Skip to content

Latest commit

 

History

History
750 lines (611 loc) · 33.7 KB

USERS.md

File metadata and controls

750 lines (611 loc) · 33.7 KB

Who is using Cilium?

Sharing experiences and learning from other users is essential. We are frequently asked who is using a particular feature of Cilium so people can get in contact with other users to share experiences and best practices. People also often want to know if product/platform X has integrated Cilium. While the Cilium Slack community allows users to get in touch, it can be challenging to find this information quickly.

The following is a directory of adopters to help identify users of individual features. The users themselves directly maintain the list.

Adding yourself as a user

If you are using Cilium or it is integrated into your product, service, or platform, please consider adding yourself as a user with a quick description of your use case by opening a pull request to this file and adding a section describing your usage of Cilium. If you are open to others contacting you about your use of Cilium on Slack, add your Slack nickname as well.

N: Name of user (company or individual)
D: Description
U: Usage of features
L: Link with further information (optional)
Q: Contacts available for questions (optional)

Example entry:

* N: Cilium Example User Inc.
  D: Cilium Example User Inc. is using Cilium for scientific purposes
  U: ENI networking, DNS policies, ClusterMesh
  Q: @slacknick1, @slacknick2

Requirements to be listed

  • You must represent the user listed. Do NOT add entries on behalf of other users.
  • There is no minimum deployment size but we request to list permanent deployments only, i.e., no demo or trial deployments. Commercial or production use is not required. A well-done home lab setup can be equally interesting as a large-scale commercial deployment.

Users (Alphabetically)

* N: AccuKnox
  D: AccuKnox uses Cilium for network visibility and network policy enforcement.
  U: L3/L4/L7 policy enforcement using Identity, External/VM Workloads, Network Visibility using Hubble
  L: https://www.accuknox.com/spifee-identity-for-cilium-presentation-at-kubecon-2021, https://www.accuknox.com/cilium
  Q: @nyrahul

* N: Acoss
  D: Acoss is using cilium as their main CNI plugin (self hosted k8s, On-premises)
  U: CiliumNetworkPolicy, Hubble, BPF NodePort, Direct routing
  L: @JrCs

* N: Adobe, Inc.
  D: Adobe's Project Ethos uses Cilium for multi-tenant, multi-cloud clusters
  U: L3/L4/L7 policies
  L: https://youtu.be/39FLsSc2P-Y

* N: AirQo
  D: AirQo uses Cilium as the CNI plugin
  U: CNI, Networking, NetworkPolicy, Cluster Mesh, Hubble, Kubernetes services
  L: @airqo-platform

* N: Alibaba Cloud
  D: Alibaba Cloud is using Cilium together with Terway CNI as the high-performance ENI dataplane
  U: Networking, NetworkPolicy, Services, IPVLAN
  L: https://www.alibabacloud.com/blog/how-does-alibaba-cloud-build-high-performance-cloud-native-pod-networks-in-production-environments_596590

* N: Amazon Web Services (AWS)
  D: AWS uses Cilium as the default CNI for EKS Anywhere
  U: Networking, NetworkPolicy, Services
  L: https://isovalent.com/blog/post/2021-09-aws-eks-anywhere-chooses-cilium

* N: APPUiO by VSHN
  D: VSHN uses Cilium for multi-tenant networking on APPUiO Cloud and as an add-on to APPUiO Managed, both on Red Hat OpenShift and Cloud Kubernetes.
  U: CNI, Networking, NetworkPolicy, Hubble, IPAM, Kubernetes services
  L: https://products.docs.vshn.ch/products/appuio/managed/addon_cilium.html and https://www.appuio.cloud

* N: ArangoDB Oasis
  D: ArangoDB Oasis is using Cilium in to separate database deployments in our multi-tenant cloud environment
  U: Networking, CiliumNetworkPolicy(cluster & local), Hubble, IPAM
  L: https://cloud.arangodb.com
  Q: @ewoutp @Robert-Stam

* N: Ascend.io
  D: Ascend.io is using Cilium as a consistent CNI for our Data Automation Platform on GKE, EKS, and AKS.
  U: Transparent Encryption, Overlay Networking, Cluster Mesh, Egress Gateway, Network Policy, Hubble
  L: https://www.ascend.io/
  Q: @Joe Stevens

* N: Ayedo
  D: Ayedo builds and operates cloud-native container platforms based on Kubernetes
  U: Hubble for Visibility, Cilium as Mesh between Services
  L: https://www.ayedo.de/

* N: Back Market
  D: Back Market is using Cilium as CNI in all their clusters and environments (kOps + EKS in AWS)
  U: CNI, Network Policies, Transparent Encryption (WG), Hubble
  Q: @nitrikx
  L: https://www.backmarket.com/

* N: Berops
  D: Cilium is used as a CNI plug-in in our open-source multi-cloud and hybrid-cloud Kubernetes platform - Claudie
  U: CNI, Network Policies, Hubble
  Q: @Bernard Halas
  L: https://github.com/berops/claudie

* N: ByteDance
  D: ByteDance is using Cilium as CNI plug-in for self-hosted Kubernetes.
  U: CNI, Networking
  L: @Jiang Wang

* N: Canonical
  D: Canonical's Kubernetes distribution microk8s uses Cilium as CNI plugin
  U: Networking, NetworkPolicy, and Kubernetes services
  L: https://microk8s.io/

* N: Capital One
  D: Capital One uses Cilium as its standard CNI for all Kubernetes environments
  U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, Hubble, network visibility
  L: https://www.youtube.com/watch?v=hwOpCKBaJ-w

* N: CENGN - Centre of Excellence in Next Generation Networks
  D: CENGN is using Cilium in multiple clusters including production and development clusters (self-hosted k8s, On-premises)
  U: L3/L4/L7 network policies, Monitoring via Prometheus metrics & Hubble
  L: https://www.youtube.com/watch?v=yXm7yZE2rk4
  Q: @rmaika @mohahmed13

* N: Cistec
  D: Cistec is a clinical information system provider and uses Cilium as the CNI plugin.
  U: Networking and network policy
  L: https://www.cistec.com/

* N: Civo
  D: Civo is offering Cilium as the CNI option for Civo users to choose it for their Civo Kubernetes clusters.
  U: Networking and network policy
  L: https://www.civo.com/kubernetes

* N: ClickHouse
  D: ClickHouse uses Cilium as CNI for AWS Kubernetes environments
  U: CiliumNetworkPolicy, Hubble, ClusterMesh
  L: https://clickhouse.com

* N: Cognite
  D: Cognite is an industrial DataOps provider and uses Cilium as the CNI plugin
  Q: @Robert Collins

* N: CONNY
  D: CONNY is legaltech platform to improve access to justice for individuals
  U: Networking, NetworkPolicy, Services
  Q: @ant31
  L: https://conny.de

* N: Cosmonic
  D: Cilium is the CNI for Cosmonic's Nomad based PaaS
  U: Networking, NetworkPolicy, Transparent Encryption
  L: https://cilium.io/blog/2023/01/18/cosmonic-user-story/

* N: Crane
  D: Crane uses Cilium as the default CNI
  U: Networking, NetworkPolicy, Services
  L: https://github.com/slzcc/crane
  Q: @slzcc

* N: Cybozu
  D: Cybozu deploys Cilium to on-prem Kubernetes Cluster and uses it with Coil by CNI chaining.
  U: CNI Chaining, L4 LoadBalancer, NetworkPolicy, Hubble
  L: https://cybozu-global.com/

* N: Daimler Truck AG
  D: The CSG RuntimeDepartment of DaimlerTruck is maintaining an AKS k8s cluster as a shared resource for DevOps crews and is using Cilium as the default CNI (BYOCNI).
  U: Networking, NetworkPolicy and Monitoring
  L: https://daimlertruck.com
  Q: @brandshaide

* N: DaoCloud - spiderpool & merbridge
  D: spiderpool is using Cilium as their main CNI plugin for overlay and merbridge is using  Cilium eBPF library to speed up your Service Mesh
  U: CNI, Service load-balancing, cluster mesh
  L: https://github.com/spidernet-io/spiderpool, https://github.com/merbridge/merbridge
  Q: @weizhoublue, @kebe7jun

* N: Datadog
  D: Datadog is using Cilium in AWS (self-hosted k8s)
  U: ENI Networking, Service load-balancing, Encryption, Network Policies, Hubble
  Q: @lbernail, @roboll, @mvisonneau

* N: Dcode.tech
  D: We specialize in AWS and Kubernetes, and actively implement Cilium at our clients. 
  U: CNI, CiliumNetworkPolicy, Hubble UI
  L: https://dcode.tech/
  Q: @eliranw, @maordavidov

* N: Deckhouse
  D: Deckhouse Kubernetes Platform is using Cilium as a one of the supported CNIs.
  U: Networking, Security, Hubble UI for network visibility
  L: https://github.com/deckhouse/deckhouse

* N: Deezer
  D: Deezer is using Cilium as CNI for all our on-prem clusters for its performance and security. We plan to leverage BGP features as well soon
  U: CNI, Hubble, kube-proxy replacement, eBPF
  L: https://github.com/deezer

* N: DigitalOcean
  D: DigitalOcean is using Cilium as the CNI for Digital Ocean's managed Kubernetes Services (DOKS)
  U: Networking and network policy
  L: https://github.com/digitalocean/DOKS

* N: Edgeless Systems
  D: Edgeless Systems is using Cilium as the CNI for Edgeless System's Confidential Kubernetes Distribution (Constellation)
  U: Networking (CNI), Transparent Encryption (WG),
  L: https://docs.edgeless.systems/constellation/architecture/networking
  Q: @m1ghtym0

* N: Eficode
  D: As a cloud-native and devops consulting firm, we have implemented Cilium on customer engagements
  U: CNI, CiliumNetworkPolicy at L7, Hubble
  L: https://eficode.com/
  Q: @Andy Allred

* N: Elastic Path
  D: Elastic Path is using Cilium in their CloudOps for Kubernetes production clusters
  U: CNI
  L: https://documentation.elasticpath.com/cloudops-kubernetes/docs/index.html
  Q: @Neil Seward

* N: Equinix
  D: Equinix Metal is using Cilium for production and non-production environments on bare metal
  U: CNI, CiliumClusterWideNetworkpolicy, CiliumNetworkPolicy, BGP advertisements, Hubble, network visibility
  L: https://metal.equinix.com/
  Q: @matoszz

* N: Equinix
  D: Equinix NL Managed Services is using Cilium with their Managed Kubernetes offering
  U: CNI, network policies, visibility
  L: https://www.equinix.nl/products/support-services/managed-services/netherlands
  Q: @jonkerj

* N: Exoscale
  D: Exoscale is offering Cilium as a CNI option on its managed Kubernetes service named SKS (Scalable Kubernetes Service)
  U: CNI, Networking
  L: https://www.exoscale.com/sks/
  Q: @Antoine

* N: finleap connect
  D: finleap connect is using Cilium in their production clusters (self-hosted, bare-metal, private cloud)
  U: CNI, NetworkPolicies
  Q: @chue

* N: Form3
  D: Form3 is using Cilium in their production clusters (self-hosted, bare-metal, private cloud)
  U: Service load-balancing, Encryption, CNI, NetworkPolicies
  Q: @kevholditch-f3, samo-f3, ewilde-form3

* N: FRSCA - Factory for Repeatable Secure Creation of Artifacts
  D: FRSCA is utilizing tetragon integrated with Tekton to create runtime attestation to attest artifact and builder attributes
  U: Runtime observability
  L: https://github.com/buildsec/frsca
  Q: @Parth Patel

* N: F5 Inc
  D: F5 helps customers with Cilium VXLAN tunnel integration with BIG-IP
  U: Networking
  L: https://github.com/f5devcentral/f5-ci-docs/blob/master/docs/cilium/cilium-bigip-info.rst
  Q: @vincentmli

* N: Giant Swarm
  D: Giant Swarm is using Cilium in their Cluster API based managed Kubernetes service (AWS, Azure, GCP, OpenStack, VMware Cloud Director and VMware vSphere) as CNI
  U: Networking
  L: https://www.giantswarm.io/

* N: GitLab
  D: GitLab is using Cilium to implement network policies inside Auto DevOps deployed clusters for customers using k8s
  U: Network policies
  L: https://docs.gitlab.com/ee/user/clusters/applications.html#install-cilium-using-gitlab-ci
  Q: @ap4y @whaber

* N: Google
  D: Google is using Cilium in Anthos and Google Kubernetes Engine (GKE) as Dataplane V2
  U: Networking, network policy, and network visibility
  L: https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine

* N: G DATA CyberDefense AG
  D: G DATA CyberDefense AG is using Cilium on our managed on premise clusters.
  U: Networking, network policy, security, and network visibility
  L: https://gdatasoftware.com
  Q: @farodin91

* N: IDNIC | Kadabra
  D: IDNIC is the National Internet Registry administering IP addresses for INDONESIA, uses Cilium to powered Kadabra project runing services across multi data centers.
  U: Networking, Network Policies, kube-proxy Replacement, Service Load Balancing and Cluster Mesh
  L: https://ris.idnic.net/
  Q: @ardikabs

* N: IKEA IT AB
  D: IKEA IT AB is using Cilium for production and non-production environments (self-hosted, bare-metal, private cloud)
  U: Networking, CiliumclusterWideNetworkPolicy, CiliumNetworkPolicy, kube-proxy replacement, Hubble, Direct routing, egress gateway, hubble-otel, Multi Nic XDP, BGP advertisements, Bandwidth Manager, Service Load Balancing, Cluster Mesh
  L: https://www.ingka.com/

* N: Immerok
  D: Immerok uses Cilium for cross-cluster communication and network isolation; Immerok Cloud is a serverless platform for the full power of [Apache Flink](https://flink.apache.org) at any scale.
  U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, CNI
  L: https://immerok.io
  Q: @austince, @dmvk

* N: Infomaniak
  D: Infomaniak is using Cilium in their production clusters (self-hosted, bare-metal and openstack)
  U: Networking, CiliumNetworkPolicy, BPF NodePort, Direct routing, kube-proxy replacement
  L: https://www.infomaniak.com/en
  Q: @reneluria

* N: innoQ Schweiz GmbH
  D: As a consulting company we added Cilium to a couple of our customers infrastructure
  U: Networking, CiliumNetworkPolicy at L7, kube-proxy replacement, encryption
  L: https://www.cloud-migration.ch/
  Q: @fakod

 * N: Isovalent
   D: Cilium is the platform that powers Isovalent’s enterprise networking, observability, and security solutions
   U: Networking, network policy, observability, cluster mesh, kube-proxy replacement, security, egress gateway, service load balancing, CNI
   L: https://isovalent.com/product/
   Q: @BillMulligan

* N: JUMO
  D: JUMO is using Cilium as their CNI plugin for all of their AWS-hosted EKS clusters
  U: Networking, network policy, network visibility, cluster mesh
  Q: @Matthieu ANTOINE, @Carlos Castro, @Joao Coutinho (Slack)

* N: Keploy
  D: Keploy is using the Cilium to capture the network traffic to perform E2E Testing.
  U: Networking, network policy, Monitoring, E2E Testing
  L: https://keploy.io/

* N: Kilo
  D: Cilium is a supported CNI for Kilo. When used together, Cilium + Kilo create a full mesh via WireGuard for Kubernetes in edge environments.
  U: CNI, Networking, Hubble, kube-proxy replacement, network policy
  L: https://kilo.squat.ai/
  Q: @squat, @arpagon

* N: kOps
  D: kOps is using Cilium as one of the supported CNIs
  U: Networking, Hubble, Encryption, kube-proxy replacement
  L: kops.sigs.k8s.io/
  Q: @olemarkus

* N: Kryptos Logic
  D: Kryptos is a cyber security company that is using Kubernetes on-prem in which Cilium is our CNI of choice.
  U: Networking, Observability, kube-proxy replacement

* N: kubeasz
  D: kubeasz, a certified kubernetes installer, is using Cilium as a one of the supported CNIs.
  U: Networking, network policy, Hubble for network visibility
  L: https://github.com/easzlab/kubeasz

* N: Kube-OVN
  D: Kube-OVN uses Cilium to enhance service performance, security and monitoring.
  U: CNI-Chaining, Hubble, kube-proxy replacement
  L: https://github.com/kubeovn/kube-ovn/blob/master/docs/IntegrateCiliumIntoKubeOVN.md
  Q: @oilbeater

* N: Kube-Hetzner
  D: Kube-Hetzner is a open-source Terraform project that uses Cilium as an possible CNI in its cluster deployment on Hetzner Cloud.
  U: Networking, Hubble, kube-proxy replacement
  L: https://github.com/kube-hetzner/terraform-hcloud-kube-hetzner#cni
  Q: @MysticalTech

* N: Kubermatic
  D: Kubermatic Kubernetes Platform is using Cilium as a one of the supported CNIs.
  U: Networking, network policy, Hubble for network visibility
  L: https://github.com/kubermatic/kubermatic

* N: KubeSphere - KubeKey
  D: KubeKey is an open-source lightweight tool for deploying Kubernetes clusters and addons efficiently. It uses Cilium as one of the supported CNIs.
  U: Networking, Security, Hubble UI for network visibility
  L: https://github.com/kubesphere/kubekey
  Q: @FeynmanZhou

* N: K8e - Simple Kubernetes Distribution
  D: Kubernetes Easy (k8e) is a lightweight, Extensible, Enterprise Kubernetes distribution. It uses Cilium as default CNI network.
  U: Networking, network policy, Hubble for network visibility
  L: https://github.com/xiaods/k8e
  Q: @xds2000

* N: Liquid Reply
  D: Liquid Reply is a professional service provider and utilizes Cilium on suitable projects and implementations.
  U: Networking, network policy, Hubble for network visibility, Security
  L: http://liquidreply.com
  Q: @mkorbi

* N: Magic Leap
  D: Magic Leap is using Hubble plugged to GKE Dataplane v2 clusters
  U: Hubble
  Q: @romachalm

* N: Melenion Inc
  D: Melenion is using Cilium as the CNI for its on-premise production clusters
  U: Service Load Balancing, Hubble
  Q: @edude03

* N: Meltwater
  D: Meltwater is using Cilium in AWS on self-hosted multi-tenant k8s clusters as the CNI plugin
  U: ENI Networking, Encryption, Monitoring via Prometheus metrics & Hubble
  Q: @recollir, @dezmodue

* N: Microsoft
  D: Microsoft is using Cilium in "Azure CNI powered by Cilium" AKS (Azure Kubernetes Services) clusters
  L: https://techcommunity.microsoft.com/t5/azure-networking-blog/azure-cni-powered-by-cilium-for-azure-kubernetes-service-aks/ba-p/3662341
  Q: @tamilmani1989 @chandanAggarwal

* N: Mobilab
  D: Mobilab uses Cilium as the CNI for its internal cloud
  U: CNI
  L: https://mobilabsolutions.com/2019/01/why-we-switched-to-cilium/

* N: MyFitnessPal
  D: MyFitnessPal trusts Cilium with high volume user traffic in AWS on self-hosted k8s clusters as the CNI plugin and in GKE with Dataplane V2
  U: Networking (CNI, Maglev, kube-proxy replacement, local redirect policy),  Observability (Network metrics with Hubble, DNS proxy, service maps, policy troubleshooting) and Security (Network Policy)
  L: https://www.myfitnesspal.com

* N: Mux, Inc.
  D: Mux deploys Cilium on self-hosted k8s clusters (Cluster API) in GCP and AWS to run its video streaming/analytics platforms.
  U: Pod networking (CNI, IPAM, Host-reachable Services), Hubble, Cluster-mesh. TBD: Network Policy, Transparent Encryption (WG), Host Firewall.
  L: https://mux.com
  Q: @dilyevsky
  
* N: NetBird
  D: NetBird uses Cilium to compile BPF to Go for cross-platform DNS management and NAT traversal
  U: bpf2go to compile a C source file into eBPF bytecode and then to Go
  L: https://netbird.io/knowledge-hub/using-xdp-ebpf-to-share-default-dns-port-between-resolvers
  Q: @braginini
  
* N: NETWAYS Web Services
  D: NETWAYS Web Services offers Cilium to their clients as CNI option for their Managed Kubernetes clusters.
  U: Networking (CNI), Observability (Hubble)
  L: https://nws.netways.de/managed-kubernetes/

* N: New York Times (the)
  D: The New York Times is using Cilium on EKS to build multi-region multi-tenant shared clusters
  U: Networking (CNI, EKS IPAM, Maglev, kube-proxy replacement, Direct Routing),  Observability (Network metrics with Hubble, policy troubleshooting) and Security (Network Policy)
  L: https://www.nytimes.com/, https://youtu.be/9FDpMNvPrCw
  Q: @abebars

* N: Nexxiot
  D: Nexxiot is an IoT SaaS provider using Cilium as the main CNI plugin on AWS EKS clusters
  U: Networking (IPAM, CNI), Security (Network Policies), Visibility (hubble)
  L: https://nexxiot.com

* N: Nine Internet Solutions AG
  D: Nine uses Cilium on all Nine Kubernetes Engine clusters
  U: CNI, network policy, kube-proxy replacement, host firewall
  L: https://www.nine.ch/en/kubernetes

* N: Northflank
  D: Northflank is a PaaS and uses Cilium as the main CNI plugin across GCP, Azure, AWS and bare-metal
  U: Networking, network policy, hubble, packet monitoring and network visibility
  L: https://northflank.com
  Q: @NorthflankWill, @Champgoblem

* N: Overstock Inc.
  D: Overstock is using Cilium as the main CNI plugin on bare-metal clusters (self hosted k8s).
  U: Networking, network policy, hubble, observability

* N: Palantir Technologies Inc.
  D: Palantir is using Cilium as their main CNI plugin in all major cloud providers [AWS/Azure/GCP] (self hosted k8s).
  U: ENI networking, L3/L4 policies, FQDN based policy, FQDN filtering, IPSec
  Q: ungureanuvladvictor

* N: Palark GmbH
  D: Palark uses Cilium for networking in its Kubernetes platform provided to numerous customers as a part of its DevOps as a Service offering.
  U: CNI, Networking, Network policy, Security, Hubble UI
  L: https://blog.palark.com/why-cilium-for-kubernetes-networking/
  Q: @shurup

* N: Parseable
  D: Parseable uses Tertragon for collecting and ingesting eBPF logs for Kubernetes clusters.
  U: Security, eBPF, Tetragon
  L: https://www.parseable.io/blog/ebpf-log-analytics
  Q: @nitisht

* N: Pionative
  D: Pionative supplies all its clients across cloud providers with
  Kubernetes running Cilium to deliver the best performance out there.
  U: CNI, Networking, Security, eBPF
  L: https://www.pionative.com
  Q: @Pionerd

* N: Plaid Inc
  D: Plaid is using Cilium as their CNI plugin in self-hosted Kubernetes on AWS.
  U: CNI, network policies
  L: [https://plaid.com](https://plaid.com/contact/)
  Q: @diversario @jandersen-plaid

* N: PlanetScale
  D: PlanetScale is using Cilium as the CNI for its serverless database platform.
  U: Networking (CNI, IPAM, kube-proxy replacement, native routing), Network Security, Cluster Mesh, Load Balancing
  L: https://planetscale.com/
  Q: @dctrwatson

* N: plusserver Kubernetes Engine (PSKE)
  D: PSKE uses Cilium for multiple scenarios, for examples for managed Kubernetes clusters provided with Gardener Project across AWS and OpenStack.
  U: CNI , Overlay Network, Network Policies
  L: https://www.plusserver.com/en/product/managed-kubernetes/, https://github.com/gardener/gardener-extension-networking-cilium

* N: Polar Signals
  D: Polar Signals uses Cilium as the CNI on its GKE dataplane v2 based clusters.
  U: Networking
  L: https://polarsignals.com
  Q: @polarsignals @brancz

* N: Polverio
  D: Polverio KubeLift is a single-node Kubernetes distribution optimized for Azure, using Cilium as the CNI.
  U: CNI, IPAM
  L: https://polverio.com
  Q: @polverio @stuartpreston

* N: Poseidon Laboratories
  D: Poseidon's Typhoon Kubernetes distro uses Cilium as the default CNI and its used internally
  U: Networking, policies, service load balancing
  L: https://github.com/poseidon/typhoon/
  Q: @dghubble @typhoon8s

* N: PostFinance AG
  D: PostFinance is using Cilium as their CNI for all mission critical, on premise k8s clusters
  U: Networking, network policies, kube-proxy replacement
  L: https://github.com/postfinance

* N: Proton AG
  D: Proton is using Cilium as their CNI for all their Kubernetes clusters
  U: Networking, network policies, host firewall, kube-proxy replacement, Hubble
  L: https://proton.me/
  Q: @j4m3s @MrFreezeex

* N: Radio France
  D: Radio France is using Cilium in their production clusters (self-hosted k8s with kops on AWS)
  U: Mainly Service load-balancing
  Q: @francoisj

* N: Rancher Labs, now part of SUSE
  D: Rancher Labs certified Kubernetes distribution RKE2 can be deployed with Cilium.
  U: Networking and network policy
  L: https://github.com/rancher/rke and https://github.com/rancher/rke2

* N: Rapyuta Robotics.
  D: Rapyuta is using cilium as their main CNI plugin. (self hosted k8s)
  U: CiliumNetworkPolicy, Hubble, Service Load Balancing.
  Q: @Gowtham

* N: Rafay Systems
  D: Rafay's Kubernetes Operations Platform uses Cilium for centralized network visibility and network policy enforcement
  U: NetworkPolicy, Visibility via Prometheus metrics & Hubble
  L: https://rafay.co/platform/network-policy-manager/
  Q: @cloudnativeboy @mohanatreya

* N: Robinhood Markets
  D: Robinhood uses Cilium for Kubernetes overlay networking in an environment where we run tests for backend services
  U: CNI, Overlay networking
  Q: @Madhu CS

* N: Santa Claus & the Elves
  D: All our infrastructure to process children's letters and wishes, toy making, and delivery, distributed over multiple clusters around the world, is now powered by Cilium.
  U: ClusterMesh, L4LB, XDP acceleration, Bandwidth manager, Encryption, Hubble
  L: https://qmonnet.github.io/whirl-offload/2024/01/02/santa-switches-to-cilium/

* N: SAP
  D: SAP uses Cilium for multiple internal scenarios. For examples for self-hosted Kubernetes scenarios on AWS with SAP Concur and for managed Kubernetes clusters provided with Gardener Project across AWS, Azure, GCP, and OpenStack.
  U: CNI , Overlay Network, Network Policies
  L: https://www.concur.com, https://gardener.cloud/, https://github.com/gardener/gardener-extension-networking-cilium
  Q: @dragan (SAP Concur), @docktofuture & @ScheererJ (Gardener)

* N: Sapian
  D: Sapian uses Cilium as the default CNI in our product DialBox Cloud; DialBox cloud is an Edge Kubernetes cluster using [kilo](https://github.com/squat/kilo) for WireGuard mesh connectivity inter-nodes. Therefore, Cilium is crucial for low latency in real-time communications environments.
  U: CNI, Network Policies, Hubble, kube-proxy replacement
  L: https://sapian.com.co, https://arpagon.co/blog/k8s-edge
  Q: @arpagon

* N: Schenker AG
  D: Land transportation unit of Schenker uses Cilium as default CNI in self-managed kubernetes clusters running in AWS
  U: CNI, Monitoring, kube-proxy replacement
  L: https://www.dbschenker.com/global
  Q: @amirkkn

* N: Sealos
  D: Sealos is using Cilium as a consistent CNI for our Sealos Cloud.
  U: Networking, Service, kube-proxy replacement, Network Policy, Hubble
  L: https://sealos.io
  Q: @fanux, @yangchuansheng

* N: Seznam.cz
  D: Seznam.cz uses Cilium in multiple scenarios in on-prem DCs. At first as L4LB which loadbalances external traffic into k8s+openstack clusters then as CNI in multiple k8s and openstack clusters which are all connected in a clustermesh to enforce NetworkPolicies across pods/VMs.
  U: L4LB, L3/4 CNPs+CCNPs, KPR, Hubble, HostPolicy, Direct-routing, IPv4+IPv6, ClusterMesh
  Q: @oblazek

* N: Simple
  D: Simple uses cilium as default CNI in Kubernetes clusters (AWS EKS) for both development and production environments.
  U: CNI, Network Policies, Hubble
  L: https://simple.life
  Q: @sergeyshevch

* N: Scaleway
  D: Scaleway uses Cilium as the default CNI for Kubernetes Kapsule
  U: Networking, NetworkPolicy, Services
  L: @jtherin @remyleone

* N: Schuberg Philis
  D: Schuberg Philis uses Cilium as CNI for mission critical kubernetes clusters we run for our customers.
  U: CNI (instead of amazon-vpc-cni-k8s), DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, EKS
  L: https://schubergphilis.com/en
  Q: @stimmerman @shoekstra @mbaumann

* N: SI Analytics
  D: SI Analytics uses Cilium as CNI in self-managed Kubernetes clusters in on-prem DCs. And also use Cilium as CNI in its GKE dataplane v2 based clusters.
  U: CNI, Network Policies, Hubble
  L: https://si-analytics.ai, https://ovision.ai
  Q: @jholee

* N: SIGHUP
  D: SIGHUP integrated Cilium as a supported CNI for KFD (Kubernetes Fury Distribution), our enterprise-grade OSS reference architecture
  U: Available supported CNI
  L: https://sighup.io, https://github.com/sighupio/fury-kubernetes-networking
  Q: @jnardiello @nutellino

* N: SmileDirectClub
  D: SmileDirectClub is using Cilium in manufacturing clusters (self-hosted on vSphere and AWS EC2)
  U: CNI
  Q: @joey, @onur.gokkocabas

* N: Snapp
  D: Snapp is using Cilium in production for its on premise openshift clusters
  U: CNI, Network Policies, Hubble
  Q: @m-yosefpor

* N: Solo.io
  D: Cilium is part of Gloo Application Networking platform, with a “batteries included but swappable” manner
  U: CNI, Network Policies
  Q: @linsun

* N: S&P Global
  D: S&P Global uses Cilium as their multi-cloud CNI
  U: CNI
  L: https://www.youtube.com/watch?v=6CZ_SSTqb4g

* N: Spherity
  D: Spherity  is using Cilium on AWS EKS
  U: CNI/ENI Networking, Network policies, Hubble
  Q: @solidnerd

* N: Sportradar
  D: Sportradar is using Cilium as their main CNI plugin in AWS (using kops)
  U: L3/L4 policies, Hubble, BPF NodePort, CiliumClusterwideNetworkPolicy
  Q: @Eric Bailey, @Ole Markus

* N: Sproutfi
  D: Sproutfi uses Cilium as the CNI on its GKE based clusters
  U: Service Load Balancing, Hubble, Datadog Integration for Prometheus metrics
  Q: @edude03

* N: SuperOrbital
  D: As a Kubernetes-focused consulting firm, we have implemented Cilium on customer engagements
  U: CNI, CiliumNetworkPolicy at L7, Hubble
  L: https://superorbital.io/
  Q: @jmcshane

* N: Talos
  D: Cilium is one of the supported CNI's in Talos
  U: Networking, NetworkPolicy, Hubble, BPF NodePort
  L: https://github.com/talos-systems/talos
  Q: @frezbo, @smira, @Ulexus

* N: Tencent Cloud
  D: Tencent Cloud container team designed the TKE hybrid cloud container network solution with Cilium as the cluster network base
  U: Networking, CNI
  L: https://segmentfault.com/a/1190000040298428/en

* N: teuto.net Netzdienste GmbH
  D: teuto.net is using cilium for their managed k8s service, t8s
  U: CNI, CiliumNetworkPolicy, Hubble, Encryption, ...
  L: https://teuto.net/managed-kubernetes
  Q: @cwrau

* N: Trendyol
  D: Trendyol.com has recently implemented Cilium as the default CNI for its production Kubernetes clusters starting from version 1.26.
  U: Networking, kube-proxy replacement, eBPF, Network Visibility with Hubble and Grafana, Local Redirect Policy
  L: https://t.ly/FDCZK

* N: T-Systems International
  D: TSI uses Cilium for it's Open Sovereign Cloud product, including as a CNI for Gardener-based Kubernetes clusters and bare-metal infrastructure managed by OnMetal.
  U: CNI, overlay network, NetworkPolicies
  Q: @ManuStoessel

* N: uSwitch
  D: uSwitch is using Cilium in AWS for all their production clusters (self hosted k8s)
  U: ClusterMesh, CNI-Chaining (with amazon-vpc-cni-k8s)
  Q: @jirving

* N: United Cloud
  D: United Cloud is using Cilium for all non-production and production clusters (on-premises)
  U: CNI, Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy, ClusterMesh, Encryption
  L: https://united.cloud
  Q: @boris

* N: Utmost Software, Inc
  D: Utmost is using Cilium in all tiers of its Kubernetes ecosystem to implement zero trust
  U: CNI, DefaultDeny(Zero Trust), Hubble, CiliumNetworkPolicy, CiliumClusterwideNetworkPolicy
  L: https://blog.utmost.co/zero-trust-security-at-utmost
  Q: @andrewholt

* N: Trip.com
  D: Trip.com is using Cilium in their production clusters (self-hosted k8s, On-premises and AWS)
  U: ENI Networking, Service load-balancing, Direct routing (via Bird)
  L: https://ctripcloud.github.io/cilium/network/2020/01/19/trip-first-step-towards-cloud-native-networking.html
  Q: @ArthurChiao

* N: Tailor Brands
  D: Tailor Brands is using Cilium in their production, staging, and development clusters (AWS EKS)
  U: CNI (instead of amazon-vpc-cni-k8s), Hubble, Datadog Integration for Prometheus metrics
  Q: @liorrozen

* N: Twilio
  D: Twilio Segment is using Cilium across their k8s-based compute platform
  U: CNI, EKS direct routing, kube-proxy replacement, Hubble, CiliumNetworkPolicies
  Q: @msaah

* N: ungleich
  D: ungleich is using Cilium as part of IPv6-only Kubernetes deployments.
  U: CNI, IPv6 only networking, BGP, eBPF
  Q: @Nico Schottelius, @nico:ungleich.ch (Matrix)

* N: Veepee
  D: Veepee is using Cilium on their on-premise Kubernetes clusters, hosting majority of their applications.
  U. CNI, BGP, eBPF, Hubble, DirectRouting (via kube-router)
  Q: @nerzhul

* N: Wildlife Studios
  D: Wildlife Studios is using Cilium in AWS for all their game production clusters (self hosted k8s)
  U: ClusterMesh, Global Service Load Balancing.
  Q: @Oki @luanguimaraesla @rsafonseca

* N: Yahoo!
  D: Yahoo is using Cilium for L4 North-South Load Balancing for Kubernetes Services
  L: https://www.youtube.com/watch?v=-C86fBMcp5Q

* N: ZeroHash
  D: Zero Hash is using Cilium as CNI for networking, security and monitoring features for Kubernetes clusters
  U: CNI/ENI Networking, Network policies, Hubble
  Q: @eugenestarchenko