Difference between revisions of "Kubernetes secrets"
Jump to navigation
Jump to search
Line 23: | Line 23: | ||
* [[CKA v1.15: Create & consume Secrets]] | * [[CKA v1.15: Create & consume Secrets]] | ||
* <code>[[ConfigMaps]]</code> | * <code>[[ConfigMaps]]</code> | ||
− | * [[ | + | * <code>[[secret not found]]</code> |
+ | * <code>[[kind: Secret]]</code> | ||
== Activities == | == Activities == |
Revision as of 09:23, 14 July 2022
Examples
kubectl create secret
,kubectl get secrets
,kubectl describe secrets/MY_SECRET_NAME
kubectl apply secret.yml
kubectl describe secrets/MY_SECRET_NAME
kubectl create secret
kubectl get secret
kubectl get secrets
kubectl describe secrets/MY_SECRET_NAME
kubectl apply -f ./secret.yml
kubectl apply -k
kubectl edit secrets
kubectl describe secret -n kubernetes-dashboard
Related terms
- CKA v1.23: Use ConfigMaps and Secrets to configure applications
- CKA v1.18: Security persistent key value store
- CKA v1.15: Create & consume Secrets
ConfigMaps
secret not found
kind: Secret
Activities
News
- Aug 2020 Kubernetes v1.19 Immutable Secrets and ConfigMaps https://github.com/kubernetes/enhancements/issues/1412
See also
- Kubernetes secrets:
kubectl [ get | create | describe | delete | secret ] secrets
,secret.yml, kind: Secret, secretKeyRef, default-token, imagePullSecrets:, kubernetes.io/dockerconfigjson
- Secrets: Kubernetes secrets,
ansible-vault
, Hashicorp Vault, AWS Secrets Manager, Google Secret Manager,git-crypt
, SOPS: Secrets OPerationS, Google Cloud Secret Manager, GitHub secret scanning alerts
Advertising: