Skip to main content
Kubernetes Networking
12 min read
Updated June 23, 2026

CiliumvsCalico

A detailed comparison of Cilium and Calico for Kubernetes networking and security. Covers eBPF vs iptables, network policies, observability, performance, and real-world use cases to help you pick the right CNI plugin.

Cilium
Calico
Kubernetes
CNI
eBPF
Networking

Cilium

An eBPF-based Kubernetes CNI plugin that provides networking, security, and observability. Bypasses iptables by programming the Linux kernel data path directly, enabling high-performance networking and deep flow-level visibility through Hubble.

Visit website

Calico

A widely deployed Kubernetes CNI plugin that provides networking and network policy enforcement. Originally built on iptables and BGP routing, now also supports an eBPF data plane. Known for its maturity, BGP integration, and broad platform support.

Visit website

Kubernetes networking is one of those things that works invisibly when done right and causes massive headaches when done wrong. Your choice of CNI (Container Network Interface) plugin determines how pods communicate, how network policies are enforced, and how much visibility you have into what is happening on the wire. In 2026, Cilium and Calico are the two most deployed CNI plugins in production Kubernetes clusters, and each represents a different philosophy about how networking should work.

Cilium, created by Isovalent (acquired by Cisco in 2024), is built on eBPF - a technology that lets you run sandboxed programs directly in the Linux kernel. Instead of relying on iptables for packet filtering and routing, Cilium programs the kernel's data path directly. This gives it significant performance advantages at scale and enables deep observability features like Hubble, which provides per-flow visibility without any application instrumentation. Cilium is a CNCF graduated project and is the default CNI for GKE, AKS, and EKS in many configurations.

Calico, created by Tigera, has been in the Kubernetes networking space since the early days. It originally used iptables for network policy enforcement and BGP for routing, making it a natural fit for organizations with existing network engineering expertise. Calico has since added an eBPF data plane as an alternative to iptables, narrowing the performance gap with Cilium. The open-source version covers networking and network policies, while Calico Enterprise adds threat detection, compliance reporting, and a management UI.

Both tools handle the core CNI job well: assigning pod IPs, enabling pod-to-pod communication, and enforcing Kubernetes NetworkPolicy resources. The differences show up in how they do it, what additional capabilities they offer, and where they perform best. Cilium's eBPF foundation gives it advantages in observability and performance at high scale. Calico's maturity and BGP support make it strong in environments that need to integrate with existing network infrastructure.

This comparison covers the practical differences across architecture, performance, network policies, observability, and operational experience. We will help you figure out which one fits your cluster's needs rather than picking a theoretical winner.

Feature Comparison

Architecture

Data Plane Technology
Cilium
eBPF-native; programs Linux kernel data path directly
Calico
iptables (default) or eBPF; flexible choice per environment

Performance

Network Performance at Scale
Cilium
Excellent; eBPF avoids iptables rule scaling issues
Calico
Good with eBPF; degrades with iptables at thousands of services
Node Resource Usage
Cilium
Moderate - eBPF maps and Hubble agent consume memory on each node
Calico
Low in iptables mode; moderate in eBPF mode

Security

L3/L4 Network Policies
Cilium
Kubernetes NetworkPolicy plus Cilium-specific CiliumNetworkPolicy
Calico
Kubernetes NetworkPolicy plus Calico-specific GlobalNetworkPolicy
L7 Network Policies
Cilium
In-kernel L7 filtering for HTTP, gRPC, Kafka, and DNS
Calico
L7 policies via Envoy sidecar injection; additional overhead
Encryption
Cilium
Transparent WireGuard or IPsec encryption for pod traffic
Calico
WireGuard encryption available in both iptables and eBPF modes

Monitoring

Observability
Cilium
Hubble provides flow logs, service maps, DNS monitoring, and a UI
Calico
Basic flow logs; rich observability requires Calico Enterprise

Networking

BGP Routing
Cilium
BGP support available but relatively new
Calico
Mature BGP implementation with full peering and route reflection
Multi-Cluster Networking
Cilium
Cluster mesh with cross-cluster pod connectivity and service discovery
Calico
Federation through BGP peering or Calico Enterprise multi-cluster

Service Mesh

Service Mesh Integration
Cilium
Can replace sidecar proxies for some service mesh functions via eBPF
Calico
Works alongside Istio/Linkerd but does not replace mesh functionality

Operations

Platform Support
Cilium
GKE, EKS, AKS, k3s, self-managed; requires kernel 4.19+
Calico
GKE, EKS, AKS, OpenShift, Rancher, k3s; works on older kernels too

Licensing

License
Cilium
Apache 2.0; CNCF graduated project
Calico
Apache 2.0 (open source); Enterprise features require commercial license

Pros and Cons

Cilium

Strengths

  • eBPF data plane delivers better performance than iptables at scale
  • Hubble provides deep network observability with per-flow visibility and service maps
  • Identity-based network policies that work at L3/L4/L7 including HTTP and gRPC filtering
  • No iptables dependency - avoids the scaling issues of large iptables rule sets
  • CNCF graduated project and default CNI for GKE, AKS, and many managed K8s offerings
  • Built-in transparent encryption with WireGuard or IPsec
  • Cluster mesh for multi-cluster pod-to-pod connectivity and service discovery

Weaknesses

  • Requires Linux kernel 4.19+ (5.10+ recommended for full feature set)
  • eBPF debugging requires specialized knowledge that most teams do not have
  • Higher memory usage on each node due to eBPF maps and Hubble agent
  • Some advanced features (Tetragon, enterprise observability) are in the Isovalent/Cisco commercial offering
  • BGP support is newer and less mature than Calico's long-standing BGP implementation
  • Steeper learning curve for network engineers accustomed to traditional networking tools
Calico

Strengths

  • Battle-tested in production since the earliest days of Kubernetes
  • Mature BGP support for integration with existing network infrastructure and peering
  • Supports both iptables and eBPF data planes - choose based on your environment
  • Broad platform support including OpenShift, Rancher, and on-premises deployments
  • Straightforward NetworkPolicy enforcement that is easy to understand and debug
  • Calico Enterprise adds compliance dashboards, threat detection, and flow logs
  • Lower node-level resource overhead in iptables mode for small clusters

Weaknesses

  • iptables data plane has known scaling issues with thousands of services and policies
  • No built-in observability comparable to Cilium's Hubble
  • eBPF mode is newer and less feature-complete than Cilium's eBPF implementation
  • L7 network policies require Envoy sidecar injection rather than in-kernel filtering
  • Enterprise features like threat detection and compliance require a commercial license
  • Flow logging and visualization require Calico Enterprise or manual Prometheus setup

Decision Matrix

Pick this if...

You need deep network observability with flow logs and service maps

Cilium

You need to integrate Kubernetes networking with BGP routers

Calico

You want L7 network policies without sidecar proxies

Cilium

You run clusters on older Linux kernels (pre-4.19)

Calico

You need multi-cluster pod-to-pod connectivity

Cilium

You need compliance reporting and threat detection dashboards

Calico

You want the lowest possible node resource overhead on small clusters

Calico

You want the CNI that major cloud providers are standardizing on

Cilium

Use Cases

Large Kubernetes cluster with 500+ services that needs network policies and flow-level observability

Cilium

Cilium's eBPF data plane scales to hundreds of services without the iptables bottleneck, and Hubble gives you per-flow visibility, DNS monitoring, and service dependency maps without any application changes. This combination is hard to match.

On-premises Kubernetes deployment that needs to peer with existing BGP routers and integrate with the physical network

Calico

Calico's BGP implementation is mature and battle-tested. It can peer with top-of-rack switches, advertise pod CIDR ranges, and integrate with existing IP address management workflows that network teams are already comfortable with.

Security-focused team that needs L7 network policies to control HTTP paths and gRPC methods between services

Cilium

Cilium enforces L7 policies in the kernel via eBPF without injecting sidecars. You can restrict which HTTP paths or gRPC methods a service can call, filter DNS queries, and inspect Kafka topics - all without additional proxy overhead.

Mixed environment with some clusters running older kernel versions (pre-4.19)

Calico

Calico's iptables mode works on virtually any Linux kernel. If you have clusters on older operating systems that cannot run a recent enough kernel for Cilium's eBPF requirements, Calico is the pragmatic choice.

Multi-cluster setup that needs transparent pod-to-pod connectivity across clusters

Cilium

Cilium's cluster mesh feature provides transparent cross-cluster pod networking and service discovery. Pods in one cluster can reach pods in another cluster by their service name without any application-level changes or additional proxies.

Regulated environment that needs compliance reporting and network threat detection

Calico

Calico Enterprise includes compliance dashboards that map network policies to regulatory frameworks, plus threat detection for known malicious IPs and anomalous traffic patterns. This is purpose-built for compliance teams that need audit-ready reports.

Verdict

Cilium4.3 / 5
Calico4.0 / 5

Cilium is the forward-looking choice for teams that want eBPF-native networking, deep observability through Hubble, and L7 security policies without sidecars. It is becoming the industry default as cloud providers adopt it. Calico remains the practical choice for teams that need mature BGP integration, work on older kernels, or want flexibility between iptables and eBPF data planes. Both are production-proven at scale.

Our Recommendation

Choose Cilium if you want eBPF-native performance, Hubble observability, and L7 network policies. Choose Calico if you need BGP integration, support for older kernels, or a lower resource footprint on smaller clusters.

Frequently Asked Questions

It is possible but not trivial. The general approach is to install Cilium alongside Calico in a migration mode, shift traffic node by node, and then remove Calico. Cilium provides a migration guide for this process. Existing Kubernetes NetworkPolicy resources will continue to work since both tools support the standard API. Calico-specific CRDs would need to be translated to Cilium equivalents.
Not quite. Calico's eBPF mode provides similar performance benefits for L3/L4 networking and avoids iptables scaling issues. However, Cilium's eBPF implementation is more mature and offers additional capabilities like in-kernel L7 filtering and the Hubble observability platform that Calico's eBPF mode does not include.
Hubble is Cilium's built-in observability platform. It captures network flows at the eBPF level and provides a CLI, UI, and Prometheus metrics for flow logs, DNS queries, HTTP requests, and service dependency maps. If you currently lack visibility into pod-to-pod traffic, Hubble is one of the strongest reasons to choose Cilium.
GKE uses Cilium-based GKE Dataplane V2 by default. EKS uses the Amazon VPC CNI by default but supports both Cilium and Calico as alternatives. AKS offers Azure CNI with Cilium overlay as an option. Each managed service has its own default, but both Cilium and Calico are supported across all major providers.
Not in a standard setup. Only one CNI plugin should manage pod networking in a cluster. Running both would create conflicts in IP address assignment and routing. During migration you can temporarily have both installed using Cilium's migration mode, but the end state should be one or the other.
For small clusters, the performance difference between eBPF and iptables is negligible. Calico in iptables mode is lighter on resources and simpler to operate at this scale. Cilium still works fine for small clusters, but you are paying the memory overhead of eBPF maps and Hubble without hitting the scale where it matters. Choose based on whether you want Hubble observability (Cilium) or BGP integration (Calico).

Related Comparisons

Container Registries
HarborvsDocker Hub
Read comparison
FinOps & Cost Management
InfracostvsKubecost
Read comparison
Artifact Management
JFrog ArtifactoryvsGitHub Packages
Read comparison
Programming Languages
GovsRust
Read comparison
Deployment Strategies
Blue-Green DeploymentsvsCanary Deployments
Read comparison
JavaScript Runtimes
BunvsNode.js
Read comparison
GitOps & CI/CD
FluxvsJenkins
Read comparison
Continuous Delivery
SpinnakervsArgo CD
Read comparison
Testing & Automation
SeleniumvsPlaywright
Read comparison
Code Quality
SonarQubevsCodeClimate
Read comparison
Serverless
AWS LambdavsGoogle Cloud Functions
Read comparison
Serverless
Serverless FrameworkvsAWS SAM
Read comparison
NoSQL Databases
DynamoDBvsMongoDB
Read comparison
Cloud Storage
AWS S3vsGoogle Cloud Storage
Read comparison
Databases
PostgreSQLvsMySQL
Read comparison
Caching
RedisvsMemcached
Read comparison
Service Discovery
Consulvsetcd
Read comparison
Service Mesh
IstiovsLinkerd
Read comparison
Reverse Proxy & Load Balancing
NginxvsTraefik
Read comparison
CI/CD
Argo CDvsJenkins X
Read comparison
Deployment Platforms
VercelvsNetlify
Read comparison
Cloud Platforms
DigitalOceanvsAWS Lightsail
Read comparison
Monitoring & Observability
New RelicvsDatadog
Read comparison
Infrastructure as Code
PulumivsAWS CDK
Read comparison
Container Platforms
RanchervsOpenShift
Read comparison
CI/CD
CircleCIvsGitHub Actions
Read comparison
Security & Secrets
HashiCorp VaultvsAWS Secrets Manager
Read comparison
Monitoring & Observability
GrafanavsKibana
Read comparison
Security Scanning
SnykvsTrivy
Read comparison
Container Orchestration
Amazon ECSvsAmazon EKS
Read comparison
Infrastructure as Code
TerraformvsCloudFormation
Read comparison
Log Management
ELK StackvsLoki + Grafana
Read comparison
Source Control & DevOps Platforms
GitHubvsGitLab
Read comparison
Configuration Management
AnsiblevsChef
Read comparison
Container Orchestration
Docker SwarmvsKubernetes
Read comparison
Kubernetes Configuration
HelmvsKustomize
Read comparison
Monitoring & Observability
PrometheusvsDatadog
Read comparison
CI/CD
GitLab CIvsGitHub Actions
Read comparison
Containers
PodmanvsDocker
Read comparison
GitOps & CD
Argo CDvsFlux
Read comparison
CI/CD
JenkinsvsGitHub Actions
Read comparison
Infrastructure as Code
TerraformvsPulumi
Read comparison

Found an issue?