secrets

All posts tagged secrets by Linux Bash
  • Posted on
    Featured Image
    Kubernetes, or K8s, manages clusters of Linux containers. It's a powerful platform for deploying, managing, and scaling applications in a containerized environment. Two critical components often used in Kubernetes deployments are Secrets and ConfigMaps. In this guide, we explore how to automate the creation of Kubernetes Secrets and ConfigMaps using Linux Bash scripts to streamline your deployments, bolster security, and ensure a high level of efficiency. Before diving into automation, let’s clarify what Kubernetes Secrets and ConfigMaps are: Secrets: Kubernetes Secrets let you store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys.
  • Posted on
    Featured Image
    In the world of software development, DevOps has become an indispensable practice, promoting a culture and environment where building, testing, and releasing software happens rapidly, frequently, and more reliably. However, as the boundary between development and operations blurs, securing the DevOps pipeline becomes paramount. Using Linux Bash, one can effectively integrate encryption, manage tokens, and handle secrets to enhance the security of DevOps processes. This blog post provides insights and practical tips on securing your DevOps pipeline leveraging the capabilities of Linux Bash.