Configuring Secrets

Create a Secret based on your needs, select the appropriate type of Secret, and configure the parameters.

Procedure

  1. Container Platform.

  2. In the left navigation bar, click Configuration > Secrets.

  3. Click Create Secret.

  4. Configure the parameters.

    Note: In the form view, sensitive data such as the input username and password will automatically be encoded in Base64 format before being stored in the Secret. The converted data can be previewed in the YAML view.

  5. Click Create.

Follow-up Actions

When creating workloads for native applications in the same namespace, you can reference the Secrets that have already been created.

Operations

You can click the (⋮) on the right side of the list page or click Actions in the upper right corner of the details page to update or delete the Secret as needed.

OperationDescription
UpdateAfter adding or updating a Secret, workloads that have referenced this Secret (or its configuration items) via environment variables need to have their Pods rebuilt for the new configuration to take effect.
Delete
  • After deleting a Secret, workloads that have referenced this Secret (or its configuration items) via environment variables may be impacted due to the inability to find the reference source when rebuilding Pods.
  • Please do not delete the Secrets automatically generated by the platform, as this may prevent the platform from functioning properly. For example: Secrets of type service-account-token that contain authentication information for namespace resources and Secrets in system namespaces (such as kube-system).