Skip to content

Commit 2728f89

Browse files
committed
Update deploy-an-application.md
1 parent 046a932 commit 2728f89

File tree

1 file changed

+21
-23
lines changed

1 file changed

+21
-23
lines changed

src/docs/build-deploy-and-maintain-apps/deploy-an-application.md

+21-23
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ sort_order: 2
2222

2323
# Deploy an application
2424

25-
Last updated: **February 12, 2025**
25+
Last updated: **February 19, 2025**
2626

2727
Welcome to the OpenShift Application Deployment site! This guide provides comprehensive insights and best practices for deploying applications on the OpenShift platform. Before proceeding, ensure you are familiar with the best practices outlined in [Build your application](../build-deploy-and-maintain-apps/build-an-application.md). If not, review them first to streamline your deployment process.
2828

@@ -41,7 +41,7 @@ RedHat's OpenShift simplifies the deployment, management and scaling of containe
4141
## On this page
4242

4343
- [**Prepare for deployment**](#prepare-for-deployment)
44-
- [**Deploy the application**](#deploy-the-application)
44+
- [**Deployment**](#deployment)
4545
- [**Manage deployment configuration**](#managing-deployment-configuration)
4646
- [**Configure networking and routes**](#configure-networking-and-routes)
4747
- [**Test the deployment**](#test-the-deployment)
@@ -64,20 +64,15 @@ Before deployment, ensure that:
6464
- The container image is stored in a registry
6565
- You have the correct access credentials for the registry. (e.g. verifying the `image-puller` role in OpenShift)
6666

67-
OpenShift supports images from various sources:
67+
OpenShift supports images from various sources, including:
6868

69-
- **OpenShift Image Streams** Tracks image versions within OpenShift, making updates easier via triggers. But image is not shareable bewteen different cluster
70-
- **Artifactory** – Centralizes artifact and dependency management (including container images). While OpenShift offers image streams natively, organizations often use Artifactory for:
71-
- A single, standardized repository of *all* application artifacts (beyond just containers)
69+
- **OpenShift Image Streams** - Tracks image versions within OpenShift, enabling automated updates via triggers. However, images managed this way are not shareable between different clusters
70+
- **Artifactory** - A centralized repository for managing application artifacts, including container images. While OpenShift natively supports image streams, organizations often use Artifactory for:
71+
- A single, standardized repository for **all** application artifacts (not just containers)
7272
- Additional scanning, caching, or proxying capabilities provided by an external repository
73-
- Image is sharable bewteen different cluster
74-
- More info on [image and artifact management with Artifactory](../build-deploy-and-maintain-apps/image-artifact-management-with-artifactory.md)
75-
- **External registries** - [Docker Hub](http://docker.io/), [Quay.io](https://quay.io/) or RedHat image repository
76-
77-
78-
- **Artifactory** - For managing dependencies centrally.
79-
- **OpenShift image streams** - Tracks image versions within OpenShift
80-
73+
- Sharing images across multiple clusters
74+
- Find more details on [image and artifact management with Artifactory](../build-deploy-and-maintain-apps/image-artifact-management-with-artifactory.md)
75+
- **External registries** - Supports sources such as [Docker Hub](http://docker.io/), [Quay.io](https://quay.io/) or RedHat image repository
8176

8277
### 2. Review application requirements
8378

@@ -93,7 +88,7 @@ Allocate sufficient CPU, memory and storage based on expected workload. OpenShif
9388

9489
---
9590

96-
## Deploy the application
91+
## Deployment
9792

9893
### 1. Choose a deployment method
9994

@@ -135,7 +130,7 @@ A deployment in OpenShift consists of:
135130
- **Pod Template** - Defines container specification (desired state of the pods being deployed), base image, ports and environment variables
136131
- **Replicas** - Number of instances that should be maintained
137132
- **Selectors** - Labels that identify the pods managed by the deployment configuration
138-
- **Triggers** - Image triggers update deployments when a new version is available.
133+
- **Triggers** - Image triggers update deployments when a new version is available
139134
Understanding these components is essential for correctly configuring your application's deployment. To read more about other configuration options, use `oc explain` command or this [kubernetes official documentation](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/).
140135

141136
### 2. Choose a deployment strategy
@@ -160,13 +155,15 @@ Environment variables can be defined in the `env` field of the Pod specification
160155

161156
## Configure networking and routes
162157

163-
**Why is networking part of a deployment guide?**
164-
Even though networking can be handled separately, configuring how your application is exposed (or restricted) is core to rolling out a functional service. Without it, your newly deployed app may not be accessible to the intended audience.
158+
### Networking in a deployment guide
159+
160+
Although networking can be managed separately, setting up how your application is accessed (or restricted) is essential for functional deployment. Without proper configuration, your deployed app may not be accessible to the intended users.
161+
165162
### 1. Network Policies
166163

167-
Network policies control traffic flow at the pod level. They define the allowed inbound and outbound traffic, enhancing security. Learn more in the [network policies guide](../platform-architecture-reference/openshift-network-policies.md).
164+
Network policies control traffic flow at the pod level defining which inbound and outbound connections are allowed. This enhances security and ensures controlled communication.
168165

169-
Applying a specific network policy to a deployment is a best practice to enhance security. For a detailed guide, learn more about the [network policies](../platform-architecture-reference/openshift-network-policies.md) guide.
166+
Applying a specific network policy to a deployment is a best practice for to enhance security. For a detailed guide, learn more about the [network policies](../platform-architecture-reference/openshift-network-policies.md) guide.
170167

171168
### 2. Exposing services using routes
172169

@@ -178,7 +175,8 @@ In OpenShift, a `Route` provides external access to an internal service. You can
178175

179176
### 3. Configuring SSL/TLS Certificates
180177

181-
Security is a critical part of any application deployment. In OpenShift, you can secure routes with SSL/TLS certificates. To obtain a certificate from the OCIO Identity Management Services’ Entrust Certificate Services, you must first generate a Certificate Signing Request (CSR) and submit it through My Services. Once issued, you can install the certificate on your application route to enable secure communication.
178+
Security is a critical part of any application deployment. In OpenShift, you can secure routes with SSL/TLS certificates. To obtain a certificate from the OCIO Identity Management Services - Entrust Certificate Services, you must first generate a Certificate Signing Request (CSR) and submit it through My Services. Once issued, you can install the certificate on your application route to enable secure communication.
179+
182180
---
183181

184182
## Test the deployment
@@ -253,9 +251,9 @@ Infrastructure as Code (IaC) ensures consistent and reliable updates. Always upd
253251

254252
Automating deployment with a **CI/CD pipeline** enhances efficiency by streamlining application updates, bug patches reducing errors.
255253

256-
- **Tekton** OpenShift integrates with **Tekton**, empowering you to create robust CI/CD systems. With Tekton, pipeline workflows can be defined in YAML format, introducing the concept of "pipeline as code." This makes pipelines reusable, version-controlled, and easily manageable. Tekton's predefined pipeline configurations are available in the [Tekton pipeline templates](https://github.com/bcgov/pipeline-templates).
254+
- **Tekton** - OpenShift integrates with **Tekton**, empowering you to create robust CI/CD systems. With Tekton, pipeline workflows can be defined in YAML format, introducing the concept of "pipeline as code." This makes pipelines reusable, version-controlled, and easily manageable. Tekton's predefined pipeline configurations are available in the [Tekton pipeline templates](https://github.com/bcgov/pipeline-templates)
257255

258-
- **ArgoCD** - For multi-cluster management, OpenShift provides ArgoCD, which uses Git as the "source of truth" for declarative infrastructure and application configurations. Learn more about [ArgoCD](https://github.com/bcgov/openshift-wiki/blob/b1a4e6db91932fd3f29705a5c8ee44983abf8763/docs/ArgoCD/argocd_info.md) along with [CI/CD pipeline templates](../automation-and-resiliency/cicd-pipeline-templates-for-private-cloud-teams.md).
256+
- **ArgoCD** - For multi-cluster management, OpenShift provides ArgoCD, which uses Git as the "source of truth" for declarative infrastructure and application configurations. Learn more about [ArgoCD](https://github.com/bcgov/openshift-wiki/blob/b1a4e6db91932fd3f29705a5c8ee44983abf8763/docs/ArgoCD/argocd_info.md) along with [CI/CD pipeline templates](../automation-and-resiliency/cicd-pipeline-templates-for-private-cloud-teams.md)
259257

260258
### 2. Version management in Continuos Deployment (CD)
261259

0 commit comments

Comments
 (0)