Skip to content

Multitenant KEDA

Multitenant KEDA lets you run multiple isolated KEDA operators inside a single Kubernetes cluster, each responsible for scaling workloads in its own set of namespaces. A single shared metrics adapter routes HPA requests to the correct operator automatically, with full mTLS isolation between tenants.

Multitenant KEDA introduces three components:

  1. Tenant KEDA operators - each typically runs in the keda namespace (but can be installed into a different namespace) and watches only its assigned target namespace(s). They are fully independent: separate deployments, separate TLS certificates, separate reconcile loops.

  2. Shared metrics adapter - a single keda-operator-metrics-apiserver that the Kubernetes API server calls for external metrics. It routes each HPA’s metric request to the correct tenant operator based on the ScaledObject’s namespace.

  3. Kedify agent is responsible for discovering tenant registrations and synchronizing TLS certificates to the metrics adapter.

  1. The Kubernetes HPA controller queries external.metrics.k8s.io for external metric values referenced by an HPA associated with workloads in namespace foo
  2. The metrics adapter looks up foo in its namespace-to-tenant routing table
  3. The adapter forwards the gRPC GetMetrics call to the tenant operator watching foo over mTLS
  4. The result is returned to the HPA

If a namespace doesn’t match any tenant, the request goes to the default tenant. This keeps backward compatibility with existing single-tenant setups.

The KEDA Helm chart supports three modes via kedify.multitenant.mode:

Modekeda-operatorMetrics ServerWebhooksCRDs
"" (disabled)Standard single-tenantStandardStandardStandard
"default"Default tenant + multitenant routingYes, routes to tenantsYesYes
"tenant"Tenant operator onlyNoNoNo
  • Default mode supports installation of the full KEDA stack (operator, metrics server, webhooks, CRDs) with the multitenant routing layer enabled in the metrics adapter.
  • Tenant mode the installation of CRDs, metrics server, and webhooks must be explicitly disabled because they are already provided by the default installation. Tenants can be installed in the same namespace as the default or a different one, but they must have unique release names, operator deployment names, service accounts, and TLS secret names.

Setting correct mode configures the Kedify/KEDA helm chart. Under the hood, each tenant KEDA operator registers itself by creating a ConfigMap labeled kedify.io/tenant-registration: "true" as part of the helm release. The registration ConfigMap contains:

FieldDescription
nameTenant identifier (<namespace>/<release-name>)
namespaceNamespace where the operator runs
watchNamespaceNamespace(s) this operator watches for ScaledObjects
addressgRPC address of the operator (e.g. keda-operator-foo.keda.svc.cluster.local:9666)
tlsSecretRefName of the Secret containing the operator’s TLS certificates
isDefaultTenantWhether this is the default (fallback) tenant
operatorDeploymentNameName of the operator Deployment

The kedify-agent discovers these ConfigMaps, reads TLS certs from each tenant’s Secret, and syncs everything into a single configuration Secret (kedify-multitenancy-config) that the metrics adapter has mounted as a volume.

Instead of one operator handling every ScaledObject in the cluster, you shard the work across multiple operators, each watching a subset of namespaces.

You can deploy multiple keda-operators in a single namespace, one keda-operator per namespace, or any combination of both topologies.

Each tenant KEDA operator generates its own TLS certificate pair (managed by KEDA’s built-in cert rotation). The kedify-agent reads these certificates and distributes them to the metrics adapter via the shared configuration Secret.

Certificate rotation is handled automatically:

  • The agent periodically checks for certificate changes (SHA256 hash comparison, every 60 seconds)
  • Updated certificates are synced to the shared configuration Secret
  • The metrics adapter detects the Secret change via filesystem watch and reloads TLS credentials without a restart
  • TLS 1.3 minimum is enforced on all tenant connections
  • Per-tenant authority is used for SNI/server certificate SAN matching

The metrics adapter maintains a routing table that maps each watched namespace to its tenant’s gRPC client. The routing semantics are:

  1. Fast path - direct namespace-to-client map lookup (O(1))
  2. Default tenant fallback - if a namespace doesn’t match any tenant, the request goes to the tenant installed with kedify.multitenant.mode=default
  3. Error - if no tenants are configured, the request fails

Each tenant operator only sees ScaledObjects in its own namespace. The mTLS certificates are unique per tenant, so even the gRPC transport is isolated.

The metrics adapter exposes the following Prometheus metrics for monitoring multitenant routing:

MetricTypeDescription
kedify_metrics_adapter_tenant_requests_totalCounterTotal metric requests per tenant
kedify_metrics_adapter_tenant_route_fallback_totalCounterRequests that fell back to the default tenant
kedify_metrics_adapter_tenant_route_errors_totalCounterRouting errors (labeled by tenant, cause)
kedify_metrics_adapter_tenant_connection_readyGaugeTenant gRPC connection state (1=ready, 0=not)

The metrics adapter emits events on its own Pod:

TypeReasonDescription
NormalKedifyTenantConnectionReadygRPC connection to a tenant is established
WarningKedifyTenantConnectionNotReadygRPC connection to a tenant failed

1. Install the kedify-agent with multitenancy enabled

Section titled “1. Install the kedify-agent with multitenancy enabled”
Terminal window
helm upgrade --install kedify-agent oci://ghcr.io/kedify/charts/kedify-agent --version v0.5.1-mt \
--namespace keda --create-namespace \
--set agent.features.multitenantKEDAEnabled=true \
--set agent.orgId="<your-org-id>" \
--set agent.apiKey="<your-api-key>"

The agent watches for tenant registration ConfigMaps and syncs TLS certificates to the metrics adapter.

2. Install the default KEDA operator in multitenant mode

Section titled “2. Install the default KEDA operator in multitenant mode”
Terminal window
helm upgrade --install keda oci://ghcr.io/kedify/charts/keda --version v2.19.0-0-mt \
--namespace keda --create-namespace \
--set kedify.multitenant.mode=default \
--set watchNamespace=keda

This installs the full KEDA stack with the multitenant routing layer enabled in the metrics adapter. The watchNamespace=keda scopes this operator to the keda namespace only. Namespaces not matched by any tenant operator will still fall back to this default tenant for metric routing, but the default operator will only reconcile ScaledObjects in its own watched namespace. If you need the default tenant to also reconcile ScaledObjects in unassigned namespaces, omit watchNamespace to watch cluster-wide.

For each tenant, install a KEDA operator scoped to its namespace. For example, a tenant foo watching namespace foo:

Terminal window
helm upgrade --install foo oci://ghcr.io/kedify/charts/keda --version v2.19.0-0-mt \
--namespace keda \
--set kedify.multitenant.mode=tenant \
--set watchNamespace=foo \
--set operator.name=keda-operator-foo \
--set serviceAccount.operator.name=keda-operator-foo \
--set certificates.secretName=kedaorg-certs-foo \
--set crds.install=false \
--set metricsServer.enabled=false \
--set webhooks.enabled=false

The tenant install disables three components that are already handled by the default installation:

  • CRDs - cluster-scoped resources like ScaledObject are already installed by the default release. Installing them again would create ownership conflicts.
  • Metrics server - there’s a single shared metrics adapter that routes HPA requests to the correct tenant. Each tenant doesn’t need its own.
  • Webhooks - the admission webhook (ValidatingWebhookConfiguration) is cluster-scoped and already validates ScaledObjects for all namespaces.

Repeat for each additional tenant with a unique release name, operator.name, service account, and certificate secret name.

Create ScaledObjects in tenant namespaces as usual - they’ll be picked up by the correct operator automatically.

apiVersion: keda.sh/v1alpha1
kind: ScaledObject
metadata:
name: my-scaledobject
namespace: foo
spec:
scaleTargetRef:
name: my-deployment
triggers:
- type: prometheus
metadata:
serverAddress: http://prometheus.monitoring.svc:9090
query: sum(rate(http_requests_total{namespace="foo"}[2m]))
threshold: "100"
ValueDefaultDescription
kedify.multitenant.mode""Deployment mode: "" (disabled), "default", or "tenant"
kedify.multitenant.configSecretNamekedify-multitenancy-configSecret name for tenant connection configs
kedify.multitenant.address""Override gRPC address for this tenant
kedify.multitenant.authority""SNI authority override
kedify.multitenant.agentNamespacekedaNamespace where kedify-agent runs
kedify.multitenant.agentServiceAccountkedify-agentServiceAccount of kedify-agent
metricsServer.enabledtrueSet to false for tenant-mode deployments
webhooks.enabledtrueSet to false for tenant-mode deployments
crds.installtrueSet to false for tenant-mode deployments
watchNamespace""Namespace(s) this operator watches
operator.namekeda-operatorOperator deployment name (must be unique per tenant)
serviceAccount.operator.namekeda-operatorOperator service account name
certificates.secretNamekedaorg-certsTLS certificate secret name (must be unique per tenant)

Kedify Agent Chart (kedify/charts/kedify-agent)

Section titled “Kedify Agent Chart (kedify/charts/kedify-agent)”
ValueDefaultDescription
agent.features.multitenantKEDAEnabledfalseEnable multitenant KEDA support

The kedify-agent reports multitenant status in the KedifyConfiguration custom resource:

Terminal window
kubectl get kedifyconfiguration -n keda -o yaml

Check status.discoveredTenants[] for per-tenant health:

FieldDescription
operatorReadyWhether the tenant operator is running
tlsCertReadyWhether the TLS certificate Secret is available
configSyncedWhether the tenant config has been synced to the metrics adapter
messageHuman-readable status message

To check the metrics adapter’s tenant connections:

Terminal window
# Check adapter logs for tenant routing events
kubectl logs -n keda deploy/keda-operator-metrics-apiserver | grep -i tenant
# Check Kubernetes events for connection state
kubectl get events -n keda --field-selector reason=KedifyTenantConnectionReady
kubectl get events -n keda --field-selector reason=KedifyTenantConnectionNotReady