Gateway Network Connectivity

Akeyless SaaS Core Services

The Akeyless Gateway is a stateless Docker container, provided as a standalone or as a cluster. To function correctly, it requires public network connectivity to the Akeyless SaaS core services (see the table below).

A basic Gateway deployment requires a server with Docker Engine installed. Download the latest Docker Engine from the Docker website.

For deployment instructions, see Deploy Gateway.

ℹ️

Note (Tenant Environments):

Accounts created in a specific tenant environment must use the matching service endpoints. For example, the eu tenant uses https://vault.eu.akeyless.io.

Available explicit tenants are us and eu.

The following table describes the main functionality of Akeyless microservices in the global environment:

ServiceEndpointIPPortDescription
Consolehttps://console.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128443Akeyless SaaS Platform
Vaulthttps://vault.akeyless.io, https://vault-ro.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128443User Account Management (UAM), managing user accounts, items, and roles
Authhttps://auth.akeyless.io, https://auth-ro.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128443Akeyless Authentication service
Certificate Authhttps://auth-cert.akeyless.io18.189.176.104443Relevant only for certificate-based authentication
Audithttps://audit.akeyless.io, https://audit-ro.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128443Audit Log main service, enables log forwarding from Gateway and Bastion
BIShttps://bis.akeyless.io, https://bis-ro.akeyless.io52.223.11.194, 35.71.185.167443Billing Infrastructure Service (BIS)
Gatorhttps://gator.akeyless.io, https://gator-ro.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128443Main service to sync gateway instances and connections with Akeyless SaaS
MQamqps://mq.akeyless.io52.223.11.194, 35.71.185.1675671Message queue (MQ) between Akeyless microservices
KFMhttps://kfm1.akeyless.io, https://kfm1-ro.akeyless.io, https://kfm2.akeyless.io, https://kfm2-ro.akeyless.io, https://kfm3.akeyless.io, https://kfm3-ro.akeyless.io, https://kfm4.akeyless.io, https://kfm4-ro.akeyless.io52.223.11.194, 35.71.185.167, 52.223.35.208, 35.71.147.131, 15.197.228.204, 3.33.247.128, 34.120.160.242443Key Fragments Services, enabling full DFC encryption
Public Gatewayhttps://rest.akeyless.io, https://api.akeyless.io15.197.223.248, 3.33.244.138443Optional: Public Gateway REST API v1/v2
Public HashiCorp Vault Proxyhttps://hvp.akeyless.io15.197.223.248, 3.33.244.138443Optional: Public HashiCorp Vault Proxy endpoint
Logstcp://log.akeyless.io:944335.192.171.1719443Gateway logs over TLS-encrypted Splunk forwarding for global and US environments
CLI S3 Buckethttps://akeyless-cli.s3.us-east-2.amazonaws.comN/A443S3 bucket to download and update Akeyless CLI versions
Services S3 Buckethttps://akeylessservices.s3.us-east-2.amazonaws.comN/A443S3 bucket to download and update Akeyless official binaries (for example, Gateway)
Artifacts Endpointhttps://artifacts.site2.akeyless.io34.149.100.205443Optional: Akeyless official artifacts endpoint. Relevant when working with whitelisted IP ranges
ℹ️

Note:

When using proxy services, you can use https://sqs.us-east-2.amazonaws.com instead of classic MQ services. If you are not working with a proxy service and still want to use SQS instead of classic MQ, set your Gateway deployment with the SQS_NO_PROXY="true" environment variable.

The artifacts endpoint https://artifacts.site2.akeyless.io is the documented default repository endpoint in current Gateway chart and CLI references.

Gateway Inbound Ports

The table below describes common inbound ports on the Gateway service itself.

PortNamePurposeRequired
18888Web UIGateway Web UIOptional
8000Configure App (deprecated)Redirects to Console app (DOCS-309, Gateway v4.47.0)Optional
8080Legacy APIAkeyless REST API v1Optional
8081APIAkeyless REST API v2Optional
8200HashiCorp Vault ProxyHashiCorp Vault Proxy endpointOptional
5696KMIPKMIP service endpointOptional

Use the Akeyless SaaS Console (https://console.akeyless.io) or <gateway-protocol>://<gateway-host>/console to open the Gateway Console UI entry point. To change Gateway settings, open the Gateway tab, select the relevant Gateway, and select Manage Gateway. The user must have Gateway-scoped administrative permission (scope or all) to see the Gateway in the list and manage it. In updated releases, Configure App on port 8000 is deprecated and can redirect to the Console app.

ℹ️

Note:

The Helm chart values include a grpc service port (8085). Validate deployment-level listener configuration for your release before exposing this port.

Proxy Settings and Queue Transport

The Gateway supports outbound proxy settings through the following environment variables:

  • HTTP_PROXY
  • HTTPS_PROXY
  • NO_PROXY

When HTTP_PROXY or HTTPS_PROXY is set, Gateway queue transport is switched to SQS mode.

If no proxy is configured and you still want to use SQS queue transport, set SQS_NO_PROXY="true".

Helm Configuration for Queue and Proxy Settings

When deploying with Helm, set SQS_NO_PROXY using env in your Gateway values file:

env:
  - name: SQS_NO_PROXY
    value: "true"

To configure outbound proxy variables with Helm, set httpProxySettings in your values file:

httpProxySettings:
  http_proxy: "http://proxy.example.internal:3128"
  https_proxy: "http://proxy.example.internal:3128"
  no_proxy: "localhost,127.0.0.1,.svc,.cluster.local"

If you set httpProxySettings.http_proxy or httpProxySettings.https_proxy in Helm values, Gateway queue transport is also switched to SQS mode.

DNS and Endpoint Resolution

Gateway hosts and pods must be able to resolve all required service hostnames listed on this page. For Akeyless API host resolution, Gateway routes GET requests to -ro hostnames and keeps non-GET requests on primary hostnames.

If the configured API hostname already includes -ro, Gateway does not add the suffix again.

If internal DNS is configured for Akeyless API communication, Gateway skips -ro hostname rewriting.

When AKEYLESS_URL and akeyless_url are not explicitly set, Gateway builds the fallback API URL from the configured protocol and akeyless_server_dns (<protocol>://<akeyless_server_dns>).

Working Without MQ Connection

If your organization's policies restrict non-web ports, it's important to understand the potential implications of blocking the MQ connection for your Akeyless setup:

  • Cross Gateway Access: The MQ service enables retrieving Gateways secrets and objects (that is Dynamic/Rotated Secrets, Classic Keys, and so on) across different Gateways and the Akeyless SaaS console. If MQ is blocked, you can still retrieve those secrets directly from their own Gateway. However, requests from other Gateways or the SaaS console will not be processed.
  • Operational Adjustments: Without the MQ service, you will need to ensure you are working directly with the correct Gateway for each relevant item. This may require additional manual oversight and adjustments compared to a setup with MQ enabled.
  • Centralized Management: The MQ service allows for centralized management, enabling you to perform all operations from the SaaS console. If MQ is blocked, this convenience will not be available, and you will need to interact directly with individual Gateways.
  • Event Forwarding relies on the MQ service for publishing event messages to the Gateway. Blocking the MQ connection will prevent event forwarding from working.

Footer Section