Secrets


Secrets store sensitive data like passwords, tokens, or keys. They may contain one or more key value pairs.

This page is about secrets in general. For details on setting up a private registry, refer to the section on registries.

When configuring a workload, you’ll be able to choose which secrets to include. Like config maps, secrets can be referenced by workloads as either an environment variable or a volume mount.

Mounted secrets will be updated automatically unless they are mounted as subpath volumes. For details on how updated secrets are propagated, refer to the Kubernetes documentation.

Creating Secrets

  1. In the upper left corner, click ☰ > Cluster Management.
  2. Go to the cluster where you want to add a secret and click Explore.
  3. Click More Resources > Core > Secrets.
  4. Click Create.
  5. Select the type of secret you want to create.
  6. Select a Namespace for the secret.
  7. Enter a Name for the secret.

    Note: Kubernetes classifies secrets, certificates, and registries all as secrets, and no two secrets in a project or namespace can have duplicate names. Therefore, to prevent conflicts, your secret must have a unique name among all secrets within your workspace.

  8. From Data, click Add to add a key-value pair. Add as many values as you need.

    Tip: You can add multiple key value pairs to the secret by copying and pasting.

    Bulk Key Value Pair Copy/Paste

  9. Click Save.

Result: Your secret is added to the project or namespace, depending on the scope you chose. You can view the secret in the Rancher UI from the Resources > Secrets view.

Mounted secrets will be updated automatically unless they are mounted as subpath volumes. For details on how updated secrets are propagated, refer to the Kubernetes documentation.

What’s Next?

Now that you have a secret added to the project or namespace, you can add it to a workload that you deploy.

For more information on adding secret to a workload, see Deploying Workloads.