Whether working through an infrastructure or application lens, the operation of these assets is driven via the use of configuration properties; some of which may contain sensitive values. In the first part of this book, we will introduce the fundamentals of managing of secrets within Kubernetes.
Chapter 1 provides guidance for identifying the traits commonly found in secrets and their role within Kubernetes. Chapter 2 focuses on the primitives of Kubernetes, its architecture, and the basic concepts for deploying an application with sensitive data. After reading part 1, you will have the skills to identify configurations containing sensitive content along with the knowledge of the primary limitations of the Kubernetes Secret resource.