filmov
tv
How to pass secrets as environment variables in kubernetes cluster | kubernetes tutorial
Показать описание
In this kubernetes tutorial for beginners video series, as part of this lecture, we will see How to pass secrets as environment variables in kubernetes cluster
What are the secrets:
Kubernetes secret object lets you store and manage sensitive information such as passwords O Auth tokens and ssh keys.
Putting this information in a secret is safer and more flexible than putting it verbatim in a pod lifecycle definition or in a container image
There are two types of secrets
1.Built-in-secreats
Kubernetes automatically creates secrets which contain credentials for accessing the API and it automatically modifies your pods to use this type of secret.
The automatic creation and use of API credentials can be disabled or overridden if desired. However, if all you need to do is securely access the API server, this is the recommended workflow
Creating your own secrets:
The kubectl creates secret command packages these files into a secret and creates the object on the API server
This is to protect the secret from being exposed accidentally to an onlooker, or from being stored in a terminal log.
What are the secrets:
Kubernetes secret object lets you store and manage sensitive information such as passwords O Auth tokens and ssh keys.
Putting this information in a secret is safer and more flexible than putting it verbatim in a pod lifecycle definition or in a container image
There are two types of secrets
1.Built-in-secreats
Kubernetes automatically creates secrets which contain credentials for accessing the API and it automatically modifies your pods to use this type of secret.
The automatic creation and use of API credentials can be disabled or overridden if desired. However, if all you need to do is securely access the API server, this is the recommended workflow
Creating your own secrets:
The kubectl creates secret command packages these files into a secret and creates the object on the API server
This is to protect the secret from being exposed accidentally to an onlooker, or from being stored in a terminal log.