10. Storing secrets in AKS

All production applications require some sensitive information to function, such as passwords or connection strings. Kubernetes has a pluggable back end to manage these secrets. Kubernetes also provides multiple ways of using the secrets in your deployment. The ability to manage secrets and use them properly will make your applications more secure.

You have already used secrets previously in this book. You used them when connecting to the WordPress site to create blog posts in Chapter 3, Application deployment on AKS, and Chapter 4, Building scalable applications. You also used secrets in Chapter 6, Securing your application with HTTPS, when you were configuring the Application Gateway Ingress Controller with ...

Get Hands-on Kubernetes on Azure - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.