UsefulLinks
Computer Science
Containerization and Orchestration
Kubernetes Orchestration
1. Introduction to Container Orchestration
2. Kubernetes Architecture and Components
3. Core Kubernetes Objects and Workloads
4. Configuration and Secret Management
5. Storage in Kubernetes
6. Kubernetes Networking
7. Application Lifecycle Management
8. Observability and Monitoring
9. Security in Kubernetes
10. Advanced Kubernetes Concepts
11. Kubernetes Ecosystem and Tools
12. Cluster Management and Operations
4.
Configuration and Secret Management
4.1.
ConfigMaps
4.1.1.
Configuration Decoupling
4.1.2.
ConfigMap Creation Methods
4.1.2.1.
Literal Values
4.1.2.2.
Files
4.1.2.3.
Directories
4.1.2.4.
Environment Files
4.1.3.
ConfigMap Usage Patterns
4.1.3.1.
Environment Variables
4.1.3.2.
Command Line Arguments
4.1.3.3.
Volume Mounts
4.1.3.4.
Subpath Mounting
4.1.4.
ConfigMap Updates
4.1.4.1.
Hot Reloading
4.1.4.2.
Rolling Updates
4.1.4.3.
Immutable ConfigMaps
4.2.
Secrets
4.2.1.
Secret Management Principles
4.2.2.
Secret Types
4.2.2.1.
Opaque Secrets
4.2.2.2.
Service Account Tokens
4.2.2.3.
Docker Registry Credentials
4.2.2.4.
TLS Certificates
4.2.2.5.
SSH Authentication
4.2.2.6.
Basic Authentication
4.2.3.
Secret Creation and Management
4.2.3.1.
kubectl Commands
4.2.3.2.
YAML Manifests
4.2.3.3.
External Secret Management
4.2.4.
Secret Usage
4.2.4.1.
Environment Variables
4.2.4.2.
Volume Mounts
4.2.4.3.
Image Pull Secrets
4.2.5.
Secret Security
4.2.5.1.
Encryption at Rest
4.2.5.2.
Encryption in Transit
4.2.5.3.
Access Controls
4.2.5.4.
Secret Rotation
4.2.5.5.
External Secret Stores
Previous
3. Core Kubernetes Objects and Workloads
Go to top
Next
5. Storage in Kubernetes