Popular posts

Cilium Talks at KubeCon NA 2024
Oct 04, 2024

Cilium Talks at KubeCon NA 2024

Find all the Cilium talks at KubeCon NA 2024

Community
Cilium 1.16 – High-Performance Networking With Netkit, Gateway API Gamma Support, BGPV2 and More!
Jul 25, 2024

Cilium 1.16 – High-Performance Networking With Netkit, Gateway API Gamma Support, BGPV2 and More!

Cilium 1.16 has arrived with Netkit, Gateway API Gamma Support, Multicast Datapath, BGPV2 Support, Security improvements, and more

Technology
External
Cilium netkit: The Final Frontier in Container Networking Performance
Jul 11, 2024

Cilium netkit: The Final Frontier in Container Networking Performance

Learn about netkit, new in Cilium 1.16, that replaces traditional veth devices with a high-performance alternative for container networking

Technology
External

All posts

From "War Games" to Network Policies
Apr 06, 2021

From "War Games" to Network Policies

We’ve just launched a new community resource:networkpolicy.io, to help people learn how to apply Kubernetes network policies to protect their business-critical workloads. But why do we need network policies at all? Let’s consider why traditional network security approaches aren’t sufficient in the cloud native world, and see what advantages we can gain through network policies.

Technology
Cilium User Survey 2021
Feb 25, 2021

Cilium User Survey 2021

Welcome to the Cilium User Survey 2021! We are looking to improve Cilium further and are interested in feedback and guidance from our users. Cilium has been a community-driven project from the beginning and the majority of our roadmap has and will continue to be defined by our users. Tell us what you want. Tell us what you are struggling with. Tell us what we can do better.

Community
NetworkPolicy Editor: Create, Visualize, and Share Kubernetes NetworkPolicies
Feb 10, 2021

NetworkPolicy Editor: Create, Visualize, and Share Kubernetes NetworkPolicies

Implementing Network Policy is a critical part of building a secure Kubernetes-based platform, but the learning curve from simple examples to more complex real-world policies is steep. Not only can it be painful to get the YAML syntax and formatting just right, but more importantly, there are many subtleties in the behavior of the network policy specification (e.g. default allow/deny, namespacing, wildcarding, rules combination, etc.). Even an experienced Kubernetes YAML-wrangler can still easily tie their brain in knots working through an advanced network policy use case.

Technology
Episode 153 Kubernetes Networking and Security, and Building Business on Open Source with Isovalent Founder, Thomas Graf
Feb 08, 2021

Episode 153 Kubernetes Networking and Security, and Building Business on Open Source with Isovalent Founder, Thomas Graf

Thomas talks about challenges of security and networking in Linux and Kubernetes and how to build a business on open source technology

Technology
External
Cilium: Programmable Linux Networking with Dan Wendlant and Thomas Graf
Feb 02, 2021

Cilium: Programmable Linux Networking with Dan Wendlant and Thomas Graf

Dan and Thomas join the show today to talk about why Cilium is a great choice for organizations looking to build cloud native applications

Technology
External
Kubernetes Networking & Load-Balancing with Cilium and F5
Jan 19, 2021

Kubernetes Networking & Load-Balancing with Cilium and F5

This is a guest blog by Howard Hao. Howard is working as a Kubernetes infrastructure SRE for Ect888.com. In this guest post, Howard will share how Ect888 uses Cilium & F5 to build a scalable load-balancing infrastructure with BGP for Ect888's production environment.

Community
Cilium with Thomas Graf on Google Kubernetes Podcast
Jan 12, 2021

Cilium with Thomas Graf on Google Kubernetes Podcast

Thomas joins the Kubernetes Podcast from Google to talk about Cilium

Community
External
Dec 11, 2020

Cilium Zero Trust Networking Protections Against CVE-2020-8554

You've probably heard about the new Man in the Middle (MITM) vulnerability in Kubernetes. If you're unfamiliar, a MITM vulnerability works by redirecting a victim's legitimate network traffic through a secret attacker on the network, where the attacker can eavesdrop or actively tamper with the victim's data before sending it to its intended destination. There have been several MITM vulnerabilities in Kubernetes, most of which take advantage of the default overly-permissive CAP_NET_RAW permissions in Kubernetes. However this vulnerability is unique in two ways:1. MITM attacks generally make use of common types of network vulnerabilities, whereas this vulnerability affects the API layer of Kubernetes itself. 2. Unlike most vulnerabilities that are assigned a Common Vulnerabilities and Exposures (CVE), there's no patch or hotfix you can deploy to protect your environment. This vulnerability is also unique in another way:if you're running Cilium without kube-proxy, you aren't vulnerable to it at all. Let's talk about how.

How-To
eBPF & Cilium Cloud-native Networking
Nov 18, 2020

eBPF & Cilium Cloud-native Networking

Dan Wendlandt talks about the evolution of cloud networking, eBPF and Cilium for programmable infrastructure

Community
External

Community

  • Slack

    Join slack workspace
  • X

    Follow Cilium on X
  • Github

    Join Github