Skip to content

Commit cdec62c

Browse files
authored
Merge pull request #266 from devtron-labs/secrets_documentation
Secrets documentation
2 parents 5330b1f + a2c387d commit cdec62c

File tree

1 file changed

+14
-12
lines changed

1 file changed

+14
-12
lines changed

docs/user-guide/creating-application/secrets.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,37 @@
11
# Secrets
22

3-
Secrets and configmaps both are used to store environment variables but there is only one major difference between them, Configmap stores key-values in normal text format, and secrets store them in base64 encrypted form. Devtron platform hides the data of secrets for the normal users and it is only visible to the users having edit permission.
3+
Secrets and configmaps both are used to store environment variables but there is one major difference between them: Configmap stores key-values in normal text format while secrets store them in base64 encrypted form. Devtron platform hides the data of secrets for the normal users and it is only visible to the users having edit permission.
44

5-
Secret objects let you store and manage sensitive information, such as- passwords, auth tokens, and ssh keys. Embedding this information in a secret is safer and more flexible than putting it verbatim in a Pod definition or in a container image.
5+
Secret objects let you store and manage sensitive information, such as passwords, authentication tokens, and ssh keys. Embedding this information in secrets is safer and more flexible than putting it verbatim in a Pod definition or in a container image.
6+
7+
## Configure Secret
68

79
![](../../.gitbook/assets/add-secret%20%281%29.png)
810

911
Click on `Add Secret` to add a new secret.
1012

11-
## Configure Secret
12-
1313
![](../../.gitbook/assets/configure-secrets%20%281%29.jpg)
1414

1515
| Key | Description |
1616
| :--- | :--- |
1717
| `Name` | Provide a name to your Secret |
1818
| `Data Type` | Provide the Data Type of your secret. To know about different Data Types available click on [Data Types](secrets.md#data-types) |
19-
| `Data Volume` | Specify, if there is a volume that is accessible to Containers running in a pod needs to be added. |
20-
| `Use configmap as Environment Variable` | Select this option if you want to inject Environment Variables in pods using ConfigMap. |
21-
| `Use configmap as Data Volume` | Select this option, if you want to configure any Data Volume that is accessible to Containers running in a pod and provide a Volume mount path. |
22-
| `Key-Value` | Provide the key and corresponding value of the provided key. |
19+
| `Data Volume` | Specify if there is a need to add a volume that is accessible to the Containers running in a pod. |
20+
| `Use configmap as Environment Variable` | Select this option if you want to inject Environment Variables in your pods using ConfigMaps. |
21+
| `Use configmap as Data Volume` | Select this option if you want to configure a Data Volume that is accessible to Containers running in a pod. Ensure that you provide a Volume mount path for the same. |
22+
| `Key-Value` | Provide a key and the corresponding value of the provided key. |
2323

2424
## Data Types
2525

2626
There are five Data types that you can use to save your secret.
2727

2828
* **Kubernetes Secret**: The secret that you create using Devtron.
29-
* **Kubernetes External Secret**: The secret data of your application is fetched externally, converts the Kubernetes External Secret to Kubernetes Secret. The conversion is completely transparent to Pods and secrets are accessed normally.
30-
* **AWS Secret Manager**: The secret data of your application is fetched from AWS Secret Manager, converts AWS Secret to Kubernetes Secret. The conversion is completely transparent to Pods that can access secrets normally.
31-
* **AWS System Manager**: The secret data for your application is fetched from AWS Secret Manager, converts the secrets stored in AWS System Manager to Kubernetes Secret. The conversion is completely transparent to Pods that can access secrets normally.
32-
* **Hashi Corp Vault**: The secret data for your application is fetched from AWS Secret Manager, converts the secrets stored in Harshi Corp Vault to Kubernetes Secret. The conversion is completely transparent to Pods that can access secrets normally.
29+
* **Kubernetes External Secret**: The secret data of your application is fetched by Devtron externally. Then the Kubernetes External Secret is converted to Kubernetes Secret.
30+
* **AWS Secret Manager**: The secret data of your application is fetched from AWS Secret Manager and then converted to Kubernetes Secret from AWS Secret.
31+
* **AWS System Manager**: The secret data for your application is fetched from AWS System Secret Manager and all the secrets stored in AWS System Manager are converted to Kubernetes Secret.
32+
* **Hashi Corp Vault**: The secret data for your application is fetched from Hashi Corp Vault and the secrets stored in Harshi Corp Vault are converted to Kubernetes Secret.
33+
34+
*Note: The conversion of secrets from various data types to Kubernetes Secrets is done within Devtron and irrespective of the data type, after conversion, the Pods access `secrets` normally.*
3335

3436
## Volume Mount Path
3537

0 commit comments

Comments
 (0)