What is Cilium?
Open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application containers or processes.
Cilium is a tool in the Security category of a tech stack.
Who uses Cilium?
3 companies reportedly use Cilium in their tech stacks, including Gini, Kubernetes Platform, and xxxx-trial.
Docker, Kubernetes, Kafka, gRPC, and Istio are some of the popular tools that integrate with Cilium. Here's a list of all 6 tools that integrate with Cilium.
Why developers like Cilium?
Here’s a list of reasons why companies and developers use Cilium
Be the first to leave a pro
- Identity Based Security - Cilium visibility and security policies are based on the container orchestrator identity (e.g., Kubernetes labels). Never again worry about network subnets or container IP addresses when writing security policies, auditing, or troubleshooting.
- Blazing Performance - BPF is the underlying Linux superpower to do the heavy lifting on the datapath by providing sandboxed programmability of the Linux kernel with incredible performance.
- API-Protocol Visibility + Security - Traditional firewalls only see and filter packets based on network headers like IP address and ports. Cilium can do this as well, but also understands and filters the individual HTTP, gRPC, and Kafka requests that stitch microservices together.
- Designed for Scale - Cilium was designed for scale, with no node-to-node interactions required when new pods are deployed, and all coordination through a highly scalable key-value store.
Cilium Alternatives & Comparisons
What are some alternatives to Cilium?
See all alternatives
Weave can traverse firewalls and operate in partially connected networks. Traffic can be encrypted, allowing hosts to be connected across an untrusted network. With weave you can easily construct applications consisting of multiple containers, running anywhere.
Istio is an open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio's control plane provides an abstraction layer over the underlying cluster management platform, such as Kubernetes, Mesos, etc.
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).