David Sanzdbaenlasombra.com·Feb 17, 2025[OCI] Revelación del secreto de una VaultEn este artículo vamos a explorar el uso de Vault por vía de un Instancia. Para ello, definiremos una Vault, asumiendo que ya disponemos de una VCN e Instancia. En este ejemplo de uso, utilizaremos la Vault para guardar la configuración de OCI-CLI qu...OCIinstancia
Laxman Patelgorgeousgawin.hashnode.dev·Feb 17, 2025ConfigMaps and Secrets: Managing Configuration and Sensitive Data in Kubernetes 🔐Kubernetes is all about running applications at scale, but how do you manage configuration data and sensitive information like passwords or API keys? Enter ConfigMaps and Secrets—two powerful tools that help you decouple configuration and sensitive d...k8s
Prod1gyprodigy.hashnode.dev·Feb 13, 2025Unlocking Kubernetes Secrets: CSI Drivers vs. External Secret OperatorContainer orchestration has been transformed by Kubernetes, but securely managing storage and secrets is still a difficult task. In this post, we'll examine how Kubernetes expands its functionality via the Container Storage Interface (CSI) and contra...secret provider class
Prakas Ranadevops.linuxhouse.in·Feb 2, 2025Deploy One-Time Secret – Secure One-Time Password/Message Sharing App with Docker and Docker Compose🚀 One-Time Secret is a secure one-time message sharing application that allows you to generate self-destructing secret links. It ensures that sensitive information is shared securely. 🔗 Official GitHub Repository: One-Time Secret GitHub In this blo...onetimesecrect
Jérôme Hoaraublog.hoaraujerome.com·Jan 10, 2025How to Add git-crypt Contributors to Your Encrypted Git RepositoryManaging sensitive information in a Git repository can be challenging, but tools like git-crypt make it easier by encrypting specific files. When adding a new contributor to such a repository, the admin needs to ensure they have the necessary access ...git-crypt
Harshit Sahuharshitsahu2311.hashnode.dev·Jan 7, 2025Secrets in Kubernetes - CKASecrets in Kubernetes are designed to securely store sensitive information like passwords, tokens, and keys. They ensure your sensitive data isn’t exposed in plain text. Let’s dive into the essentials! Secrets are Kubernetes objects used to store sm...35 readsCertified Kubernetes Administratortypes_of_secrets_in_k8s
Cheedge Leenotes-renovation.hashnode.dev·Dec 29, 2024Kubernets Secret (2)5. How to decode the secret Previous we see how to create a secret, now let’s use the base64 encode secret to decode the secret Let’s first get the secret creating yaml file, k get secrets database-data -o yaml > secret.yaml let’s use an simple opaq...Kubernetes Configuration and SecretKubernetes
Sagar Rawatsagarrawatt.hashnode.dev·Dec 22, 2024Streamlining Kubernetes secrets with external secret operator and aws secret managercontent Why we using external secret operator Step 1: Creating a service account or IAM user & secret key and access key in Aws. Step 2: Installation of an external secret operator. Step 3: Creating secret store , secrets , and external secret S...110 readsAWS
Amulyaawscloudbasics.hashnode.dev·Dec 6, 2024Mastering Kubernetes ConfigMaps and Secrets: A Deep Dive into Configuration ManagementIntroduction In the complex world of Kubernetes, managing application configurations and sensitive data is a critical challenge for DevOps engineers and developers. ConfigMaps and Secrets are two powerful Kubernetes resources that provide elegant sol...DevOpsconfigmap
Shaik Mustafamustafa-k8s.hashnode.dev·Dec 4, 2024ConfigMaps vs. Secrets: The Silent Heroes of Kubernetes ConfigurationsCONFIGMAPS: A ConfigMap in Kubernetes is used to store configuration data in the form of key-value pairs. This data is typically non-confidential and helps to decouple the configuration settings from the application code, eliminating hardcoded values...141 likes·163 readskubernetes configmaps and secrets