Skip to content

Part 2: Kubernetes, Explained 2024: Secrets and ConfigMaps

Published: at 01:33 PMSuggest Changes

Part 2: Kubernetes, Explained in 2024: Secrets and ConfigMaps

In part 1, we discussed the basics of Kubernetes, including Pods, Nodes, and Deployments. In this part, we’ll dive into ConfigMaps and Secrets.

To do this, we need to understand the concept of environment variables. Environment variables are key-value pairs that are available to all processes running in a container. They are used to pass configuration information to the containerized application. For example, you might use environment variables to specify the database connection string or the API key for a service.

This concept is the foundation for ConfigMaps and Secrets in Kubernetes.

The reason why we don’t simply rely on environment variables is that they can be cumbersome to manage, especially when you have a large number of them. ConfigMaps and Secrets provide a way to manage these key-value pairs in a more structured and scalable way. They also allow you to decouple the configuration from the application code, making it easier to update the configuration without changing the code.

ConfigMaps

A ConfigMap is an object in Kubernetes that stores configuration data in the form of key-value pairs. It can be used to store configuration information such as environment variables, command-line arguments, or configuration files. You can use environment variables directly in your Pod definition, but ConfigMaps provide a more flexible and scalable way to manage configuration data. Here’s an example Pod definition that uses a ConfigMap:

apiVersion: v1
kind: ConfigMap
metadata:
  name: app-config
data:
  DB_URL: "postgres://user:password@localhost/dbname"

---

apiVersion: v1
kind: Pod
metadata:
  name: my-app
spec:
  containers:
  - name: my-container
    image: my-app-image
    envFrom:
    - configMapRef:
        name: app-config

In this example, we define a ConfigMap named app-config with a key-value pair housing the database URL. We then reference this ConfigMap in the Pod definition using the envFrom field.

This leads to an important question: what about that password? Shouldn’t it be kept secret?

Secrets

Secrets are similar to ConfigMaps, but they are specifically designed to store sensitive information such as passwords, API keys, and other confidential data. Secrets are stored in a base64-encoded format to provide an additional layer of security. Here’s an example of how you can use a Secret in a Pod definition:

apiVersion: v1
kind: Secret
metadata:
  name: db-secret
type: Opaque
data:
  DB_PASSWORD: cGFzc3dvcmQ=  # base64-encoded password

---

apiVersion: v1
kind: Pod
metadata:
  name: my-app
spec:
  containers:
  - name: my-container
    image: my-app-image
    env:
    - name: DB_PASSWORD
      valueFrom:
        secretKeyRef:
          name: db-secret
          key: DB_PASSWORD

In this example, we define a Secret named db-secret with a key-value pair housing the database password. We then reference this Secret in the Pod definition using the valueFrom field.

An image of a neon vault
A vault, courtesy of Dall-E

Vault, and other secrets management tools

While Kubernetes provides a way to manage secrets, it is not a full-fledged secrets management solution. For more advanced use cases, you may want to consider using a dedicated secrets management tool such as HashiCorp Vault or AWS Secrets Manager. These tools provide additional features such as encryption, access control, and audit logging. They also integrate seamlessly with Kubernetes, allowing you to store and retrieve secrets securely.

In part 3, we’ll pivot to discussing Ingress.

👉🏼 Continue to part 3


Next Post
Part 1: Kubernetes, Explained 2024: Nodes, Pods, Services, Deployments