- Identity-Aware and HTTP-Aware Policy Enforcement
- Locking down external access with DNS-based policies
- Inspecting TLS Encrypted Connections with Cilium
- Securing a Kafka cluster
- How to secure gRPC
- Getting Started Securing Elasticsearch
- How to Secure a Cassandra Database
- Getting Started Securing Memcached
- Locking down external access using AWS metadata
- Creating policies from verdicts
- Host Firewall (beta when using kube-proxy/)
- Advanced Networking
- Setting Up Cilium in AlibabaCloud ENI Mode (beta/)
- Using kube-router to run BGP
- Using BIRD to run BGP
- IPVLAN based Networking (beta/)
- Transparent Encryption
- Host-Reachable Services
- Kubernetes Without kube-proxy
- Bandwidth Manager (beta/)
- Kata Containers with Cilium
- Configuring IPAM modes
- Local Redirect Policy (beta/)
- BGP (beta/)
- Egress Gateway (beta/)