Summary
In this chapter, we introduced containers, Kubernetes, and Secrets. We provided an overview of the history so far, going through the concepts of bare metal, virtual machine, and container-based deployments. We had the opportunity to understand the benefits of containerization and introduce container orchestration engines. We learned more about Kubernetes and its components, which made it possible for us to run our first Kubernetes secret example and also have a deep dive into the Kubernetes components involved to facilitate secret usage. This helped us identify the security and robustness concerns that come with the usage of Kubernetes Secrets.
In the next chapter, we will focus on the different types of Kubernetes Secrets, their usages, and the cross-cutting concerns that Secrets come with, such as auditing and access permissions.