ConfigMaps and Secrets¶
Using a ConfigMap After a ConfigMap is created, it can be used in three workload scenarios: environment variables, command line parameters, and data volumes.
Using a Secret After secrets are created, they can be mounted as data volumes or be exposed as environment variables to be used by a container in a pod.