Credentials and Configs in Kubernetes Secrets and ConfigMaps

Поделиться
HTML-код
  • Опубликовано: 17 авг 2024
  • Kubernetes ConfigMaps and Secrets Tutorial // In this tutorial we will use ConfigMap and Secret objects in my Cluster to deploy NGINX and MySQL containers. This example is a great howto for beginners which explains how to get configuration files and credentials as examples inside the volume of the container. #Kubernetes #ConfigMaps #HomeLab
    Kubernetes Persistent Volumes: • Persistent Volumes wit...
    Teleport-*: goteleport.com/...
    Follow me:
    TWITTER: / christianlempa
    INSTAGRAM: / christianlempa
    DISCORD: / discord
    GITHUB: github.com/chr...
    PATREON: / christianlempa
    MY EQUIPMENT: kit.co/christi...
    Timestamps:
    00:00 - Introduction
    01:19 - Why use ConfigMaps and Secrets?
    02:40 - What is a ConfigMap?
    03:19 - Nginx Config stored in a ConfigMap
    08:51 - What is a Secret?
    09:41 - MySQL Password in a Secret
    14:57 - Nginx Certificates in a Secret
    18:47 - Are Kubernetes Secrets secure?
    ________________
    All links with "*" are affiliate links.

Комментарии • 28

  • @stevenstreller8818
    @stevenstreller8818 Год назад +2

    One thing would have to be mentioned in any case: If I store the secret as environment variable in the deployment, I have the possibility to access this value in the running container instance via the terminal with printenv or env in the container. Here, too, the values are then in plain text. So if a potential attacker gets access to the container, he can easily read the password for the database 🙂

  • @mateuszkozera9443
    @mateuszkozera9443 2 месяца назад

    Thank You Christian!

  • @PeterNunnOZ
    @PeterNunnOZ 2 года назад +4

    Looking forward to the reverse proxy and ingress bits :)

  • @oussamaelkhayali2218
    @oussamaelkhayali2218 2 года назад

    Man, its my first comment on youtube, I really love your videos, im a beginner and whenever i have a problem, your chanel is my first choice, keep going !

    • @christianlempa
      @christianlempa  2 года назад +1

      Thank you so much! I'm happy that you enjoy the channel. 🤗

  • @totto4556
    @totto4556 2 года назад

    AMAZING VIDEO!

  • @RABWA333
    @RABWA333 2 года назад

    Thanks a lot , very informative

  • @KeithDavey2014
    @KeithDavey2014 Год назад +1

    You can also pre base64 encode the secret string and put that in the secret.yaml file as well. That way he secret is not stored in plane test in the yaml file its self.

  • @et4493
    @et4493 Год назад

    absolute champion ❤ BTW that's not how you say opaque, but it was just hilarious 😂

  • @cristianllansola1095
    @cristianllansola1095 10 месяцев назад

    I configured my configmaps, and works perfectly with my env values from VUE. But I'm trying to get this values in the frontend pod... i'm no able to do it....
    Is there any extra conf ?
    Thanks a lot for your videos.

  • @vasireddy7355
    @vasireddy7355 Год назад

    You are awesome.

  • @allisondealmeida
    @allisondealmeida 2 года назад

    Tem algum tutorial de criação de um cluster kubernetes de alta disponibilidade?

  • @TheChihuhua
    @TheChihuhua Год назад

    B-E-A-Utiful!

  • @TakeOnMe5
    @TakeOnMe5 9 месяцев назад

    In case you missed 18:47 ... Base64 is not an encryption, it is an encoding only - It does nothing to protect the password!

  • @kylehodgetts
    @kylehodgetts 2 года назад +3

    Opaque is said like "Oh-payk" :)

    • @christianlempa
      @christianlempa  2 года назад +3

      Yeah I realized it when looking it up after the recording 😄

  • @hamadaparis3556
    @hamadaparis3556 2 года назад

    Hi Chris I have a question about kubernetes clusterIP service for pods as a single network point other pods can reach internally, where does its IP exist if I define one on my cluster, how the request travels from external pod to the service to retrieve data or whatever, I think that the virtual IP address for the service exists on the master and not the worker nodes since the worker node can go down and the service is still maintained, the request from the pod goes to the master who determines the service endpoint and routes the request to that IP I'm just saying man what would logically happen any clarification correcting would be really appreciated thanks for the content.

    • @christianlempa
      @christianlempa  2 года назад +3

      The network layer is controlled on each node by the kube-proxy service. Once you define a ClusterIP, the user-space proxy uses iptables rules which capture traffic to the Service's clusterIP and redirect´s that traffic to the proxy port which proxies the backend Pod. Hope that makes sense.

    • @hamadaparis3556
      @hamadaparis3556 2 года назад

      Awesome thanks so much🙂🙏

  • @SanjeevKumar-nq8td
    @SanjeevKumar-nq8td Год назад

    How to mount .crt file as secret, can you please show

    • @christianlempa
      @christianlempa  Год назад

      You need to import that to a secret, "kubectl create secret generic my-secret --from-file=config"