Kubernetes Plugins

The Akeyless Kubernetes plugins enable containerized applications to use Static, Dynamic, and Rotated secrets as well as Certificates sourced from the Akeyless Platform.

The following plugins are available for Kubernetes:

📘

Note: The documentation, configuration and examples for Akeyless Kubernetes plugins are also applicable to Red Hat OpenShift environment.

Feature Compatibility Matrix

Akeyless provides multiple ways to consume secrets from Kubernetes. The following matrix compares the most common integrations:

Capability / FeatureExternal Secrets Operator (ESO)Akeyless Kubernetes Secrets InjectorAkeyless Secrets Store CSI ProviderCert Manager (Akeyless issuer)
Primary use caseSync Akeyless secrets into Kubernetes SecretsInject secrets directly into pods at runtimeMount secrets as volumes in podsIssue TLS certs from Akeyless
Secret storage in KubernetesYes (Kubernetes Secret objects)No (file/env in pod only)No (mounted files only)Partial (only certificates as Kubernetes secrets)
Secret injection methodController reconciles ExternalSecret CRDsMutating Admission Webhook (init and optional sidecar)CSI driver mounts secrets into container filesystemCertificate issuance & renewal
Supported Secret TypesStatic, Rotated, Dynamic, CertificatesStatic, Rotated, Dynamic, Certificates, USCStatic, Rotated, CertificatesCertificates
Push secrets from Kubernetes to AkeylessYes (PushSecret)NoNoNo
Native JSON extraction and templatingYes (dataFrom.extract, templating support)No (app reads raw file/env values)NoN/A
Ideal forGitOps, configurations as code, multi-tenant clustersApp-centric injection with no Kubernetes Secret persistenceFile-based consumption, legacy apps expecting filesTLS for Ingress and Service objects

Tutorial

Check out our tutorial video on Injecting Secrets into a Kubernetes Cluster.


Footer Section