How to manage Kubernetes Secrets with Red Hat OpenShift

Learn the basics of Kubernetes Secrets and how Red Hat® OpenShift® can help you get the most out of your preferred Kubernetes Secrets management strategy. 

How to manage Kubernetes Secrets with Red Hat OpenShift

Most organizations must keep secrets—pieces of information or data that should only be accessed by specific people or workloads (like passwords, confidential data, TLS certificates, etc). A dedicated secrets management system is specifically designed to handle sensitive data and connect to different platforms, including Kubernetes.

Using an external system for managing secrets gives organizations an extra layer of security and the ability to establish a higher level “command center” where secrets can be audited, monitored, and controlled. This helps limit the uncontrolled spread of self-managed secrets within Kubernetes. Additionally, these systems can automate the entire lifecycle of a secret—including tasks like automatically rotating them, setting expiration dates, and revoking access. This helps reduce the risk of secrets becoming compromised over time.

Secrets management in Red Hat® OpenShift® is designed to be flexible and work with a variety of tools, so organizations are not locked in with a single vendor. This is achieved through an operator and plugin architecture which separates workloads and applications from the secrets manager. The workload doesn't need to know where or how a secret is stored. Instead, the operator, in combination with the vendor plugin, acts as the intermediary. The plugin handles all communication between the Red Hat OpenShift cluster and the external secrets manager, and the operator handles all communication between the plugin and the workloads. Because the system is built this way, any vendor can create a plugin as long as it follows the specific rules and APIs defined by the operator.

Red Hat OpenShift supports several options for managing secrets:

  • Secrets Store CSI Driver: allows Kubernetes to access and use multiple secrets, keys, and certificates from external secret management systems.
  • External Secrets Operator: synchronizes secrets from external management systems into Kubernetes Secrets and manages them in Red Hat OpenShift.  
  • Cert-manager: adds certificates and certificate issuers as type:Secret  within a Kubernetes cluster. 

What is included in this learning path?

  • What is a Kubernetes Secret?
  • Approaches to managing Kubernetes Secrets and other credentials in Red Hat OpenShift
  • Introductions to Secrets Store CSI Driver, External Secrets Operator, and cert-manager
  • Available partner and vendor integrations

What will you get?

  • An understanding of what Kubernetes Secrets are and how they work
  • Best strategies for managing Kubernetes Secrets for different workload requirements
  • How to get the most out of your preferred Kubernetes Secrets management methods using Red Hat OpenShift 
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동