|
You are here |
external-secrets.io | ||
| | | | |
www.pulumi.com
|
|
| | | | | Learn how to manage Kubernetes secrets with Pulumi ESC and External Secrets Operator | |
| | | | |
particule.io
|
|
| | | | | [AI summary] A technical guide demonstrating how to integrate AWS Secrets Manager with Kubernetes using the Secrets Store CSI driver to securely manage and inject application credentials. | |
| | | | |
blog.nuculabs.de
|
|
| | | | | Hi ?????, In this article I will talk about how to authenticate your applications to the Kubernetes API via the service accounts feature. Citing the Kubernetes docs, a service account for a pod: "provides an identity for processes that run in a Pod. When you (a human) access the cluster (for example, using kubectl), you are authenticated by the apiserver as a particular User Account (currently this is usually admin, unless your cluster administrator has customized your cluster). Processes in containers inside pods can also contact the apiserver. When they do, they are authenticated as a particular Service Account (for example, default)." ?? | |
| | | | |
www.strongdm.com
|
|
| | | HashiCorp Vault is a powerful secrets management tool that is well suited to automating the creation, distribution, and destruction of secrets. | ||