Summary
In this chapter, we looked at the methods Kubernetes provides for injecting application configuration. First, we looked at some best practices for configuring containerized applications. Then, we reviewed the first method that Kubernetes gives us, ConfigMaps, along with several options for creating and mounting them to Pods. Finally, we looked at Secrets, which when encrypted are a more secure way to handle sensitive configurations. By now, you should have all the tools you need to provide secure and insecure configuration values to your application.
In the next chapter, we'll delve into a topic we already touched on by mounting our Secrets and ConfigMaps – the Kubernetes volume resource and, more generally, storage on Kubernetes.