Kubernetes - Secret
Secret
s are similar to ConfigMap
s but are specifically intended to hold confidential data. small amount of sensitive data such as a password, a token, or a key.
Default type is type: Opaque
.
apiVersion: v1
kind: Secret
kubernetes.io/tls
vs Opaque
:
The TLS Secret type is provided for user's convenience. You can create an Opaque
for credentials used for TLS server and/or client.
All private keys generated and/or managed must be stored as Kubernetes secrets.
Keys stored in kubernetes secrets and mounted as data volumes in the Pod are not considered to be “persisted” since the actual key material is in a file in an in-memory tmpfs directory.
Secret Types
kubernetes.io/tls:
data: ca.crt, tls.crt, tls.key
kubernetes.io/service-account-token
data: ca.crt, token
kubernetes.io/dockerconfigjson
data: .dockerconfigjson
Bootstrap Token: bootstrap.kubernetes.io/token