Cilium Annual Report 2022
Cilium Annual Report 2022
Cilium Annual Report 2022
Based on the feedback from our user survey, this consistent connectivity is crucial because most
people are running multiple clusters with different tenants across disparate infrastructure. Having
Cilium as the CNI everywhere creates a seamless user experience anywhere you need to connect an
application - and in distributed computing everything goes over the network. End users across
diverse industries like finance, retail, software, and telecommunications are all realizing the
benefits of Cilium and eBPF and have shown that it is production ready at scale.
2022 is the year of the CNI for Cilium, but this is just the beginning of the Cilium ecosystem. The
purpose of this report is to share highlights of events, milestones, and feedback in the Cilium
Project's community. The data included in this report is taken from the Cilium User Survey, project's
public dashboard, GitHub organization, Slack, blog, and social media. If you have any comments or
feedback about this report, please reach out to the project at [email protected].
Thomas Graf
This is just the Co-Creator Cilium Project
beginning of the
Cilium ecosystem
Project snapshot
Cilium has seen tremendous growth in the project and community over the past year. These stats
provide a quick snapshot of some of that work!
Contributors
The top 10 contributors by number of PRs were Tobias Klauser, Paul Chaignon, Joe Stringer, André
Martins, Michi Mutsuzaki, Tam Mach, Martynas Pumputis, Bill Mulligan, William Findlay, and Jarno
Rajahalme. Thank you for all the work you have done for the project!
The number of people commenting on issues and PRs has increased by over 60% in the past year alone,
and over 6x in the past 5 years.
2019 1 Isovalent
2 Independent
2020
3 Red Hat
2021
4 Google
2022
5 Datadog
Users
The number of public users has more than tripled from 30 to 91! Alongside that, Cilium now also has
28 public case studies.
4
We had contributors from 53 countries with the most contributions coming from US, Germany, China, UK,
and India.
More countries
USA, 22.2% Germany, 10.7%
Blog posts
125
100
Cilium! 0
2017 2018 2019 2020 2021 2022
Cilium
from 9990 stars to 14055
Hubble
from 1680 to 2405
Tetragon
from 0 to 2013
Committers
Finally, we would like to thank the committers of Cilium for all the work and effort they put into the
project. Cilium has welcomed six new committers in 2022, and and we look forward to adding more in
2023. Cilium committers come from AMD, Datadog, Docker, Google, Independent, Isovalent, Palantir, Red
Hat, and SUSE.
4
Release Highlights
Cilium 1.12 was released in July and made many improvements across networking, security, and
service mesh. The 1.13 release is imminent, with release candidate 4 already in preview.
Networking
Kubernetes Ingress
Cluster Mesh
Topology-aware routing and service affinity allows services to be configured to prefer endpoints in the
local or remote cluster.
4
Multi-Cluster for External Workloads allows connecting existing non-Kubernetes workloads into the
Kubernetes cluster for a consistent experience. For example, enforcing network policies across Kubernetes,
OpenStack, and bare-metal environments all at once.
Egress Gateway
IPv6 support has been added to the BGP control plane. By leveraging a new feature-rich BGP engine,
Cilium can now set up IPv6 peering sessions and advertise BGP IPv6 Pod CIDRs.
Load-Balancing
Performance
Cilium is the first CNI to support TCP BBR (Bottleneck Bandwidth and Round-trip Propagation Time)
congestion control for Pods in order to achieve significantly better throughput and lower latency for Pods
exposed to lossy networks such as the Internet. The bandwidth manager used to rate-limit Pod traffic and
optimize network utilization has been promoted to stable.
5
Security
Tetragon
Tetragon is the latest open-source project in the Cilium family. Currently considered beta-level
maturity, it provides eBPF-based transparent security observability combined with real-time runtime
enforcement. The deep visibility is achieved without requiring application changes and is provided at
low overhead thanks to smart in-kernel filtering and aggregation logic built directly into the
eBPF-based kernel-level collector. The embedded runtime enforcement layer is capable of performing
access control on the system call and other enforcement levels.
Security Posture
Service Mesh
User Surveys
We took the chance to survey our users to see what they said about the project. When we asked what
feature of Cilium was most important, there was a mix of responses alluding to Cilium being used in
many different ways with different requirements and priorities. However, when asked what the biggest
challenge with Kubernetes networking is, our respondents resoundingly answered “observability”, and
expressed thanks for Hubble’s help in this area.
When we asked our users what features they were relying upon the most they answered networking,
kube-proxy replacement, and Hubble. Service Mesh, Ingress, Multi-cluster, Encryption, and LB are
the most evaluated and planned features and some people are already running Service Mesh in
production today!
eBPF-based Networking
31.3%
18.8% Performance
Transparent Encryption
9.4% 6.3%
Scalability
Network policy
12.5% 6.3%
Multi-Cluster
People are excited about expanding their use cases for Cilium! This all makes sense when we look at
how people are running their Kubernetes environments with almost everyone running more than one
cluster and most clusters having multiple tenants. Being able to connect them together and secure the
network will be key.
7
25%
21.9% 1
2-5
6-20
12.5%
>20
40.6%
12.6%
18.8%
8
Cilium in Production
In 2022, Cilium has gone from a few stories to full blown production everywhere. All major cloud
providers now use Cilium in their Kubernetes offerings and Cilium is the CNI for many of the most
popular Kubernetes distributions.
9
Community Quotes
Microsoft
Microsoft is thrilled to partner with the Cilium community to bring the power of eBPF and Cilium
natively in Azure. Leveraging Cilium’s capabilities to provide eBPF-enriched features like efficient
load-balancing, extensive network security features, and rich observability integrated well along
with industry-leading robust and scalable Azure CNI IP Address Management (IPAM), with VNET and
Overlay mode, will give the most performant and best-in-class container networking platform for
our customers. As a native offering, customers will find it significantly easier to leverage Cilium
directly on Azure and with other integration work in progress to offer the advanced features of
Cilium, we are truly excited about the future of Cilium on Azure.”
Grafana
We want to make sure that Grafana observability is easily available wherever our ever-expanding
community needs it. eBPF and Cilium are quickly becoming the de facto standard for secure and
observable connectivity in Kubernetes, so we partnered with the Cilium team to help our mutual
users with a critical need. Our engineering teams are now working together to leverage the open
source Grafana LGTM Stack (Loki for logs, Grafana for visualization, Tempo for traces, and Mimir for
metrics) to enhance eBPF-based observability for monitoring, troubleshooting, and security
workflows."
SP Global
It is important to create a Highway in our Kubernetes world in order for the network to seamlessly
communicate with all of the ecosystem and still provide the perfect end user experience. Using
Cilium CNI, we built that Highway and that Highway today communicates seamlessly with our
on-prem, cloud, SaaS, and all our downstream systems in order to make that experience very
reliable and very smooth so that every time the app owner or application developer doesn't have to
rethink, re-enovate, or redo how do I connect to my data and data center, how do I connect to my
database, how do I connect to my a service in a SaaS. Using Cilium CNI, the Highway is built and
through the common fabric of Cilium we provide that very seamless and secure connectivity.”
Community Events
KubeCon
Cilium was well represented at both KubeCon EU and NA. There were 10 talks about Cilium in
Valencia and 14 in Detroit. In Detroit, Cilium hosted its first in-person project meeting, and applied
for graduation in the CNCF.
KubeCon NA in Detroit
eBPF Summit
eBPF Summit is the yearly conference looking at the innovation around eBPF from many different
perspectives, from kernel maintainers working on eBPF implementation, through projects using
eBPF technology to create next-generation tools, to end users sharing their experiences of
leveraging this awesome new set of capabilities. Cilium was well represented with production
use cases and debugging stories.
Meetups
2022 was the first year back to in person meet ups and it was great to see Cilium popping up in
different countries. You can catch all of the videos on Youtube.
12
If 2022 has been the year of Cilium as the CNI, I have three predictions for 2023: service mesh maturity,
ecosystem expansion, and increased software supply chain security. Finally, as a milestone, I think
Cilium will also graduate from the CNCF.
Cilium service mesh was launched at the end of 2021 and the first users already have it in
production. Just like using the same CNI everywhere provides a consistent user experience across
infrastructures, Cilium Service Mesh provides one solution to control, observe, and secure your
network from L3-L7. The main service mesh feature that is missing right now is mTLS, but that will be
included in one of the next releases of Cilium. Check out the release candidates to get involved in the
testing! Once that is just a flag away, the onboarding to Cilium Service Mesh will massively accelerate.
With Cilium Service Mesh, end users finally will have control of their network from L3-L7 in one place
rather than trying to debug networking issues across layers and tools.
With Cilium as the standard CNI, an ecosystem can now begin to emerge around it. Standardization
makes it massively easier to provide integrations and extensions since everyone is using the same
base. We can already see this ecosystem beginning to form with the Grafana announcement. With
Cilium everywhere capturing observability data using eBPF, it makes total sense to connect it to Grafana
and visualize the data. With Cilium capturing data in the kernel with eBPF, the ecosystem around
Cilium can leverage this data and functionality to build better platforms for end users. 2023 will be
when we start to see these integrations and functionalities explode.
Finally, it wouldn’t be 2022 without mentioning the software supply chain security and 2023 will see
Cilium at the forefront of it. Cilium as a project has already taken steps forward on this front by
generating signed releases and a software bill of materials (SBOM). We have also worked to
reduce the privileges needed to run and operate Cilium. More far reaching than this though is how
people are using Tetragon to secure the software supply chain by verifying eBPF traces for Supply
Chain Artifacts. There are so many use cases for Tetragon to make systems more secure and the
excitement around the project just highlights that. 2023 will see an even more secure Cilium and better
protected software supply chain because of Cilium.
If all of this has gotten you excited about Cilium, there are many ways to get involved. The best way to
start is to check out the Cilium project on GitHub. There, you can find information about the project, as
well as ways to get involved, such as reporting bugs, suggesting new features, or contributing code.
Additionally, the Cilium community is active on Slack and Twitter. If you want to just follow along for
now, be sure to sign up for the newsletter. If you have any questions or comments please reach out to
[email protected].