When you use Kubernetes clusters for Enterprise Distributed Application Service (EDAS), we recommend that you use Secrets to store sensitive information such as passwords and certificates. This topic describes how to manage Secrets.
Prerequisites
- A Kubernetes cluster is created in the Container Service for Kubernetes (ACK) console.
- To use an ACK cluster in Enterprise Distributed Application Service (EDAS), create a managed Kubernetes cluster or a dedicated Kubernetes cluster in the Container Service for Kubernetes (ACK) console. For more information, see the following topics:
- To use a serverless Kubernetes cluster in EDAS, create a serverless Kubernetes cluster in the Container Service for Kubernetes (ACK) console. For more information, see Create an ASK cluster.
- The created Kubernetes cluster is imported to EDAS. For more information, see Import a Kubernetes cluster to the EDAS console.
Background information
You can use Secrets to store sensitive information that needs to be kept confidential, such as passwords and certificates. Secrets can be passed to containers when you create or deploy applications. If you modify a Secret, the modification takes effect after you redeploy the relevant application.
You can use Secrets in the following scenarios:
- Use Secrets to configure environment variables for containers. For more information, see Configure environment variables.
- Mount Secrets as files to the directories of containers. For more information, see Mount configurations.
- Store HTTPS certificate information in a Secret and use the Secret to configure the Ingress for an application. For more information, see Create a Kubernetes ingress for an application.