Updated on 2023-07-07 GMT+08:00
ConfigMaps and Secrets
- Creating a ConfigMap
- Using a ConfigMap
After a ConfigMap is created, it can be used in three workload scenarios: environment variables, command line parameters, and data volumes. - Creating a Secret
- Using a Secret
After secrets are created, they can be mounted as data volumes or be exposed as environment variables to be used by a container in a pod. - Cluster Secrets
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot