1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2024-12-14 11:57:48 +00:00

add Saxo Bank and Velux as adopters (#7036)

Signed-off-by: Chip Zoller <chipzoller@gmail.com>
This commit is contained in:
Chip Zoller 2023-04-28 07:58:58 -04:00 committed by GitHub
parent f964f43889
commit 9cdb012c2c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -4,7 +4,6 @@ This is the list of organizations and users that have publicly shared how they a
💡 **Add your organization by creating a PR or [submitting this form](https://docs.google.com/forms/d/e/1FAIpQLSe1IBSxDFn_iAAq9vd0nQdjKbapvgGyM8j2IX_z4xSCu-OSNg/viewform)**
Note: There are several other organizations and users that are unable to publicly share their stories but are active in the Kyverno community. We appreciate all our users and their contributions to making Kyverno a successful CNCF project.
The list of organizations that have publicly shared the usage of Kyverno:
@ -30,7 +29,9 @@ The list of organizations that have publicly shared the usage of Kyverno:
| [Yahoo](https://www.yahoo.com/) | Use Kyverno for mutation, to replace image tags to digest and also for validation for checking freshness of images. |
| [T-Systems](https://www.t-systems.com) | |
| [Red Hat](https://www.redhat.com) | Learn more about Red Hat Advanced Cluster Management for Kubernetes for [Generating Governance Policies Using Kustomize and GitOps](https://cloud.redhat.com/blog/generating-governance-policies-using-kustomize-and-gitops).|
| [DE-CIX](https://www.de-cix.net) | Kyvernos policy enforcement is used to enforce the company's security guidelines. This is done using validation, mutation and generation techniques. |
| [DE-CIX](https://www.de-cix.net) | Kyvernos policy enforcement is used to enforce the company's security guidelines. This is done using validation, mutation and generation techniques. |
| [Saxo Bank](https://www.home.saxo/) | We use Kyverno to enforce security and best practises. |
| [Velux](https://www.velux.com/) | We successfully use Kyverno in our clusters for security, best practice enforcement, resource mutation, secret copying and more! |
<!-- append the line below to the table
| [name](URL) | brief description of how you are using Kyverno |
-->