Submit your CfP for CiliumCon NA
Nov 30, 2017

Cilium now supports Kafka!

We have released Cilium v0.12 a couple of weeks back. One of the exciting feature additions is the introduction of Kafka protocol visibility and policy enforcement in form of a tech preview.

The following video will take you through a quick Kafka demo:

You can also check out the Kafka Getting Started Guide to learn how to enforce Kafka-aware policies yourself.

Other Relevant CILIUM NEWS

  • Iinitial implementation stages of XDP-based filtering enable source IP filtering in the NIC driver, with incredible performance results for protecting a host that can be seen here. Below are the highlights from Cilium
  • Simplified policy model to express connectivity for special entities "world" (outside of the cluster) and "host" (system on which endpoint is running on)
  • XDP policy enforcement for filtering out source IPs and allowing host and endpoint destination IPs
  • Initial framework to support multiple user-space proxies brings the ability to parse many more application protocols
  • Auto-population of IPv6 routes for all hosts in the cluster to minimize IPv6 control plane routing (applicable for non-overlay mode)
  • Support for L3-dependent L4 policies on ingress, enabled by expanding PolicyMap entry options in BPF
  • Unified Cilium default policy behaviour: platform-agnostic enforcement behavior. Now, policy is defined as a whitelist on per-endpoint basis, globally (in-line with Kubernetes behaviour).
  • Cluster-wide information on Cilium identities via CLI/API.
  • Cilium support for Kubernetes 1.8
  • Improved DaemonSet file to automatically derive Kubernetes API access
  • Support for DaemonSet configuration, such as etcd endpoints, via ConfigMap
  • Support for ingress and egress rules with IP blocks, including blacklisting
  • Prioritization of Kubernetes pod CIDR for node CIDR allocation.

We’ve also grown our documentation to include several specifics varying from policy enforcement and rules to BPF debugging datapath and developer documentation in the Contributor guide. Take a closer look at our Docs page.

As always, we’re here to help with any questions on Cilium Slack or file any issues for the project on GitHub. You can tweet to us @ciliumproject and follow us on Twitter for more updates.

~ The Cilium Team

Popular posts

Agentic Bee: How to get AI Agents to talk to Tetragon?
May 15, 2025

Agentic Bee: How to get AI Agents to talk to Tetragon?

Learn how Canopus uses eBPF Tetragon & AI Agents to find top 1% of vulnerabilities

Community
Sinad User Story: Delivering Security and Observability for Workloads with Confidence
Apr 25, 2025

Sinad User Story: Delivering Security and Observability for Workloads with Confidence

Learn why Sinad uses Tetragon for security observability and runtime enforcement

Community
Tetragon User Story: Why This Social Networking Company Made Tetragon a Default for their Kubernetes Clusters
Apr 15, 2025

Tetragon User Story: Why This Social Networking Company Made Tetragon a Default for their Kubernetes Clusters

Why a social networking company secures every Kubernetes cluster with Tetragon

Community