• Managing application configurations with ConfigMaps
  • Securing sensitive information with Secrets
  • Using ConfigMaps and Secrets in applications