Exploring Built-In Secrets
Explore how Kubernetes manages built-in Secrets to secure sensitive information within containers. Understand automatic token generation, mounting, and how to use Secrets for initial credentials in Jenkins.
We'll cover the following...
Creating Jenkins objects
We’ll create the same Jenkins objects we defined earlier.
We create Ingress, Deployment, and Service objects. We also execute the kubectl rollout status command that will tell us when the deployment is finished, which may take some time.
The jenkins-unprotected.yml definition does not use any new feature, so we won’t waste time going through the YAML file. Instead, we’ll open Jenkins UI in a browser.
Upon closer inspection, you’ll notice that there is no login button. Jenkins is currently unprotected. The image does allow the option to define an initial administrative username and password.
If the files ...