Secrets Store Csi Driver

Secrets Store CSI driver for Kubernetes secrets - Integrates secrets stores with Kubernetes via a CSI volume.
Alternatives To Secrets Store Csi Driver
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Velero7,6515110 hours ago179July 19, 2023484apache-2.0Go
Backup and migrate Kubernetes applications and their persistent volumes
Kubernetes Handbook5,105
5 days ago1otherMakefile
Kubernetes Handbook (Kubernetes指南)
11 hours ago1,236apache-2.0Shell
Cloud-Native distributed storage built on and for Kubernetes
Nfs Subdir External Provisioner2,054
2 days ago39apache-2.0Shell
Dynamic sub-dir volume provisioner on a remote NFS server.
6 years ago5September 15, 201688apache-2.0Go
Torus Distributed Storage
Local Path Provisioner1,743
3 days ago29March 22, 2023134apache-2.0Go
Dynamically provisioning persistent local storage with Kubernetes
Heketi1,2501791413 months ago42June 15, 2022otherGo
RESTful based volume management framework for GlusterFS
Stash1,21116a month ago102August 14, 2023100otherGo
🛅 Backup your Kubernetes Stateful Applications
Secrets Store Csi Driver1,055103 days ago71July 14, 202268apache-2.0Go
Secrets Store CSI driver for Kubernetes secrets - Integrates secrets stores with Kubernetes via a CSI volume.
Ceph Csi1,013
13 hours ago11April 22, 202199apache-2.0Go
CSI driver for Ceph
Alternatives To Secrets Store Csi Driver
Select To Compare

Alternative Project Comparisons

Kubernetes Secrets Store CSI Driver

GitHub release (latest by date) Go Report Card GitHub go.mod Go version Slack OpenSSF Scorecard

Secrets Store CSI Driver for Kubernetes secrets - Integrates secrets stores with Kubernetes via a Container Storage Interface (CSI) volume. The Secrets Store CSI Driver is a subproject of Kubernetes SIG Auth.

The Secrets Store CSI Driver allows Kubernetes to mount multiple secrets, keys, and certs stored in enterprise-grade external secrets stores into their pods as a volume. Once the Volume is attached, the data in it is mounted into the container's file system.

Test Status

Test Status
periodic/image-scan sig-auth-secrets-store-csi-driver-periodic/secrets-store-csi-driver-image-scan
periodic/azure-upgrade sig-auth-secrets-store-csi-driver-periodic/secrets-store-csi-driver-upgrade-test-azure
postsubmit/aws sig-auth-secrets-store-csi-driver-postsubmit/secrets-store-csi-driver-e2e-aws-postsubmit
postsubmit/azure sig-auth-secrets-store-csi-driver-postsubmit/secrets-store-csi-driver-e2e-azure-postsubmit
postsubmit/gcp sig-auth-secrets-store-csi-driver-postsubmit/secrets-store-csi-driver-e2e-gcp-postsubmit
postsubmit/vault sig-auth-secrets-store-csi-driver-postsubmit/secrets-store-csi-driver-e2e-vault-postsubmit

Want to help?

Join us to help define the direction and implementation of this project!


  • Mounts secrets/keys/certs to pod using a CSI Inline volume
  • Supports mounting multiple secrets store objects as a single volume
  • Supports multiple secrets stores as providers. Multiple providers can run in the same cluster simultaneously.
  • Supports pod portability with the SecretProviderClass CRD
  • Supports Linux and Windows containers
  • Supports sync with Kubernetes Secrets


Secrets Store CSI Driver Demo

Getting Started

Check out the installation instructions to deploy the Secrets Store CSI Driver and providers. Get familiar with our CRDs and core components

Development Guide

Follow these steps to setup Secrets Store CSI Driver for local debugging.


Please see the docs for more in-depth information and supported features.

Getting involved and contributing

Are you interested in contributing to secrets-store-csi-driver? We, the maintainers and community, would love your suggestions, contributions, and help! Also, the maintainers can be contacted at any time to learn more about how to get involved.

In the interest of getting more new people involved, we tag issues with good first issue. These are typically issues that have smaller scope but are good ways to start to get acquainted with the codebase.

We also encourage ALL active community participants to act as if they are maintainers, even if you don't have "official" write permissions. This is a community effort, we are here to serve the Kubernetes community. If you have an active interest and you want to get involved, you have real power! Don't assume that the only people who can get things done around here are the "maintainers".

We also would love to add more "official" maintainers, so show us what you can do!

Check out Secrets Store CSI Driver Membership for more information.

Code of conduct

Participation in the Kubernetes community is governed by the Kubernetes Code of Conduct.

Popular Volume Projects
Popular Kubernetes Projects
Popular Media Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Kubernetes Secrets