Kubernets Secret (2)

Cheedge LeeCheedge Lee
1 min read

5. How to decode the secret

Previous we see how to create a secret, now let’s use the base64 encode secret to decode the secret

Let’s first get the secret creating yaml file,

k get secrets database-data -o yaml > secret.yaml

let’s use an simple opaque example, and we can see the file

apiVersion: v1
data:
  DB_PASSWORD: c2VjcmV0
kind: Secret
metadata:
  creationTimestamp: "2024-12-29T20:17:39Z"
  name: database-data
  namespace: database-ns
  resourceVersion: "5076"
  uid: a7c50ba3-8945-4ba2-b40e-27e2ecb86f2b
type: Opaque

And the data is base64 encoded, so let’s decode it.

k get secrets database-data -n database-ns -o jsonpath='{.data.*}' | base64 -d

and this will generate the decode DB_PASSWORD.

6. More Reference

There are more reference about secret can be found in officail documents.

https://kubernetes.io/docs/tasks/inject-data-application/distribute-credentials-secure/

0
Subscribe to my newsletter

Read articles from Cheedge Lee directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Cheedge Lee
Cheedge Lee

Some blogs are from my previous blogs, even though I have renovated and checked before migration, but there may be still some parts out of date. (https://blog.sina.com.cn/u/1784323047 or https://blog.csdn.net/li_6698230?type=blog, if they're still accessible.)