diff --git a/deploy/crdb.sh b/deploy/crdb.sh
index ecec39101b1a57014d3ca438fed57105f62074c4..76aa0737087cb9bfe28b4a42e6ebd58b5b784b7e 100755
--- a/deploy/crdb.sh
+++ b/deploy/crdb.sh
@@ -30,12 +30,6 @@ export CRDB_PASSWORD=${CRDB_PASSWORD:-"tfs123"}
 # If not already set, set the database name to be used by Context.
 export CRDB_DATABASE=${CRDB_DATABASE:-"tfs"}
 
-# If not already set, set the name of the secret where CockroachDB data and credentials will be stored.
-export CRDB_SECRET_NAME=${CRDB_SECRET_NAME:-"crdb-data"}
-
-# If not already set, set the namespace where the secret containing CockroachDB data and credentials will be stored.
-export CRDB_SECRET_NAMESPACE=${CRDB_SECRET_NAMESPACE:-"tfs"}
-
 # If not already set, set CockroachDB installation mode. Accepted values are: 'single' and 'cluster'.
 # "YES", the database pointed by variable CRDB_NAMESPACE will be dropped while
 # checking/deploying CockroachDB.
@@ -138,25 +132,9 @@ function crdb_deploy_single() {
     PATCH='{"spec": {"template": {"spec": {"containers": ['${CONTAINER}']}}}}'
     kubectl patch daemonset nginx-ingress-microk8s-controller --namespace ingress --patch "${PATCH}"
     echo
-
-    echo "Create secret with CockroachDB data"
-    kubectl create secret generic ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --type='Opaque' \
-        --from-literal=CRDB_NAMESPACE=${CRDB_NAMESPACE} \
-        --from-literal=CRDB_SQL_PORT=${CRDB_SQL_PORT} \
-        --from-literal=CRDB_GUI_PORT=${CRDB_GUI_PORT} \
-        --from-literal=CRDB_DATABASE=${CRDB_DATABASE} \
-        --from-literal=CRDB_USERNAME=${CRDB_USERNAME} \
-        --from-literal=CRDB_PASSWORD="'"${CRDB_PASSWORD}"'" \
-        --from-literal=CRDB_SSLMODE=require
-
-    kubectl get all --all-namespaces
 }
 
 function crdb_undeploy_single() {
-    echo "Delete secret with CockroachDB data"
-    kubectl delete secret ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --ignore-not-found
-    echo
-
     echo "CockroachDB"
     echo ">>> Checking if CockroachDB is deployed..."
     if kubectl get --namespace ${CRDB_NAMESPACE} statefulset/cockroachdb &> /dev/null; then
@@ -307,25 +285,9 @@ function crdb_deploy_cluster() {
     PATCH='{"spec": {"template": {"spec": {"containers": ['${CONTAINER}']}}}}'
     kubectl patch daemonset nginx-ingress-microk8s-controller --namespace ingress --patch "${PATCH}"
     echo
-
-    echo "Create secret with CockroachDB data"
-    kubectl create secret generic ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --type='Opaque' \
-        --from-literal=CRDB_NAMESPACE=${CRDB_NAMESPACE} \
-        --from-literal=CRDB_SQL_PORT=${CRDB_SQL_PORT} \
-        --from-literal=CRDB_GUI_PORT=${CRDB_GUI_PORT} \
-        --from-literal=CRDB_DATABASE=${CRDB_DATABASE} \
-        --from-literal=CRDB_USERNAME=${CRDB_USERNAME} \
-        --from-literal=CRDB_PASSWORD="'"${CRDB_PASSWORD}"'" \
-        --from-literal=CRDB_SSLMODE=require
-
-    kubectl get all --all-namespaces
 }
 
 function crdb_undeploy_cluster() {
-    echo "Delete secret with CockroachDB data"
-    kubectl delete secret ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --ignore-not-found
-    echo
-
     echo "CockroachDB Client"
     echo ">>> Checking if CockroachDB Client is deployed..."
     if kubectl get --namespace ${CRDB_NAMESPACE} pod/cockroachdb-client-secure &> /dev/null; then
diff --git a/deploy/nats.sh b/deploy/nats.sh
index 757b0984f5afebb0a252b3087f93d2a239a72faf..54402899698995ceaddbebde2254528c4b33a315 100755
--- a/deploy/nats.sh
+++ b/deploy/nats.sh
@@ -13,6 +13,7 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
+
 ########################################################################################################################
 # Read deployment settings
 ########################################################################################################################
@@ -20,17 +21,12 @@
 # If not already set, set the namespace where NATS will be deployed.
 export NATS_NAMESPACE=${NATS_NAMESPACE:-"nats"}
 
-# If not already set, set the name of the secret where NATS data and credentials will be stored.
-export NATS_SECRET_NAME=${NATS_SECRET_NAME:-"nats-data"}
-
-# If not already set, set the namespace where the secret containing NATS data and credentials will be stored.
-export NATS_SECRET_NAMESPACE=${NATS_SECRET_NAMESPACE:-"tfs"}
-
 # If not already set, disable flag for re-deploying NATS from scratch.
 # WARNING: ACTIVATING THIS FLAG IMPLIES LOOSING THE MESSAGE BROKER INFORMATION!
 # If NATS_REDEPLOY is "YES", the message broker will be dropped while checking/deploying NATS.
 export NATS_REDEPLOY=${NATS_REDEPLOY:-""}
 
+
 ########################################################################################################################
 # Automated steps start here
 ########################################################################################################################
@@ -106,21 +102,9 @@ function nats_deploy_single() {
     PATCH='{"spec": {"template": {"spec": {"containers": ['${CONTAINER}']}}}}'
     kubectl patch daemonset nginx-ingress-microk8s-controller --namespace ingress --patch "${PATCH}"
     echo
-
-    echo "Create secret with NATS data"
-    kubectl create secret generic ${NATS_SECRET_NAME} --namespace ${NATS_SECRET_NAMESPACE} --type='Opaque' \
-        --from-literal=NATS_NAMESPACE=${NATS_NAMESPACE} \
-        --from-literal=NATS_CLIENT_PORT=${NATS_CLIENT_PORT} \
-        --from-literal=NATS_GUI_PORT=${NATS_GUI_PORT}
-
-    kubectl get all --all-namespaces
 }
 
 function nats_undeploy_single() {
-    echo "Delete secret with NATS data"
-    kubectl delete secret ${NATS_SECRET_NAME} --namespace ${NATS_SECRET_NAMESPACE} --ignore-not-found
-    echo
-
     echo "NATS"
     echo ">>> Checking if NATS is deployed..."
     if kubectl get --namespace ${NATS_NAMESPACE} statefulset/nats &> /dev/null; then
diff --git a/deploy/tfs.sh b/deploy/tfs.sh
index efa4875c64b8e03b32f9727ecec690a6f2e060c5..8b172b0fc13e629eab49efbd60816a336c5903a9 100755
--- a/deploy/tfs.sh
+++ b/deploy/tfs.sh
@@ -42,6 +42,22 @@ export TFS_GRAFANA_PASSWORD=${TFS_GRAFANA_PASSWORD:-"admin123+"}
 # If TFS_SKIP_BUILD is "YES", the containers are not rebuilt-retagged-repushed and existing ones are used.
 export TFS_SKIP_BUILD=${TFS_SKIP_BUILD:-""}
 
+# If not already set, set the namespace where CockroackDB will be deployed.
+export CRDB_NAMESPACE=${CRDB_NAMESPACE:-"crdb"}
+
+# If not already set, set the database username to be used by Context.
+export CRDB_USERNAME=${CRDB_USERNAME:-"tfs"}
+
+# If not already set, set the database user's password to be used by Context.
+export CRDB_PASSWORD=${CRDB_PASSWORD:-"tfs123"}
+
+# If not already set, set the database name to be used by Context.
+export CRDB_DATABASE=${CRDB_DATABASE:-"tfs"}
+
+# If not already set, set the namespace where NATS will be deployed.
+export NATS_NAMESPACE=${NATS_NAMESPACE:-"nats"}
+
+
 ########################################################################################################################
 # Automated steps start here
 ########################################################################################################################
@@ -61,6 +77,24 @@ kubectl delete namespace $TFS_K8S_NAMESPACE
 kubectl create namespace $TFS_K8S_NAMESPACE
 printf "\n"
 
+echo "Create secret with CockroachDB data"
+CRDB_SQL_PORT=$(kubectl --namespace ${CRDB_NAMESPACE} get service cockroachdb-public -o 'jsonpath={.spec.ports[?(@.name=="sql")].port}')
+kubectl create secret generic crdb-data --namespace ${TFS_K8S_NAMESPACE} --type='Opaque' \
+    --from-literal=CRDB_NAMESPACE=${CRDB_NAMESPACE} \
+    --from-literal=CRDB_SQL_PORT=${CRDB_SQL_PORT} \
+    --from-literal=CRDB_DATABASE=${CRDB_DATABASE} \
+    --from-literal=CRDB_USERNAME=${CRDB_USERNAME} \
+    --from-literal=CRDB_PASSWORD="'"${CRDB_PASSWORD}"'" \
+    --from-literal=CRDB_SSLMODE=require
+printf "\n"
+
+echo "Create secret with NATS data"
+NATS_CLIENT_PORT=$(kubectl --namespace ${NATS_NAMESPACE} get service nats -o 'jsonpath={.spec.ports[?(@.name=="client")].port}')
+kubectl create secret generic nats-data --namespace ${TFS_K8S_NAMESPACE} --type='Opaque' \
+    --from-literal=NATS_NAMESPACE=${NATS_NAMESPACE} \
+    --from-literal=NATS_CLIENT_PORT=${NATS_CLIENT_PORT}
+printf "\n"
+
 echo "Deploying components and collecting environment variables..."
 ENV_VARS_SCRIPT=tfs_runtime_env_vars.sh
 echo "# Environment variables for TeraFlowSDN deployment" > $ENV_VARS_SCRIPT
diff --git a/my_deploy.sh b/my_deploy.sh
index 41dce9bd52d9414f4b077feeb9efab6703d52df8..8795f9e819f3ce6809e6843efe93388db8c4b274 100644
--- a/my_deploy.sh
+++ b/my_deploy.sh
@@ -13,6 +13,9 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
+
+# ----- TeraFlowSDN ------------------------------------------------------------
+
 # Set the URL of the internal MicroK8s Docker registry where the images will be uploaded to.
 export TFS_REGISTRY_IMAGES=${TFS_REGISTRY_IMAGES:-"http://localhost:32000/tfs/"}
 
@@ -34,6 +37,7 @@ export TFS_GRAFANA_PASSWORD="admin123+"
 # Disable skip-build flag to rebuild the Docker images.
 export TFS_SKIP_BUILD=""
 
+# ----- CockroachDB ------------------------------------------------------------
 # Set the namespace where CockroackDB will be deployed.
 export CRDB_NAMESPACE="crdb"
 
@@ -46,12 +50,6 @@ export CRDB_PASSWORD="tfs123"
 # Set the database name to be used by Context.
 export CRDB_DATABASE="tfs"
 
-# Set the name of the secret where CockroachDB data and credentials will be stored.
-export CRDB_SECRET_NAME="crdb-data"
-
-# Set the namespace where the secret containing CockroachDB data and credentials will be stored.
-export CRDB_SECRET_NAMESPACE=${TFS_K8S_NAMESPACE}
-
 # Set CockroachDB installation mode to 'single'. This option is convenient for development and testing.
 # See ./deploy/all.sh or ./deploy/crdb.sh for additional details
 export CRDB_DEPLOY_MODE="single"
@@ -62,14 +60,9 @@ export CRDB_DROP_DATABASE_IF_EXISTS=""
 # Disable flag for re-deploying CockroachDB from scratch.
 export CRDB_REDEPLOY=""
 
+# ----- NATS -------------------------------------------------------------------
 # Set the namespace where NATS will be deployed.
 export NATS_NAMESPACE="nats"
 
-# Set the name of the secret where NATS data and credentials will be stored.
-export NATS_SECRET_NAME="nats-data"
-
-# Set the namespace where the secret containing NATS data and credentials will be stored.
-export NATS_SECRET_NAMESPACE=${TFS_K8S_NAMESPACE}
-
 # Disable flag for re-deploying NATS from scratch.
-export NATS_REDEPLOY=${NATS_REDEPLOY:-""}
+export NATS_REDEPLOY=""