Skip to content

Commit f2cfc91

Browse files
committed
Fix the case of Secrets wherever it refers to the Kubernetes object
1 parent 317df88 commit f2cfc91

File tree

1 file changed

+14
-14
lines changed
  • content/en/docs/concepts/configuration

1 file changed

+14
-14
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ content_type: concept
66
feature:
77
title: Secret and configuration management
88
description: >
9-
Deploy and update secrets and application configuration without rebuilding your image
10-
and without exposing secrets in your stack configuration.
9+
Deploy and update Secrets and application configuration without rebuilding your image
10+
and without exposing Secrets in your stack configuration.
1111
weight: 30
1212
---
1313

@@ -68,7 +68,7 @@ help automate node registration.
6868
### Use case: dotfiles in a secret volume
6969

7070
You can make your data "hidden" by defining a key that begins with a dot.
71-
This key represents a dotfile or "hidden" file. For example, when the following secret
71+
This key represents a dotfile or "hidden" file. For example, when the following Secret
7272
is mounted into a volume, `secret-volume`, the volume will contain a single file,
7373
called `.secret-file`, and the `dotfile-test-container` will have this file
7474
present at the path `/etc/secret-volume/.secret-file`.
@@ -135,8 +135,8 @@ Here are some of your options:
135135
[ServiceAccount](/docs/reference/access-authn-authz/authentication/#service-account-tokens)
136136
and its tokens to identify your client.
137137
- There are third-party tools that you can run, either within or outside your cluster,
138-
that provide secrets management. For example, a service that Pods access over HTTPS,
139-
that reveals a secret if the client correctly authenticates (for example, with a ServiceAccount
138+
that provide Secrets management. For example, a service that Pods access over HTTPS,
139+
that reveals a Secret if the client correctly authenticates (for example, with a ServiceAccount
140140
token).
141141
- For authentication, you can implement a custom signer for X.509 certificates, and use
142142
[CertificateSigningRequests](/docs/reference/access-authn-authz/certificate-signing-requests/)
@@ -505,7 +505,7 @@ data:
505505
A bootstrap token Secret has the following keys specified under `data`:
506506

507507
- `token-id`: A random 6 character string as the token identifier. Required.
508-
- `token-secret`: A random 16 character string as the actual token secret. Required.
508+
- `token-secret`: A random 16 character string as the actual token Secret. Required.
509509
- `description`: A human-readable string that describes what the token is
510510
used for. Optional.
511511
- `expiration`: An absolute UTC time using [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339) specifying when the token
@@ -568,9 +568,9 @@ precedence.
568568

569569
#### Size limit {#restriction-data-size}
570570

571-
Individual secrets are limited to 1MiB in size. This is to discourage creation
572-
of very large secrets that could exhaust the API server and kubelet memory.
573-
However, creation of many smaller secrets could also exhaust memory. You can
571+
Individual Secrets are limited to 1MiB in size. This is to discourage creation
572+
of very large Secrets that could exhaust the API server and kubelet memory.
573+
However, creation of many smaller Secrets could also exhaust memory. You can
574574
use a [resource quota](/docs/concepts/policy/resource-quotas/) to limit the
575575
number of Secrets (or other resources) in a namespace.
576576

@@ -708,17 +708,17 @@ LASTSEEN FIRSTSEEN COUNT NAME KIND SUBOBJECT
708708
0s 0s 1 dapi-test-pod Pod Warning InvalidEnvironmentVariableNames kubelet, 127.0.0.1 Keys [1badkey, 2alsobad] from the EnvFrom secret default/mysecret were skipped since they are considered invalid environment variable names.
709709
```
710710

711-
### Container image pull secrets {#using-imagepullsecrets}
711+
### Container image pull Secrets {#using-imagepullsecrets}
712712

713713
If you want to fetch container images from a private repository, you need a way for
714714
the kubelet on each node to authenticate to that repository. You can configure
715-
_image pull secrets_ to make this possible. These secrets are configured at the Pod
715+
_image pull Secrets_ to make this possible. These Secrets are configured at the Pod
716716
level.
717717

718718
#### Using imagePullSecrets
719719

720-
The `imagePullSecrets` field is a list of references to secrets in the same namespace.
721-
You can use an `imagePullSecrets` to pass a secret that contains a Docker (or other) image registry
720+
The `imagePullSecrets` field is a list of references to Secrets in the same namespace.
721+
You can use an `imagePullSecrets` to pass a Secret that contains a Docker (or other) image registry
722722
password to the kubelet. The kubelet uses this information to pull a private image on behalf of your Pod.
723723
See the [PodSpec API](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podspec-v1-core)
724724
for more information about the `imagePullSecrets` field.
@@ -787,7 +787,7 @@ Secrets it expects to interact with, other apps within the same namespace can
787787
render those assumptions invalid.
788788

789789
A Secret is only sent to a node if a Pod on that node requires it.
790-
For mounting secrets into Pods, the kubelet stores a copy of the data into a `tmpfs`
790+
For mounting Secrets into Pods, the kubelet stores a copy of the data into a `tmpfs`
791791
so that the confidential data is not written to durable storage.
792792
Once the Pod that depends on the Secret is deleted, the kubelet deletes its local copy
793793
of the confidential data from the Secret.

0 commit comments

Comments
 (0)