Kubernetes - SecretsYou want to ensure all Secrets are encrypted at rest and restrict access. Which two steps should you take?AEnable encryption in API server and use RBAC to limit Secret accessBStore Secrets in ConfigMaps and enable encryption in etcdCUse plain text Secrets and restrict access with network policiesDEnable encryption in kubelet and disable RBACCheck Answer
Step-by-Step SolutionSolution:Step 1: Enable encryption in API serverConfigure API server with encryption config to encrypt Secrets in etcd.Step 2: Use RBAC to restrict accessRole-Based Access Control limits who can view or modify Secrets.Final Answer:Enable encryption in API server and use RBAC to limit Secret access -> Option AQuick Check:Encryption + RBAC = secure Secrets [OK]Quick Trick: Combine encryption and RBAC for best Secret security [OK]Common Mistakes:Using ConfigMaps for SecretsDisabling RBAC weakens securityRelying on network policies alone
Master "Secrets" in Kubernetes9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More Kubernetes Quizzes ConfigMaps - Creating ConfigMaps from files - Quiz 8hard Health Checks and Probes - Liveness probe concept - Quiz 1easy Health Checks and Probes - HTTP probe configuration - Quiz 13medium Health Checks and Probes - Readiness probe concept - Quiz 6medium Ingress - Ingress controllers (Nginx, Traefik) - Quiz 9hard Networking - Pod-to-Pod communication - Quiz 1easy Resource Management - CPU requests and limits - Quiz 2easy Resource Management - Horizontal Pod Autoscaler - Quiz 6medium Resource Management - CPU requests and limits - Quiz 12easy Secrets - External secret management integration - Quiz 12easy