Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 3. Creating applications
3.1. Using templates Link kopierenLink in die Zwischenablage kopiert!
The following sections provide an overview of templates, as well as how to use and create them.
3.1.1. Understanding templates Link kopierenLink in die Zwischenablage kopiert!
A template describes a set of objects that can be parameterized and processed to produce a list of objects for creation by OpenShift Container Platform. A template can be processed to create anything you have permission to create within a project, for example services, build configurations, and deployment configurations. A template can also define a set of labels to apply to every object defined in the template.
You can create a list of objects from a template using the CLI or, if a template has been uploaded to your project or the global template library, using the web console.
3.1.2. Uploading a template Link kopierenLink in die Zwischenablage kopiert!
If you have a JSON or YAML file that defines a template, you can upload the template to projects using the CLI. This saves the template to the project for repeated use by any user with appropriate access to that project. Instructions about writing your own templates are provided later in this topic.
Procedure
Upload a template using one of the following methods:
Upload a template to your current project’s template library, pass the JSON or YAML file with the following command:
$ oc create -f <filename>Upload a template to a different project using the
option with the name of the project:-n$ oc create -f <filename> -n <project>
The template is now available for selection using the web console or the CLI.
3.1.3. Creating an application by using the web console Link kopierenLink in die Zwischenablage kopiert!
You can use the web console to create an application from a template.
Procedure
- Select Developer from the context selector at the top of the web console navigation menu.
- While in the desired project, click +Add
- Click All services in the Developer Catalog tile.
Click Builder Images under Type to see the available builder images.
NoteOnly image stream tags that have the
tag listed in their annotations appear in this list, as demonstrated here:builderkind: "ImageStream" apiVersion: "v1" metadata: name: "ruby" creationTimestamp: null spec: # ... tags: - name: "2.6" annotations: description: "Build and run Ruby 2.6 applications" iconClass: "icon-ruby" tags: "builder,ruby"1 supports: "ruby:2.6,ruby" version: "2.6" # ...- 1
- Including
builderhere ensures this image stream tag appears in the web console as a builder.
- Modify the settings in the new application screen to configure the objects to support your application.
3.1.4. Creating objects from templates by using the CLI Link kopierenLink in die Zwischenablage kopiert!
You can use the CLI to process templates and use the configuration that is generated to create objects.
3.1.4.1. Adding labels Link kopierenLink in die Zwischenablage kopiert!
Labels are used to manage and organize generated objects, such as pods. The labels specified in the template are applied to every object that is generated from the template.
Procedure
Add labels in the template from the command line:
$ oc process -f <filename> -l name=otherLabel
3.1.4.2. Listing parameters Link kopierenLink in die Zwischenablage kopiert!
The list of parameters that you can override are listed in the
parameters
Procedure
You can list parameters with the CLI by using the following command and specifying the file to be used:
$ oc process --parameters -f <filename>Alternatively, if the template is already uploaded:
$ oc process --parameters -n <project> <template_name>For example, the following shows the output when listing the parameters for one of the quick start templates in the default
project:openshift$ oc process --parameters -n openshift rails-postgresql-exampleExample output
NAME DESCRIPTION GENERATOR VALUE SOURCE_REPOSITORY_URL The URL of the repository with your application source code https://github.com/sclorg/rails-ex.git SOURCE_REPOSITORY_REF Set this to a branch name, tag or other ref of your repository if you are not using the default branch CONTEXT_DIR Set this to the relative path to your project if it is not in the root of your repository APPLICATION_DOMAIN The exposed hostname that will route to the Rails service rails-postgresql-example.openshiftapps.com GITHUB_WEBHOOK_SECRET A secret string used to configure the GitHub webhook expression [a-zA-Z0-9]{40} SECRET_KEY_BASE Your secret key for verifying the integrity of signed cookies expression [a-z0-9]{127} APPLICATION_USER The application user that is used within the sample application to authorize access on pages openshift APPLICATION_PASSWORD The application password that is used within the sample application to authorize access on pages secret DATABASE_SERVICE_NAME Database service name postgresql POSTGRESQL_USER database username expression user[A-Z0-9]{3} POSTGRESQL_PASSWORD database password expression [a-zA-Z0-9]{8} POSTGRESQL_DATABASE database name root POSTGRESQL_MAX_CONNECTIONS database max connections 10 POSTGRESQL_SHARED_BUFFERS database shared buffers 12MBThe output identifies several parameters that are generated with a regular expression-like generator when the template is processed.
3.1.4.3. Generating a list of objects Link kopierenLink in die Zwischenablage kopiert!
Using the CLI, you can process a file defining a template to return the list of objects to standard output.
Procedure
Process a file defining a template to return the list of objects to standard output:
$ oc process -f <filename>Alternatively, if the template has already been uploaded to the current project:
$ oc process <template_name>Create objects from a template by processing the template and piping the output to
:oc create$ oc process -f <filename> | oc create -f -Alternatively, if the template has already been uploaded to the current project:
$ oc process <template> | oc create -f -You can override any parameter values defined in the file by adding the
option for each-ppair you want to override. A parameter reference appears in any text field inside the template items.<name>=<value>For example, in the following the
andPOSTGRESQL_USERparameters of a template are overridden to output a configuration with customized environment variables:POSTGRESQL_DATABASECreating a List of objects from a template
$ oc process -f my-rails-postgresql \ -p POSTGRESQL_USER=bob \ -p POSTGRESQL_DATABASE=mydatabaseThe JSON file can either be redirected to a file or applied directly without uploading the template by piping the processed output to the
command:oc create$ oc process -f my-rails-postgresql \ -p POSTGRESQL_USER=bob \ -p POSTGRESQL_DATABASE=mydatabase \ | oc create -f -If you have large number of parameters, you can store them in a file and then pass this file to
:oc process$ cat postgres.env POSTGRESQL_USER=bob POSTGRESQL_DATABASE=mydatabase$ oc process -f my-rails-postgresql --param-file=postgres.envYou can also read the environment from standard input by using
as the argument to"-":--param-file$ sed s/bob/alice/ postgres.env | oc process -f my-rails-postgresql --param-file=-
3.1.5. Modifying uploaded templates Link kopierenLink in die Zwischenablage kopiert!
You can edit a template that has already been uploaded to your project.
Procedure
Modify a template that has already been uploaded:
$ oc edit template <template>
3.1.6. Using instant app and quick start templates Link kopierenLink in die Zwischenablage kopiert!
OpenShift Container Platform provides a number of default instant app and quick start templates to make it easy to quickly get started creating a new application for different languages. Templates are provided for Rails (Ruby), Django (Python), Node.js, CakePHP (PHP), and Dancer (Perl). Your cluster administrator must create these templates in the default, global
openshift
By default, the templates build using a public source repository on GitHub that contains the necessary application code.
Procedure
You can list the available default instant app and quick start templates with:
$ oc get templates -n openshiftTo modify the source and build your own version of the application:
-
Fork the repository referenced by the template’s default parameter.
SOURCE_REPOSITORY_URL Override the value of the
parameter when creating from the template, specifying your fork instead of the default value.SOURCE_REPOSITORY_URLBy doing this, the build configuration created by the template now points to your fork of the application code, and you can modify the code and rebuild the application at will.
-
Fork the repository referenced by the template’s default
Some of the instant app and quick start templates define a database deployment configuration. The configuration they define uses ephemeral storage for the database content. These templates should be used for demonstration purposes only as all database data is lost if the database pod restarts for any reason.
3.1.6.1. Quick start templates Link kopierenLink in die Zwischenablage kopiert!
A quick start template is a basic example of an application running on OpenShift Container Platform. Quick starts come in a variety of languages and frameworks, and are defined in a template, which is constructed from a set of services, build configurations, and deployment configurations. This template references the necessary images and source repositories to build and deploy the application.
To explore a quick start, create an application from a template. Your administrator must have already installed these templates in your OpenShift Container Platform cluster, in which case you can simply select it from the web console.
Quick starts refer to a source repository that contains the application source code. To customize the quick start, fork the repository and, when creating an application from the template, substitute the default source repository name with your forked repository. This results in builds that are performed using your source code instead of the provided example source. You can then update the code in your source repository and launch a new build to see the changes reflected in the deployed application.
3.1.6.1.1. Web framework quick start templates Link kopierenLink in die Zwischenablage kopiert!
These quick start templates provide a basic application of the indicated framework and language:
- CakePHP: a PHP web framework that includes a MySQL database
- Dancer: a Perl web framework that includes a MySQL database
- Django: a Python web framework that includes a PostgreSQL database
- NodeJS: a NodeJS web application that includes a MongoDB database
- Rails: a Ruby web framework that includes a PostgreSQL database
3.1.7. Writing templates Link kopierenLink in die Zwischenablage kopiert!
You can define new templates to make it easy to recreate all the objects of your application. The template defines the objects it creates along with some metadata to guide the creation of those objects.
The following is an example of a simple template object definition (YAML):
apiVersion: template.openshift.io/v1
kind: Template
metadata:
name: redis-template
annotations:
description: "Description"
iconClass: "icon-redis"
tags: "database,nosql"
objects:
- apiVersion: v1
kind: Pod
metadata:
name: redis-master
spec:
containers:
- env:
- name: REDIS_PASSWORD
value: ${REDIS_PASSWORD}
image: dockerfile/redis
name: master
ports:
- containerPort: 6379
protocol: TCP
parameters:
- description: Password used for Redis authentication
from: '[A-Z0-9]{8}'
generate: expression
name: REDIS_PASSWORD
labels:
redis: master
3.1.7.1. Writing the template description Link kopierenLink in die Zwischenablage kopiert!
The template description informs you what the template does and helps you find it when searching in the web console. Additional metadata beyond the template name is optional, but useful to have. In addition to general descriptive information, the metadata also includes a set of tags. Useful tags include the name of the language the template is related to for example, Java, PHP, Ruby, and so on.
The following is an example of template description metadata:
kind: Template
apiVersion: template.openshift.io/v1
metadata:
name: cakephp-mysql-example
annotations:
openshift.io/display-name: "CakePHP MySQL Example (Ephemeral)"
description: >-
An example CakePHP application with a MySQL database. For more information
about using this template, including OpenShift considerations, see
https://github.com/sclorg/cakephp-ex/blob/master/README.md.
WARNING: Any data stored will be lost upon pod destruction. Only use this
template for testing."
openshift.io/long-description: >-
This template defines resources needed to develop a CakePHP application,
including a build configuration, application DeploymentConfig, and
database DeploymentConfig. The database is stored in
non-persistent storage, so this configuration should be used for
experimental purposes only.
tags: "quickstart,php,cakephp"
iconClass: icon-php
openshift.io/provider-display-name: "Red Hat, Inc."
openshift.io/documentation-url: "https://github.com/sclorg/cakephp-ex"
openshift.io/support-url: "https://access.redhat.com"
message: "Your admin credentials are ${ADMIN_USERNAME}:${ADMIN_PASSWORD}"
- 1
- The unique name of the template.
- 2
- A brief, user-friendly name, which can be employed by user interfaces.
- 3
- A description of the template. Include enough detail that users understand what is being deployed and any caveats they must know before deploying. It should also provide links to additional information, such as a README file. Newlines can be included to create paragraphs.
- 4
- Additional template description. This may be displayed by the service catalog, for example.
- 5
- Tags to be associated with the template for searching and grouping. Add tags that include it into one of the provided catalog categories. Refer to the
idandcategoryAliasesinCATALOG_CATEGORIESin the console constants file. The categories can also be customized for the whole cluster. - 6
- An icon to be displayed with your template in the web console.
Example 3.1. Available icons
-
icon-3scale -
icon-aerogear -
icon-amq -
icon-angularjs -
icon-ansible -
icon-apache -
icon-beaker -
icon-camel -
icon-capedwarf -
icon-cassandra -
icon-catalog-icon -
icon-clojure -
icon-codeigniter -
icon-cordova -
icon-datagrid -
icon-datavirt -
icon-debian -
icon-decisionserver -
icon-django -
icon-dotnet -
icon-drupal -
icon-eap -
icon-elastic -
icon-erlang -
icon-fedora -
icon-freebsd -
icon-git -
icon-github -
icon-gitlab -
icon-glassfish -
icon-go-gopher -
icon-golang -
icon-grails -
icon-hadoop -
icon-haproxy -
icon-helm -
icon-infinispan -
icon-jboss -
icon-jenkins -
icon-jetty -
icon-joomla -
icon-jruby -
icon-js -
icon-knative -
icon-kubevirt -
icon-laravel -
icon-load-balancer -
icon-mariadb -
icon-mediawiki -
icon-memcached -
icon-mongodb -
icon-mssql -
icon-mysql-database -
icon-nginx -
icon-nodejs -
icon-openjdk -
icon-openliberty -
icon-openshift -
icon-openstack -
icon-other-linux -
icon-other-unknown -
icon-perl -
icon-phalcon -
icon-php -
icon-play -
iconpostgresql -
icon-processserver -
icon-python -
icon-quarkus -
icon-rabbitmq -
icon-rails -
icon-redhat -
icon-redis -
icon-rh-integration -
icon-rh-spring-boot -
icon-rh-tomcat -
icon-ruby -
icon-scala -
icon-serverlessfx -
icon-shadowman -
icon-spring-boot -
icon-spring -
icon-sso -
icon-stackoverflow -
icon-suse -
icon-symfony -
icon-tomcat -
icon-ubuntu -
icon-vertx -
icon-wildfly -
icon-windows -
icon-wordpress -
icon-xamarin -
icon-zend
-
- 7
- The name of the person or organization providing the template.
- 8
- A URL referencing further documentation for the template.
- 9
- A URL where support can be obtained for the template.
- 10
- An instructional message that is displayed when this template is instantiated. This field should inform the user how to use the newly created resources. Parameter substitution is performed on the message before being displayed so that generated credentials and other parameters can be included in the output. Include links to any next-steps documentation that users should follow.
3.1.7.2. Writing template labels Link kopierenLink in die Zwischenablage kopiert!
Templates can include a set of labels. These labels are added to each object created when the template is instantiated. Defining a label in this way makes it easy for users to find and manage all the objects created from a particular template.
The following is an example of template object labels:
kind: "Template"
apiVersion: "v1"
...
labels:
template: "cakephp-mysql-example"
app: "${NAME}"
3.1.7.3. Writing template parameters Link kopierenLink in die Zwischenablage kopiert!
Parameters allow a value to be supplied by you or generated when the template is instantiated. Then, that value is substituted wherever the parameter is referenced. References can be defined in any field in the objects list field. This is useful for generating random passwords or allowing you to supply a hostname or other user-specific value that is required to customize the template. Parameters can be referenced in two ways:
-
As a string value by placing values in the form in any string field in the template.
${PARAMETER_NAME} -
As a JSON or YAML value by placing values in the form in place of any field in the template.
${{PARAMETER_NAME}}
When using the
${PARAMETER_NAME}
"http://${PARAMETER_1}${PARAMETER_2}"
When using the
${{PARAMETER_NAME}}
A single parameter can be referenced multiple times within a template and it can be referenced using both substitution syntaxes within a single template.
A default value can be provided, which is used if you do not supply a different value:
The following is an example of setting an explicit value as the default value:
parameters:
- name: USERNAME
description: "The user name for Joe"
value: joe
Parameter values can also be generated based on rules specified in the parameter definition, for example generating a parameter value:
parameters:
- name: PASSWORD
description: "The random user password"
generate: expression
from: "[a-zA-Z0-9]{12}"
In the previous example, processing generates a random password 12 characters long consisting of all upper and lowercase alphabet letters and numbers.
The syntax available is not a full regular expression syntax. However, you can use
\w
\d
\a
\A
-
produces 10 alphabet characters, numbers, and underscores. This follows the PCRE standard and is equal to
[\w]{10}.[a-zA-Z0-9_]{10} -
produces 10 numbers. This is equal to
[\d]{10}.[0-9]{10} -
produces 10 alphabetical characters. This is equal to
[\a]{10}.[a-zA-Z]{10} -
produces 10 punctuation or symbol characters. This is equal to
[\A]{10}.[~!@#$%\^&*()\-_+={}\[\]\\|<,>.?/"';:`]{10}
Depending on if the template is written in YAML or JSON, and the type of string that the modifier is embedded within, you might need to escape the backslash with a second backslash. The following examples are equivalent:
Example YAML template with a modifier
parameters:
- name: singlequoted_example
generate: expression
from: '[\A]{10}'
- name: doublequoted_example
generate: expression
from: "[\\A]{10}"
Example JSON template with a modifier
{
"parameters": [
{
"name": "json_example",
"generate": "expression",
"from": "[\\A]{10}"
}
]
}
Here is an example of a full template with parameter definitions and references:
kind: Template
apiVersion: template.openshift.io/v1
metadata:
name: my-template
objects:
- kind: BuildConfig
apiVersion: build.openshift.io/v1
metadata:
name: cakephp-mysql-example
annotations:
description: Defines how to build the application
spec:
source:
type: Git
git:
uri: "${SOURCE_REPOSITORY_URL}"
ref: "${SOURCE_REPOSITORY_REF}"
contextDir: "${CONTEXT_DIR}"
- kind: DeploymentConfig
apiVersion: apps.openshift.io/v1
metadata:
name: frontend
spec:
replicas: "${{REPLICA_COUNT}}"
parameters:
- name: SOURCE_REPOSITORY_URL
displayName: Source Repository URL
description: The URL of the repository with your application source code
value: https://github.com/sclorg/cakephp-ex.git
required: true
- name: GITHUB_WEBHOOK_SECRET
description: A secret string used to configure the GitHub webhook
generate: expression
from: "[a-zA-Z0-9]{40}"
- name: REPLICA_COUNT
description: Number of replicas to run
value: "2"
required: true
message: "... The GitHub webhook secret is ${GITHUB_WEBHOOK_SECRET} ..."
- 1
- This value is replaced with the value of the
SOURCE_REPOSITORY_URLparameter when the template is instantiated. - 2
- This value is replaced with the unquoted value of the
REPLICA_COUNTparameter when the template is instantiated. - 3
- The name of the parameter. This value is used to reference the parameter within the template.
- 4
- The user-friendly name for the parameter. This is displayed to users.
- 5
- A description of the parameter. Provide more detailed information for the purpose of the parameter, including any constraints on the expected value. Descriptions should use complete sentences to follow the console’s text standards. Do not make this a duplicate of the display name.
- 6
- A default value for the parameter which is used if you do not override the value when instantiating the template. Avoid using default values for things like passwords, instead use generated parameters in combination with secrets.
- 7
- Indicates this parameter is required, meaning you cannot override it with an empty value. If the parameter does not provide a default or generated value, you must supply a value.
- 8
- A parameter which has its value generated.
- 9
- The input to the generator. In this case, the generator produces a 40 character alphanumeric value including upper and lowercase characters.
- 10
- Parameters can be included in the template message. This informs you about generated values.
3.1.7.4. Writing the template object list Link kopierenLink in die Zwischenablage kopiert!
The main portion of the template is the list of objects which is created when the template is instantiated. This can be any valid API object, such as a build configuration, deployment configuration, or service. The object is created exactly as defined here, with any parameter values substituted in prior to creation. The definition of these objects can reference parameters defined earlier.
The following is an example of an object list:
kind: "Template"
apiVersion: "v1"
metadata:
name: my-template
objects:
- kind: "Service"
apiVersion: "v1"
metadata:
name: "cakephp-mysql-example"
annotations:
description: "Exposes and load balances the application pods"
spec:
ports:
- name: "web"
port: 8080
targetPort: 8080
selector:
name: "cakephp-mysql-example"
- 1
- The definition of a service, which is created by this template.
If an object definition metadata includes a fixed
namespace
namespace
3.1.7.5. Marking a template as bindable Link kopierenLink in die Zwischenablage kopiert!
The Template Service Broker advertises one service in its catalog for each template object of which it is aware. By default, each of these services is advertised as being bindable, meaning an end user is permitted to bind against the provisioned service.
Procedure
Template authors can prevent end users from binding against services provisioned from a given template.
-
Prevent end user from binding against services provisioned from a given template by adding the annotation to the template.
template.openshift.io/bindable: "false"
3.1.7.6. Exposing template object fields Link kopierenLink in die Zwischenablage kopiert!
Template authors can indicate that fields of particular objects in a template should be exposed. The Template Service Broker recognizes exposed fields on
ConfigMap
Secret
Service
Route
To expose one or more fields of an object, add annotations prefixed by
template.openshift.io/expose-
template.openshift.io/base64-expose-
Each annotation key, with its prefix removed, is passed through to become a key in a
bind
Each annotation value is a Kubernetes JSONPath expression, which is resolved at bind time to indicate the object field whose value should be returned in the
bind
Bind
A-Z
a-z
_
A-Z
a-z
0-9
_
Unless escaped with a backslash, Kubernetes' JSONPath implementation interprets characters such as
.
@
ConfigMap
my.key
{.data['my\.key']}
"{.data['my\\.key']}"
The following is an example of different objects' fields being exposed:
kind: Template
apiVersion: template.openshift.io/v1
metadata:
name: my-template
objects:
- kind: ConfigMap
apiVersion: v1
metadata:
name: my-template-config
annotations:
template.openshift.io/expose-username: "{.data['my\\.username']}"
data:
my.username: foo
- kind: Secret
apiVersion: v1
metadata:
name: my-template-config-secret
annotations:
template.openshift.io/base64-expose-password: "{.data['password']}"
stringData:
password: <password>
- kind: Service
apiVersion: v1
metadata:
name: my-template-service
annotations:
template.openshift.io/expose-service_ip_port: "{.spec.clusterIP}:{.spec.ports[?(.name==\"web\")].port}"
spec:
ports:
- name: "web"
port: 8080
- kind: Route
apiVersion: route.openshift.io/v1
metadata:
name: my-template-route
annotations:
template.openshift.io/expose-uri: "http://{.spec.host}{.spec.path}"
spec:
path: mypath
An example response to a
bind
{
"credentials": {
"username": "foo",
"password": "YmFy",
"service_ip_port": "172.30.12.34:8080",
"uri": "http://route-test.router.default.svc.cluster.local/mypath"
}
}
Procedure
-
Use the annotation to return the field value as a string. This is convenient, although it does not handle arbitrary binary data.
template.openshift.io/expose- -
If you want to return binary data, use the annotation instead to base64 encode the data before it is returned.
template.openshift.io/base64-expose-
3.1.7.7. Waiting for template readiness Link kopierenLink in die Zwischenablage kopiert!
Template authors can indicate that certain objects within a template should be waited for before a template instantiation by the service catalog, Template Service Broker, or
TemplateInstance
Before starting the procedure, read the following considerations:
- Set memory, CPU, and storage default sizes to make sure your application is given enough resources to run smoothly.
-
Avoid referencing the tag from images if that tag is used across major versions. This can cause running applications to break when new images are pushed to that tag.
latest - A good template builds and deploys cleanly without requiring modifications after the template is deployed.
Procedure
To use the template feature, mark one or more objects of kind
,Build,BuildConfig,Deployment,DeploymentConfig, orJobin a template with the following annotation:StatefulSet"template.alpha.openshift.io/wait-for-ready": "true"Template instantiation is not complete until all objects marked with the annotation report ready. Similarly, if any of the annotated objects report failed, or if the template fails to become ready within a fixed timeout of one hour, the template instantiation fails.
For the purposes of instantiation, readiness and failure of each object kind are defined as follows:
Expand Kind Readiness Failure BuildObject reports phase complete.
Object reports phase canceled, error, or failed.
BuildConfigLatest associated build object reports phase complete.
Latest associated build object reports phase canceled, error, or failed.
DeploymentObject reports new replica set and deployment available. This honors readiness probes defined on the object.
Object reports progressing condition as false.
DeploymentConfigObject reports new replication controller and deployment available. This honors readiness probes defined on the object.
Object reports progressing condition as false.
JobObject reports completion.
Object reports that one or more failures have occurred.
StatefulSetObject reports all replicas ready. This honors readiness probes defined on the object.
Not applicable.
The following is an example template extract, which uses the
annotation. Further examples can be found in the OpenShift Container Platform quick start templates.wait-for-readykind: Template apiVersion: template.openshift.io/v1 metadata: name: my-template objects: - kind: BuildConfig apiVersion: build.openshift.io/v1 metadata: name: ... annotations: # wait-for-ready used on BuildConfig ensures that template instantiation # will fail immediately if build fails template.alpha.openshift.io/wait-for-ready: "true" spec: ... - kind: DeploymentConfig apiVersion: apps.openshift.io/v1 metadata: name: ... annotations: template.alpha.openshift.io/wait-for-ready: "true" spec: ... - kind: Service apiVersion: v1 metadata: name: ... spec: ...
3.1.7.8. Creating a template from existing objects Link kopierenLink in die Zwischenablage kopiert!
Rather than writing an entire template from scratch, you can export existing objects from your project in YAML form, and then modify the YAML from there by adding parameters and other customizations as template form.
Procedure
Export objects in a project in YAML form:
$ oc get -o yaml all > <yaml_filename>You can also substitute a particular resource type or multiple resources instead of
. Runallfor more examples.oc get -hThe object types included in
are:oc get -o yaml all-
BuildConfig -
Build -
DeploymentConfig -
ImageStream -
Pod -
ReplicationController -
Route -
Service
-
Using the
all
3.2. Creating applications by using the Developer perspective Link kopierenLink in die Zwischenablage kopiert!
The Developer perspective in the web console provides you the following options from the +Add view to create applications and associated services and deploy them on OpenShift Container Platform:
Getting started resources: Use these resources to help you get started with Developer Console. You can choose to hide the header using the Options menu
.
- Creating applications using samples: Use existing code samples to get started with creating applications on the OpenShift Container Platform.
- Build with guided documentation: Follow the guided documentation to build applications and familiarize yourself with key concepts and terminologies.
- Explore new developer features: Explore the new features and resources within the Developer perspective.
Developer catalog: Explore the Developer Catalog to select the required applications, services, or source to image builders, and then add it to your project.
- All Services: Browse the catalog to discover services across OpenShift Container Platform.
- Database: Select the required database service and add it to your application.
- Operator Backed: Select and deploy the required Operator-managed service.
- Helm chart: Select the required Helm chart to simplify deployment of applications and services.
- Devfile: Select a devfile from the Devfile registry to declaratively define a development environment.
Event Source: Select an event source to register interest in a class of events from a particular system.
NoteThe Managed services option is also available if the RHOAS Operator is installed.
- Git repository: Import an existing codebase, Devfile, or Dockerfile from your Git repository using the From Git, From Devfile, or From Dockerfile options respectively, to build and deploy an application on OpenShift Container Platform.
- Container images: Use existing images from an image stream or registry to deploy it on to the OpenShift Container Platform.
- Pipelines: Use Tekton pipeline to create CI/CD pipelines for your software delivery process on the OpenShift Container Platform.
Serverless: Explore the Serverless options to create, build, and deploy stateless and serverless applications on the OpenShift Container Platform.
- Channel: Create a Knative channel to create an event forwarding and persistence layer with in-memory and reliable implementations.
- Samples: Explore the available sample applications to create, build, and deploy an application quickly.
- Quick Starts: Explore the quick start options to create, import, and run applications with step-by-step instructions and tasks.
From Local Machine: Explore the From Local Machine tile to import or upload files on your local machine for building and deploying applications easily.
- Import YAML: Upload a YAML file to create and define resources for building and deploying applications.
- Upload JAR file: Upload a JAR file to build and deploy Java applications.
- Share my Project: Use this option to add or remove users to a project and provide accessibility options to them.
- Helm Chart repositories: Use this option to add Helm Chart repositories in a namespace.
- Re-ordering of resources: Use these resources to re-order pinned resources added to your navigation pane. The drag-and-drop icon is displayed on the left side of the pinned resource when you hover over it in the navigation pane. The dragged resource can be dropped only in the section where it resides.
Note that certain options, such as Pipelines, Event Source, and Import Virtual Machines, are displayed only when the OpenShift Pipelines Operator, OpenShift Serverless Operator, and OpenShift Virtualization Operator are installed, respectively.
3.2.1. Prerequisites Link kopierenLink in die Zwischenablage kopiert!
To create applications using the Developer perspective ensure that:
- You have logged in to the web console.
- You have created a project or have access to a project with the appropriate roles and permissions to create applications and other workloads in OpenShift Container Platform.
To create serverless applications, in addition to the preceding prerequisites, ensure that:
3.2.2. Creating sample applications Link kopierenLink in die Zwischenablage kopiert!
You can use the sample applications in the +Add flow of the Developer perspective to create, build, and deploy applications quickly.
Prerequisites
- You have logged in to the OpenShift Container Platform web console and are in the Developer perspective.
Procedure
- In the +Add view, click the Samples tile to see the Samples page.
- On the Samples page, select one of the available sample applications to see the Create Sample Application form.
In the Create Sample Application Form:
- In the Name field, the deployment name is displayed by default. You can modify this name as required.
- In the Builder Image Version, a builder image is selected by default. You can modify this image version by using the Builder Image Version drop-down list.
- A sample Git repository URL is added by default.
- Click Create to create the sample application. The build status of the sample application is displayed on the Topology view. After the sample application is created, you can see the deployment added to the application.
3.2.3. Creating applications by using Quick Starts Link kopierenLink in die Zwischenablage kopiert!
The Quick Starts page shows you how to create, import, and run applications on OpenShift Container Platform, with step-by-step instructions and tasks.
Prerequisites
- You have logged in to the OpenShift Container Platform web console and are in the Developer perspective.
Procedure
-
In the +Add view, click the Getting Started resources
Build with guided documentation View all quick starts link to view the Quick Starts page. - In the Quick Starts page, click the tile for the quick start that you want to use.
- Click Start to begin the quick start.
- Perform the steps that are displayed.
3.2.4. Importing a codebase from Git to create an application Link kopierenLink in die Zwischenablage kopiert!
You can use the Developer perspective to create, build, and deploy an application on OpenShift Container Platform using an existing codebase in GitHub.
The following procedure walks you through the From Git option in the Developer perspective to create an application.
Procedure
- In the +Add view, click From Git in the Git Repository tile to see the Import from git form.
-
In the Git section, enter the Git repository URL for the codebase you want to use to create an application. For example, enter the URL of this sample Node.js application . The URL is then validated.
https://github.com/sclorg/nodejs-ex Optional: You can click Show Advanced Git Options to add details such as:
- Git Reference to point to code in a specific branch, tag, or commit to be used to build the application.
- Context Dir to specify the subdirectory for the application source code you want to use to build the application.
- Source Secret to create a Secret Name with credentials for pulling your source code from a private repository.
Optional: You can import a
, aDevfile,Dockerfile, or aBuilder Imagethrough your Git repository to further customize your deployment.Serverless Function-
If your Git repository contains a , a
Devfile, aDockerfile, or aBuilder Image, it is automatically detected and populated on the respective path fields.func.yaml -
If a , a
Devfile, or aDockerfileare detected in the same repository, theBuilder Imageis selected by default.Devfile -
If is detected in the Git repository, the Import Strategy changes to
func.yaml.Serverless Function - Alternatively, you can create a serverless function by clicking Create Serverless function in the +Add view using the Git repository URL.
- To edit the file import type and select a different strategy, click Edit import strategy option.
-
If multiple , a
Devfiles, or aDockerfilesare detected, to import a specific instance, specify the respective paths relative to the context directory.Builder Images
-
If your Git repository contains a
After the Git URL is validated, the recommended builder image is selected and marked with a star. If the builder image is not auto-detected, select a builder image. For the
Git URL, by default the Node.js builder image is selected.https://github.com/sclorg/nodejs-ex- Optional: Use the Builder Image Version drop-down to specify a version.
- Optional: Use the Edit import strategy to select a different strategy.
- Optional: For the Node.js builder image, use the Run command field to override the command to run the application.
In the General section:
-
In the Application field, enter a unique name for the application grouping, for example, . Ensure that the application name is unique in a namespace.
myapp The Name field to identify the resources created for this application is automatically populated based on the Git repository URL if there are no existing applications. If there are existing applications, you can choose to deploy the component within an existing application, create a new application, or keep the component unassigned.
NoteThe resource name must be unique in a namespace. Modify the resource name if you get an error.
-
In the Application field, enter a unique name for the application grouping, for example,
In the Resources section, select:
- Deployment, to create an application in plain Kubernetes style.
- Deployment Config, to create an OpenShift Container Platform style application.
Serverless Deployment, to create a Knative service.
NoteTo set the default resource preference for importing an application, go to User Preferences
Applications Resource type field. The Serverless Deployment option is displayed in the Import from Git form only if the OpenShift Serverless Operator is installed in your cluster. The Resources section is not available while creating a serverless function. For further details, refer to the OpenShift Serverless documentation.
In the Pipelines section, select Add Pipeline, and then click Show Pipeline Visualization to see the pipeline for the application. A default pipeline is selected, but you can choose the pipeline you want from the list of available pipelines for the application.
NoteThe Add pipeline checkbox is checked and Configure PAC is selected by default if the following criterias are fulfilled:
- Pipeline operator is installed
-
is enabled
pipelines-as-code -
directory is detected in the Git repository
.tekton
Add a webhook to your repository. If Configure PAC is checked and the GitHub App is set up, you can see the Use GitHub App and Setup a webhook options. If GitHub App is not set up, you can only see the Setup a webhook option:
-
Go to Settings
Webhooks and click Add webhook. - Set the Payload URL to the Pipelines as Code controller public URL.
- Select the content type as application/json.
-
Add a webhook secret and note it in an alternate location. With installed on your local machine, generate a random secret.
openssl - Click Let me select individual events and select these events: Commit comments, Issue comments, Pull request, and Pushes.
- Click Add webhook.
-
Go to Settings
Optional: In the Advanced Options section, the Target port and the Create a route to the application is selected by default so that you can access your application using a publicly available URL.
If your application does not expose its data on the default public port, 80, clear the check box, and set the target port number you want to expose.
Optional: You can use the following advanced options to further customize your application:
- Routing
By clicking the Routing link, you can perform the following actions:
- Customize the hostname for the route.
- Specify the path the router watches.
- Select the target port for the traffic from the drop-down list.
Secure your route by selecting the Secure Route check box. Select the required TLS termination type and set a policy for insecure traffic from the respective drop-down lists.
NoteFor serverless applications, the Knative service manages all the routing options above. However, you can customize the target port for traffic, if required. If the target port is not specified, the default port of
is used.8080
- Domain mapping
If you are creating a Serverless Deployment, you can add a custom domain mapping to the Knative service during creation.
In the Advanced options section, click Show advanced Routing options.
- If the domain mapping CR that you want to map to the service already exists, you can select it from the Domain mapping drop-down menu.
-
If you want to create a new domain mapping CR, type the domain name into the box, and select the Create option. For example, if you type in , the Create option is Create "example.com".
example.com
- Health Checks
Click the Health Checks link to add Readiness, Liveness, and Startup probes to your application. All the probes have prepopulated default data; you can add the probes with the default data or customize it as required.
To customize the health probes:
- Click Add Readiness Probe, if required, modify the parameters to check if the container is ready to handle requests, and select the check mark to add the probe.
- Click Add Liveness Probe, if required, modify the parameters to check if a container is still running, and select the check mark to add the probe.
Click Add Startup Probe, if required, modify the parameters to check if the application within the container has started, and select the check mark to add the probe.
For each of the probes, you can specify the request type - HTTP GET, Container Command, or TCP Socket, from the drop-down list. The form changes as per the selected request type. You can then modify the default values for the other parameters, such as the success and failure thresholds for the probe, number of seconds before performing the first probe after the container starts, frequency of the probe, and the timeout value.
- Build Configuration and Deployment
Click the Build Configuration and Deployment links to see the respective configuration options. Some options are selected by default; you can customize them further by adding the necessary triggers and environment variables.
For serverless applications, the Deployment option is not displayed as the Knative configuration resource maintains the desired state for your deployment instead of a
resource.DeploymentConfig
- Scaling
Click the Scaling link to define the number of pods or instances of the application you want to deploy initially.
If you are creating a serverless deployment, you can also configure the following settings:
-
Min Pods determines the lower limit for the number of pods that must be running at any given time for a Knative service. This is also known as the setting.
minScale -
Max Pods determines the upper limit for the number of pods that can be running at any given time for a Knative service. This is also known as the setting.
maxScale - Concurrency target determines the number of concurrent requests desired for each instance of the application at a given time.
- Concurrency limit determines the limit for the number of concurrent requests allowed for each instance of the application at a given time.
- Concurrency utilization determines the percentage of the concurrent requests limit that must be met before Knative scales up additional pods to handle additional traffic.
-
Autoscale window defines the time window over which metrics are averaged to provide input for scaling decisions when the autoscaler is not in panic mode. A service is scaled-to-zero if no requests are received during this window. The default duration for the autoscale window is . This is also known as the stable window.
60s
-
Min Pods determines the lower limit for the number of pods that must be running at any given time for a Knative service. This is also known as the
- Resource Limit
- Click the Resource Limit link to set the amount of CPU and Memory resources a container is guaranteed or allowed to use when running.
- Labels
- Click the Labels link to add custom labels to your application.
- Click Create to create the application and a success notification is displayed. You can see the build status of the application in the Topology view.
3.2.5. Creating applications by deploying container image Link kopierenLink in die Zwischenablage kopiert!
You can use an external image registry or an image stream tag from an internal registry to deploy an application on your cluster.
Prerequisites
- You have logged in to the OpenShift Container Platform web console and are in the Developer perspective.
Procedure
- In the +Add view, click Container images to view the Deploy Images page.
In the Image section:
- Select Image name from external registry to deploy an image from a public or a private registry, or select Image stream tag from internal registry to deploy an image from an internal registry.
- Select an icon for your image in the Runtime icon tab.
In the General section:
- In the Application name field, enter a unique name for the application grouping.
- In the Name field, enter a unique name to identify the resources created for this component.
In the Resource type section, select the resource type to generate:
-
Select Deployment to enable declarative updates for and
Podobjects.ReplicaSet -
Select DeploymentConfig to define the template for a object, and manage deploying new images and configuration sources.
Pod - Select Serverless Deployment to enable scaling to zero when idle.
-
Select Deployment to enable declarative updates for
- Click Create. You can view the build status of the application in the Topology view.
3.2.6. Deploying a Java application by uploading a JAR file Link kopierenLink in die Zwischenablage kopiert!
You can use the web console Developer perspective to upload a JAR file by using the following options:
- Navigate to the +Add view of the Developer perspective, and click Upload JAR file in the From Local Machine tile. Browse and select your JAR file, or drag a JAR file to deploy your application.
- Navigate to the Topology view and use the Upload JAR file option, or drag a JAR file to deploy your application.
- Use the in-context menu in the Topology view, and then use the Upload JAR file option to upload your JAR file to deploy your application.
Prerequisites
- The Cluster Samples Operator must be installed by a cluster administrator.
- You have access to the OpenShift Container Platform web console and are in the Developer perspective.
Procedure
- In the Topology view, right-click anywhere to view the Add to Project menu.
- Hover over the Add to Project menu to see the menu options, and then select the Upload JAR file option to see the Upload JAR file form. Alternatively, you can drag the JAR file into the Topology view.
- In the JAR file field, browse for the required JAR file on your local machine and upload it. Alternatively, you can drag the JAR file on to the field. A toast alert is displayed at the top right if an incompatible file type is dragged into the Topology view. A field error is displayed if an incompatible file type is dropped on the field in the upload form.
- The runtime icon and builder image are selected by default. If a builder image is not auto-detected, select a builder image. If required, you can change the version using the Builder Image Version drop-down list.
- Optional: In the Application Name field, enter a unique name for your application to use for resource labelling.
- In the Name field, enter a unique component name for the associated resources.
- Optional: Use the Resource type drop-down list to change the resource type.
- In the Advanced options menu, click Create a Route to the Application to configure a public URL for your deployed application.
- Click Create to deploy the application. A toast notification is shown to notify you that the JAR file is being uploaded. The toast notification also includes a link to view the build logs.
If you attempt to close the browser tab while the build is running, a web alert is displayed.
After the JAR file is uploaded and the application is deployed, you can view the application in the Topology view.
3.2.7. Using the Devfile registry to access devfiles Link kopierenLink in die Zwischenablage kopiert!
You can use the devfiles in the +Add flow of the Developer perspective to create an application. The +Add flow provides a complete integration with the devfile community registry. A devfile is a portable YAML file that describes your development environment without needing to configure it from scratch. Using the Devfile registry, you can use a preconfigured devfile to create an application.
Procedure
-
Navigate to Developer Perspective
+Add Developer Catalog All Services. A list of all the available services in the Developer Catalog is displayed. - Under Type, click Devfiles to browse for devfiles that support a particular language or framework. Alternatively, you can use the keyword filter to search for a particular devfile using their name, tag, or description.
- Click the devfile you want to use to create an application. The devfile tile displays the details of the devfile, including the name, description, provider, and the documentation of the devfile.
- Click Create to create an application and view the application in the Topology view.
3.2.8. Using the Developer Catalog to add services or components to your application Link kopierenLink in die Zwischenablage kopiert!
You use the Developer Catalog to deploy applications and services based on Operator backed services such as Databases, Builder Images, and Helm Charts. The Developer Catalog contains a collection of application components, services, event sources, or source-to-image builders that you can add to your project. Cluster administrators can customize the content made available in the catalog.
Procedure
- In the Developer perspective, navigate to the +Add view and from the Developer Catalog tile, click All Services to view all the available services in the Developer Catalog.
- Under All Services, select the kind of service or the component you need to add to your project. For this example, select Databases to list all the database services and then click MariaDB to see the details for the service.
Click Instantiate Template to see an automatically populated template with details for the MariaDB service, and then click Create to create and view the MariaDB service in the Topology view.
Figure 3.1. MariaDB in Topology
3.3. Creating applications from installed Operators Link kopierenLink in die Zwischenablage kopiert!
Operators are a method of packaging, deploying, and managing a Kubernetes application. You can create applications on OpenShift Container Platform using Operators that have been installed by a cluster administrator.
This guide walks developers through an example of creating applications from an installed Operator using the OpenShift Container Platform web console.
3.3.1. Creating an etcd cluster using an Operator Link kopierenLink in die Zwischenablage kopiert!
This procedure walks through creating a new etcd cluster using the etcd Operator, managed by Operator Lifecycle Manager (OLM).
Prerequisites
- Access to an OpenShift Container Platform 4.14 cluster.
- The etcd Operator already installed cluster-wide by an administrator.
Procedure
-
Create a new project in the OpenShift Container Platform web console for this procedure. This example uses a project called .
my-etcd Navigate to the Operators
Installed Operators page. The Operators that have been installed to the cluster by the cluster administrator and are available for use are shown here as a list of cluster service versions (CSVs). CSVs are used to launch and manage the software provided by the Operator. TipYou can get this list from the CLI using:
$ oc get csvOn the Installed Operators page, click the etcd Operator to view more details and available actions.
As shown under Provided APIs, this Operator makes available three new resource types, including one for an etcd Cluster (the
resource). These objects work similar to the built-in native Kubernetes ones, such asEtcdClusterorDeployment, but contain logic specific to managing etcd.ReplicaSetCreate a new etcd cluster:
- In the etcd Cluster API box, click Create instance.
-
The next page allows you to make any modifications to the minimal starting template of an object, such as the size of the cluster. For now, click Create to finalize. This triggers the Operator to start up the pods, services, and other components of the new etcd cluster.
EtcdCluster
Click the example etcd cluster, then click the Resources tab to see that your project now contains a number of resources created and configured automatically by the Operator.
Verify that a Kubernetes service has been created that allows you to access the database from other pods in your project.
All users with the
role in a given project can create, manage, and delete application instances (an etcd cluster, in this example) managed by Operators that have already been created in the project, in a self-service manner, just like a cloud service. If you want to enable additional users with this ability, project administrators can add the role using the following command:edit$ oc policy add-role-to-user edit <user> -n <target_project>
You now have an etcd cluster that will react to failures and rebalance data as pods become unhealthy or are migrated between nodes in the cluster. Most importantly, cluster administrators or developers with proper access can now easily use the database with their applications.
3.4. Creating applications by using the CLI Link kopierenLink in die Zwischenablage kopiert!
You can create an OpenShift Container Platform application from components that include source or binary code, images, and templates by using the OpenShift Container Platform CLI.
The set of objects created by
new-app
3.4.1. Creating an application from source code Link kopierenLink in die Zwischenablage kopiert!
With the
new-app
The
new-app
new-app
Deployment
OpenShift Container Platform automatically detects whether the pipeline, source, or docker build strategy should be used, and in the case of source build, detects an appropriate language builder image.
3.4.1.1. Local Link kopierenLink in die Zwischenablage kopiert!
To create an application from a Git repository in a local directory:
$ oc new-app /<path to source code>
If you use a local Git repository, the repository must have a remote named
origin
new-app
3.4.1.2. Remote Link kopierenLink in die Zwischenablage kopiert!
To create an application from a remote Git repository:
$ oc new-app https://github.com/sclorg/cakephp-ex
To create an application from a private remote Git repository:
$ oc new-app https://github.com/youruser/yourprivaterepo --source-secret=yoursecret
If you use a private remote Git repository, you can use the
--source-secret
You can use a subdirectory of your source code repository by specifying a
--context-dir
$ oc new-app https://github.com/sclorg/s2i-ruby-container.git \
--context-dir=2.0/test/puma-test-app
Also, when specifying a remote URL, you can specify a Git branch to use by appending
#<branch_name>
$ oc new-app https://github.com/openshift/ruby-hello-world.git#beta4
3.4.1.3. Build strategy detection Link kopierenLink in die Zwischenablage kopiert!
OpenShift Container Platform automatically determines which build strategy to use by detecting certain files:
If a Jenkins file exists in the root or specified context directory of the source repository when creating a new application, OpenShift Container Platform generates a pipeline build strategy.
NoteThe
build strategy is deprecated; consider using Red Hat OpenShift Pipelines instead.pipeline- If a Dockerfile exists in the root or specified context directory of the source repository when creating a new application, OpenShift Container Platform generates a docker build strategy.
- If neither a Jenkins file nor a Dockerfile is detected, OpenShift Container Platform generates a source build strategy.
Override the automatically detected build strategy by setting the
--strategy
docker
pipeline
source
$ oc new-app /home/user/code/myapp --strategy=docker
The
oc
git remote -v
3.4.1.4. Language detection Link kopierenLink in die Zwischenablage kopiert!
If you use the source build strategy,
new-app
| Language | Files |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
After a language is detected,
new-app
supports
new-app
You can override the image the builder uses for a particular source repository by specifying the image, either an image stream or container specification, and the repository with a
~
For example, to use the
myproject/my-ruby
$ oc new-app myproject/my-ruby~https://github.com/openshift/ruby-hello-world.git
To use the
openshift/ruby-20-centos7:latest
$ oc new-app openshift/ruby-20-centos7:latest~/home/user/code/my-ruby-app
Language detection requires the Git client to be locally installed so that your repository can be cloned and inspected. If Git is not available, you can avoid the language detection step by specifying the builder image to use with your repository with the
<image>~<repository>
The
-i <image> <repository>
new-app
repository
The
-i <image> --code <repository>
new-app
repository
image
3.4.2. Creating an application from an image Link kopierenLink in die Zwischenablage kopiert!
You can deploy an application from an existing image. Images can come from image streams in the OpenShift Container Platform server, images in a specific registry, or images in the local Docker server.
The
new-app
new-app
--docker-image
-i|--image-stream
If you specify an image from your local Docker repository, you must ensure that the same image is available to the OpenShift Container Platform cluster nodes.
3.4.2.1. Docker Hub MySQL image Link kopierenLink in die Zwischenablage kopiert!
Create an application from the Docker Hub MySQL image, for example:
$ oc new-app mysql
3.4.2.2. Image in a private registry Link kopierenLink in die Zwischenablage kopiert!
Create an application using an image in a private registry, specify the full container image specification:
$ oc new-app myregistry:5000/example/myimage
3.4.2.3. Existing image stream and optional image stream tag Link kopierenLink in die Zwischenablage kopiert!
Create an application from an existing image stream and optional image stream tag:
$ oc new-app my-stream:v1
3.4.3. Creating an application from a template Link kopierenLink in die Zwischenablage kopiert!
You can create an application from a previously stored template or from a template file, by specifying the name of the template as an argument. For example, you can store a sample application template and use it to create an application.
Upload an application template to your current project’s template library. The following example uploads an application template from a file called
examples/sample-app/application-template-stibuild.json
$ oc create -f examples/sample-app/application-template-stibuild.json
Then create a new application by referencing the application template. In this example, the template name is
ruby-helloworld-sample
$ oc new-app ruby-helloworld-sample
To create a new application by referencing a template file in your local file system, without first storing it in OpenShift Container Platform, use the
-f|--file
$ oc new-app -f examples/sample-app/application-template-stibuild.json
3.4.3.1. Template parameters Link kopierenLink in die Zwischenablage kopiert!
When creating an application based on a template, use the
-p|--param
$ oc new-app ruby-helloworld-sample \
-p ADMIN_USERNAME=admin -p ADMIN_PASSWORD=mypassword
You can store your parameters in a file, then use that file with
--param-file
--param-file=-
helloworld.params
ADMIN_USERNAME=admin
ADMIN_PASSWORD=mypassword
Reference the parameters in the file when instantiating a template:
$ oc new-app ruby-helloworld-sample --param-file=helloworld.params
3.4.4. Modifying application creation Link kopierenLink in die Zwischenablage kopiert!
The
new-app
new-app
| Object | Description |
|---|---|
|
| A
|
|
| For the
|
|
| A
|
|
| The
|
| Other | Other objects can be generated when instantiating templates, according to the template. |
3.4.4.1. Specifying environment variables Link kopierenLink in die Zwischenablage kopiert!
When generating applications from a template, source, or an image, you can use the
-e|--env
$ oc new-app openshift/postgresql-92-centos7 \
-e POSTGRESQL_USER=user \
-e POSTGRESQL_DATABASE=db \
-e POSTGRESQL_PASSWORD=password
The variables can also be read from file using the
--env-file
postgresql.env
POSTGRESQL_USER=user
POSTGRESQL_DATABASE=db
POSTGRESQL_PASSWORD=password
Read the variables from the file:
$ oc new-app openshift/postgresql-92-centos7 --env-file=postgresql.env
Additionally, environment variables can be given on standard input by using
--env-file=-
$ cat postgresql.env | oc new-app openshift/postgresql-92-centos7 --env-file=-
Any
BuildConfig
new-app
-e|--env
--env-file
3.4.4.2. Specifying build environment variables Link kopierenLink in die Zwischenablage kopiert!
When generating applications from a template, source, or an image, you can use the
--build-env
$ oc new-app openshift/ruby-23-centos7 \
--build-env HTTP_PROXY=http://myproxy.net:1337/ \
--build-env GEM_HOME=~/.gem
The variables can also be read from a file using the
--build-env-file
ruby.env
HTTP_PROXY=http://myproxy.net:1337/
GEM_HOME=~/.gem
Read the variables from the file:
$ oc new-app openshift/ruby-23-centos7 --build-env-file=ruby.env
Additionally, environment variables can be given on standard input by using
--build-env-file=-
$ cat ruby.env | oc new-app openshift/ruby-23-centos7 --build-env-file=-
3.4.4.3. Specifying labels Link kopierenLink in die Zwischenablage kopiert!
When generating applications from source, images, or templates, you can use the
-l|--label
$ oc new-app https://github.com/openshift/ruby-hello-world -l name=hello-world
3.4.4.4. Viewing the output without creation Link kopierenLink in die Zwischenablage kopiert!
To see a dry-run of running the
new-app
-o|--output
yaml
json
oc create
To output
new-app
$ oc new-app https://github.com/openshift/ruby-hello-world \
-o yaml > myapp.yaml
Edit the file:
$ vi myapp.yaml
Create a new application by referencing the file:
$ oc create -f myapp.yaml
3.4.4.5. Creating objects with different names Link kopierenLink in die Zwischenablage kopiert!
Objects created by
new-app
--name
$ oc new-app https://github.com/openshift/ruby-hello-world --name=myapp
3.4.4.6. Creating objects in a different project Link kopierenLink in die Zwischenablage kopiert!
Normally,
new-app
-n|--namespace
$ oc new-app https://github.com/openshift/ruby-hello-world -n myproject
3.4.4.7. Creating multiple objects Link kopierenLink in die Zwischenablage kopiert!
The
new-app
new-app
To create an application from a source repository and a Docker Hub image:
$ oc new-app https://github.com/openshift/ruby-hello-world mysql
If a source code repository and a builder image are specified as separate arguments,
new-app
~
3.4.4.8. Grouping images and source in a single pod Link kopierenLink in die Zwischenablage kopiert!
The
new-app
+
--group
$ oc new-app ruby+mysql
To deploy an image built from source and an external image together:
$ oc new-app \
ruby~https://github.com/openshift/ruby-hello-world \
mysql \
--group=ruby+mysql
3.4.4.9. Searching for images, templates, and other inputs Link kopierenLink in die Zwischenablage kopiert!
To search for images, templates, and other inputs for the
oc new-app
--search
--list
$ oc new-app --search php
3.4.4.10. Setting the import mode Link kopierenLink in die Zwischenablage kopiert!
To set the import mode when using
oc new-app
--import-mode
Legacy
PreserveOriginal
$ oc new-app --image=registry.redhat.io/ubi8/httpd-24:latest --import-mode=Legacy --name=test
$ oc new-app --image=registry.redhat.io/ubi8/httpd-24:latest --import-mode=PreserveOriginal --name=test
3.5. Creating applications using Ruby on Rails Link kopierenLink in die Zwischenablage kopiert!
Ruby on Rails is a web framework written in Ruby. This guide covers using Rails 4 on OpenShift Container Platform.
Go through the whole tutorial to have an overview of all the steps necessary to run your application on the OpenShift Container Platform. If you experience a problem try reading through the entire tutorial and then going back to your issue. It can also be useful to review your previous steps to ensure that all the steps were run correctly.
3.5.1. Prerequisites Link kopierenLink in die Zwischenablage kopiert!
- Basic Ruby and Rails knowledge.
- Locally installed version of Ruby 2.0.0+, Rubygems, Bundler.
- Basic Git knowledge.
- Running instance of OpenShift Container Platform 4.
-
Make sure that an instance of OpenShift Container Platform is running and is available. Also make sure that your CLI client is installed and the command is accessible from your command shell, so you can use it to log in using your email address and password.
oc
3.5.2. Setting up the database Link kopierenLink in die Zwischenablage kopiert!
Rails applications are almost always used with a database. For local development use the PostgreSQL database.
Procedure
Install the database:
$ sudo yum install -y postgresql postgresql-server postgresql-develInitialize the database:
$ sudo postgresql-setup initdbThis command creates the
directory, in which the data is stored./var/lib/pgsql/dataStart the database:
$ sudo systemctl start postgresql.serviceWhen the database is running, create your
user:rails$ sudo -u postgres createuser -s railsNote that the user created has no password.
3.5.3. Writing your application Link kopierenLink in die Zwischenablage kopiert!
If you are starting your Rails application from scratch, you must install the Rails gem first. Then you can proceed with writing your application.
Procedure
Install the Rails gem:
$ gem install railsExample output
Successfully installed rails-4.3.0 1 gem installedAfter you install the Rails gem, create a new application with PostgreSQL as your database:
$ rails new rails-app --database=postgresqlChange into your new application directory:
$ cd rails-appIf you already have an application, make sure the
(postgresql) gem is present in yourpg. If not, edit yourGemfileby adding the gem:Gemfilegem 'pg'Generate a new
with all your dependencies:Gemfile.lock$ bundle installIn addition to using the
database with thepostgresqlgem, you also must ensure that thepgis using theconfig/database.ymladapter.postgresqlMake sure you updated
section in thedefaultfile, so it looks like this:config/database.ymldefault: &default adapter: postgresql encoding: unicode pool: 5 host: localhost username: rails password: <password>Create your application’s development and test databases:
$ rake db:createThis creates
anddevelopmentdatabase in your PostgreSQL server.test
3.5.3.1. Creating a welcome page Link kopierenLink in die Zwischenablage kopiert!
Since Rails 4 no longer serves a static
public/index.html
To have a custom welcome page must do following steps:
- Create a controller with an index action.
- Create a view page for the welcome controller index action.
- Create a route that serves applications root page with the created controller and view.
Rails offers a generator that completes all necessary steps for you.
Procedure
Run Rails generator:
$ rails generate controller welcome indexAll the necessary files are created.
edit line 2 in
file as follows:config/routes.rbroot 'welcome#index'Run the rails server to verify the page is available:
$ rails serverYou should see your page by visiting http://localhost:3000 in your browser. If you do not see the page, check the logs that are output to your server to debug.
3.5.3.2. Configuring application for OpenShift Container Platform Link kopierenLink in die Zwischenablage kopiert!
To have your application communicate with the PostgreSQL database service running in OpenShift Container Platform you must edit the
default
config/database.yml
Procedure
Edit the
section in yourdefaultwith pre-defined variables as follows:config/database.ymlSample
config/databaseYAML file<% user = ENV.key?("POSTGRESQL_ADMIN_PASSWORD") ? "root" : ENV["POSTGRESQL_USER"] %> <% password = ENV.key?("POSTGRESQL_ADMIN_PASSWORD") ? ENV["POSTGRESQL_ADMIN_PASSWORD"] : ENV["POSTGRESQL_PASSWORD"] %> <% db_service = ENV.fetch("DATABASE_SERVICE_NAME","").upcase %> default: &default adapter: postgresql encoding: unicode # For details on connection pooling, see rails configuration guide # http://guides.rubyonrails.org/configuring.html#database-pooling pool: <%= ENV["POSTGRESQL_MAX_CONNECTIONS"] || 5 %> username: <%= user %> password: <%= password %> host: <%= ENV["#{db_service}_SERVICE_HOST"] %> port: <%= ENV["#{db_service}_SERVICE_PORT"] %> database: <%= ENV["POSTGRESQL_DATABASE"] %>
3.5.3.3. Storing your application in Git Link kopierenLink in die Zwischenablage kopiert!
Building an application in OpenShift Container Platform usually requires that the source code be stored in a git repository, so you must install
git
Prerequisites
- Install git.
Procedure
Make sure you are in your Rails application directory by running the
command. The output of the command should look like:ls -1$ ls -1Example output
app bin config config.ru db Gemfile Gemfile.lock lib log public Rakefile README.rdoc test tmp vendorRun the following commands in your Rails app directory to initialize and commit your code to git:
$ git init$ git add .$ git commit -m "initial commit"After your application is committed you must push it to a remote repository. GitHub account, in which you create a new repository.
Set the remote that points to your
repository:git$ git remote add origin git@github.com:<namespace/repository-name>.gitPush your application to your remote git repository.
$ git push
3.5.4. Deploying your application to OpenShift Container Platform Link kopierenLink in die Zwischenablage kopiert!
You can deploy you application to OpenShift Container Platform.
After creating the
rails-app
Deploying your application in OpenShift Container Platform involves three steps:
- Creating a database service from OpenShift Container Platform’s PostgreSQL image.
- Creating a frontend service from OpenShift Container Platform’s Ruby 2.0 builder image and your Ruby on Rails source code, which are wired with the database service.
- Creating a route for your application.
Procedure
To deploy your Ruby on Rails application, create a new project for the application:
$ oc new-project rails-app --description="My Rails application" --display-name="Rails Application"
3.5.4.1. Creating the database service Link kopierenLink in die Zwischenablage kopiert!
Your Rails application expects a running database service. For this service use PostgreSQL database image.
To create the database service, use the
oc new-app
- POSTGRESQL_DATABASE
- POSTGRESQL_USER
- POSTGRESQL_PASSWORD
Setting these variables ensures:
- A database exists with the specified name.
- A user exists with the specified name.
- The user can access the specified database with the specified password.
Procedure
Create the database service:
$ oc new-app postgresql -e POSTGRESQL_DATABASE=db_name -e POSTGRESQL_USER=username -e POSTGRESQL_PASSWORD=passwordTo also set the password for the database administrator, append to the previous command with:
-e POSTGRESQL_ADMIN_PASSWORD=admin_pwWatch the progress:
$ oc get pods --watch
3.5.4.2. Creating the frontend service Link kopierenLink in die Zwischenablage kopiert!
To bring your application to OpenShift Container Platform, you must specify a repository in which your application lives.
Procedure
Create the frontend service and specify database related environment variables that were setup when creating the database service:
$ oc new-app path/to/source/code --name=rails-app -e POSTGRESQL_USER=username -e POSTGRESQL_PASSWORD=password -e POSTGRESQL_DATABASE=db_name -e DATABASE_SERVICE_NAME=postgresqlWith this command, OpenShift Container Platform fetches the source code, sets up the builder, builds your application image, and deploys the newly created image together with the specified environment variables. The application is named
.rails-appVerify the environment variables have been added by viewing the JSON document of the
deployment config:rails-app$ oc get dc rails-app -o jsonYou should see the following section:
Example output
env": [ { "name": "POSTGRESQL_USER", "value": "username" }, { "name": "POSTGRESQL_PASSWORD", "value": "password" }, { "name": "POSTGRESQL_DATABASE", "value": "db_name" }, { "name": "DATABASE_SERVICE_NAME", "value": "postgresql" } ],Check the build process:
$ oc logs -f build/rails-app-1After the build is complete, look at the running pods in OpenShift Container Platform:
$ oc get podsYou should see a line starting with
, and that is your application running in OpenShift Container Platform.myapp-<number>-<hash>Before your application is functional, you must initialize the database by running the database migration script. There are two ways you can do this:
Manually from the running frontend container:
Exec into frontend container with
command:rsh$ oc rsh <frontend_pod_id>Run the migration from inside the container:
$ RAILS_ENV=production bundle exec rake db:migrateIf you are running your Rails application in a
ordevelopmentenvironment you do not have to specify thetestenvironment variable.RAILS_ENV
- By adding pre-deployment lifecycle hooks in your template.
3.5.4.3. Creating a route for your application Link kopierenLink in die Zwischenablage kopiert!
You can expose a service to create a route for your application.
Procedure
To expose a service by giving it an externally-reachable hostname like
use OpenShift Container Platform route. In your case you need to expose the frontend service by typing:www.example.com$ oc expose service rails-app --hostname=www.example.com
Ensure the hostname you specify resolves into the IP address of the router.