SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Deployment
Strategies
Jahangir Shaik
Basic Deployment
Rolling Deployment
Load Balancer
Simultaneous Updates
Instances
Load Balancer
Select Updates
Instances
Basic deployment simultaneously updates newer version on every node
or instance in the target environment
PROS
• Fast
• Simple
• Cost effective
CONS
• Outage vulnerability
• Difficult to rollback
Rolling deployment involves in replacing instances of previous version,
one after other, in a sequence till all instances are updated with newer
version; Also, sometimes known as ramped deployment
PROS
• Flexible
• Minimum downtime
• Flawed deployment
impacts less users
CONS
• Slow rollback
• Requires Backward
compatibility
2
Multi-service Deployment
Blue Green Deployment
Load Balancer
Multiservice Updates
Instances
Load Balancer
PROD
STAGE
Blue-green deployment is a release method that has two different but
identical environments wherein one environment is updated with newer
version and when testing is complete, traffic is switched from older
version environment to newer, updated environment
PROS
• Instant rollout /
rollback
• Minimum downtime
• Zero versioning issues
CONS
• High cost
• Difficult to scale
• Distorted user
transactions
Multi-service deployment simultaneously updates every node in the
target environment with multiple services; Similar to basic deployment
but mostly applicable for services
PROS
• Fast
• Simple
• Cost effective
CONS
• Outage vulnerability
• Difficult to rollback
3
Canary Deployment
Dark Launch Deployment
Load Balancer
V1
V1
V2 Canary
Load Balancer
V1
V1
V2
New feature
Canary deployment updates an app or service in increments. Initial
update is rolled out to small subset of users, and it is gradually
increased in the scope of users till it reaches 100%
PROS
• Minimum downtime
• Fast rollbacks
• Allows test and live
updates
CONS
• Slow rollout
• Release increments take
time
• Requires High observation
Dark launching process allows production ready release features to a
small user group without exposing to rest of userbase until they are
ready
PROS
• Gain feedback
• Minimize risk
• Safe & fast transition
• Run experiments
CONS
• Large setup timeframes
• High cost of
implementation
4
Feature toggle Deployment
Shadow Deployment
Load Balancer
Users
Users
Live Environment
Users
Shadow deployment follows a process wherein app or service changes are
deployed in a parallel environment that mimics the production
environment. The deployed changes are not visible to the end-users,
hence the term “shadow”
PROS
• Efficient scaling
• Real world testing
• Risk mitigation
CONS
• High cost of
implementation
Feature toggle deployment allows a service, function or feature to be
hidden, enabled or disabled during runtime for a particular group of
users while other users don’t notice any impact
PROS
• Rapid feedback
• Unfinished feature can
be deployed
CONS
• High cost of
implementation
• Impacts User experience
Features
Features
New feature
5
Feature visible
Feature not visible
Users
Users
Users
Users
A/B test Deployment involves measuring functionality of two versions by
collecting real time data. While not strictly a deployment strategy, it’s a
testing approach that builds on the canary deployment strategy. A/B
testing allows organizations to take informed business decisions
PROS
• Experimentation
• Exploration
• Traffic routing based on
business need
CONS
• High cost of maintenance
• May negatively impact
user experience
A/B Test Deployment
A/B
Testing
15%
30%
Option A
Option B
Option B
6
Thank you

Weitere ähnliche Inhalte

Ähnlich wie SUMMARY OF DEVOPS IT DEPLOYMENT STRATEGIES

Building a CICD Pipeline for Containers - DevDay Austin 2017
Building a CICD Pipeline for Containers - DevDay Austin 2017Building a CICD Pipeline for Containers - DevDay Austin 2017
Building a CICD Pipeline for Containers - DevDay Austin 2017
Amazon Web Services
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
Peak 10
 

Ähnlich wie SUMMARY OF DEVOPS IT DEPLOYMENT STRATEGIES (20)

Building a CICD Pipeline for Containers - DevDay Austin 2017
Building a CICD Pipeline for Containers - DevDay Austin 2017Building a CICD Pipeline for Containers - DevDay Austin 2017
Building a CICD Pipeline for Containers - DevDay Austin 2017
 
Docker-native Automated Delivery w/ Caylent
Docker-native Automated Delivery w/ CaylentDocker-native Automated Delivery w/ Caylent
Docker-native Automated Delivery w/ Caylent
 
Building a CICD pipeline for deploying to containers
Building a CICD pipeline for deploying to containersBuilding a CICD pipeline for deploying to containers
Building a CICD pipeline for deploying to containers
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
 
Change Management in Hybrid landscapes 2017
Change Management in Hybrid landscapes 2017Change Management in Hybrid landscapes 2017
Change Management in Hybrid landscapes 2017
 
DevOps Transformation: Learnings and Best Practices
DevOps Transformation: Learnings and Best PracticesDevOps Transformation: Learnings and Best Practices
DevOps Transformation: Learnings and Best Practices
 
Building A CICD Pipeline for Deploying to Containers
Building A CICD Pipeline for Deploying to ContainersBuilding A CICD Pipeline for Deploying to Containers
Building A CICD Pipeline for Deploying to Containers
 
Testing in the new age of DevOps
Testing in the new age of DevOpsTesting in the new age of DevOps
Testing in the new age of DevOps
 
Failover-Apachecon-Asia-2022.pptx
Failover-Apachecon-Asia-2022.pptxFailover-Apachecon-Asia-2022.pptx
Failover-Apachecon-Asia-2022.pptx
 
Building CI/CD Pipelines for Serverless Applications
Building CI/CD Pipelines for Serverless ApplicationsBuilding CI/CD Pipelines for Serverless Applications
Building CI/CD Pipelines for Serverless Applications
 
Building a CI/CD Pipeline for Containers - DevDay Los Angeles 2017
Building a CI/CD Pipeline for Containers - DevDay Los Angeles 2017Building a CI/CD Pipeline for Containers - DevDay Los Angeles 2017
Building a CI/CD Pipeline for Containers - DevDay Los Angeles 2017
 
Continuous Deployment Strategies
Continuous Deployment StrategiesContinuous Deployment Strategies
Continuous Deployment Strategies
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Executing Deployment & Release Strategies
Executing Deployment & Release StrategiesExecuting Deployment & Release Strategies
Executing Deployment & Release Strategies
 
Backend Master | 3.4.1 Deploy - Deploy Automation
Backend Master | 3.4.1 Deploy - Deploy AutomationBackend Master | 3.4.1 Deploy - Deploy Automation
Backend Master | 3.4.1 Deploy - Deploy Automation
 
Ncerc rlmca202 adm m3 ssm
Ncerc rlmca202  adm m3 ssmNcerc rlmca202  adm m3 ssm
Ncerc rlmca202 adm m3 ssm
 
Continuous Deployment of your Application - SpringOne Tour Dallas
Continuous Deployment of your Application - SpringOne Tour DallasContinuous Deployment of your Application - SpringOne Tour Dallas
Continuous Deployment of your Application - SpringOne Tour Dallas
 
Performance Testing webinar
Performance Testing   webinarPerformance Testing   webinar
Performance Testing webinar
 
Deployment Strategy PowerPoint Presentation Slides
Deployment Strategy PowerPoint Presentation SlidesDeployment Strategy PowerPoint Presentation Slides
Deployment Strategy PowerPoint Presentation Slides
 
Cloud for Agile Testing - Burak Koyuncu
Cloud for Agile Testing - Burak KoyuncuCloud for Agile Testing - Burak Koyuncu
Cloud for Agile Testing - Burak Koyuncu
 

Kürzlich hochgeladen

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Kürzlich hochgeladen (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

SUMMARY OF DEVOPS IT DEPLOYMENT STRATEGIES

  • 2. Basic Deployment Rolling Deployment Load Balancer Simultaneous Updates Instances Load Balancer Select Updates Instances Basic deployment simultaneously updates newer version on every node or instance in the target environment PROS • Fast • Simple • Cost effective CONS • Outage vulnerability • Difficult to rollback Rolling deployment involves in replacing instances of previous version, one after other, in a sequence till all instances are updated with newer version; Also, sometimes known as ramped deployment PROS • Flexible • Minimum downtime • Flawed deployment impacts less users CONS • Slow rollback • Requires Backward compatibility 2
  • 3. Multi-service Deployment Blue Green Deployment Load Balancer Multiservice Updates Instances Load Balancer PROD STAGE Blue-green deployment is a release method that has two different but identical environments wherein one environment is updated with newer version and when testing is complete, traffic is switched from older version environment to newer, updated environment PROS • Instant rollout / rollback • Minimum downtime • Zero versioning issues CONS • High cost • Difficult to scale • Distorted user transactions Multi-service deployment simultaneously updates every node in the target environment with multiple services; Similar to basic deployment but mostly applicable for services PROS • Fast • Simple • Cost effective CONS • Outage vulnerability • Difficult to rollback 3
  • 4. Canary Deployment Dark Launch Deployment Load Balancer V1 V1 V2 Canary Load Balancer V1 V1 V2 New feature Canary deployment updates an app or service in increments. Initial update is rolled out to small subset of users, and it is gradually increased in the scope of users till it reaches 100% PROS • Minimum downtime • Fast rollbacks • Allows test and live updates CONS • Slow rollout • Release increments take time • Requires High observation Dark launching process allows production ready release features to a small user group without exposing to rest of userbase until they are ready PROS • Gain feedback • Minimize risk • Safe & fast transition • Run experiments CONS • Large setup timeframes • High cost of implementation 4
  • 5. Feature toggle Deployment Shadow Deployment Load Balancer Users Users Live Environment Users Shadow deployment follows a process wherein app or service changes are deployed in a parallel environment that mimics the production environment. The deployed changes are not visible to the end-users, hence the term “shadow” PROS • Efficient scaling • Real world testing • Risk mitigation CONS • High cost of implementation Feature toggle deployment allows a service, function or feature to be hidden, enabled or disabled during runtime for a particular group of users while other users don’t notice any impact PROS • Rapid feedback • Unfinished feature can be deployed CONS • High cost of implementation • Impacts User experience Features Features New feature 5 Feature visible Feature not visible
  • 6. Users Users Users Users A/B test Deployment involves measuring functionality of two versions by collecting real time data. While not strictly a deployment strategy, it’s a testing approach that builds on the canary deployment strategy. A/B testing allows organizations to take informed business decisions PROS • Experimentation • Exploration • Traffic routing based on business need CONS • High cost of maintenance • May negatively impact user experience A/B Test Deployment A/B Testing 15% 30% Option A Option B Option B 6