Deploy applications to your cluster nodes using , which are objects that contain pods that run your apps, along with metadata that set rules for the deployment’s behavior. Workloads can be deployed within the scope of the entire clusters or within a namespace.
When deploying a workload, you can deploy from any image. There are a variety of workload types to choose from which determine how your application should run.
Following a workload deployment, you can continue working with it. You can:
- the workload to a newer version of the application it’s running.
- Roll back a workload to a previous version, if an issue occurs during upgrade.
Load Balancing and Ingress
After you launch an application, it’s only available within the cluster. It can’t be reached externally.
If you want your applications to be externally accessible, you must add a load balancer to your cluster. Load balancers create a gateway for external connections to access your cluster, provided that the user knows the load balancer’s IP address and the application’s port number.
For more information, see load balancers.
Ingress
Load Balancers can only handle one IP address per service, which means if you run multiple services in your cluster, you must have a load balancer for each service. Running multiples load balancers can be expensive. You can get around this issue by using an ingress.
Ingress is a set of rules that act as a load balancer. Ingress works in conjunction with one or more ingress controllers to dynamically route service requests. When the ingress receives a request, the ingress controller(s) in your cluster program the load balancer to direct the request to the correct service based on service subdomains or path rules that you’ve configured.
For more information, see Ingress.
When using ingresses in a project, you can program the ingress hostname to an external DNS by setting up a Global DNS entry.
For more information, see .
Pipelines
After your project has been , you can add the repositories and start configuring a pipeline for each repository.
For more information, see Pipelines.
Besides launching individual components of an application, you can use the Rancher catalog to start launching applications, which are Helm charts.
For more information, see .
Kubernetes Resources
Resources include:
- : Files used to encrypt/decrypt data entering or leaving the cluster.
- ConfigMaps: Files that store general configuration information, such as a group of config files.
- : Files that carry credentials used to authenticate with private registries.