayedo D: Ayedo builds and operates cloud-native container platforms based on Kubernetes U: Hubble for Visibility, Cilium as Mesh between Services L: https://www.ayedo.de/ * N: Back Market D: Back Market is using Cilium as CNI in all their clusters and environments (kOps + EKS in AWS) U: CNI, Network Policies, Transparent Encryption (WG), Hubble Q: @nitrikx L: https://www.backmarket.com/ * N: Berops D: Cilium is used as a CNI plug-in in our open-source multi-cloud and hybrid-cloud Kubernetes platform - Claudie U: CNI, Network Policies, Hubble Q: @Bernard Halas L: https://github.com/berops/claudie * N: ByteDance D: ByteDance is using Cilium as CNI plug-in for self-hosted Kubernetes. U: CNI, Networking L: @Jiang Wang * N: Canonical D: Canonical's Kubernetes distribution microk8s uses Cilium as CNI plugin U: Networking, NetworkPolicy, and Kubernetes services L: https://microk8s.io/ * N: Capital One D: Capital One uses Cilium as its standard CNI for all Kubernetes environments U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, Hubble, network visibility L: https://www.youtube.com/watch?v=hwOpCKBaJ-w * N: CENGN - Centre of Excellence in Next Generation Networks D: CENGN is using Cilium in multiple clusters including production and development clusters (self-hosted k8s, On-premises) U: L3/L4/L7 network policies, Monitoring via Prometheus metrics & Hubble L: https://www.youtube.com/watch?v=yXm7yZE2rk4 Q: @rmaika @mohahmed13 * N: Cistec D: Cistec is a clinical information system provider and uses Cilium as the CNI plugin. U: Networking and network policy L: https://www.cistec.com/ * N: Civo D: Civo is offering Cilium as the CNI option for Civo users to choose it for their Civo Kubernetes clusters. U: Networking and network policy L: https://www.civo.com/kubernetes * N: ClickHouse D: ClickHouse uses Cilium as CNI for AWS Kubernetes environments U: CiliumNetworkPolicy, Hubble, ClusterMesh L: https://clickhouse.com * N: Cognite D: Cognite is an industrial DataOps provider and uses Cilium as the CNI plugin Q: @Robert Collins * N: CONNY D: CONNY is legaltech platform to improve access to justice for individuals U: Networking, NetworkPolicy, Services Q: @ant31 L: https://conny.de * N: Cosmonic D: Cilium is the CNI for Cosmonic's Nomad based PaaS U: Networking, NetworkPolicy, Transparent Encryption L: https://cilium.io/blog/2023/01/18/cosmonic-user-story/ * N: Crane D: Crane uses Cilium as the default CNI U: Networking, NetworkPolicy, Services L: https://github.com/slzcc/crane Q: @slzcc * N: Cybozu D: Cybozu deploys Cilium to on-prem Kubernetes Cluster and uses it with Coil by CNI chaining. U: CNI Chaining, L4 LoadBalancer, NetworkPolicy, Hubble L: https://cybozu-global.com/ * N: Daimler Truck AG D: The CSG RuntimeDepartment of DaimlerTruck is maintaining an AKS k8s cluster as a shared resource for DevOps crews and is using Cilium as the default CNI (BYOCNI). U: Networking, NetworkPolicy and Monitoring L: https://daimlertruck.com Q: @brandshaide * N: DaoCloud - spiderpool & merbridge D: spiderpool is using Cilium as their main CNI plugin for overlay and merbridge is using Cilium eBPF library to speed up your Service Mesh U: CNI, Service load-balancing, cluster mesh L: https://github.com/spidernet-io/spiderpool, https://github.com/merbridge/merbridge Q: @weizhoublue, @kebe7jun * N: Datadog D: Datadog is using Cilium in AWS (self-hosted k8s) U: ENI Networking, Service load-balancing, Encryption, Network Policies, Hubble Q: @lbernail, @roboll, @mvisonneau * N: Dcode.tech D: We specialize in AWS and Kubernetes, and actively implement Cilium at our clients. U: CNI, CiliumNetworkPolicy, Hubble UI L: https://dcode.tech/ Q: @eliranw, @maordavidov * N: Deckhouse D: Deckhouse Kubernetes Platform is using Cilium as a one of the supported CNIs. U: Networking, Security, Hubble UI for network visibility L: https://github.com/deckhouse/deckhouse * N: Deezer D: Deezer is using Cilium as CNI for all our on-prem clusters for its performance and security. We plan to leverage BGP features as well soon U: CNI, Hubble, kube-proxy replacement, eBPF L: https://github.com/deezer * N: DigitalOcean D: DigitalOcean is using Cilium as the CNI for Digital Ocean's managed Kubernetes Services (DOKS) U: Networking and network policy L: https://github.com/digitalocean/DOKS * N: Edgeless Systems D: Edgeless Systems is using Cilium as the CNI for Edgeless System's Confidential Kubernetes Distribution (Constellation) U: Networking (CNI), Transparent Encryption (WG), L: https://docs.edgeless.systems/constellation/architecture/networking Q: @m1ghtym0 * N: Eficode D: As a cloud-native and devops consulting firm, we have implemented Cilium on customer engagements U: CNI, CiliumNetworkPolicy at L7, Hubble L: https://eficode.com/ Q: @Andy Allred * N: Elastic Path D: Elastic Path is using Cilium in their CloudOps for Kubernetes production clusters U: CNI L: https://documentation.elasticpath.com/cloudops-kubernetes/docs/index.html Q: @Neil Seward * N: Equinix D: Equinix Metal is using Cilium for production and non-production environments on bare metal U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, BGP advertisements, Hubble, network visibility L: https://metal.equinix.com/ Q: @matoszz * N: Equinix D: Equinix NL Managed Services is using Cilium with their Managed Kubernetes offering U: CNI, network policies, visibility L: https://www.equinix.nl/products/support-services/managed-services/netherlands Q: @jonkerj * N: Exoscale D: Exoscale is offering Cilium as a CNI option on its managed Kubernetes service named SKS (Scalable Kubernetes Service) U: CNI, Networking L: https://www.exoscale.com/sks/ Q: @Antoine * N: finleap connect D: finleap connect is using Cilium in their production clusters (self-hosted, bare-metal, private cloud) U: CNI, NetworkPolicies Q: @chue * N: Form3 D: Form3 is using Cilium in their production clusters (self-hosted, bare-metal, private cloud) U: Service load-balancing, Encryption, CNI, NetworkPolicies Q: @kevholditch-f3, samo-f3, ewilde-form3 * N: FRSCA - Factory for Repeatable Secure Creation of Artifacts D: FRSCA is utilizing tetragon integrated with Tekton to create runtime attestation to attest artifact and builder attributes U: Runtime observability L: https://github.com/buildsec/frsca Q: @Parth Patel * N: F5 Inc D: F5 helps customers with Cilium VXLAN tunnel integration with BIG-IP U: Networking L: https://github.com/f5devcentral/f5-ci-docs/blob/master/docs/cilium/cilium-bigip-info.rst Q: @vincentmli * N: Gcore D: Gcore supports Cilium as CNI provider for Gcore Managed Kubernetes Service U: CNI, Networking, NetworkPolicy, Kubernetes Services L: https://gcore.com/news/cilium-cni-support Q: @rzdebskiy * N: Giant Swarm D: Giant Swarm is using Cilium in their Cluster API based managed Kubernetes service (AWS, Azure, GCP, OpenStack, VMware Cloud Director and VMware vSphere) as CNI U: Networking L: https://www.giantswarm.io/ * N: GitLab D: GitLab is using Cilium to implement network policies inside Auto DevOps deployed clusters for customers using k8s U: Network policies L: https://docs.gitlab.com/ee/user/clusters/applications.html#install-cilium-using-gitlab-ci Q: @ap4y @whaber * N: Google D: Google is using Cilium in Anthos and Google Kubernetes Engine (GKE) as Dataplane V2 U: Networking, network policy, and network visibility L: https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine * N: G DATA CyberDefense AG D: G DATA CyberDefense AG is using Cilium on our managed on premise clusters. U: Networking, network policy, security, and network visibility L: https://gdatasoftware.com Q: @farodin91 * N: IDNIC | Kadabra D: IDNIC is the National Internet Registry administering IP addresses for INDONESIA, uses Cilium to powered Kadabra project runing services across multi data centers. U: Networking, Network Policies, kube-proxy Replacement, Service Load Balancing and Cluster Mesh L: https://ris.idnic.net/ Q: @ardikabs * N: IKEA IT AB D: IKEA IT AB is using Cilium for production and non-production environments (self-hosted, bare-metal, private cloud) U: Networking, CiliumclusterWideNetworkPolicy, CiliumNetworkPolicy, kube-proxy replacement, Hubble, Direct routing, egress gateway, hubble-otel, Multi Nic XDP, BGP advertisements, Bandwidth Manager, Service Load Balancing, Cluster Mesh L: https://www.ingka.com/ * N: Immerok D: Immerok uses Cilium for cross-cluster communication and network isolation; Immerok Cloud is a serverless platform for the full power of [Apache Flink](https://flink.apache.org) at any scale. U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, CNI L: https://immerok.io Q: @austince, @dmvk * N: Infomaniak D: Infomaniak is using Cilium in their production clusters (self-hosted, bare-metal and openstack) U: Networking, CiliumNetworkPolicy, BPF NodePort, Direct routing, kube-proxy replacement L: https://www.infomaniak.com/en Q: @reneluria * N: innoQ Schweiz GmbH D: As a consulting company we added Cilium to a couple of our customers infrastructure U: Networking, CiliumNetworkPolicy at L7, kube-proxy replacement, encryption L: https://www.cloud-migration.ch/ Q: @fakod * N: Isovalent D: Cilium is the platform that powers Isovalent’s enterprise networking, observability, and security solutions U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, egress gateway, service load balancing, CNI L: https://isovalent.com/product/ Q: @BillMulligan * N: JUMO D: JUMO is using Cilium as their CNI plugin for all of their AWS-hosted EKS clusters U: Networking, network policy, network visibility, cluster mesh Q: @Matthieu ANTOINE, @Carlos Castro, @Joao Coutinho (Slack) * N: Keploy D: Keploy is using the Cilium to capture the network traffic to perform E2E Testing. U: Networking, network policy, Monitoring, E2E Testing L: https://keploy.io/ * N: Kilo D: Cilium is a supported CNI for Kilo. When used together, Cilium + Kilo create a full mesh via WireGuard for Kubernetes in edge environments. U: CNI, Networking, Hubble, kube-proxy replacement, network policy L: https://kilo.squat.ai/ Q: @squat, @arpagon * N: kOps D: kOps is using Cilium as one of the supported CNIs U: Networking, Hubble, Encryption, kube-proxy replacement L: kops.sigs.k8s.io/ Q: @olemarkus * N: Kryptos Logic D: Kryptos is a cyber security company that is using Kubernetes on-prem in which Cilium is our CNI of choice. U: Networking, Observability, kube-proxy replacement * N: kubeasz D: kubeasz, a certified kubernetes installer, is using Cilium as a one of the supported CNIs. U: Networking, network policy, Hubble for network visibility L: https://github.com/easzlab/kubeasz * N: Kube-OVN D: Kube-OVN uses Cilium to enhance service performance, security and monitoring. U: CNI-Chaining, Hubble, kube-proxy replacement L: https://github.com/kubeovn/kube-ovn/blob/master/docs/IntegrateCiliumIntoKubeOVN.md Q: @oilbeater * N: Kube-Hetzner D: Kube-Hetzner is a open-source Terraform project that uses Cilium as an possible CNI in its cluster deployment on Hetzner Cloud. U: Networking, Hubble, kube-proxy replacement L: https://github.com/kube-hetzner/terraform-hcloud-kube-hetzner#cni Q: @MysticalTech * N: Kubermatic D: Kubermatic Kubernetes Platform is using Cilium as a one of the supported CNIs. U: Networking, network policy, Hubble for network visibility L: https://github.com/kubermatic/kubermatic * N: KubeSphere - KubeKey D: KubeKey is an open-source lightweight tool for deploying Kubernetes clusters and addons efficiently. It uses Cilium as one of the supported CNIs. U: Networking, Security, Hubble UI for network visibility L: https://github.com/kubesphere/kubekey Q: @FeynmanZhou * N: K8e - Simple Kubernetes Distribution D: Kubernetes Easy (k8e) is a lightweight, Extensible, Enterprise Kubernetes distribution. It uses Cilium as default CNI network. U: Networking, network policy, Hubble for network visibility L: https://github.com/xiaods/k8e Q: @xds2000 * N: Liquid Reply D: Liquid Reply is a professional service provider and utilizes Cilium on suitable projects and implementations. U: Networking, network policy, Hubble for network visibility, Security L: http://liquidreply.com Q: @mkorbi * N: Magic Leap D: Magic Leap is using Hubble plugged to GKE Dataplane v2 clusters U: Hubble Q: @romachalm * N: Melenion Inc D: Melenion is using Cilium as the CNI for its on-premise production clusters U: Service Load Balancing, Hubble Q: @edude03 * N: Meltwater D: Meltwater is using Cilium in AWS on self-hosted multi-tenant k8s clusters as the CNI plugin U: ENI Networking, Encryption, Monitoring via Prometheus metrics & Hubble Q: @recollir, @dezmodue * N: Microsoft D: Microsoft is using Cilium in "Azure CNI powered by Cilium" AKS (Azure Kubernetes Services) clusters L: https://techcommunity.microsoft.com/t5/azure-networking-blog/azure-cni-powered-by-cilium-for-azure-kubernetes-service-aks/ba-p/3662341 Q: @tamilmani1989 @chandanAggarwal * N: Mobilab D: Mobilab uses Cilium as the CNI for its internal cloud U: CNI L: https://mobilabsolutions.com/2019/01/why-we-switched-to-cilium/ * N: MyFitnessPal D: MyFitnessPal trusts Cilium with high volume user traffic in AWS on self-hosted k8s clusters as the CNI plugin and in GKE with Dataplane V2 U: Networking (CNI, Maglev, kube-proxy replacement, local redirect policy), Observability (Network metrics with Hubble, DNS proxy, service maps, policy troubleshooting) and Security (Network Policy) L: https://www.myfitnesspal.com * N: Mux, Inc. D: Mux deploys Cilium on self-hosted k8s clusters (Cluster API) in GCP and AWS to run its video streaming/analytics platforms. U: Pod networking (CNI, IPAM, Host-reachable Services), Hubble, Cluster-mesh. TBD: Network Policy, Transparent Encryption (WG), Host Firewall. L: https://mux.com Q: @dilyevsky * N: NetBird D: NetBird uses Cilium to compile BPF to Go for cross-platform DNS management and NAT traversal U: bpf2go to compile a C source file into eBPF bytecode and then to Go L: https://netbird.io/knowledge-hub/using-xdp-ebpf-to-share-default-dns-port-between-resolvers Q: @braginini * N: NETWAYS Web Services D: NETWAYS Web Services offers Cilium to their clients as CNI option for their Managed Kubernetes clusters. U: Networking (CNI), Observability (Hubble) L: https://nws.netways.de/managed-kubernetes/ * N: New York Times (the) D: The New York Times is using Cilium on EKS to build multi-region multi-tenant shared clusters U: Networking (CNI, EKS IPAM, Maglev, kube-proxy replacement, Direct Routing), Observability (Network metrics with Hubble, policy troubleshooting) and Security (Network Policy) L: https://www.nytimes.com/, https://youtu.be/9FDpMNvPrCw Q: @abebars * N: Nexxiot D: Nexxiot is an IoT SaaS provider using Cilium as the main CNI plugin on AWS EKS clusters U: Networking (IPAM, CNI), Security (Network Policies), Visibility (hubble) L: https://nexxiot.com * N: Nine Internet Solutions AG D: Nine uses Cilium on all Nine Kubernetes Engine clusters U: CNI, network policy, kube-proxy replacement, host firewall L: https://www.nine.ch/en/kubernetes * N: Northflank D: Northflank is a PaaS and uses Cilium as the main CNI plugin across GCP, Azure, AWS and bare-metal U: Networking, network policy, hubble, packet monitoring and network visibility L: https://northflank.com Q: @NorthflankWill, @Champgoblem * N: Overstock Inc. D: Overstock is using Cilium as the main CNI plugin on bare-metal clusters (self hosted k8s). U: Networking, network policy, hubble, observability * N: Palantir Technologies Inc. D: Palantir is using Cilium as their main CNI plugin in all major cloud providers [AWS/Azure/GCP] (self hosted k8s). U: ENI networking, L3/L4 policies, FQDN based policy, FQDN filtering, IPSec Q: ungureanuvladvictor * N: Palark GmbH D: Palark uses Cilium for networking in its Kubernetes platform provided to numerous customers as a part of its DevOps as a Service offering. U: CNI, Networking, Network policy, Security, Hubble UI L: https://blog.palark.com/why-cilium-for-kubernetes-networking/ Q: @shurup * N: Parseable D: Parseable uses Tertragon for collecting and ingesting eBPF logs for Kubernetes clusters. U: Security, eBPF, Tetragon L: https://www.parseable.io/blog/ebpf-log-analytics Q: @nitisht * N: Pionative D: Pionative supplies all its clients across cloud providers with Kubernetes running Cilium to deliver the best performance out there. U: CNI, Networking, Security, eBPF L: https://www.pionative.com Q: @Pionerd * N: Plaid Inc D: Plaid is using Cilium as their CNI plugin in self-hosted Kubernetes on AWS. U: CNI, network policies L: [https://plaid.com](https://plaid.com/contact/) Q: @diversario @jandersen-plaid * N: PlanetScale D: PlanetScale is using Cilium as the CNI for its serverless database platform. U: Networking (CNI, IPAM, kube-proxy replacement, native routing), Network Security, Cluster Mesh, Load Balancing L: https://planetscale.com/ Q: @dctrwatson * N: plusserver Kubernetes Engine (PSKE) D: PSKE uses Cilium for multiple scenarios, for examples for managed Kubernetes clusters provided with Gardener Project across AWS and OpenStack. U: CNI , Overlay Network, Network Policies L: https://www.plusserver.com/en/product/managed-kubernetes/, https://github.com/gardener/gardener-extension-networking-cilium * N: Polar Signals D: Polar Signals uses Cilium as the CNI on its GKE dataplane v2 based clusters. U: Networking L: https://polarsignals.com Q: @polarsignals @brancz * N: Polverio D: Polverio KubeLift is a single-node Kubernetes distribution optimized for Azure, using Cilium as the CNI. U: CNI, IPAM L: https://polverio.com Q: @polverio @stuartpreston * N: Poseidon Laboratories D: Poseidon's Typhoon Kubernetes distro uses Cilium as the default CNI and its used internally U: Networking, policies, service load balancing L: https://github.com/poseidon/typhoon/ Q: @dghubble @typhoon8s * N: PostFinance AG D: PostFinance is using Cilium as their CNI for all mission critical, on premise k8s clusters U: Networking, network policies, kube-proxy replacement L: https://github.com/postfinance * N: Proton AG D: Proton is using Cilium as their CNI for all their Kubernetes clusters U: Networking, network policies, host firewall, kube-proxy replacement, Hubble L: https://proton.me/ Q: @j4m3s @MrFreezeex * N: Radio France D: Radio France is using Cilium in their production clusters (self-hosted k8s with kops on AWS) U: Mainly Service load-balancing Q: @francoisj * N: Rancher Labs, now part of SUSE D: Rancher Labs certified Kubernetes distribution RKE2 can be deployed with Cilium. U: Networking and network policy L: https://github.com/rancher/rke and https://github.com/rancher/rke2 * N: Rapyuta Robotics. D: Rapyuta is using cilium as their main CNI plugin. (self hosted k8s) U: CiliumNetworkPolicy, Hubble, Service Load Balancing. Q: @Gowtham * N: Rafay Systems D: Rafay's Kubernetes Operations Platform uses Cilium for centralized network visibility and network policy enforcement U: NetworkPolicy, Visibility via Prometheus metrics & Hubble L: https://rafay.co/platform/network-policy-manager/ Q: @cloudnativeboy @mohanatreya * N: Robinhood Markets D: Robinhood uses Cilium for Kubernetes overlay networking in an environment where we run tests for backend services U: CNI, Overlay networking Q: @Madhu CS * N: Santa Claus & the Elves D: All our infrastructure to process children's letters and wishes, toy making, and delivery, distributed over multiple clusters around the world, is now powered by Cilium. U: ClusterMesh, L4LB, XDP acceleration, Bandwidth manager, Encryption, Hubble L: https://qmonnet.github.io/whirl-offload/2024/01/02/santa-switches-to-cilium/ * N: SAP D: SAP uses Cilium for multiple internal scenarios. For examples for self-hosted Kubernetes scenarios on AWS with SAP Concur and for managed Kubernetes clusters provided with Gardener Project across AWS, Azure, GCP, and OpenStack. U: CNI , Overlay Network, Network Policies L: https://www.concur.com, https://gardener.cloud/, https://github.com/gardener/gardener-extension-networking-cilium Q: @dragan (SAP Concur), @docktofuture & @ScheererJ (Gardener) * N: Sapian D: Sapian uses Cilium as the default CNI in our product DialBox Cloud; DialBox cloud is an Edge Kubernetes cluster using [kilo](https://github.com/squat/kilo) for WireGuard mesh connectivity inter-nodes. Therefore, Cilium is crucial for low latency in real-time communications environments. U: CNI, Network Policies, Hubble, kube-proxy replacement L: https://sapian.com.co, https://arpagon.co/blog/k8s-edge Q: @arpagon * N: Schenker AG D: Land transportation unit of Schenker uses Cilium as default CNI in self-managed kubernetes clusters running in AWS U: CNI, Monitoring, kube-proxy replacement L: https://www.dbschenker.com/global Q: @amirkkn * N: Sealos D: Sealos is using Cilium as a consistent CNI for our Sealos Cloud. U: Networking, Service, kube-proxy replacement, Network Policy, Hubble L: https://sealos.io Q: @fanux, @yangchuansheng * N: Seznam.cz D: Seznam.cz uses Cilium in multiple scenarios in on-prem DCs. At first as L4LB which loadbalances external traffic into k8s+openstack clusters then as CNI in multiple k8s and openstack clusters which are all connected in a clustermesh to enforce NetworkPolicies across pods/VMs. U: L4LB, L3/4 CNPs+CCNPs, KPR, Hubble, HostPolicy, Direct-routing, IPv4+IPv6, ClusterMesh Q: @oblazek * N: Simple D: Simple uses cilium as default CNI in Kubernetes clusters (AWS EKS) for both development and production environments. U: CNI, Network Policies, Hubble L: https://simple.life Q: @sergeyshevch * N: Scaleway D: Scaleway uses Cilium as the default CNI for Kubernetes Kapsule U: Networking, NetworkPolicy, Services L: @jtherin @remyleone * N: Schuberg Philis D: Schuberg Philis uses Cilium as CNI for mission critical kubernetes clusters we run for our customers. U: CNI (instead of amazon-vpc-cni-k8s), DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, EKS L: https://schubergphilis.com/en Q: @stimmerman @shoekstra @mbaumann * N: SI Analytics D: SI Analytics uses Cilium as CNI in self-managed Kubernetes clusters in on-prem DCs. And also use Cilium as CNI in its GKE dataplane v2 based clusters. U: CNI, Network Policies, Hubble L: https://si-analytics.ai, https://ovision.ai Q: @jholee * N: SIGHUP D: SIGHUP integrated Cilium as a supported CNI for KFD (Kubernetes Fury Distribution), our enterprise-grade OSS reference architecture U: Available supported CNI L: https://sighup.io, https://github.com/sighupio/fury-kubernetes-networking Q: @jnardiello @nutellino * N: SmileDirectClub D: SmileDirectClub is using Cilium in manufacturing clusters (self-hosted on vSphere and AWS EC2) U: CNI Q: @joey, @onur.gokkocabas * N: Snapp D: Snapp is using Cilium in production for its on premise openshift clusters U: CNI, Network Policies, Hubble Q: @m-yosefpor * N: Solo.io D: Cilium is part of Gloo Application Networking platform, with a “batteries included but swappable” manner U: CNI, Network Policies Q: @linsun * N: S&P Global D: S&P Global uses Cilium as their multi-cloud CNI U: CNI L: https://www.youtube.com/watch?v=6CZ_SSTqb4g * N: Spherity D: Spherity is using Cilium on AWS EKS U: CNI/ENI Networking, Network policies, Hubble Q: @solidnerd * N: Sportradar D: Sportradar is using Cilium as their main CNI plugin in AWS (using kops) U: L3/L4 policies, Hubble, BPF NodePort, CiliumClusterwideNetworkPolicy Q: @Eric Bailey, @Ole Markus * N: Sproutfi D: Sproutfi uses Cilium as the CNI on its GKE based clusters U: Service Load Balancing, Hubble, Datadog Integration for Prometheus metrics Q: @edude03 * N: SuperOrbital D: As a Kubernetes-focused consulting firm, we have implemented Cilium on customer engagements U: CNI, CiliumNetworkPolicy at L7, Hubble L: https://superorbital.io/ Q: @jmcshane * N: Talos D: Cilium is one of the supported CNI's in Talos U: Networking, NetworkPolicy, Hubble, BPF NodePort L: https://github.com/talos-systems/talos Q: @frezbo, @smira, @Ulexus * N: Tencent Cloud D: Tencent Cloud container team designed the TKE hybrid cloud container network solution with Cilium as the cluster network base U: Networking, CNI L: https://segmentfault.com/a/1190000040298428/en * N: teuto.net Netzdienste GmbH D: teuto.net is using cilium for their managed k8s service, t8s U: CNI, CiliumNetworkPolicy, Hubble, Encryption, ... L: https://teuto.net/managed-kubernetes Q: @cwrau * N: Trendyol D: Trendyol.com has recently implemented Cilium as the default CNI for its production Kubernetes clusters starting from version 1.26. U: Networking, kube-proxy replacement, eBPF, Network Visibility with Hubble and Grafana, Local Redirect Policy L: https://t.ly/FDCZK * N: T-Systems International D: TSI uses Cilium for it's Open Sovereign Cloud product, including as a CNI for Gardener-based Kubernetes clusters and bare-metal infrastructure managed by OnMetal. U: CNI, overlay network, NetworkPolicies Q: @ManuStoessel * N: uSwitch D: uSwitch is using Cilium in AWS for all their production clusters (self hosted k8s) U: ClusterMesh, CNI-Chaining (with amazon-vpc-cni-k8s) Q: @jirving * N: United Cloud D: United Cloud is using Cilium for all non-production and production clusters (on-premises) U: CNI, Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, ClusterMesh, Encryption L: https://united.cloud Q: @boris * N: Utmost Software, Inc D: Utmost is using Cilium in all tiers of its Kubernetes ecosystem to implement zero trust U: CNI, DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy L: https://blog.utmost.co/zero-trust-security-at-utmost Q: @andrewholt * N: Trip.com D: Trip.com is using Cilium in their production clusters (self-hosted k8s, On-premises and AWS) U: ENI Networking, Service load-balancing, Direct routing (via Bird) L: https://ctripcloud.github.io/cilium/network/2020/01/19/trip-first-step-towards-cloud-native-networking.html Q: @ArthurChiao * N: Tailor Brands D: Tailor Brands is using Cilium in their production, staging, and development clusters (AWS EKS) U: CNI (instead of amazon-vpc-cni-k8s), Hubble, Datadog Integration for Prometheus metrics Q: @liorrozen * N: Twilio D: Twilio Segment is using Cilium across their k8s-based compute platform U: CNI, EKS direct routing, kube-proxy replacement, Hubble, CiliumNetworkPolicies Q: @msaah * N: ungleich D: ungleich is using Cilium as part of IPv6-only Kubernetes deployments. U: CNI, IPv6 only networking, BGP, eBPF Q: @Nico Schottelius, @nico:ungleich.ch (Matrix) * N: Veepee D: Veepee is using Cilium on their on-premise Kubernetes clusters, hosting majority of their applications. U. CNI, BGP, eBPF, Hubble, DirectRouting (via kube-router) Q: @nerzhul * N: Wildlife Studios D: Wildlife Studios is using Cilium in AWS for all their game production clusters (self hosted k8s) U: ClusterMesh, Global Service Load Balancing. Q: @Oki @luanguimaraesla @rsafonseca * N: Yahoo! D: Yahoo is using Cilium for L4 North-South Load Balancing for Kubernetes Services L: https://www.youtube.com/watch?v=-C86fBMcp5Q * N: ZeroHash D: Zero Hash is using Cilium as CNI for networking, security and monitoring features for Kubernetes clusters U: CNI/ENI Networking, Network policies, Hubble Q: @eugenestarchenko