Skip to content

Commit 53cc509

Browse files
authored
Merge pull request #555 from mlittlec/main
Add new post for Use Secrets
2 parents eff1a8a + 4c251d9 commit 53cc509

File tree

2 files changed

+50
-0
lines changed

2 files changed

+50
-0
lines changed
205 KB
Loading
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: "Use Secrets"
3+
date: 2025-05-21
4+
draft: false
5+
summary: "Learn how to use Secrets with Oracle Cloud Native Environment."
6+
tags: ["ocne2", "lab", "tutorial", "ocne-install"]
7+
showDate: true
8+
---
9+
10+
## Links
11+
12+
:crescent_moon: [Lab](https://luna.oracle.com/lab/5f5b5b18-263f-46a3-81e1-81d6b6386272)
13+
14+
:spiral_notepad: [Tutorial](https://docs.oracle.com/en/learn/ocne2-secrets)
15+
16+
## Details
17+
18+
Many applications have information, such as passwords, that only authorized users should access. This situation is where Kubernetes Secrets can help. They provide a way to securely manage sensitive data such as passwords, SSH, and API keys. Using secrets allows the separation of confidential data from the application's code, which reduces the risk of sensitive data being exposed or modified during the workflow of your Pods.
19+
20+
Before you start, it helps to know some basic details about Kubernetes Secrets:
21+
22+
- They must be present before being used by a Pod.
23+
- Defined using a *KEY* and *VALUE* pair.
24+
- Limited to a maximum size of 1MB to prevent them from using all of the kube-apiserver and kubelet memory.
25+
- Define them as *immutable* to protect them from accidental or unwanted modification.
26+
27+
> **Important:** Kubernetes Secrets are not encrypted by default because they are only Base64-encoded and are stored unencrypted in etcd. So anyone with access to etcd can view or alter a Secret. Using Kubernetes Secrets can be made safe by using any of these methods:
28+
>
29+
> - Enable [Encryption at Rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/) for Secrets.
30+
> - Configure least-privilege access by using [RBAC authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
31+
> - Restrict access to secrets to specific containers.
32+
> - Using an external secrets management service.
33+
34+
This tutorial covers the basics of Kubernetes Secrets and demonstrates a simple use case.
35+
36+
For more information about Oracle Cloud Native Environment 2, please refer to the current [Release Documentation](https://docs.oracle.com/en/operating-systems/olcne/) site.
37+
38+
### Objectives
39+
40+
In this tutorial, you'll learn to:
41+
42+
- Create a Secret
43+
- View a Secret
44+
- Decode a Secret
45+
- Use a Secret to define an environment variable in a deployment
46+
47+
### Prerequisites
48+
49+
- Installation of Oracle Cloud Native Environment (Oracle CNE)
50+
- A single control node and one worker node

0 commit comments

Comments
 (0)