Introduction

Completed

Imagine that you work for a freight company that uses ships to transport goods across the world. The operations department uses a small system that tracks where all the company's ships are docked. Due to staff increases, your company decided to move this system to Azure Kubernetes Service (AKS). However, the security team noted some flaws in the app configuration: some configurations were hardcoded in the app, and some sensitive values like connection strings were left as plain text. These flaws require changes before the application can be deployed for production use.

Important

To complete the optional exercises in this module, you need to use your own subscription, which might incur charges. If you want to follow along, you can use a trial subscription or a subscription that you already have access to.

Learning objectives

By the end of this module, you're able to:

  • Understand configuration concepts behind Kubernetes workloads, such as Secrets and ConfigMaps.
  • Deploy a complete application, securely storing application secrets.
  • Deploy a workload-based configuration for a web application.

Prerequisites

All exercises use the Azure Cloud Shell, which already has all the needed tools installed. If you prefer to run the examples in your own terminal, you need to have the Azure CLI and kubectl installed.