1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 07:57:07 +00:00

Add OVHcloud in ADOPTERS.md (#11966)

Signed-off-by: Aurelie Vache <scraly@gmail.com>
This commit is contained in:
Aurelie Vache 2025-01-21 11:49:33 +01:00 committed by GitHub
parent 54a8a53205
commit 07a23746d8
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -48,6 +48,7 @@ The list of organizations that have publicly shared the usage of Kyverno:
| [Corestream](https://corp.corestream.com/) | At our organization, we've leveraged Kyverno to significantly enhance our Kubernetes-based DevOps practices. We use Kyverno's policy-as-code approach to automate and enforce best practices across our clusters. Our policies cover a wide range of scenarios, from managing Azure Key Vault integrations and secret protections to enforcing image registry restrictions and implementing multi-region deployment strategies. Kyverno allows us to automatically inject configuration, create role-based access controls, and ensure consistent labeling across our resources. This automation not only improves our security posture by preventing misconfigurations and unauthorized changes but also streamlines our deployment processes. By using Kyverno, we've been able to standardize our environments, reduce manual errors, and maintain compliance with our organization's policies. | | [Corestream](https://corp.corestream.com/) | At our organization, we've leveraged Kyverno to significantly enhance our Kubernetes-based DevOps practices. We use Kyverno's policy-as-code approach to automate and enforce best practices across our clusters. Our policies cover a wide range of scenarios, from managing Azure Key Vault integrations and secret protections to enforcing image registry restrictions and implementing multi-region deployment strategies. Kyverno allows us to automatically inject configuration, create role-based access controls, and ensure consistent labeling across our resources. This automation not only improves our security posture by preventing misconfigurations and unauthorized changes but also streamlines our deployment processes. By using Kyverno, we've been able to standardize our environments, reduce manual errors, and maintain compliance with our organization's policies. |
| [Tigera](https://www.tigera.io/) | Kubernetes Policy and Governance | | [Tigera](https://www.tigera.io/) | Kubernetes Policy and Governance |
| [kubriX platform](kubrix.io) | Policy enforcement and automation of your kubrix platform using GitOps | | [kubriX platform](kubrix.io) | Policy enforcement and automation of your kubrix platform using GitOps |
| [OVHcloud](https://www.ovhcloud.com/) | At OVHcloud, we advise our customers to [deploy Kyverno as a policy engine on their Managed Kubernetes (MKS) clusters](https://help.ovhcloud.com/csm/en-gb-public-cloud-kubernetes-install-kyverno?id=kb_article_view&sysparm_article=KB0049839) and we also use it internally to enforce the security of several of our products. |
<!-- append the line below to the table <!-- append the line below to the table
| [name](URL) | brief description of how you are using Kyverno | | [name](URL) | brief description of how you are using Kyverno |
--> -->