Today in Kubernetes, the exposure of secrets for connecting application workloads to external services such as REST APIs, databases, event buses, and many more is manual and bespoke. Each service provider suggests a different way to access their secrets, and each application developer consumes those secrets in a custom way to their workloads. While there is a good deal of value to this flexibility level, large development teams lose overall velocity dealing with each unique solution. To combat this, we already see teams adopting internal patterns for how to achieve this workload-to-service linkage.
This project specifies a Kubernetes-wide specification for communicating service secrets to workloads in an automated way. It aims to create a widely applicable mechanism but without excluding other strategies for systems that it does not fit easily. The benefit of Kubernetes-wide specification is that all of the actors in an ecosystem can work towards a clearly defined abstraction at the edge of their expertise and depend on other parties to complete the chain.
To get started, please check out the guide for the appropriate role
- Application Developer expects secrets to be exposed consistently and predictably
- Service Provider expects secrets to be collected consistently and predictably
- Application Operator expects secrets to be transferred from services to workloads consistently and predictably
Community, discussion, contribution, and support
The Service Binding for Kubernetes project is a community lead effort. A bi-weekly working group call is open to the public. Discussions occur on GitHub and on the #bindings-discuss channel in the Kubernetes Slack.
Code of conduct
Participation in the Service Binding community is governed by the Contributor Covenant.