Comment on page
How Release works
This is a technical discussion of how Release environments as a service work (EaaS) when deployed into your cloud account. These examples generally refer to AWS, but Release offers full support for other cloud service providers.
Release environments are deployed underneath a subdomain for ease and isolation. For example, the subdomain
release.example.commay have multiple environments that are reachable as
serviceB-envA.release.example.com, and so on.
You can use wildcard domains for preproduction and production environments, so that for example, both
*.staging.example.comcan be used. Wildcard domains can be used to accommodate different languages:
A shopping website
shopping.commay have an application called
shoesand a customer called
buyer. The customer's private application URL would be
shoes-buyer.release.shopping.com. Custom domains, such as
shoes.buyer.com, need external DNS configuration.
In advanced configurations, preproduction applications can be deployed into one subdomain (
*.release.example.com) and production or staging environments deployed directly as, for example,
With Release, you can deploy environments and applications without in-depth knowledge of the infrastructure needed to run your application code.
When Release is integrated with your cloud service provider, it is given credentials and authorization to build infrastructure and deploy applications to your cluster.
- For AWS and GovCloud, a CloudFormation template creates an IAM role for Release.
- With GCP, a project credential file allows Release to build and deploy code to projects.
For EaaS customers, cloud integration is configured for each cloud provider account, so you can deploy across clouds and regions.
For private application customers, a landing page is designed for each installation that has access to your cloud account.
Given secure access to your cloud account, Release spins up all the necessary buckets, Kubernetes clusters, and supporting infrastructure. AWS uses several services including EKS, ECR, S3, Route53, VPC, RDS, DynamoDB, RDS, CloudFront, and ALB. GCP uses Container Engine, Container Registry, Google Cloud Virtual Network, Cloud Load Balancing, Cloud DNS, Cloud Storage, and Cloud SQL.
An example diagram of an AWS Cloudformation template for an EKS cluster in Release
Release environments are built from an Application Template that runs many versions of your application simultaneously in a complete stack so you can test and view multiple branches of code and ideas in parallel.
The production deployment of applications is straightforward because the development Application Templates vary only slightly in terms of Environment variables. Since multiple production environments differ only slightly for individual customer needs, private application customers can run their own version of an application in their accounts for privacy, security, or regulatory requirements.
Release uses AWS Certificate Manager (ACM) with DNS validation enabled to issue secure SSL Certificates for applications. This process is clear if the subdomain is configured in Route53 in the same account and the zone is publicly available. In some cases, exceptions need to be made to validate the certificates manually:
- For AWS GovCloud accounts, Route53 has private-zone-only support. The Release UI generates the validation records to be inserted into the public zone to validate the certificate request. A DNS CNAME record is created and ACM then validates the certificate.
- Similarly, AWS or GCP accounts with private zones need to copy the validation records from the Release UI and create a DNS CNAME record in the public zone.
- In cases where public DNS zones do not exist, a fake public zone can be created to validate CNAME records. This is not recommended, but will work if the DNS domain is registered, owned by the end user, and valid. Release provides detailed support in these situations.
Release applications and environments deployed into your cloud account can be granted secure access to resources. The table below shows different ways to do this in AWS and GCP.
Release handles administration, support, and upgrades, and ensures smooth functioning of the infrastructure dedicated to running your applications. If you want more visibility into infrastructure for cost analysis, auditing, performance, or reliability reasons, there are several options available:
Release environments can be run on any valid zone if certificates and DNS records exist.