Skip to content

Commit

Permalink
Merge pull request #47203 from windsonsea/kustome
Browse files Browse the repository at this point in the history
Fix typos in managing-secret-using-kustomize.md
  • Loading branch information
k8s-ci-robot committed Jul 19, 2024
2 parents f51b4ba + 61746ad commit ddfefc5
Showing 1 changed file with 5 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -21,14 +21,14 @@ generates a Secret that you can apply to the API server using `kubectl`.

You can generate a Secret by defining a `secretGenerator` in a
`kustomization.yaml` file that references other existing files, `.env` files, or
literal values. For example, the following instructions create a Kustomization
literal values. For example, the following instructions create a kustomization
file for the username `admin` and the password `1f2d1e2e67df`.

{{< note >}}
The `stringData` field for a Secret does not work well with server-side apply.
{{< /note >}}

### Create the Kustomization file
### Create the kustomization file

{{< tabs name="Secret data" >}}
{{< tab name="Literals" codelang="yaml" >}}
Expand Down Expand Up @@ -57,7 +57,7 @@ secretGenerator:
- username.txt
- password.txt
```
{{% /tab %}}}
{{% /tab %}}
{{% tab name=".env files" %}}
You can also define the secretGenerator in the `kustomization.yaml` file by
providing `.env` files. For example, the following `kustomization.yaml` file
Expand All @@ -72,7 +72,7 @@ secretGenerator:
{{% /tab %}}
{{< /tabs >}}
In all cases, you don't need to base64 encode the values. The name of the YAML
In all cases, you don't need to encode the values in base64. The name of the YAML
file **must** be `kustomization.yaml` or `kustomization.yml`.

### Apply the kustomization file
Expand All @@ -93,7 +93,7 @@ When a Secret is generated, the Secret name is created by hashing
the Secret data and appending the hash value to the name. This ensures that
a new Secret is generated each time the data is modified.
To verify that the Secret was created and to decode the Secret data,
To verify that the Secret was created and to decode the Secret data,
```shell
kubectl get -k <directory-path> -o jsonpath='{.data}'
Expand Down

0 comments on commit ddfefc5

Please sign in to comment.