A core part of our IT transformation program is the implementation of deployment pipelines for every application. Attendees will learn how to build abstract pipelines that will allow multiple types of applications to fit the same basic pipeline structure. This has been a big win for injecting change and updating legacy applications.
4. The current data center is...challenging...
RHEL
7.4
Dev
RHEL
7.3
Test
RHEL
7.1
Prod
Dev Test Prod
RHEL
7.2
Dev
Admin Admin Admin Admin Admin Admin
Dev
RHEL
7.2
Dev
RHEL
7.1
Dev
RHEL
7.3
Dev
Ubuntu
Trusty
RHEL
7.4
Dev
RHEL
6.6
Dev
Ubuntu
Trusty
RHEL
7.3
Test
RHEL
7.4
Test
RHEL
7.2
Test
Ubuntu
Trusty
RHEL
6.9
Test
RHEL
7.1
Test
RHEL
7.4
Prod
RHEL
7.1
Prod
RHEL
7.3
Prod
Ubuntu
Trusty
RHEL
6.9
Prod
RHEL
7.2
Prod
@barkerd427
6. The new data center is understandable and usable.
Developer Access Production Controlled
Network
Storage
Compute
Platform
Deployment Pipeline
RHEL
7.4
App1
RHEL
7.4
App1
RHEL
7.4
App1
RHEL
7.4
App1
RHEL
7.4
App1
RHEL
7.4
App1
RHEL
7.4
App2
RHEL
7.4
App2
RHEL
7.4
App2
RHEL
7.4
App2
RHEL
7.4
App2
RHEL
7.4
App2
@barkerd427
7. The value of Pipelines
● Abstract audit and compliance
● Trivialities eliminated
● Security checks occur early/often
● Test all the things!
@barkerd427
8. The value of Pipelines
● Nimble security
● Common artifact repositories
● Standardized approval system
● Apps become secure by default
@barkerd427
10. Two types of pipelines
Scripted:
● Very Groovy!
● More powerful
● Provides greatest level
of flexibility
Declarative:
● Only a little Groovy
● Simpler to maintain
● Easier to read and
understand
34. Operators
● Represents human
operational knowledge
in software
● CustomResource
Definitions
○ Extends Kubernetes API
@barkerd427
● Identical model to k8s
controllers
○ OODA Loop
● Now in Beta!!!
35. Operators
● Deployed into k8s
cluster
● Interactions through
new API
○ kubectl get prometheuses
○ kubectl get alertmanagers
@barkerd427
● Abstraction around k8s
primitives
○ Users just want to use a MySQL
cluster.
● Complex tasks that can
be performed
○ Rotating credentials, certs, versions,
backups
38. What to take away?
This is the slide you should take a
picture of...
Do not take a picture of this slide!!!
No, stop!
STOP!!!
Really, STOP!!!
Security!
SECURITY!!!!
● Just Start
● Start Small
● Abstract Consciously
● Let Others Do The
Work
● Contribute Back