Skip to content
Discussion options

You must be logged in to vote

You don’t necessarily need to repeat the authentication part for every Kubernetes secret. A common approach is to use a single central Secret or ConfigMap that stores the shared authentication information, then reference it in multiple places using Kubernetes features like envFrom or secretKeyRef.

For example:

apiVersion: v1
kind: Secret
metadata:
  name: infisical-auth
type: Opaque
stringData:
  token: "<YOUR_INFISICAL_TOKEN>"

Then in your pod/deployment:


env:
  - name: INFISICAL_TOKEN
    valueFrom:
      secretKeyRef:
        name: infisical-auth
        key: token

This way, you only store the auth info once and can inject it wherever needed. Infisical’s Kubernetes integration suppo…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant