Environments (ConfigMap) and Secrets
Understand how to use setup env variables and secrets
We have 3 ways to set environment variables and secrets;
- key-value pair format
- ConfigMap
- Secrets
key-value pair format
ConfigMap
The concept of ConfigMap is actually the same as key-value pair format, just it stores the configuration data in a Kubernetes API object.
There are two ways of creating ConfigMap;
- Imperative
- Declarative
Ways of creating ConfigMap
Imperative
When you create configmap from file path, make sure each line adhere to the format like this <name>=<value>
Declarative
Apply entire ConfigMap to Pod
Make sure the configMapRef name is equal to ConfigMap file metadata name.
Apply only 1 value from ConfigMap to Pod
We can also apply only 1 value from ConfigMap to Pod.
Apply ConfigMap to volume
A container using a ConfigMap as a subPath volume will not receive ConfigMap updates.
In some cases, you might want to create files with the contents during runtime, but you can actually do that using ConfigMap.
In this case, two files called will be created in /app/src
, so these files will present at this path:
/app/src/config.py
/app/src/special_file.txt
Secrets
- Secrets only encoded and not encrypted in etcd. Therefore, we should enable encryption at kube-apiserver (REST)
- Consider external secrets providers like HashiCorp Vault and AWS Secrets Manager
- Don't check in secret objects with data to SCM like GitHub
- Remember to setup RBAC (least-privileged access) to secrets as anyone can access those Kubernetes objects within the same namespace
Secrets are used to store confidential information like a password, key, or token.
Additional information on how Kubernetes manage secrets:
- A secret will be only sent to a node if a pod requires it
- When we mount secrets into pods, the kubelet will store a copy of the secret into a
tmpfs
(aka a disk in RAM) so that the confidential data is not written to disk storage. - The kubelet will delete its local copy of the secret when the pod depends on the secret is deleted.
Built-in Type | Usage |
---|---|
Opaque | arbitrary user-defined data |
kubernetes.io/service-account-token | ServiceAccount token |
kubernetes.io/dockerconfigjson | serialized ~/.docker/config.json file |
kubernetes.io/basic-auth | credentials for basic authentication |
kubernetes.io/ssh-auth | credentials for SSH authentication |
kubernetes.io/tls | data for a TLS client or server |
bootstrap.kubernetes.io/token | bootstrap token data |
Ways of creating Secrets
Imperative
When you use imperative to create secret, you no need to encode your data, as the command will automatically help you to encode.
When you create secret from file path, make sure each line adhere to the format like this <name>=<value>
Declarative
Make sure your secrets store with base64 format
Opaque
Docker config
Basic authentication
The data
or stringData
(clear text content) field of the Secret must contain one of the following two keys:
username
password
SSH authentication
Mandatory field: ssh-privatekey
TLS
Mandatory fields: tls.crt
and tls.key
Apply entire Secret to Pod
Make sure the secretRef name is equal to Secret file metadata name.
Apply only 1 value from Secret to Pod
We can also apply only 1 value from Secret to Pod.
Apply Secret to volume
A container using a Secret as a subPath volume will not receive Secret updates.
In some cases, you might want to create files with the contents during runtime, but you can actually do that using Secret.
In this case, a file called .secret-file
will be created in /app/src
, so this file will present at this path /app/src/.secret-file
.