Complete the code to specify the volume type as a secret in the pod spec.
volumes:
- name: secret-volume
[1]:
secretName: mysecretTo mount a secret as a volume, the volume type must be secret.
Complete the container volumeMounts to mount the secret volume at the correct path.
containers:
- name: app
image: myapp
volumeMounts:
- name: secret-volume
mountPath: [1]The common convention is to mount secrets under /etc/secret or a similar path.
Fix the error in the volumeMounts section to correctly mount the secret volume.
containers:
- name: app
image: myapp
volumeMounts:
- name: [1]
mountPath: /etc/secretThe volumeMount name must match the volume name defined in the pod spec, which is secret-volume.
Fill both blanks to create a pod spec that mounts a secret named 'db-secret' at '/etc/db'.
volumes: - name: [1] secret: secretName: [2]
The volume name can be any valid name, here db-secret-volume. The secretName must be the actual secret, db-secret.
Fill all three blanks to complete the container spec that mounts the secret volume 'db-secret-volume' at '/etc/db'.
containers: - name: app image: myapp volumeMounts: - name: [1] mountPath: [2] readOnly: [3]
The volumeMount name must match the volume name db-secret-volume. The mountPath is /etc/db. Secrets should be mounted as read-only, so true.