Browse Source

Updates to the deploy readme

pull/1259/head
Tim McCarthy 5 years ago
parent
commit
720d5e7979
1 changed files with 4 additions and 4 deletions
  1. +4
    -4
      deploy/aro/readme.md

+ 4
- 4
deploy/aro/readme.md View File

@ -2,13 +2,13 @@
This folder contains all of the the files required to deploy eShopOnContainers to an Azure Red Hat OpenShift (ARO) cluster. The strategy being used here is a GitOps strategy that takes advantage of OpenShift deployment triggers to deploy the containers whenever any of the container images or deployment configuration changes, such as Deployment Config, Service or Route objects. This folder contains all of the the files required to deploy eShopOnContainers to an Azure Red Hat OpenShift (ARO) cluster. The strategy being used here is a GitOps strategy that takes advantage of OpenShift deployment triggers to deploy the containers whenever any of the container images or deployment configuration changes, such as Deployment Config, Service or Route objects.
Each subfolder in this folder corresponds to one of the eShopOnContainers microservices containers. Each microsoervice folder contains a YAML pipeline deployment file and an OpenShift template YAML file that will create the necessary OpenShift objects for the respective microservice. The following folders do not correspond to any of the eSHopOnContainers microservices:
Each subfolder in this folder corresponds to one of the eShopOnContainers microservices containers. Each microservice folder contains a YAML pipeline deployment file and an OpenShift template YAML file that will create the necessary OpenShift objects for the respective microservice. The following folders do not correspond to any of the eShopOnContainers microservices:
- azure-devops-templates - this contains a centralized variables template (`variables.yml`) that is shared among all of the deploy pipelines, as well as an Azure DevOps pipeline job template that is used for deploying all of the gateway API services.
- apigw-templates - this contains an OpenShift template used to deploy the API gateway services
- apigw-templates - this contains an OpenShift template file (`apigw-deploy-template.yml`) used to deploy the API gateway services
- azure-devops-templates - this contains a centralized variables template file (`variables.yml`) that is shared among all of the deploy pipelines, as well as an Azure DevOps pipeline job template (`api-gw-deploy.yml`) that is used for deploying all of the gateway API services. It calls the `apigw-deploy-template.yml` template file to configure the gateway API services.
- infrastructure - this contains a YAML pipeline that calls several OpenShift templates to deploy all of the infrastructure services, such as MongoDB, SQL Server, RabbitMQ, etc. - infrastructure - this contains a YAML pipeline that calls several OpenShift templates to deploy all of the infrastructure services, such as MongoDB, SQL Server, RabbitMQ, etc.
Some of the microservices folders contain extra files, such as for exposing public routes. These are not included in the OpenSHift templates because they need to be tokenized in order to preserve the integrity of the certificate data used for the routes.
Some of the microservices folders contain extra files, such as for exposing public routes. These are not included in the OpenShift templates because they need to be tokenized in order to preserve the integrity of the certificate data used for the routes.
In order to get secrets passed in to the pipelines, I have chosen to use an Azure Key Vault instance in conjunction with the [Azure DevOps Azure Key Vault task](https://docs.microsoft.com/en-us/azure/devops/pipelines/tasks/deploy/azure-key-vault?view=azure-devops) in order to bring in any secrets needed during the build as ephemeral environment variables. The only secrets that I have chosen to store in Azure Key Vault are the SQL username/password and the certificate values required for the public routes. The following are the envrionment variable names of the secrets: In order to get secrets passed in to the pipelines, I have chosen to use an Azure Key Vault instance in conjunction with the [Azure DevOps Azure Key Vault task](https://docs.microsoft.com/en-us/azure/devops/pipelines/tasks/deploy/azure-key-vault?view=azure-devops) in order to bring in any secrets needed during the build as ephemeral environment variables. The only secrets that I have chosen to store in Azure Key Vault are the SQL username/password and the certificate values required for the public routes. The following are the envrionment variable names of the secrets:


Loading…
Cancel
Save