AT&T, New Jersey, United States.
World Journal of Advanced Engineering Technology and Sciences, 2026, 18(01), 066-070
Article DOI: 10.30574/wjaets.2026.18.1.0005
Received on 01 December 2025; revised on 04 January 2026; accepted on 09 January 2026
The typical native mechanism in Kubernetes to handle secret rotation, refreshes files roughly every minute, but applications must re-open them or restart to pick up updated credentials. Common workarounds used by top industry players (CSI driver, sidecar, restarts) trade off in terms of latency, complexity, or security. We survey six approaches—native refresh, CSI Secrets Store, Vault Agent sidecar, LD_PRELOAD shim, eBPF interceptor, and pod restart—evaluate each on downtime, security, performance overhead, complexity, and portability. Also highlight on eBPF‐based kernel interceptor that hot-swaps secrets in sub-second latency without pod restarts or app changes. We describe aspects involving its design, implementation, and planned evaluation.
Kubernetes; Zero-Downtime Rotation; Secrets Management; eBPF; Kernel Interception; LD_PRELOAD; CSI-Driver; Sidecar
Get Your e Certificate of Publication using below link
Preview Article PDF
Amar Gurajapu. Swap Kubernetes Secrets Without Application Disruption: Comparative Study and eBPF-Powered Kernel Interception Framework. World Journal of Advanced Engineering Technology and Sciences, 2026, 18(01), 066-070. Article DOI: https://doi.org/10.30574/wjaets.2026.18.1.0005