Difference between revisions of "Kubernetes secrets"
Jump to navigation
Jump to search
Line 26: | Line 26: | ||
* <code>[[kind: Secret]]</code> | * <code>[[kind: Secret]]</code> | ||
* [[Kustomize]] | * [[Kustomize]] | ||
− | * <code>[[base64 --decode ; echo | + | * <code>[[base64 --decode]]; echo</code> |
== Activities == | == Activities == |
Revision as of 12:01, 7 September 2022
Examples
kubectl create secret
,kubectl get secrets
,kubectl describe secrets/MY_SECRET_NAME
kubectl apply secret.yml
kubectl describe secrets/MY_SECRET_NAME
kubectl create secret
kubectl get secret
kubectl get secrets
kubectl describe secrets/MY_SECRET_NAME
kubectl apply -f ./secret.yml
kubectl apply -k
kubectl edit secrets
kubectl describe secret -n kubernetes-dashboard
Related terms
- CKA v1.23: Use ConfigMaps and Secrets to configure applications
- CKA v1.18: Security persistent key value store
- CKA v1.15: Create & consume Secrets
ConfigMaps
secret not found
kind: Secret
- Kustomize
base64 --decode; echo
Activities
News
- Aug 2020 Kubernetes v1.19 Immutable secrets and ConfigMaps https://github.com/kubernetes/enhancements/issues/1412
See also
- Kubernetes secrets:
kubectl [ get | create | describe | delete | secret ] secrets
,secret.yml, kind: Secret, secretKeyRef, default-token, imagePullSecrets:, kubernetes.io/dockerconfigjson
- Secrets: Kubernetes secrets,
ansible-vault
, Hashicorp Vault, AWS Secrets Manager, Google Secret Manager,git-crypt
, SOPS: Secrets OPerationS, Google Cloud Secret Manager, GitHub secret scanning alerts
Advertising: