/
Browse
/
Learning Journeys
/
Developing Applications in SAP BTP, Kyma Runtime
/
Using ConfigMaps and Secrets
Discovering Kubernetes
Explaining the Basic Concepts of Kubernetes
23 mins
Describing Kubernetes Cluster Architecture
17 mins
Mastering Kubernetes Objects
29 mins
Interacting with the Kubernetes API Using Kubectl
17 mins
Quiz
Discovering Kyma
Working with Kubernetes Workloads
Using Services to Create Internal and External Communication with Kubernetes
Using Service Meshes with Istio
Using Kyma Eventing
Using Kubernetes Storage and StatefulSets
Using SAP BTP Service Management
Performing Observability and Monitoring
Using ConfigMaps and Secrets
Knowledge quiz
It's time to put what you've learned to the test, get 3 right to pass this unit.
1.
What are Secrets used for?
Choose the correct answer.
To store sensitive data like passwords or API keys
To store non-sensitive data like configuration files
2.
Which command do you use to retrieve the logs using the label selector?
Choose the correct answer.
kubectl logs -s
kubectl logs -l
kubectl logs -ls
3.
What are ConfigMaps used for?
Choose the correct answer.
To store sensitive data like passwords or API keys
To store non-sensitive data like configuration files
4.
How can ConfigMaps and Secrets be used in your application?
Choose the correct answer.
They can be used to decouple configuration data from the application
They can be used to store data in a database