<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>DevSecOps School</provider_name><provider_url>https://devsecopsschool.com/blog</provider_url><author_name>pritesh k</author_name><author_url>https://devsecopsschool.com/blog/author/priteshgeek/</author_url><title>ConfigMaps in DevSecOps: A Comprehensive Tutorial - DevSecOps School</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="UlTwxVzBa5"&gt;&lt;a href="https://devsecopsschool.com/blog/configmaps-in-devsecops-a-comprehensive-tutorial/"&gt;ConfigMaps in DevSecOps: A Comprehensive Tutorial&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://devsecopsschool.com/blog/configmaps-in-devsecops-a-comprehensive-tutorial/embed/#?secret=UlTwxVzBa5" width="600" height="338" title="&#x201C;ConfigMaps in DevSecOps: A Comprehensive Tutorial&#x201D; &#x2014; DevSecOps School" data-secret="UlTwxVzBa5" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://devsecopsschool.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Introduction &amp; Overview What is ConfigMaps? ConfigMaps is a Kubernetes API resource that allows users to store non-sensitive configuration data in key-value pairs, files, or literals. This data can be consumed by pods or other Kubernetes resources, enabling applications to adapt to different environments without code changes. History or Background Introduced in Kubernetes 1.2 (2016), ... Read more</description></oembed>
