Skip to content

Commit 0bb8ce1

Browse files
authored
tip for secret encoding
1 parent 6f8e018 commit 0bb8ce1

File tree

1 file changed

+3
-1
lines changed
  • docs/modules/ROOT/pages/exoscale-dbaas/postgresql

1 file changed

+3
-1
lines changed

docs/modules/ROOT/pages/exoscale-dbaas/postgresql/create.adoc

+3-1
Original file line numberDiff line numberDiff line change
@@ -48,13 +48,15 @@ When you see `True` in the READY column, it means the instance is provisioned an
4848
4949
== Find the connection details
5050
51-
The connection details are stored in a secret. Kubernetes secrets are base64 encoded. You can retrieve them with the following command:
51+
The connection details are stored in a secret. You can retrieve them with the following command:
5252
5353
[source,bash]
5454
----
5555
$ oc get secrets postgres-creds -o yaml
5656
----
5757
58+
TIP: Kubernetes secrets are base64 encoded. See https://kubernetes.io/docs/concepts/configuration/secret/#working-with-secrets[Working with kubernetes secrets^].
59+
5860
The output of the command above is a secret specification with the following structure:
5961
6062
include::page$references/secrets.adoc[tag=postgres]

0 commit comments

Comments
 (0)