Learn · Configuration
Configuration & Secrets
Most outages are configuration outages. The discipline is to prove references and keys before you restart workloads or blame the platform.
What this module covers
Wiring, exposure, and operational realism.
- ConfigMaps: non-secret configuration and safe update posture.
- Secrets: threat models, access boundaries, rotation costs, and why base64 is not safety.
- Wiring: envFrom vs explicit keys, volume mounts, and how missing keys become crash loops.
Readings
Safe handling, stated without illusion.
Text
Codex GigasSecrets, Sealing, and the False Promise of Safety
Threat models, encryption boundaries, audit, rotation posture, and workload identity tradeoffs.
Text
Codex GigasOn Drift, Entropy, and the Burden of Configuration
Why configuration decays, and how to keep the platform honest over time.
Tutorial
Chapter 15Ingress, Config, and Secrets
Practical examples for Ingress, ConfigMaps, and Secrets—with caveats.
Practice
Make config failures legible.
Next
Continue with operations.