This document describes how to create an application and deploy it in the TEM console.
|Region||AZs Supported for Deployment|
|Guangzhou||Zones 3, 4, and 6|
|Shanghai||Zones 2, 3, 4, and 5|
Click Create to access the New application page and enter the application information.
Click Submit and select OK in the pop-up window to enter the application deployment page. If you select Cancel, you can click Deploy to New Environment in the application list to complete the application deployment later.
On the application deployment page, configure the relevant parameters according to the specific conditions of your application.
The parameters are described as follows:
|Release Environment||Select the environment where the application is located. If there are no suitable environments, you can create one on the Environment page as instructed in Creating Environment.|
|JDK Version||Select the JDK version, which can be KonaJDK 11（recommend）,OpenJDK 11,KonaJDK 8 or OpenJDK 8.|
|Upload Package/Image||Upload your package or image or download the demos in the console to deploy them and try out all the features of TEM.|
|Version Number||Set the application version number. You can choose to enter the version number or click Use Timestamp as Version Number to use the timestamp as the application version number.|
|Version Description||Enter the version description.|
|Start Parameter||Set the start parameter.|
If your application is in Java and associated with a registry, TEM will be able to automatically inject the registry information. For more information, please see Service Registration and Discovery.
|Resource Configuration||Yes||You can set a number manually or set an auto scaling rule to automatically scale.|
|Application Management||No||Configure processing tasks to be executed before and after the application process, for example, environment preparation and application exit.|
|Configuration Setting||No||Configuration usage and management.|
|Environment Variables||No||Configure environment variables.|
|No||Persistent Storage: provide storage for the container. Currently, CFS is supported, which needs to be mounted to the specified path of the container.
|Security Group||No||You can configure a security group rule to allow or reject the outbound and inbound traffic of instances in the security group. If you need to open other ports for your business, you can create a security group accordingly.|
|Log Configuration||No||You can enable Persistent storage in CLS. This supports standard output
TEM provides two ways of access: intra-environment access and public network access.
Taking public network access as an example, the steps are as follows:
Create a public network access route as instructed in Configuring Application Access and Routing.
You can view the public IP of the application under Access Management on the environment details page.
Enter the following URL in a browser:
<public network access address/domain name>+<path>
For example, if the following result is returned after you enter
http://xx.xx.xx.xx/ping-provider, the application is deployed successfully.