Continuous integration deployment-k8s-configuration and storage-configuration management: Application of Secret

Continuous integration deployment-k8s-configuration and storage-configuration management: Application of Secret

1 Introduction

is similar to ConfigMap and is used to store configuration information, but is mainly used to store sensitive information and information that needs to be encrypted. Secret can provide data encryption, Decryption function.

When creatingSecret, please note that if the characters to be encrypted contain special characters, you need to use escape characters to transfer them, such as$ After transfer, it is \$. You can also use single quotes to describe special characters, so there is no need to transfer. For example, 1$289*-! is converted to '1$289*-!'.

The following are some key features and usage scenarios of Secret:

  • Storage sensitive data:SecretUsed to store sensitive data, such as database passwords, API keys, certificates wait. This data is generally not suitable for direct exposure in configuration files or environment variables because they may pose a threat to the security of the system.

  • Data encryption: The data in Secret will be encrypted and stored to ensure the confidentiality of the data. Only entities with appropriate permissions can decrypt and

Guess you like

Origin blog.csdn.net/linmengmeng_1314/article/details/134230332