0
0
Kubernetesdevops~10 mins

External secret management integration in Kubernetes - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to create a Kubernetes Secret.

Kubernetes
apiVersion: v1
kind: Secret
metadata:
  name: my-secret
stringData:
  password: [1]
Drag options to blanks, or click blank then click option'
AsecretKeyRef
BexternalSecretRef
CmyPassword123
DconfigMapRef
Attempts:
3 left
💡 Hint
Common Mistakes
Using a reference like 'secretKeyRef' instead of the actual secret value.
Confusing ConfigMap references with secrets.
2fill in blank
medium

Complete the ExternalSecret manifest to specify the secret store provider.

Kubernetes
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
  name: my-external-secret
spec:
  refreshInterval: 1h
  secretStoreRef:
    name: my-secret-store
    kind: [1]
Drag options to blanks, or click blank then click option'
AClusterSecretStore
BSecret
CConfigMap
DExternalSecret
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'Secret' or 'ConfigMap' as the kind, which are not secret stores.
Confusing ExternalSecret kind with secret store kind.
3fill in blank
hard

Fix the error in the ExternalSecret spec to correctly map the external secret key to the Kubernetes secret key.

Kubernetes
spec:
  target:
    name: my-secret
  data:
  - secretKey: password
    remoteRef:
      key: [1]
Drag options to blanks, or click blank then click option'
Adb-password
Bpassword
Cmy-secret
DsecretKey
Attempts:
3 left
💡 Hint
Common Mistakes
Using the Kubernetes secret key name instead of the external secret key.
Using generic terms like 'secretKey' instead of the actual external key.
4fill in blank
hard

Fill both blanks to configure the SecretStore to use AWS Secrets Manager with the correct provider and region.

Kubernetes
spec:
  provider:
    [1]:
      region: [2]
Drag options to blanks, or click blank then click option'
Aaws
Bus-west-2
Cgcp
Deurope-west1
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'gcp' as provider for AWS Secrets Manager.
Using incorrect region names.
5fill in blank
hard

Fill all three blanks to define an ExternalSecret that fetches a secret named 'api-key' from HashiCorp Vault with the correct path and key mapping.

Kubernetes
spec:
  secretStoreRef:
    name: vault-secret-store
    kind: SecretStore
  target:
    name: vault-api-key
  data:
  - secretKey: [1]
    remoteRef:
      key: [2]
      property: [3]
Drag options to blanks, or click blank then click option'
AapiKey
Bsecret/data/api-key
Cvalue
Dpassword
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up secretKey and remoteRef.key values.
Using incorrect Vault paths or property names.