@@ -21,14 +21,14 @@ generates a Secret that you can apply to the API server using `kubectl`.
21
21
22
22
You can generate a Secret by defining a ` secretGenerator ` in a
23
23
` kustomization.yaml ` file that references other existing files, ` .env ` files, or
24
- literal values. For example, the following instructions create a Kustomization
24
+ literal values. For example, the following instructions create a kustomization
25
25
file for the username ` admin ` and the password ` 1f2d1e2e67df ` .
26
26
27
27
{{< note >}}
28
28
The ` stringData ` field for a Secret does not work well with server-side apply.
29
29
{{< /note >}}
30
30
31
- ### Create the Kustomization file
31
+ ### Create the kustomization file
32
32
33
33
{{< tabs name="Secret data" >}}
34
34
{{< tab name="Literals" codelang="yaml" >}}
@@ -57,7 +57,7 @@ secretGenerator:
57
57
- username.txt
58
58
- password.txt
59
59
```
60
- {{% /tab %}}}
60
+ {{% /tab %}}
61
61
{{% tab name=".env files" %}}
62
62
You can also define the secretGenerator in the `kustomization.yaml` file by
63
63
providing `.env` files. For example, the following `kustomization.yaml` file
@@ -72,7 +72,7 @@ secretGenerator:
72
72
{{% /tab %}}
73
73
{{< /tabs >}}
74
74
75
- In all cases, you don' t need to base64 encode the values. The name of the YAML
75
+ In all cases, you don' t need to encode the values in base64 . The name of the YAML
76
76
file ** must** be ` kustomization.yaml` or ` kustomization.yml` .
77
77
78
78
# ## Apply the kustomization file
@@ -93,7 +93,7 @@ When a Secret is generated, the Secret name is created by hashing
93
93
the Secret data and appending the hash value to the name. This ensures that
94
94
a new Secret is generated each time the data is modified.
95
95
96
- To verify that the Secret was created and to decode the Secret data,
96
+ To verify that the Secret was created and to decode the Secret data,
97
97
98
98
```shell
99
99
kubectl get -k -o jsonpath='{.data}'
0 commit comments