In Chapter 4, Kubernetes Concepts and Windows Support, we mentioned that one of Windows's node support limitations is that Kubernetes secrets that are mounted to pods as volumes are written in clear-text on node disk storage (not RAM memory). The reason for this is that Windows currently does not support mounting in-memory filesystems to pod containers. This may pose security risks, and needs additional actions to secure the cluster. At the same time, mounting secrets as environment variables has its own security risks—you can enumerate environment variables for processes if you have access to the system. Until it is possible to mount secrets as volumes from in-memory filesystems, there is no completely secure solution for injecting secrets for Windows containers apart from using third-party providers, such as Azure Key Vault...
United States
Great Britain
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Singapore
Hungary
Ukraine
Luxembourg
Estonia
Lithuania
South Korea
Turkey
Switzerland
Colombia
Taiwan
Chile
Norway
Ecuador
Indonesia
New Zealand
Cyprus
Denmark
Finland
Poland
Malta
Czechia
Austria
Sweden
Italy
Egypt
Belgium
Portugal
Slovenia
Ireland
Romania
Greece
Argentina
Netherlands
Bulgaria
Latvia
South Africa
Malaysia
Japan
Slovakia
Philippines
Mexico
Thailand