Deploying your Quarkus applications to OpenShift
Abstract
Preface
As an application developer, you can deploy your Quarkus applications to OpenShift using a single Maven command. This functionality is provided by the quarkus-openshift
extension that supports multiple deployment options, including the Docker build strategy and the Source-to-Image (S2I) strategy.
In the Red Hat build of Quarkus documentation you will learn the recommended workflows to deploy your Quarkus applications to production environments. To learn about alternative deployments, see the Quarkus community documentation.
Prerequisites
-
Have OpenJDK (JDK) 11 installed and the
JAVA_HOME
environment variable set to specify the location of the Java SDK. - Have Apache Maven 3.8.1 or higher installed.
Have a Quarkus Maven project that includes the
quarkus-openshift
extension.- To add the Quarkus OpenShift extension, see Adding the Quarkus Openshift extension.
Have access to a Red Hat OpenShift Container Platform cluster and the latest version of the OpenShift CLI (oc) installed.
- For information about installing oc, see Installing and configuring OpenShift Container Platform clusters.
Login to OpenShift using
oc
and select your project.- To verify the OpenShift project namespace, see Verifying the OpenShift project namespace.
Providing feedback on Red Hat documentation
We appreciate your feedback on our technical content and encourage you to tell us what you think. If you’d like to add comments, provide insights, correct a typo, or even ask a question, you can do so directly in the documentation.
You must have a Red Hat account and be logged in to the customer portal.
To submit documentation feedback from the customer portal, do the following:
- Select the Multi-page HTML format.
- Click the Feedback button at the top-right of the document.
- Highlight the section of text where you want to provide feedback.
- Click the Add Feedback dialog next to your highlighted text.
- Enter your feedback in the text box on the right of the page and then click Submit.
We automatically create a tracking issue each time you submit feedback. Open the link that is displayed after you click Submit and start watching the issue or add more comments.
Thank you for the valuable feedback.
Making open source more inclusive
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Chapter 1. OpenShift build strategies and Quarkus
Red Hat OpenShift Container Platform is a Kubernetes-based platform for developing and running containerized applications. For security and convenience OpenShift supports different build strategies that are not available in the upstream Kubernetes distributions.
Overview of OpenShift build strategies
- Docker build
- This strategy builds the artifacts (JAR files or a native executable) outside the OpenShift cluster, either locally or in a CI environment, and then provides them to the OpenShift build system together with a Dockerfile. The container is built inside the OpenShift cluster and provided as an image stream.
Since Red Hat build of Quarkus 1.11, the OpenShift Docker build strategy is the preferred build strategy that supports Quarkus applications targeted for JVM as well as Quarkus applications compiled to native executables. However, the S2I remains the default deployment strategy for backwards compatibility reasons. You can configure the deployment strategy using the quarkus.openshift.build-strategy
property.
- Source to Image (S2I)
- The build process is performed inside the OpenShift cluster. Using S2I to deploy Quarkus as a JVM application is fully supported.
- Binary S2I
- This strategy uses a JAR file as an input to the S2I build process. This speeds up the build process and deployment of your application.
Build strategy | Support for Quarkus tooling | Support for JVM | Support for Native | Support for JVM Serverless | Support for native Serverless |
---|---|---|---|---|---|
Docker build | YES | YES | YES | YES | YES |
S2I Binary | YES | YES | NO | NO | NO |
Source S2I | NO | YES | NO | NO | NO |
Chapter 2. Adding the Quarkus Openshift extension
You need to add the quarkus-openshift
extension as a dependency to your Quarkus project so that you can build and deploy your applications as a container image to be used inside your OpenShift cluster.
The OpenShift extension also generates OpenShift resources such as: image streams, build configuration, deployment configuration, service definitions and more. If your Quarkus application includes the quarkus-smallrye-health
extension OpenShift can access the health endpoint and check the liveness and readiness of your application.
Prerequisites
Have a Quarkus Maven project.
- For information on how to create Quarkus project with Maven, see Developing and compiling your Quarkus applications with Apache Maven.
Procedure
- Change to the directory that contains your Quarkus project.
Use one of the following methods to add the
quarkus-openshift
extension to your project:Add the
quarkus-openshift
extension to thepom.xml
file:pom.xml
<dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-openshift</artifactId> </dependency>
Add the
quarkus-openshift
extension using the command line:./mvnw quarkus:add-extension -Dextensions="openshift"
Chapter 3. Deploying Quarkus Java applications to OpenShift
By using the Quarkus OpenShift extension, you can deploy your application to OpenShift using the Docker build strategy. The container is built inside the OpenShift cluster and provided as an image stream.
Your Quarkus project includes pre-generated Dockerfiles with instructions. When you want to use a custom Dockerfile, you need to add the file in the src/main/docker
directory or anywhere inside the module. Additionally, you need to set the path to your Dockerfile using the quarkus.openshift.jvm-dockerfile
property.
Prerequisites
-
Have a Quarkus Maven project that includes the
quarkus-openshift
extension. Login to OpenShift using
oc
and select your project.- To verify the OpenShift project namespace, see Verifying the OpenShift project namespace.
Procedure
- Change to the directory that contains your Quarkus project.
Configure the following properties in your
application.properties
file:Set the Docker build strategy:
quarkus.openshift.build-strategy=docker
(Optional) If you are using an untrusted certificate, configure the
KubernetesClient
:quarkus.kubernetes-client.trust-certs=true
(Optional) Expose the service to create an OpenShift route:
quarkus.openshift.expose=true
(Optional) Set the path to your custom Dockerfile:
quarkus.openshift.jvm-dockerfile=<path_to_your_dockerfile>
The following example shows the path to the
Dockerfile.custom-jvm
:quarkus.openshift.jvm-dockerfile=src/main/resources/Dockerfile.custom-jvm
Package and deploy your Quarkus application to the current OpenShift project:
./mvnw clean package -Dquarkus.kubernetes.deploy=true
Verification
View a list of pods associated with your current OpenShift project:
oc get pods
To retrieve the log output for your application’s pod, enter the following command where
<pod_name>
is the name of the latest pod prefixed with the name of your application:oc logs -f <pod_name>
Chapter 4. Deploying Quarkus applications compiled to native executables
You can deploy your native Quarkus application to OpenShift using the Docker build strategy. You need to create a native executable for your application that targets the Linux X86_64 operating system. If your host operating system is different from this, you will need to create a native Linux executable using a container runtime like Docker or Podman.
Your Quarkus project includes pre-generated Dockerfiles with instructions. When you want to use a custom Dockerfile, you need to add the file in the src/main/docker
directory or anywhere inside the module. Additionally, you need to set the path to your Dockerfile using the quarkus.openshift.native-dockerfile
property.
Prerequisites
- A Linux X86_64 operating system or an OCI (Open Container Initiative) compatible container runtime, such as Podman or Docker.
-
Have a Quarkus Maven project that includes the
quarkus-openshift
extension. Login to OpenShift using
oc
and select your project.- To verify the OpenShift project namespace, see Verifying the OpenShift project namespace.
Procedure
- Change to the directory that contains your Quarkus project.
Configure the following properties in your
application.properties
file:Set the Docker build strategy:
quarkus.openshift.build-strategy=docker
Set the container runtime:
quarkus.native.container-build=true
(Optional) If you are using an untrusted certificate, configure the
KubernetesClient
:quarkus.kubernetes-client.trust-certs=true
(Optional) Expose the service to create an OpenShift route:
quarkus.openshift.expose=true
(Optional) Set the path to your custom Dockerfile:
quarkus.openshift.native-dockerfile=<path_to_your_dockerfile>
The following example shows the path to the
Dockerfile.custom-native
:quarkus.openshift.jvm-dockerfile=src/main/docker/Dockerfile.custom-native
(Optional) Specify the container engine:
To build a native executable with Podman:
quarkus.native.container-runtime=podman
To build a native executable with Docker:
quarkus.native.container-runtime=docker
Build a native executable, package, and deploy your application to OpenShift:
./mvnw clean package -Pnative -Dquarkus.kubernetes.deploy=true
Verification
View a list of pods associated with your current OpenShift project:
oc get pods
To retrieve the log output for your application’s pod, enter the following command where
<pod_name>
is the name of the latest pod prefixed with the name of your application:oc logs -f <pod_name>
Chapter 5. Deploying Quarkus applications as an OpenShift Serverless service
You can deploy your Quarkus applications to OpenShift Serverless using the Docker build strategy. By using OpenShift Serverless Knative Serving, you can scale services up and down depending on the load size. Scaling down services that are currently not requested improves memory capabilities.
Your Quarkus project includes pre-generated Dockerfiles with instructions. When you want to use a custom Dockerfile, you need to add the file in the src/main/docker
directory or anywhere inside the module. Additionally, you need to set the path to your Dockerfile using the quarkus.openshift.jvm-dockerfile
property for JVM mode and quarkus.openshift.native-dockerfile
property for native mode.
The following procedure demonstrates how to deploy a Serverless Quarkus Java application or a Serverless application compiled to a native executable using the Quarkus OpenShift extension.
Prerequisites
-
Have a Quarkus Maven project that includes the
quarkus-openshift
extension. Login to OpenShift using
oc
and select your project.- To verify the OpenShift project namespace, see Verifying the OpenShift project namespace.
- OpenShift Serverless operator is installed.
- OpenShift Knative Serving is installed and verified. See Installing Knative Serving.
- For native compilation, a Linux X86_64 operating system or an OCI (Open Container Initiative) compatible container runtime, such as Podman or Docker is required.
Procedure
- Change to the directory that contains your Quarkus project.
Configure the following properties in your
application.properties
file:Set Knative as a deployment target:
quarkus.kubernetes.deployment-target=knative
Set the Docker build strategy:
quarkus.openshift.build-strategy=docker
Direct OpenShift Serverless to pull your container image from the OpenShift internal registry:
quarkus.container-image.registry=image-registry.openshift-image-registry.svc:5000
NoteIf your OpenShift
<project_name>
is different from theusername
of the host system, set the group for the container image otherwise Quarkus cannot pull the image from the image registry.quarkus.container-image.group=<project_name>
(Optional) If you are using an untrusted certificate, configure the
KubernetesClient
:quarkus.kubernetes-client.trust-certs=true
(Optional) Expose the service to create an OpenShift route:
quarkus.openshift.expose=true
(Optional) Set the path to your custom Dockerfile:
quarkus.openshift.jvm-dockerfile=<path_to_your_dockerfile>
The following example shows the path to the
Dockerfile.custom-jvm
:quarkus.openshift.jvm-dockerfile=src/main/resources/Dockerfile.custom-jvm
(Optional) To deploy a Serverless application compiled to a native executable, you need to configure the following properties:
Set the container runtime:
quarkus.native.container-build=true
Specify the container engine:
To build a native executable with Podman:
quarkus.native.container-runtime=podman
To build a native executable with Docker:
quarkus.native.container-runtime=docker
(Optional) Set the path to your custom Dockerfile:
quarkus.openshift.native-dockerfile=<path_to_your_dockerfile>
Package and deploy your Serverless application to OpenShift using one of the following options:
Deploy a Quarkus Java application:
./mvnw clean package -Dquarkus.kubernetes.deploy=true
Deploy a Quarkus native application:
./mvnw clean package -Pnative -Dquarkus.kubernetes.deploy=true
Verification
View a list of pods associated with your current OpenShift project:
oc get pods
To retrieve the log output for your application’s pod, enter the following command where
<pod_name>
is the name of the latest pod prefixed with the name of your application:oc logs -f <pod_name>
Chapter 6. Using S2I to deploy Quarkus applications to OpenShift
You can deploy your Quarkus applications to OpenShift using the Source-to-Image (S2I) method. With S2I, you must provide the source code to the build container either through a Git repository or by uploading the source at build time.
For deploying Quarkus applications compiled to native executables, use the Docker build strategy. The S2I is not the supported method for native deployments.
Prerequisites
-
Have a Quarkus Maven project that includes the
quarkus-openshift
extension. - Host your Quarkus Maven project in a Git repository.
Login to OpenShift using
oc
and select your project.- To verify the OpenShift project namespace, see Verifying the OpenShift project namespace.
Procedure
- Change to the directory that contains your Quarkus Maven project.
-
Create a hidden directory called
.s2i
at the same level as thepom.xml
file. Create a file called
environment
in the.s2i
directory and add the following content:ARTIFACT_COPY_ARGS=-p -r lib/ *-runner.jar
- Commit and push your changes to the remote Git repository.
To import the supported OpenShift image, enter the following command:
oc import-image --confirm ubi8/openjdk-11 --from=registry.access.redhat.com/ubi8/openjdk-11
NoteIf you are deploying on IBM Z infrastructure, enter
oc import-image --confirm openj9/openj9-11-rhel8 --from=registry.redhat.io/openj9/openj9-11-rhel8
.For information about this image, see the Red Hat OpenJ9 11 Java Applications on RHEL8 page.
To build the project in OpenShift, enter the following command where
<git_path>
is the path to the Git repository that hosts your Quarkus project and<project_name>
is the OpenShift project that you created.oc new-app ubi8/openjdk-11 <git_path> --name=<project_name>
NoteIf you are deploying on IBM Z infrastructure, enter
oc new-app openj9/openj9-11-rhel8 <git_path> --name=<project_name>
.This command builds the project, creates the application, and deploys the OpenShift service.
To deploy an updated version of the project, push any updates to the Git repository then enter the following command:
oc start-build <project_name>
Verification
View a list of pods associated with your current OpenShift project:
oc get pods
To retrieve the log output for your application’s pod, enter the following command where
<pod_name>
is the name of the latest pod prefixed with the name of your application:oc logs -f <pod_name>
Additional resources
Chapter 7. Verifying the OpenShift project namespace
Prerequisites
- Have access to a Red Hat OpenShift Container Platform cluster and the latest version of the OpenShift CLI (oc) installed.
Procedure
Log in to the OpenShift CLI (oc):
oc login
Display the current project space:
oc project -q
(Optional) Create a new OpenShift project:
oc new-project <project_name>
Additional resources
Chapter 8. Quarkus configuration properties for customizing deployments on OpenShift
You can customize your deployments on OpenShift by defining optional configuration properties. You can configure your Quarkus project in your applications.properties
file or via the command line.
Property | Description | Default |
---|---|---|
|
The container image group. Must be set if the OpenShift |
|
| The container registry to use | |
| Kubernetes client certificate authentication | |
|
Deployment target platform. For example, | |
| Builds a native Linux executable using a container runtime. Docker is used by default |
|
| The container runtime used build the image. For example, Docker | |
| The deployment strategy |
|
| Exposes a route for the Quarkus application |
|
|
Enables debug and generates debug symbols in a separate .debug file. When used with |
|
Chapter 9. Additional resources
Revised on 2021-06-15 14:51:41 UTC