You can mount Secrets to Pods as volumes. This validator detects a condition when a Secret mounted as a volume in PodTemplateSpec is not found. That can happen if the Secret was deleted or renamed, or there was a typo in the volume mount spec. Note that this check is skipped for volume mounts marked as optional.
Affected Resources: Deployment, DaemonSet, StatefulSet, CronJob, Job, ReplicaSet, Pod
kind: Deployment
spec:
template:
spec:
volumes:
- name: my-secret-volume
secret:
secretName: my-secret # This Secret is not present
optional: false
Please let us know if there are other built-in validation rules you would like to see in Kubevious to detect misconfigurations and violations to best practices. Optionally, you can provide your details so we can reach out to you with follow-up questions.