• Using AWS Secrets Manager secrets and Systems Manager parameters in Kubernetes with KES

    4 min read

    By using the Kubernetes External Secrets we can use external secret management systems, like AWS Secrets Manager or Vault, to securely add secrets in Kubernetes.

    This is achieved by by using the ExternalSecret object which declares how to fetch the secret data, while the KES controller converts the ExternalSecrets to Secrets. The conversion is completely transparent to Pods that can access Secrets normally.


  • Setting secret into a environment variable

    2 min read

    Although it's not a best practice to feed secrets into environment variables it's still something that it is possible to do. Let's take a glance on how to do it


  • Access kubernetes secrets as volumes

    2 min read

    To be able to use a secret on a deployment (or generally speaking, any pod) we can choose to share it by using either volumes or environment variables. Let's take a look hwo it would look like using an volume mount


  • Managing a secret on kubernetes

    3 min read

    Most of the services we will be deploying on kubernetes are going to rely on having access to secrets to retrieve or push data to another service: Let's check how to work with the secrets on kubernetes

    $ kubectl create secret
    Create a secret using specified subcommand.
    Available Commands:
      docker-registry Create a secret for use with a Docker registry
      generic         Create a secret from a local file, directory or literal value
      tls             Create a TLS secret
      kubectl create secret [flags] [options]
    Use "kubectl <command> --help" for more information about a given command.
    Use "kubectl options" for a list of global command-line options (applies to all commands).



From pet to cattle
Treat your kubernetes clusters like cattle, not pets