1 Kubernetes Secrets
This chapter covers
- Focusing on security
- Taking full advantage of the Kubernetes ecosystem
- Differentiating between what is and is not considered a Secret
- Bringing it all together
- Getting started with the tools you will need for success
Enterprise software systems rely on accurate configuration data to support their normal operation. Configurations take many forms and can be set up in a variety of ways, depending on the use case and context. These configurable properties could include details to support the application framework or the normal operation of the program.
While many of these properties are intended to be viewed by any party, there are certain attributes, such as passwords, that should only be seen or accessed ...
Get Kubernetes Secrets Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.