diff --git a/content/en/docs/tasks/configmap-secret/managing-secret-using-kubectl.md b/content/en/docs/tasks/configmap-secret/managing-secret-using-kubectl.md index 51f66d44be..36ce3b5875 100644 --- a/content/en/docs/tasks/configmap-secret/managing-secret-using-kubectl.md +++ b/content/en/docs/tasks/configmap-secret/managing-secret-using-kubectl.md @@ -40,6 +40,10 @@ You must use single quotes `''` to escape special characters such as `$`, `\`, `*`, `=`, and `!` in your strings. If you don't, your shell will interpret these characters. +{{< note >}} +The `stringData` field for a Secret does not work well with server-side apply. +{{< /note >}} + ### Use source files 1. Store the credentials in files: diff --git a/content/en/docs/tasks/configmap-secret/managing-secret-using-kustomize.md b/content/en/docs/tasks/configmap-secret/managing-secret-using-kustomize.md index ae2109f803..364b461614 100644 --- a/content/en/docs/tasks/configmap-secret/managing-secret-using-kustomize.md +++ b/content/en/docs/tasks/configmap-secret/managing-secret-using-kustomize.md @@ -24,6 +24,10 @@ You can generate a Secret by defining a `secretGenerator` in a literal values. For example, the following instructions create a Kustomization file for the username `admin` and the password `1f2d1e2e67df`. +{{< note >}} +The `stringData` field for a Secret does not work well with server-side apply. +{{< /note >}} + ### Create the Kustomization file {{< tabs name="Secret data" >}}