Continuous integration deployment-k8s-configuration and storage-configuration management: Application of Secret
1 Introduction
is similar to ConfigMap
and is used to store configuration information, but is mainly used to store sensitive information and information that needs to be encrypted. Secret
can provide data encryption, Decryption function.
When creatingSecret
, please note that if the characters to be encrypted contain special characters, you need to use escape characters to transfer them, such as$
After transfer, it is \$
. You can also use single quotes to describe special characters, so there is no need to transfer. For example, 1$289*-!
is converted to '1$289*-!'
.
The following are some key features and usage scenarios of Secret:
-
Storage sensitive data:
Secret
Used to store sensitive data, such as database passwords,API
keys, certificates wait. This data is generally not suitable for direct exposure in configuration files or environment variables because they may pose a threat to the security of the system. -
Data encryption: The data in
Secret
will be encrypted and stored to ensure the confidentiality of the data. Only entities with appropriate permissions can decrypt and