Tweak tasks/configmap-secret

This commit is contained in:
Sean Wei 2022-11-13 09:10:07 +08:00
parent 1cff40e656
commit 37864abbb4
3 changed files with 11 additions and 14 deletions

View File

@ -238,4 +238,3 @@ kubectl delete secret mysecret
- Read more about the [Secret concept](/docs/concepts/configuration/secret/) - Read more about the [Secret concept](/docs/concepts/configuration/secret/)
- Learn how to [manage Secrets using kubectl](/docs/tasks/configmap-secret/managing-secret-using-kubectl/) - Learn how to [manage Secrets using kubectl](/docs/tasks/configmap-secret/managing-secret-using-kubectl/)
- Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/) - Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/)

View File

@ -33,7 +33,7 @@ Run the following command:
```shell ```shell
kubectl create secret generic db-user-pass \ kubectl create secret generic db-user-pass \
--from-literal=username=devuser \ --from-literal=username=admin \
--from-literal=password='S!B\*d$zDsb=' --from-literal=password='S!B\*d$zDsb='
``` ```
You must use single quotes `''` to escape special characters such as `$`, `\`, You must use single quotes `''` to escape special characters such as `$`, `\`,
@ -87,8 +87,8 @@ kubectl get secrets
The output is similar to: The output is similar to:
``` ```
NAME TYPE DATA AGE NAME TYPE DATA AGE
db-user-pass Opaque 2 51s db-user-pass Opaque 2 51s
``` ```
View the details of the Secret: View the details of the Secret:
@ -143,11 +143,13 @@ accidentally, or from being stored in a terminal log.
S!B\*d$zDsb= S!B\*d$zDsb=
``` ```
{{<caution>}}This is an example for documentation purposes. In practice, {{< caution >}}
This is an example for documentation purposes. In practice,
this method could cause the command with the encoded data to be stored in this method could cause the command with the encoded data to be stored in
your shell history. Anyone with access to your computer could find the your shell history. Anyone with access to your computer could find the
command and decode the secret. A better approach is to combine the view and command and decode the secret. A better approach is to combine the view and
decode commands.{{</caution>}} decode commands.
{{< /caution >}}
```shell ```shell
kubectl get secret db-user-pass -o jsonpath='{.data.password}' | base64 --decode kubectl get secret db-user-pass -o jsonpath='{.data.password}' | base64 --decode
@ -193,10 +195,8 @@ To delete a Secret, run the following command:
kubectl delete secret db-user-pass kubectl delete secret db-user-pass
``` ```
<!-- discussion -->
## {{% heading "whatsnext" %}} ## {{% heading "whatsnext" %}}
- Read more about the [Secret concept](/docs/concepts/configuration/secret/) - Read more about the [Secret concept](/docs/concepts/configuration/secret/)
- Learn how to [manage Secrets using config files](/docs/tasks/configmap-secret/managing-secret-using-config-file/) - Learn how to [manage Secrets using config file](/docs/tasks/configmap-secret/managing-secret-using-config-file/)
- Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/) - Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/)

View File

@ -90,8 +90,7 @@ the Secret data and appending the hash value to the name. This ensures that
a new Secret is generated each time the data is modified. a new Secret is generated each time the data is modified.
To verify that the Secret was created and to decode the Secret data, refer to To verify that the Secret was created and to decode the Secret data, refer to
[Managing Secrets using [Managing Secrets using kubectl](/docs/tasks/configmap-secret/managing-secret-using-kubectl/#verify-the-secret).
kubectl](/docs/tasks/configmap-secret/managing-secret-using-kubectl/#verify-the-secret).
## Edit a Secret {#edit-secret} ## Edit a Secret {#edit-secret}
@ -117,12 +116,11 @@ your Pods.
To delete a Secret, use `kubectl`: To delete a Secret, use `kubectl`:
```shell ```shell
kubectl delete secret <secret-name> kubectl delete secret db-user-pass
``` ```
<!-- Optional section; add links to information related to this topic. -->
## {{% heading "whatsnext" %}} ## {{% heading "whatsnext" %}}
- Read more about the [Secret concept](/docs/concepts/configuration/secret/) - Read more about the [Secret concept](/docs/concepts/configuration/secret/)
- Learn how to [manage Secrets with the `kubectl` command](/docs/tasks/configmap-secret/managing-secret-using-kubectl/) - Learn how to [manage Secrets using kubectl](/docs/tasks/configmap-secret/managing-secret-using-kubectl/)
- Learn how to [manage Secrets using config file](/docs/tasks/configmap-secret/managing-secret-using-config-file/) - Learn how to [manage Secrets using config file](/docs/tasks/configmap-secret/managing-secret-using-config-file/)