Managing Secret using kubectl

Creating Secret objects using kubectl command line.

Before you begin

You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:

Create a Secret

A Secret can contain user credentials required by Pods to access a database. For example, a database connection string consists of a username and password. You can store the username in a file ./username.txt and the password in a file ./password.txt on your local machine.

  1. echo -n 'admin' > ./username.txt
  2. echo -n '1f2d1e2e67df' > ./password.txt

The -n flag in the above two commands ensures that the generated files will not contain an extra newline character at the end of the text. This is important because when kubectl reads a file and encode the content into base64 string, the extra newline character gets encoded too.

The kubectl create secret command packages these files into a Secret and creates the object on the API server.

  1. kubectl create secret generic db-user-pass \
  2. --from-file=./username.txt \
  3. --from-file=./password.txt

The output is similar to:

  1. secret/db-user-pass created

Default key name is the filename. You may optionally set the key name using --from-file=[key=]source. For example:

  1. kubectl create secret generic db-user-pass \
  2. --from-file=username=./username.txt \
  3. --from-file=password=./password.txt

You do not need to escape special characters in passwords from files (--from-file).

You can also provide Secret data using the --from-literal=<key>=<value> tag. This tag can be specified more than once to provide multiple key-value pairs. Note that special characters such as $, \, *, =, and ! will be interpreted by your shell) and require escaping. In most shells, the easiest way to escape the password is to surround it with single quotes ('). For example, if your actual password is S!B\*d$zDsb=, you should execute the command this way:

  1. kubectl create secret generic dev-db-secret \
  2. --from-literal=username=devuser \
  3. --from-literal=password='S!B\*d$zDsb='

Verify the Secret

You can check that the secret was created:

  1. kubectl get secrets

The output is similar to:

  1. NAME TYPE DATA AGE
  2. db-user-pass Opaque 2 51s

You can view a description of the Secret:

  1. kubectl describe secrets/db-user-pass

The output is similar to:

  1. Name: db-user-pass
  2. Namespace: default
  3. Labels: <none>
  4. Annotations: <none>
  5. Type: Opaque
  6. Data
  7. ====
  8. password: 12 bytes
  9. username: 5 bytes

The commands kubectl get and kubectl describe avoid showing the contents of a Secret by default. This is to protect the Secret from being exposed accidentally to an onlooker, or from being stored in a terminal log.

Decoding the Secret

To view the contents of the Secret we just created, you can run the following command:

  1. kubectl get secret db-user-pass -o jsonpath='{.data}'

The output is similar to:

  1. {"password.txt":"MWYyZDFlMmU2N2Rm","username.txt":"YWRtaW4="}

Now you can decode the password.txt data:

  1. echo 'MWYyZDFlMmU2N2Rm' | base64 --decode

The output is similar to:

  1. 1f2d1e2e67df

Clean Up

To delete the Secret you have just created:

  1. kubectl delete secret db-user-pass

What’s next