Skip to content

TLS Certificates in Multi‑Tenant Kubernetes

In a shared cluster, different teams can create Ingress or IngressRoute objects that Traefik consumes.

Traefik does not support multi-tenancy when using the Kubernetes Ingress or IngressRoute specifications due to the way TLS certificate management is handled.

At the core of this limitation is the TLS Store, which holds all the TLS certificates used by Traefik. As this Store is global in Traefik, it is shared across all namespaces, meaning any Ingress or IngressRoute in the cluster can potentially reference or affect TLS configurations intended for other tenants.

This lack of isolation poses a risk in multi-tenant environments where different teams or applications require strict boundaries between resources, especially around sensitive data like TLS certificates.

In contrast, the Kubernetes Gateway API provides better primitives for secure multi-tenancy. Specifically, the Listener resource in the Gateway API allows administrators to explicitly define which Route resources (e.g., HTTPRoute) are permitted to bind to which domain names or ports. This capability enforces stricter ownership and isolation, making it a safer choice for multi-tenant use cases.

When strict boundaries are required between resources and teams, we recommend using one Traefik instance per tenant.

In Kubernetes one way to isolate a tenant is to restrict it to a namespace. In that case, the namespace options from the Kubernetes CRD and Ingress providers can be leveraged.

Dedicate one Traefik instance per tenant using the Helm Chart

providers:
  kubernetesCRD:
    namespaces:
      - tenant
  kubernetesIngress:
    namespaces:
      - tenant