July 2018
Intermediate to advanced
504 pages
11h 34m
English
Secrets are similar to config maps, which we discussed in the previous chapter, in that they are also used to pass data to pods, but that's where their similarities end. A secret's only use case is to store sensitive data consumed by applications—API tokens, credentials, X.509 certificates/keys, and so on. They are backed by tmpfs (an in-memory temporary filesystem) which prevents them from being stored on persistent storage. Secrets are different from config maps in the following ways: