Managing sensitive configuration with the Secret object
The Secret object is a resource that allows you to configure applications running on Kubernetes. Secrets are extremely similar to ConfigMaps and can be used together. The difference is that Secrets are encoded and intended to host sensitive data such as passwords, tokens, or private API keys, while ConfigMaps are intended to host non-sensitive configuration data. Other than that, Secrets and ConfigMaps mostly behave the same.
Let's start by discovering how to list the Secrets that are available in your Kubernetes cluster.
Listing Secrets
Like any other Kubernetes resource, you can list secrets using the kubectl get
command. The resource identifier is a secret here:
$ kubectl get secret
Just like with ConfigMaps, the DATA
column tells you the number of sensitive parameters that have been hashed and saved in your secret.
The --from-literal
flag can be used to fill a Secret object at creation time, the same...