Difference between revisions of "Kubernetes secrets"
Jump to navigation
Jump to search
Line 19: | Line 19: | ||
== Related terms == | == Related terms == | ||
+ | * [[CKA v1.23]]: Use [[ConfigMaps]] and [[Kubernetes secrets|Secrets]] to configure applications | ||
* [[CKA v1.18]]: [[Secrets (Kubernetes)|Security persistent key value store]] | * [[CKA v1.18]]: [[Secrets (Kubernetes)|Security persistent key value store]] | ||
* [[CKA v1.15: Create & consume Secrets]] | * [[CKA v1.15: Create & consume Secrets]] |
Revision as of 12:10, 18 May 2022
Examples
kubectl create secret
,kubectl get secrets
,kubectl describe secrets/MY_SECRET_NAME
kubectl apply secret.yml
kubectl describe secrets/MY_SECRET_NAME
kubectl create secret
kubectl get secret
kubectl get secrets
kubectl describe secrets/MY_SECRET_NAME
kubectl apply -f ./secret.yml
kubectl apply -k
kubectl edit secrets
kubectl describe secret -n kubernetes-dashboard
Related terms
- CKA v1.23: Use ConfigMaps and Secrets to configure applications
- CKA v1.18: Security persistent key value store
- CKA v1.15: Create & consume Secrets
- v1.19 inmutable https://github.com/kubernetes/enhancements/issues/1412
- ConfigMaps
See also
- Kubernetes secrets:
kubectl [ get | create | describe | delete | secret ] secrets
,secret.yml, kind: Secret, secretKeyRef, default-token, imagePullSecrets:, kubernetes.io/dockerconfigjson
- Secrets: Kubernetes secrets,
ansible-vault
, Hashicorp Vault, AWS Secrets Manager, Google Secret Manager,git-crypt
, SOPS: Secrets OPerationS, Google Cloud Secret Manager, GitHub secret scanning alerts
Advertising: