Sharing experiences and learning from other users is essential. We are frequently asked who is using a particular feature of Cilium so people can get in contact with other users to share experiences and best practices. People also often want to know if product/platform X has integrated Cilium. While the Cilium Slack community allows users to get in touch, it can be challenging to find this information quickly.
The following is a directory of adopters to help identify users of individual features. The users themselves directly maintain the list.
If you are using Cilium or it is integrated into your product, service, or platform, please consider adding yourself as a user with a quick description of your use case by opening a pull request to this file and adding a section describing your usage of Cilium. If you are open to others contacting you about your use of Cilium on Slack, add your Slack nickname as well.
N: Name of user (company)
D: Description
U: Usage of features
L: Link with further information (optional)
Q: Contacts available for questions (optional)
Example entry:
* N: Cilium Example User Inc.
D: Cilium Example User Inc. is using Cilium for scientific purposes
U: ENI networking, DNS policies, ClusterMesh
Q: @slacknick1, @slacknick2
- You must represent the user listed. Do NOT add entries on behalf of other users.
- There is no minimum deployment size but we request to list permanent production deployments only, i.e., no demo or trial deployments. Commercial use is not required. A well-done home lab setup can be equally interesting as a large-scale commercial deployment.
* N: Ænix
D: Ænix uses Cilium in free PaaS platform [Cozystack](https://cozystack.io) for running containers, virtual machines and Kubernetes-as-a-Service.
U: Networking, NetworkPolicy, kube-proxy replacement, CNI-Chaining (with kube-ovn)
L: https://cozystack.io/
Q: @kvaps
* N: AccuKnox
D: AccuKnox uses Cilium for network visibility and network policy enforcement.
U: L3/L4/L7 policy enforcement using Identity, External/VM Workloads, Network Visibility using Hubble
L: https://www.accuknox.com/spifee-identity-for-cilium-presentation-at-kubecon-2021, https://www.accuknox.com/cilium
Q: @nyrahul
* N: Acoss
D: Acoss is using cilium as their main CNI plugin (self hosted k8s, On-premises)
U: CiliumNetworkPolicy, Hubble, BPF NodePort, Direct routing
L: @JrCs
* N: Adobe, Inc.
D: Adobe's Project Ethos uses Cilium for multi-tenant, multi-cloud clusters
U: L3/L4/L7 policies
L: https://youtu.be/39FLsSc2P-Y
* N: AirQo
D: AirQo uses Cilium as the CNI plugin
U: CNI, Networking, NetworkPolicy, Cluster Mesh, Hubble, Kubernetes services
L: @airqo-platform
* N: Alibaba Cloud
D: Alibaba Cloud is using Cilium together with Terway CNI as the high-performance ENI dataplane
U: Networking, NetworkPolicy, Services, IPVLAN
L: https://www.alibabacloud.com/blog/how-does-alibaba-cloud-build-high-performance-cloud-native-pod-networks-in-production-environments_596590
* N: Amazon Web Services (AWS)
D: AWS uses Cilium as the default CNI for EKS Anywhere
U: Networking, NetworkPolicy, Services
L: https://isovalent.com/blog/post/2021-09-aws-eks-anywhere-chooses-cilium
* N: APPUiO by VSHN
D: VSHN uses Cilium for multi-tenant networking on APPUiO Cloud and as an add-on to APPUiO Managed, both on Red Hat OpenShift and Cloud Kubernetes.
U: CNI, Networking, NetworkPolicy, Hubble, IPAM, Kubernetes services
L: https://products.docs.vshn.ch/products/appuio/managed/addon_cilium.html and https://www.appuio.cloud
* N: ArangoDB Oasis
D: ArangoDB Oasis is using Cilium in to separate database deployments in our multi-tenant cloud environment
U: Networking, CiliumNetworkPolicy(cluster & local), Hubble, IPAM
L: https://cloud.arangodb.com
Q: @ewoutp @Robert-Stam
* N: Archer Aviation
D: Archer Aviation uses Cilium as part of the foundation of the Kubernetes cluster.
U: Networking, Observability, Security
L: https://www.archer.com
Q: @Hongbo Miao
* N: Ascend.io
D: Ascend.io is using Cilium as a consistent CNI for our Data Automation Platform on GKE, EKS, and AKS.
U: Transparent Encryption, Overlay Networking, Cluster Mesh, Egress Gateway, Network Policy, Hubble
L: https://www.ascend.io/
Q: @Joe Stevens
* N: Ayedo
D: Ayedo builds and operates cloud-native container platforms based on Kubernetes
U: Hubble for Visibility, Cilium as Mesh between Services
L: https://www.ayedo.de/
* N: Back Market
D: Back Market is using Cilium as CNI in all their clusters and environments (kOps + EKS in AWS)
U: CNI, Network Policies, Transparent Encryption (WG), Hubble
Q: @nitrikx
L: https://www.backmarket.com/
* N: Berops
D: Cilium is used as a CNI plug-in in our open-source multi-cloud and hybrid-cloud Kubernetes platform - Claudie
U: CNI, Network Policies, Hubble
Q: @Bernard Halas
L: https://github.com/berops/claudie
* N: Bitnami
D: Cilium is part of the largest open-source application catalog.
U: CNI, Hubble, BGP, eBPF, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy
L: https://bitnami.com/stack/cilium
Q: @carrodher
* N: ByteDance
D: ByteDance is using Cilium as CNI plug-in for self-hosted Kubernetes.
U: CNI, Networking
L: @Jiang Wang
* N: Canonical
D: Canonical's Kubernetes distribution microk8s uses Cilium as CNI plugin
U: Networking, NetworkPolicy, and Kubernetes services
L: https://microk8s.io/
* N: Capital One
D: Capital One uses Cilium as its standard CNI for all Kubernetes environments
U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, Hubble, network visibility
L: https://www.youtube.com/watch?v=hwOpCKBaJ-w
* N: CENGN - Centre of Excellence in Next Generation Networks
D: CENGN is using Cilium in multiple clusters including production and development clusters (self-hosted k8s, On-premises)
U: L3/L4/L7 network policies, Monitoring via Prometheus metrics & Hubble
L: https://www.youtube.com/watch?v=yXm7yZE2rk4
Q: @rmaika @mohahmed13
* N: Cistec
D: Cistec is a clinical information system provider and uses Cilium as the CNI plugin.
U: Networking and network policy
L: https://www.cistec.com/
* N: Civo
D: Civo is offering Cilium as the CNI option for Civo users to choose it for their Civo Kubernetes clusters.
U: Networking and network policy
L: https://www.civo.com/kubernetes
* N: ClickHouse
D: ClickHouse uses Cilium as CNI for AWS Kubernetes environments
U: CiliumNetworkPolicy, Hubble, ClusterMesh
L: https://clickhouse.com
* N: Cognite
D: Cognite is an industrial DataOps provider and uses Cilium as the CNI plugin
Q: @Robert Collins
* N: CONNY
D: CONNY is legaltech platform to improve access to justice for individuals
U: Networking, NetworkPolicy, Services
Q: @ant31
L: https://conny.de
* N: Cosmonic
D: Cilium is the CNI for Cosmonic's Nomad based PaaS
U: Networking, NetworkPolicy, Transparent Encryption
L: https://cilium.io/blog/2023/01/18/cosmonic-user-story/
* N: Crane
D: Crane uses Cilium as the default CNI
U: Networking, NetworkPolicy, Services
L: https://github.com/slzcc/crane
Q: @slzcc
* N: Cybozu
D: Cybozu deploys Cilium to on-prem Kubernetes Cluster and uses it with Coil by CNI chaining.
U: CNI Chaining, L4 LoadBalancer, NetworkPolicy, Hubble
L: https://cybozu-global.com/
* N: Daimler Truck AG
D: The CSG RuntimeDepartment of DaimlerTruck is maintaining an AKS k8s cluster as a shared resource for DevOps crews and is using Cilium as the default CNI (BYOCNI).
U: Networking, NetworkPolicy and Monitoring
L: https://daimlertruck.com
Q: @brandshaide
* N: DaoCloud - spiderpool & merbridge
D: spiderpool is using Cilium as their main CNI plugin for overlay and merbridge is using Cilium eBPF library to speed up your Service Mesh
U: CNI, Service load-balancing, cluster mesh
L: https://github.com/spidernet-io/spiderpool, https://github.com/merbridge/merbridge
Q: @weizhoublue, @kebe7jun
* N: Datadog
D: Datadog is using Cilium in AWS (self-hosted k8s)
U: ENI Networking, Service load-balancing, Encryption, Network Policies, Hubble
Q: @lbernail, @roboll, @mvisonneau
* N: Dcode.tech
D: We specialize in AWS and Kubernetes, and actively implement Cilium at our clients.
U: CNI, CiliumNetworkPolicy, Hubble UI
L: https://dcode.tech/
Q: @eliranw, @maordavidov
* N: Deckhouse
D: Deckhouse Kubernetes Platform is using Cilium as a one of the supported CNIs.
U: Networking, Security, Hubble UI for network visibility
L: https://github.com/deckhouse/deckhouse
* N: Deezer
D: Deezer is using Cilium as CNI for all our on-prem clusters for its performance and security. We plan to leverage BGP features as well soon
U: CNI, Hubble, kube-proxy replacement, eBPF
L: https://github.com/deezer
* N: DigitalOcean
D: DigitalOcean is using Cilium as the CNI for Digital Ocean's managed Kubernetes Services (DOKS)
U: Networking and network policy
L: https://github.com/digitalocean/DOKS
* N: Edgeless Systems
D: Edgeless Systems is using Cilium as the CNI for Edgeless System's Confidential Kubernetes Distribution (Constellation)
U: Networking (CNI), Transparent Encryption (WG),
L: https://docs.edgeless.systems/constellation/architecture/networking
Q: @m1ghtym0
* N: Eficode
D: As a cloud-native and devops consulting firm, we have implemented Cilium on customer engagements
U: CNI, CiliumNetworkPolicy at L7, Hubble
L: https://eficode.com/
Q: @Andy Allred
* N: Elastic Path
D: Elastic Path is using Cilium in their CloudOps for Kubernetes production clusters
U: CNI
L: https://documentation.elasticpath.com/cloudops-kubernetes/docs/index.html
Q: @Neil Seward
* N: Equinix
D: Equinix Metal is using Cilium for production and non-production environments on bare metal
U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, BGP advertisements, Hubble, network visibility
L: https://metal.equinix.com/
Q: @matoszz
* N: Equinix
D: Equinix NL Managed Services is using Cilium with their Managed Kubernetes offering
U: CNI, network policies, visibility
L: https://www.equinix.nl/products/support-services/managed-services/netherlands
Q: @jonkerj
* N: Exoscale
D: Exoscale is offering Cilium as a CNI option on its managed Kubernetes service named SKS (Scalable Kubernetes Service)
U: CNI, Networking
L: https://www.exoscale.com/sks/
Q: @Antoine
* N: finleap connect
D: finleap connect is using Cilium in their production clusters (self-hosted, bare-metal, private cloud)
U: CNI, NetworkPolicies
Q: @chue
* N: Form3
D: Form3 is using Cilium in their production clusters (self-hosted, bare-metal, private cloud)
U: Service load-balancing, Encryption, CNI, NetworkPolicies
Q: @kevholditch-f3, samo-f3, ewilde-form3
* N: FRSCA - Factory for Repeatable Secure Creation of Artifacts
D: FRSCA is utilizing tetragon integrated with Tekton to create runtime attestation to attest artifact and builder attributes
U: Runtime observability
L: https://github.com/buildsec/frsca
Q: @Parth Patel
* N: F5 Inc
D: F5 helps customers with Cilium VXLAN tunnel integration with BIG-IP
U: Networking
L: https://github.com/f5devcentral/f5-ci-docs/blob/master/docs/cilium/cilium-bigip-info.rst
Q: @vincentmli
* N: Gcore
D: Gcore supports Cilium as CNI provider for Gcore Managed Kubernetes Service
U: CNI, Networking, NetworkPolicy, Kubernetes Services
L: https://gcore.com/news/cilium-cni-support
Q: @rzdebskiy
* N: Giant Swarm
D: Giant Swarm is using Cilium in their Cluster API based managed Kubernetes service (AWS, Azure, GCP, OpenStack, VMware Cloud Director and VMware vSphere) as CNI
U: Networking
L: https://www.giantswarm.io/
* N: GitLab
D: GitLab is using Cilium to implement network policies inside Auto DevOps deployed clusters for customers using k8s
U: Network policies
L: https://docs.gitlab.com/ee/user/clusters/applications.html#install-cilium-using-gitlab-ci
Q: @ap4y @whaber
* N: Google
D: Google is using Cilium in Anthos and Google Kubernetes Engine (GKE) as Dataplane V2
U: Networking, network policy, and network visibility
L: https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine
* N: G DATA CyberDefense AG
D: G DATA CyberDefense AG is using Cilium on our managed on premise clusters.
U: Networking, network policy, security, and network visibility
L: https://gdatasoftware.com
Q: @farodin91
* N: IDNIC | Kadabra
D: IDNIC is the National Internet Registry administering IP addresses for INDONESIA, uses Cilium to powered Kadabra project runing services across multi data centers.
U: Networking, Network Policies, kube-proxy Replacement, Service Load Balancing and Cluster Mesh
L: https://ris.idnic.net/
Q: @ardikabs
* N: IKEA IT AB
D: IKEA IT AB is using Cilium for production and non-production environments (self-hosted, bare-metal, private cloud)
U: Networking, CiliumclusterWideNetworkPolicy, CiliumNetworkPolicy, kube-proxy replacement, Hubble, Direct routing, egress gateway, hubble-otel, Multi Nic XDP, BGP advertisements, Bandwidth Manager, Service Load Balancing, Cluster Mesh
L: https://www.ingka.com/
* N: Immerok
D: Immerok uses Cilium for cross-cluster communication and network isolation; Immerok Cloud is a serverless platform for the full power of [Apache Flink](https://flink.apache.org) at any scale.
U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, CNI
L: https://immerok.io
Q: @austince, @dmvk
* N: Infomaniak
D: Infomaniak is using Cilium in their production clusters (self-hosted, bare-metal and openstack)
U: Networking, CiliumNetworkPolicy, BPF NodePort, Direct routing, kube-proxy replacement
L: https://www.infomaniak.com/en
Q: @reneluria
* N: innoQ Schweiz GmbH
D: As a consulting company we added Cilium to a couple of our customers infrastructure
U: Networking, CiliumNetworkPolicy at L7, kube-proxy replacement, encryption
L: https://www.cloud-migration.ch/
Q: @fakod
* N: Isovalent
D: Cilium is the platform that powers Isovalent’s enterprise networking, observability, and security solutions
U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, egress gateway, service load balancing, CNI
L: https://isovalent.com/product/
Q: @BillMulligan
* N: JUMO
D: JUMO is using Cilium as their CNI plugin for all of their AWS-hosted EKS clusters
U: Networking, network policy, network visibility, cluster mesh
Q: @Matthieu ANTOINE, @Carlos Castro, @Joao Coutinho (Slack)
* N: Keploy
D: Keploy is using the Cilium to capture the network traffic to perform E2E Testing.
U: Networking, network policy, Monitoring, E2E Testing
L: https://keploy.io/
* N: Kilo
D: Cilium is a supported CNI for Kilo. When used together, Cilium + Kilo create a full mesh via WireGuard for Kubernetes in edge environments.
U: CNI, Networking, Hubble, kube-proxy replacement, network policy
L: https://kilo.squat.ai/
Q: @squat, @arpagon
* N: kOps
D: kOps is using Cilium as one of the supported CNIs
U: Networking, Hubble, Encryption, kube-proxy replacement
L: kops.sigs.k8s.io/
Q: @olemarkus
* N: Kryptos Logic
D: Kryptos is a cyber security company that is using Kubernetes on-prem in which Cilium is our CNI of choice.
U: Networking, Observability, kube-proxy replacement
* N: kubeasz
D: kubeasz, a certified kubernetes installer, is using Cilium as a one of the supported CNIs.
U: Networking, network policy, Hubble for network visibility
L: https://github.com/easzlab/kubeasz
* N: Kube-OVN
D: Kube-OVN uses Cilium to enhance service performance, security and monitoring.
U: CNI-Chaining, Hubble, kube-proxy replacement
L: https://github.com/kubeovn/kube-ovn/blob/master/docs/IntegrateCiliumIntoKubeOVN.md
Q: @oilbeater
* N: Kube-Hetzner
D: Kube-Hetzner is a open-source Terraform project that uses Cilium as an possible CNI in its cluster deployment on Hetzner Cloud.
U: Networking, Hubble, kube-proxy replacement
L: https://github.com/kube-hetzner/terraform-hcloud-kube-hetzner#cni
Q: @MysticalTech
* N: Kubermatic
D: Kubermatic Kubernetes Platform is using Cilium as a one of the supported CNIs.
U: Networking, network policy, Hubble for network visibility
L: https://github.com/kubermatic/kubermatic
* N: KubeSphere - KubeKey
D: KubeKey is an open-source lightweight tool for deploying Kubernetes clusters and addons efficiently. It uses Cilium as one of the supported CNIs.
U: Networking, Security, Hubble UI for network visibility
L: https://github.com/kubesphere/kubekey
Q: @FeynmanZhou
* N: K8e - Simple Kubernetes Distribution
D: Kubernetes Easy (k8e) is a lightweight, Extensible, Enterprise Kubernetes distribution. It uses Cilium as default CNI network.
U: Networking, network policy, Hubble for network visibility
L: https://github.com/xiaods/k8e
Q: @xds2000
* N: LinkPool
D: LinkPool is a professional Web3 infrastructure provider.
U: LinkPool is using Cilium as the CNI for its on-premise production clusters
L: https://linkpool.com
Q: @jleeh
* N: Liquid Reply
D: Liquid Reply is a professional service provider and utilizes Cilium on suitable projects and implementations.
U: Networking, network policy, Hubble for network visibility, Security
L: http://liquidreply.com
Q: @mkorbi
* N: Magic Leap
D: Magic Leap is using Hubble plugged to GKE Dataplane v2 clusters
U: Hubble
Q: @romachalm
* N: Melenion Inc
D: Melenion is using Cilium as the CNI for its on-premise production clusters
U: Service Load Balancing, Hubble
Q: @edude03
* N: Meltwater
D: Meltwater is using Cilium in AWS on self-hosted multi-tenant k8s clusters as the CNI plugin
U: ENI Networking, Encryption, Monitoring via Prometheus metrics & Hubble
Q: @recollir, @dezmodue
* N: Microsoft
D: Microsoft is using Cilium in "Azure CNI powered by Cilium" AKS (Azure Kubernetes Services) clusters
L: https://techcommunity.microsoft.com/t5/azure-networking-blog/azure-cni-powered-by-cilium-for-azure-kubernetes-service-aks/ba-p/3662341
Q: @tamilmani1989 @chandanAggarwal
* N: Mobilab
D: Mobilab uses Cilium as the CNI for its internal cloud
U: CNI
L: https://mobilabsolutions.com/2019/01/why-we-switched-to-cilium/
* N: MyFitnessPal
D: MyFitnessPal trusts Cilium with high volume user traffic in AWS on self-hosted k8s clusters as the CNI plugin and in GKE with Dataplane V2
U: Networking (CNI, Maglev, kube-proxy replacement, local redirect policy), Observability (Network metrics with Hubble, DNS proxy, service maps, policy troubleshooting) and Security (Network Policy)
L: https://www.myfitnesspal.com
* N: Mux, Inc.
D: Mux deploys Cilium on self-hosted k8s clusters (Cluster API) in GCP and AWS to run its video streaming/analytics platforms.
U: Pod networking (CNI, IPAM, Host-reachable Services), Hubble, Cluster-mesh. TBD: Network Policy, Transparent Encryption (WG), Host Firewall.
L: https://mux.com
Q: @dilyevsky
* N: NetBird
D: NetBird uses Cilium to compile BPF to Go for cross-platform DNS management and NAT traversal
U: bpf2go to compile a C source file into eBPF bytecode and then to Go
L: https://netbird.io/knowledge-hub/using-xdp-ebpf-to-share-default-dns-port-between-resolvers
Q: @braginini
* N: NETWAYS Web Services
D: NETWAYS Web Services offers Cilium to their clients as CNI option for their Managed Kubernetes clusters.
U: Networking (CNI), Observability (Hubble)
L: https://nws.netways.de/managed-kubernetes/
* N: New York Times (the)
D: The New York Times is using Cilium on EKS to build multi-region multi-tenant shared clusters
U: Networking (CNI, EKS IPAM, Maglev, kube-proxy replacement, Direct Routing), Observability (Network metrics with Hubble, policy troubleshooting) and Security (Network Policy)
L: https://www.nytimes.com/, https://youtu.be/9FDpMNvPrCw
Q: @abebars
* N: Nexxiot
D: Nexxiot is an IoT SaaS provider using Cilium as the main CNI plugin on AWS EKS clusters
U: Networking (IPAM, CNI), Security (Network Policies), Visibility (hubble)
L: https://nexxiot.com
* N: Nine Internet Solutions AG
D: Nine uses Cilium on all Nine Kubernetes Engine clusters
U: CNI, network policy, kube-proxy replacement, host firewall
L: https://www.nine.ch/en/kubernetes
* N: Northflank
D: Northflank is a PaaS and uses Cilium as the main CNI plugin across GCP, Azure, AWS and bare-metal
U: Networking, network policy, hubble, packet monitoring and network visibility
L: https://northflank.com
Q: @NorthflankWill, @Champgoblem
* N: Overstock Inc.
D: Overstock is using Cilium as the main CNI plugin on bare-metal clusters (self hosted k8s).
U: Networking, network policy, hubble, observability
* N: Palantir Technologies Inc.
D: Palantir is using Cilium as their main CNI plugin in all major cloud providers [AWS/Azure/GCP] (self hosted k8s).
U: ENI networking, L3/L4 policies, FQDN based policy, FQDN filtering, IPSec
Q: ungureanuvladvictor
* N: Palark GmbH
D: Palark uses Cilium for networking in its Kubernetes platform provided to numerous customers as a part of its DevOps as a Service offering.
U: CNI, Networking, Network policy, Security, Hubble UI
L: https://blog.palark.com/why-cilium-for-kubernetes-networking/
Q: @shurup
* N: Parseable
D: Parseable uses Tertragon for collecting and ingesting eBPF logs for Kubernetes clusters.
U: Security, eBPF, Tetragon
L: https://www.parseable.io/blog/ebpf-log-analytics
Q: @nitisht
* N: Pionative
D: Pionative supplies all its clients across cloud providers with
Kubernetes running Cilium to deliver the best performance out there.
U: CNI, Networking, Security, eBPF
L: https://www.pionative.com
Q: @Pionerd
* N: Plaid Inc
D: Plaid is using Cilium as their CNI plugin in self-hosted Kubernetes on AWS.
U: CNI, network policies
L: [https://plaid.com](https://plaid.com/contact/)
Q: @diversario @jandersen-plaid
* N: PlanetScale
D: PlanetScale is using Cilium as the CNI for its serverless database platform.
U: Networking (CNI, IPAM, kube-proxy replacement, native routing), Network Security, Cluster Mesh, Load Balancing
L: https://planetscale.com/
Q: @dctrwatson
* N: plusserver Kubernetes Engine (PSKE)
D: PSKE uses Cilium for multiple scenarios, for examples for managed Kubernetes clusters provided with Gardener Project across AWS and OpenStack.
U: CNI , Overlay Network, Network Policies
L: https://www.plusserver.com/en/product/managed-kubernetes/, https://github.com/gardener/gardener-extension-networking-cilium
* N: Polar Signals
D: Polar Signals uses Cilium as the CNI on its GKE dataplane v2 based clusters.
U: Networking
L: https://polarsignals.com
Q: @polarsignals @brancz
* N: Polverio
D: Polverio KubeLift is a single-node Kubernetes distribution optimized for Azure, using Cilium as the CNI.
U: CNI, IPAM
L: https://polverio.com
Q: @polverio @stuartpreston
* N: Poseidon Laboratories
D: Poseidon's Typhoon Kubernetes distro uses Cilium as the default CNI and its used internally
U: Networking, policies, service load balancing
L: https://github.com/poseidon/typhoon/
Q: @dghubble @typhoon8s
* N: PostFinance AG
D: PostFinance is using Cilium as their CNI for all mission critical, on premise k8s clusters
U: Networking, network policies, kube-proxy replacement
L: https://github.com/postfinance
* N: Proton AG
D: Proton is using Cilium as their CNI for all their Kubernetes clusters
U: Networking, network policies, host firewall, kube-proxy replacement, Hubble
L: https://proton.me/
Q: @j4m3s @MrFreezeex
* N: Radio France
D: Radio France is using Cilium in their production clusters (self-hosted k8s with kops on AWS)
U: Mainly Service load-balancing
Q: @francoisj
* N: Rancher Labs, now part of SUSE
D: Rancher Labs certified Kubernetes distribution RKE2 can be deployed with Cilium.
U: Networking and network policy
L: https://github.com/rancher/rke and https://github.com/rancher/rke2
* N: Rapyuta Robotics.
D: Rapyuta is using cilium as their main CNI plugin. (self hosted k8s)
U: CiliumNetworkPolicy, Hubble, Service Load Balancing.
Q: @Gowtham
* N: Rafay Systems
D: Rafay's Kubernetes Operations Platform uses Cilium for centralized network visibility and network policy enforcement
U: NetworkPolicy, Visibility via Prometheus metrics & Hubble
L: https://rafay.co/platform/network-policy-manager/
Q: @cloudnativeboy @mohanatreya
* N: Robinhood Markets
D: Robinhood uses Cilium for Kubernetes overlay networking in an environment where we run tests for backend services
U: CNI, Overlay networking
Q: @Madhu CS
* N: Santa Claus & the Elves
D: All our infrastructure to process children's letters and wishes, toy making, and delivery, distributed over multiple clusters around the world, is now powered by Cilium.
U: ClusterMesh, L4LB, XDP acceleration, Bandwidth manager, Encryption, Hubble
L: https://qmonnet.github.io/whirl-offload/2024/01/02/santa-switches-to-cilium/
* N: SAP
D: SAP uses Cilium for multiple internal scenarios. For examples for self-hosted Kubernetes scenarios on AWS with SAP Concur and for managed Kubernetes clusters provided with Gardener Project across AWS, Azure, GCP, and OpenStack.
U: CNI , Overlay Network, Network Policies
L: https://www.concur.com, https://gardener.cloud/, https://github.com/gardener/gardener-extension-networking-cilium
Q: @dragan (SAP Concur), @docktofuture & @ScheererJ (Gardener)
* N: Sapian
D: Sapian uses Cilium as the default CNI in our product DialBox Cloud; DialBox cloud is an Edge Kubernetes cluster using [kilo](https://github.com/squat/kilo) for WireGuard mesh connectivity inter-nodes. Therefore, Cilium is crucial for low latency in real-time communications environments.
U: CNI, Network Policies, Hubble, kube-proxy replacement
L: https://sapian.com.co, https://arpagon.co/blog/k8s-edge
Q: @arpagon
* N: Schenker AG
D: Land transportation unit of Schenker uses Cilium as default CNI in self-managed kubernetes clusters running in AWS
U: CNI, Monitoring, kube-proxy replacement
L: https://www.dbschenker.com/global
Q: @amirkkn
* N: Sealos
D: Sealos is using Cilium as a consistent CNI for our Sealos Cloud.
U: Networking, Service, kube-proxy replacement, Network Policy, Hubble
L: https://sealos.io
Q: @fanux, @yangchuansheng
* N: Seznam.cz
D: Seznam.cz uses Cilium in multiple scenarios in on-prem DCs. At first as L4LB which loadbalances external traffic into k8s+openstack clusters then as CNI in multiple k8s and openstack clusters which are all connected in a clustermesh to enforce NetworkPolicies across pods/VMs.
U: L4LB, L3/4 CNPs+CCNPs, KPR, Hubble, HostPolicy, Direct-routing, IPv4+IPv6, ClusterMesh
Q: @oblazek
* N: Simple
D: Simple uses cilium as default CNI in Kubernetes clusters (AWS EKS) for both development and production environments.
U: CNI, Network Policies, Hubble
L: https://simple.life
Q: @sergeyshevch
* N: Scaleway
D: Scaleway uses Cilium as the default CNI for Kubernetes Kapsule
U: Networking, NetworkPolicy, Services
L: @jtherin @remyleone
* N: Schuberg Philis
D: Schuberg Philis uses Cilium as CNI for mission critical kubernetes clusters we run for our customers.
U: CNI (instead of amazon-vpc-cni-k8s), DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, EKS
L: https://schubergphilis.com/en
Q: @stimmerman @shoekstra @mbaumann
* N: SI Analytics
D: SI Analytics uses Cilium as CNI in self-managed Kubernetes clusters in on-prem DCs. And also use Cilium as CNI in its GKE dataplane v2 based clusters.
U: CNI, Network Policies, Hubble
L: https://si-analytics.ai, https://ovision.ai
Q: @jholee
* N: SIGHUP
D: SIGHUP integrated Cilium as a supported CNI for KFD (Kubernetes Fury Distribution), our enterprise-grade OSS reference architecture
U: Available supported CNI
L: https://sighup.io, https://github.com/sighupio/fury-kubernetes-networking
Q: @jnardiello @nutellino
* N: SmileDirectClub
D: SmileDirectClub is using Cilium in manufacturing clusters (self-hosted on vSphere and AWS EC2)
U: CNI
Q: @joey, @onur.gokkocabas
* N: Snapp
D: Snapp is using Cilium in production for its on premise openshift clusters
U: CNI, Network Policies, Hubble
Q: @m-yosefpor
* N: Solo.io
D: Cilium is part of Gloo Application Networking platform, with a “batteries included but swappable” manner
U: CNI, Network Policies
Q: @linsun
* N: S&P Global
D: S&P Global uses Cilium as their multi-cloud CNI
U: CNI
L: https://www.youtube.com/watch?v=6CZ_SSTqb4g
* N: Spectro Cloud
D: Spectro Cloud uses & promotes Cilium for clusters its K8S management platform (Palette) deploys
U: CNI, Overlay network, kube-proxy replacement
Q: @Kevin Reeuwijk
* N: Spherity
D: Spherity is using Cilium on AWS EKS
U: CNI/ENI Networking, Network policies, Hubble
Q: @solidnerd
* N: Sportradar
D: Sportradar is using Cilium as their main CNI plugin in AWS (using kops)
U: L3/L4 policies, Hubble, BPF NodePort, CiliumClusterwideNetworkPolicy
Q: @Eric Bailey, @Ole Markus
* N: Sproutfi
D: Sproutfi uses Cilium as the CNI on its GKE based clusters
U: Service Load Balancing, Hubble, Datadog Integration for Prometheus metrics
Q: @edude03
* N: SuperOrbital
D: As a Kubernetes-focused consulting firm, we have implemented Cilium on customer engagements
U: CNI, CiliumNetworkPolicy at L7, Hubble
L: https://superorbital.io/
Q: @jmcshane
* N: Syself
D: Syself uses Cilium as the CNI for Syself Autopilot, a managed Kubernetes platform
U: CNI, HostFirewall, Monitoring, CiliumClusterwideNetworkPolicy, Hubble
L: https://syself.com
Q: @sbaete
* N: Talos
D: Cilium is one of the supported CNI's in Talos
U: Networking, NetworkPolicy, Hubble, BPF NodePort
L: https://github.com/talos-systems/talos
Q: @frezbo, @smira, @Ulexus
* N: Tencent Cloud
D: Tencent Cloud container team designed the TKE hybrid cloud container network solution with Cilium as the cluster network base
U: Networking, CNI
L: https://segmentfault.com/a/1190000040298428/en
* N: teuto.net Netzdienste GmbH
D: teuto.net is using cilium for their managed k8s service, t8s
U: CNI, CiliumNetworkPolicy, Hubble, Encryption, ...
L: https://teuto.net/managed-kubernetes
Q: @cwrau
* N: Trendyol
D: Trendyol.com has recently implemented Cilium as the default CNI for its production Kubernetes clusters starting from version 1.26.
U: Networking, kube-proxy replacement, eBPF, Network Visibility with Hubble and Grafana, Local Redirect Policy
L: https://t.ly/FDCZK
* N: T-Systems International
D: TSI uses Cilium for it's Open Sovereign Cloud product, including as a CNI for Gardener-based Kubernetes clusters and bare-metal infrastructure managed by OnMetal.
U: CNI, overlay network, NetworkPolicies
Q: @ManuStoessel
* N: uSwitch
D: uSwitch is using Cilium in AWS for all their production clusters (self hosted k8s)
U: ClusterMesh, CNI-Chaining (with amazon-vpc-cni-k8s)
Q: @jirving
* N: United Cloud
D: United Cloud is using Cilium for all non-production and production clusters (on-premises)
U: CNI, Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, ClusterMesh, Encryption
L: https://united.cloud
Q: @boris
* N: Utmost Software, Inc
D: Utmost is using Cilium in all tiers of its Kubernetes ecosystem to implement zero trust
U: CNI, DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy
L: https://blog.utmost.co/zero-trust-security-at-utmost
Q: @andrewholt
* N: Trip.com
D: Trip.com is using Cilium in their production clusters (self-hosted k8s, On-premises and AWS)
U: ENI Networking, Service load-balancing, Direct routing (via Bird)
L: https://ctripcloud.github.io/cilium/network/2020/01/19/trip-first-step-towards-cloud-native-networking.html
Q: @ArthurChiao
* N: Tailor Brands
D: Tailor Brands is using Cilium in their production, staging, and development clusters (AWS EKS)
U: CNI (instead of amazon-vpc-cni-k8s), Hubble, Datadog Integration for Prometheus metrics
Q: @liorrozen
* N: Twilio
D: Twilio Segment is using Cilium across their k8s-based compute platform
U: CNI, EKS direct routing, kube-proxy replacement, Hubble, CiliumNetworkPolicies
Q: @msaah
* N: ungleich
D: ungleich is using Cilium as part of IPv6-only Kubernetes deployments.
U: CNI, IPv6 only networking, BGP, eBPF
Q: @Nico Schottelius, @nico:ungleich.ch (Matrix)
* N: Veepee
D: Veepee is using Cilium on their on-premise Kubernetes clusters, hosting majority of their applications.
U. CNI, BGP, eBPF, Hubble, DirectRouting (via kube-router)
Q: @nerzhul
* N: VMware by Broadcom
D: VMware offers multi-arch (ARM, AMD) and multi-distro (Ubuntu, RedHat UBI, Debian, PhotonOS) Cilium as part of the Tanzu Application Catalog, enabling customers to deploy it in their Kubernetes infrastructure.
U: CNI, Hubble, BGP, eBPF, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy
L: https://app-catalog.vmware.com/catalog?gfilter=cilium
Q: @carrodher
* N: Wildlife Studios
D: Wildlife Studios is using Cilium in AWS for all their game production clusters (self hosted k8s)
U: ClusterMesh, Global Service Load Balancing.
Q: @Oki @luanguimaraesla @rsafonseca
* N: WSO2
D: WSO2 is using Cilium to implemented Zero Trust Network Security for their Kubernetes clusters
U: CNI, WireGuard Transparent Encryption, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, Hubble, Layer 7 visibility and Service Mesh via Cilium Envoy
L: https://www.cncf.io/case-studies/wso2/
Q: @lakwarus @isala404 @tharinduwijewardane
* N: Yahoo!
D: Yahoo is using Cilium for L4 North-South Load Balancing for Kubernetes Services
L: https://www.youtube.com/watch?v=-C86fBMcp5Q
* N: ZeroHash
D: Zero Hash is using Cilium as CNI for networking, security and monitoring features for Kubernetes clusters
U: CNI/ENI Networking, Network policies, Hubble
Q: @eugenestarchenko