Kubernetes - SecretsAfter enabling encryption, you notice older Secrets are still unencrypted in etcd. What should you do?ARestart etcd to apply encryption retroactivelyBManually re-encrypt existing Secrets by updating themCDelete and recreate the SecretsDNothing, encryption applies automatically to all SecretsCheck Answer
Step-by-Step SolutionSolution:Step 1: Understand encryption scopeEncryption applies only to new or updated Secrets after config is enabled.Step 2: Re-encrypt existing SecretsTo encrypt old Secrets, they must be updated or recreated to trigger encryption.Final Answer:Manually re-encrypt existing Secrets by updating them -> Option BQuick Check:Update Secrets to encrypt old data [OK]Quick Trick: Update Secrets to encrypt existing unencrypted data [OK]Common Mistakes:Restarting etcd expecting encryptionAssuming encryption auto-applies retroactivelyDeleting Secrets unnecessarily
Master "Secrets" in Kubernetes9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More Kubernetes Quizzes ConfigMaps - Creating ConfigMaps from files - Quiz 8hard Health Checks and Probes - Liveness probe concept - Quiz 1easy Health Checks and Probes - HTTP probe configuration - Quiz 13medium Health Checks and Probes - Readiness probe concept - Quiz 6medium Ingress - Ingress controllers (Nginx, Traefik) - Quiz 9hard Networking - Pod-to-Pod communication - Quiz 1easy Resource Management - CPU requests and limits - Quiz 2easy Resource Management - Horizontal Pod Autoscaler - Quiz 6medium Resource Management - CPU requests and limits - Quiz 12easy Secrets - External secret management integration - Quiz 12easy