You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/configuration/secret.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -277,8 +277,8 @@ for information on referencing service account credentials from within Pods.
277
277
278
278
### Docker config Secrets
279
279
280
-
You can use one of the following `type` values to create a Secret to
281
-
store the credentials for accessing a container image registry:
280
+
If you are creating a Secret to store credentials for accessing a container image registry,
281
+
you must use one of the following `type` values for that Secret:
282
282
283
283
- `kubernetes.io/dockercfg`
284
284
- `kubernetes.io/dockerconfigjson`
@@ -354,10 +354,12 @@ Docker configuration file):
354
354
}
355
355
```
356
356
357
-
{{< note >}}
357
+
{{< caution >}}
358
358
The `auth` value there is base64 encoded; it is obscured but not secret.
359
359
Anyone who can read that Secret can learn the registry access bearer token.
360
-
{{< /note >}}
360
+
361
+
It is suggested to use [credential providers](/docs/tasks/administer-cluster/kubelet-credential-provider/) to dynamically and securely provide pull secrets on-demand.
0 commit comments