forked from docs/doc-exports
Reviewed-by: Eotvos, Oliver <oliver.eotvos@t-systems.com> Co-authored-by: qiujiandong1 <qiujiandong1@huawei.com> Co-committed-by: qiujiandong1 <qiujiandong1@huawei.com>
1.1 KiB
1.1 KiB
ConfigMaps and Secrets
- Creating a ConfigMap
- Using a ConfigMap
After a ConfigMap is created, it can be used in three workload scenarios: environment variables, command line parameters, and data volumes. - Creating a Secret
- Using a Secret
After secrets are created, they can be mounted as data volumes or be exposed as environment variables to be used by a container in a pod. - Cluster Secrets