8 Untime secret configuration
gitea_admin edited this page 2026-04-02 13:16:53 +00:00
This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Runtime configuration When you develop an integration with Camel K there are many ways you can provide a configuration resource to the runtime Integration. Since we are dealing with Kubernetes we use Configmap or Secret. The kamel run command is provided with a --config flag that help you setting any configuration resource your Integration need.

The runtime configuration are expected to be encoded in UTF-8 as they are processed by runtime Camel Context and parsed as property files. These resources are materialized as files in a well known path in the Integration Pod. The mount trait will be declared on the Integration. They are also made available on the classpath in order to ease their usage directly from the Route. If you need to provide a non UTF-8 (ie, a binary resource) you may look for --resource flag instead.

the scope of --config global option had different meaning prior Camel K version 1.5. The old global --config has been replaced with --kube-config since Camel K version 1.5. Runtime configmap configuration In a Kubernetes world were dealing with Configmap containing configuration previously stored in the platform. When you need to materialize a Configmap into a file configuration available at your Integration, you can use the --config configmap syntax.

As an example, lets create a Configmap named my-cm containing certain information. You can alternatively use any Configmap youve already stored in your cluster:

kubectl create configmap my-cm --from-literal=my-configmap-key="configmap content" We want to use the materialized file in an integration:

config-configmap-route.yaml
- from:
    uri: "timer:configmap"
    steps:
      - setBody:
          simple: "resource:classpath:my-configmap-key"
      - setBody:
          simple: "configmap content is: ${body}"
      - to: "log:info"
    ```
        


config-secret-route.yaml

  • from: uri: "timer:secret" steps: - setBody: simple: "resource:classpath:my-secret-key" - setBody: simple: "secret content is: ${body}" - to: "log:info" ``` You can see that we re expecting to use a my-secret-key file stored somewhere in the classpath. In order to materialize the Secret will be as easy as running the --config secret syntax: