Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Step 7: Review & Deploy

Final validation and deployment of your configured container.

Deployment Readiness

Before deployment, the platform validates your configuration:

Configuration Validation

The system checks for required settings and potential issues:

Common Validation Items:

  • Container name is required: Ensure you've provided a valid container name
  • Container image is required: Verify your image reference is complete
  • ⚠️ Resource allocation: Check CPU and memory settings are appropriate
  • ⚠️ Network configuration: Validate port configurations and conflicts
  • ⚠️ Storage setup: Verify volume mounts and persistent storage

Configuration Summary

Review all your deployment settings:

Basic Container Settings

  • Container Name: Your application identifier
  • Container Image: Source image and tag
  • Resource Allocation: CPU and memory limits

CPU and Memory Allocation

  • CPU Allocation: Millicores allocated (e.g., 500m = 0.5 cores)
  • Memory Allocation: Memory limit (e.g., 512Mi)
  • Cluster Usage: Percentage of total cluster resources

Network Configuration

  • Configured Ports: All exposed ports and protocols
  • Access Methods: How your application will be accessible
  • Security Settings: Port exposure and protocol configuration

Application Configuration

  • Environment Variables: All configured environment settings
  • Secrets: Secure configuration (values hidden)
  • ConfigMaps: Non-sensitive configuration files

Storage & Configuration

  • Persistent Volume Claims: Long-term storage configuration
  • Volume Mounts: Filesystem mount points
  • Secrets: Secure data storage
  • ConfigMaps: Configuration file management
  • Tolerations: Node scheduling preferences

Pre-Deployment Checklist

Required Configuration

  • Container name is unique and descriptive
  • Container image is accessible and valid
  • Resource allocation matches application needs
  • Required ports are configured and documented
  • Environment variables are complete

Security Review

  • Sensitive data is stored in Secrets, not environment variables
  • Only necessary ports are exposed
  • Container runs with appropriate security context
  • Access controls are properly configured

Performance Validation

  • CPU and memory limits are appropriate for workload
  • Storage allocation meets application requirements
  • Network configuration supports expected traffic
  • Health checks are configured if needed

Operational Readiness

  • Monitoring and logging strategy is in place
  • Backup procedures are defined for persistent data
  • Rollback plan is available
  • Documentation is updated

Deployment Process

Once validation passes:

Deployment Steps

  1. Final Review: Verify all settings match your requirements
  2. Deploy: Click the deploy button to start the deployment process
  3. Monitoring: Track deployment progress in real-time

Deployment Phases

  1. Image Pull: Download container image to cluster nodes
  2. Resource Allocation: Reserve CPU, memory, and storage
  3. Volume Creation: Set up persistent volumes and mounts
  4. Secret Injection: Mount secrets and ConfigMaps
  5. Container Start: Launch container with configuration
  6. Health Checks: Verify container health and readiness
  7. Service Registration: Register with service discovery

Post-Deployment

After successful deployment:

Immediate Actions

  1. Verify Status: Check container status shows "Running"
  2. Test Connectivity: Validate network access and ports
  3. Check Logs: Review startup logs for errors
  4. Monitor Resources: Confirm resource usage is within limits

Dashboard Monitoring

  • Container Status: Running, pending, stopped, or failed states
  • Resource Usage: Real-time CPU and memory consumption
  • Network Activity: Port accessibility and traffic patterns
  • Logs: Application output and error messages

Management Operations

  • Scaling: Adjust CPU and memory allocations
  • Updates: Deploy new container versions
  • Configuration: Modify environment variables and settings
  • Troubleshooting: Access logs and diagnostic information

Validation Errors and Solutions

Common Validation Errors

Missing Required Fields

Error: "Container name is required"

Solution: Provide a unique, descriptive container name

Error: "Container image is required"

Solution: Specify a valid container image reference

Resource Conflicts

Error: "Insufficient cluster resources"

Solution: Reduce resource requests or wait for capacity

Error: "Port already in use"

Solution: Choose different ports or remove conflicting services

Configuration Issues

Error: "Invalid environment variable format"

Solution: Check variable names and values for syntax errors

Error: "Volume mount conflict"

Solution: Ensure mount paths don't overlap

Resolution Steps

  1. Review Error Messages: Read validation feedback carefully
  2. Check Dependencies: Verify external dependencies are available
  3. Validate Configuration: Double-check all configuration values
  4. Test Incrementally: Start with minimal configuration
  5. Consult Documentation: Reference platform guides and examples

Rollback and Recovery

Rollback Scenarios

  • Deployment Failure: Automatic rollback to previous stable state
  • Configuration Error: Manual revert to known good configuration
  • Performance Issues: Scale back resources or revert changes
  • Security Concerns: Immediate isolation and configuration review

Recovery Procedures

  1. Identify Issue: Determine root cause of failure
  2. Stop Deployment: Halt problematic deployment if needed
  3. Restore Configuration: Revert to last known good state
  4. Validate Fix: Test resolution before re-deployment
  5. Monitor Closely: Ensure stability after recovery

Best Practices for Deployment

Preparation

  • Start Small: Begin with minimal configuration and iterate
  • Test Thoroughly: Validate in development before production
  • Document Changes: Maintain clear deployment notes
  • Plan Rollback: Always have a rollback strategy

Deployment

  • Monitor Progress: Watch deployment status and logs
  • Validate Quickly: Test core functionality immediately
  • Check Dependencies: Ensure external services are accessible
  • Review Metrics: Confirm resource usage patterns

Post-Deployment

  • Continuous Monitoring: Set up alerts and dashboards
  • Performance Tuning: Optimize based on actual usage
  • Security Review: Regular security and compliance checks
  • Documentation Updates: Keep deployment docs current

Next: Your container is now deployed! Proceed to Container Management for ongoing operations and monitoring.