Skip to content

youming-lin/knative-service-toolchain

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Icon Developing a Knative Service app

How Knative deployment works

The application code is stored in source control, along with its Dockerfile and Knative service definition. If your app doesn't have a Knative service definition, the toolchain automatically generates one during deployment. The target cluster is configured during toolchain setup by using an IBM Cloud API key and cluster name. You can update them at any time by altering the Delivery Pipeline configuration. Any code changes detected in the Git repo are automatically built, validated, and deployed into the Kubernetes cluster.

Icon

Creating a Knative Service app

You can continuously deliver a secure Knative Service container app to a Kubernetes Cluster. Learn how to create a "Hello World" application that uses Docker, Node.js, and a DevOps toolchain. The app comes preconfigured for continuous delivery with the following features:

  • Vulnerability Advisor
  • Source control
  • Issue tracking
  • Online editing
  • Knative deployment to the IBM Kubernetes Service

Prerequisites

  1. To get started, click Create toolchain:
    Create toolchain
  2. You can use the default settings, or make changes as needed.
  3. Under Tool Integrations, select Delivery Pipeline.
  4. Enter your IBM Cloud API key, or generate a new API key by clicking Create.
  5. Confirm the container registry region, container registry namespace, and cluster information.
  6. Click Create.

The following best practices are implemented automatically upon app creation:

  • Sanity check the Dockerfile before image creation.
  • Build a container image on every Git commit, setting a tag based on build number, time stamp, and commit ID for traceability.
  • Use a private image registry to store the image, and automatically configure access permissions for target cluster deployment by using API tokens that can be revoked.
  • Check the container image for security vulnerabilities.
  • Insert the image tag into the deployment manifest automatically.
  • Use an explicit namespace in a cluster to insulate each deployment, which makes it easy to clear by running kubectl delete namespace.

Learn more

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published