From 1b3186b8baf0bfebba565c3738243e192251f181 Mon Sep 17 00:00:00 2001 From: Jim Bugwadia Date: Sat, 11 Nov 2023 22:45:00 -0800 Subject: [PATCH] Adopters dodp1 (#8889) * fix excessive logs Signed-off-by: Jim Bugwadia * add DoD Platform One as an adopter. Signed-off-by: Jim Bugwadia --------- Signed-off-by: Jim Bugwadia --- ADOPTERS.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/ADOPTERS.md b/ADOPTERS.md index 58da89a9d4..34640b3b0d 100644 --- a/ADOPTERS.md +++ b/ADOPTERS.md @@ -39,6 +39,8 @@ The list of organizations that have publicly shared the usage of Kyverno: | [LinkedIn](https://www.linkedin.com/) | Policy enforcement on our on-prem Kubernetes clusters. | | [Groww](https://groww.in/) | We have implemented Kyverno as a part of Auto compliance. We put policies to satisfy CIS Compliance for GKE as well as block anomalies detected by the Red Team. | | [Spotify](https://www.cncf.io/announcements/2023/11/08/cloud-native-computing-foundation-presents-the-top-end-user-award-to-spotify/) | Spotify uses Kyverno extensively for its admission controller capabilities, including best practices and environment-specific data. | +| [Spotify](https://www.cncf.io/announcements/2023/11/08/cloud-native-computing-foundation-presents-the-top-end-user-award-to-spotify/) | Spotify uses Kyverno extensively for its admission controller capabilities, including best practices and environment-specific data. | +| [US DoD Platform One](https://p1.dso.mil/) | The US Department of Defense (DoD) Platform One uses Kyverno as its default policy engine for Kubernetes. |