Book Image

Cloud Native with Kubernetes

By : Alexander Raul
Book Image

Cloud Native with Kubernetes

By: Alexander Raul

Overview of this book

Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry. This book is a comprehensive guide to deploying, securing, and operating modern cloud native applications on Kubernetes. From the fundamentals to Kubernetes best practices, the book covers essential aspects of configuring applications. You’ll even explore real-world techniques for running clusters in production, tips for setting up observability for cluster resources, and valuable troubleshooting techniques. Finally, you’ll learn how to extend and customize Kubernetes, as well as gaining tips for deploying service meshes, serverless tooling, and more on your cluster. By the end of this Kubernetes book, you’ll be equipped with the tools you need to confidently run and extend modern applications on Kubernetes.
Table of Contents (22 chapters)
1
Section 1: Setting Up Kubernetes
5
Section 2: Configuring and Deploying Applications on Kubernetes
11
Section 3: Running Kubernetes in Production
16
Section 4: Extending Kubernetes

Chapter 6 – Kubernetes Application Configuration

  1. Secrets are stored encoded and optionally encrypted in etcd. ConfigMaps are stored in plain text.
  2. They are Base64-encoded.
  3. The data will be more visible when describing the ConfigMap. The key-value pattern is also easier to use when mounting the ConfigMap as an environment variable.
  4. Depending on how you set up your cluster, your secrets may not be encrypted at all. If a cluster's EncryptionConfiguration is not set, secrets will only be Base64-encoded – and they can easily be decoded. By creating your cluster with an EncryptionConfiguration, your secrets will be stored encrypted in etcd. This is not a security panacea, but encryption at rest is certainly necessary to improve security for secrets.