Deploying software regularly
You must release updates to your software regularly so you:
- avoid making changes to one part of your software system that cause other parts to fail (these are known as 鈥榖reaking changes鈥�)
- have constant feedback from users: this will help you design and build your system in an iterative manner
- create a resilient and easy to change system
- reduce the risk of creating vulnerabilities in your system
Your software release cycle should be based on how your team can support updates.
Some teams release weekly, some release daily and some release constantly throughout the day.
You鈥檒l have to explain how you鈥檙e doing this at your service assessments.
Principles for deploying regularly
When deploying software you need to:
- deploy little and often
- deploy quality software
- use auditable deployments
- use zero downtime deployments where possible
Deploy little and often
You should deploy software often and with small changes, so that:
- users benefit from new features or improvements quickly, instead of waiting months for an update
- users can give you feedback quicker, allowing you to iterate your software to meet their needs
- your team gets better at releasing because they do it often
- you identify bugs and cyber security issues more easily because fewer things are changing at the same time: this means they鈥檙e cheaper to fix
- you can react quickly to urgent fixes, such as security updates and last minute changes
- your team can move faster through the needed for iterative development
You should measure how long it takes for code changes to hit production so you are aware of how regular your deployment cycle is.
Deploy quality software
To deploy quality software, make sure:
- deployments are consistent across environments: this gives you confidence that your testing is always relevant
- you automate the testing process of the software to routinely check for issues
Deployment should be a low-risk process. By the time you鈥檙e deploying a new version of software into production, you should be sure it鈥檒l work.
To check the new version will work, you can:
- set up automated testing
- deploy your software to staging servers first
- implement a
- use
Regular deployments which use the same tools and technologies repeatedly and reliably give you confidence that your deployment mechanism works. This is because you鈥檙e constantly testing deployment.
Use auditable deployments
To keep track of deployment history and get immediate feedback on your deployment, you should:
- know which version of your service is running in each environment at all times
- be able to trace changes back to the initial code commits in the source code repositories after a deployment hits production
If you combine this approach with small and frequent releases, you can:
- narrow the source of any problems down to a small number of commits
- roll back to a previous version more easily
- confidently 鈥榬oll forward鈥� with a code change to fix a production issue: you can be a lot more confident your fix will work if you鈥檙e making frequent releases
Aim for zero downtime deployment
Deployments that minimise or limit service disruption are known as zero downtime deployments.
These can take place during the normal business day, which means staff do not have to work unsociable hours.
Zero downtime deployments can:
- increase user satisfaction
- lower service operation costs: release windows are often in unsociable hours, and require hands-on skills from operations staff
- prevent difficulties when negotiating emergency releases - for example, for security or critical issues
You may think that setting up your application to do zero downtime deployments involves lots of work, but downtime can cost you money. You should find out the cost of downtime for your service and decide if you can accept that cost.
How to deploy regularly
It鈥檚 easier to deploy software regularly if you:
- build a single artifact rather than variations for different environments
- have multiple deployment environments
- manage variable configuration
- secure passwords and keys
- use smoke tests: software tests that check if the most important functions are working
Building a single artifact
An artifact can be:
- the compiled binary and its dependencies
- a .jar file for JVM languages
- a compressed archive of the source: not including compilation artifacts
- an entire virtual machine image with the application pre-deployed
You should try to build a that鈥檚 deployed into each environment, from development machines through test into production.
Having the same application artifact deployed everywhere means that you:
- can be confident the artifact is tested in the same way as in production
- have a single artifact to represent a deployment, meaning it鈥檚 auditable and easy to roll back or upgrade
Teams often add debugging symbols, optimisations or test code solely to their pre-production environments. This makes it hard to have confidence in the artifact that will go to production.
Managing artifacts
You should keep all your artifacts in a central repository. Having one place for your artifacts allows you to:
- give your team access to a shared set of artifacts
- promote your artifacts across environments
- rollback or upgrade more easily
You鈥檒l need to host your repository yourself or choose a service to host it for you. For example, some teams at GDS use or .
Multiple deployment environments
You should have multiple deployment environments so you can phase the rollout of your software and ensure it鈥檚 adequately tested.
At the very least you need a:
- development environment running the latest version of the software
- production environment hosting live users
You may also have a staging environment prior to production, or environments dedicated to:
- exploratory testing
- user testing
- performance testing
- security testing
Using a pipeline
You may choose to manage the deployment of your software to your environments using a pipeline.
This will make sure a version of software is not deployed to a later environment before it has been deployed and tested at an earlier stage.
For example, 188体育 deploys to its staging environment first so the development team can be confident the software does what it should before it鈥檚 deployed to production.
Deciding which environments to deploy
You also need to decide which of your environments you must deploy to in order to have confidence in your product. Emergency fixes can then skip unnecessary stages that are not part of the normal deployment pipeline so that development is not held up.
For example, a product owner should not have to sign off a security fix in a user acceptance environment.
The order of your environments does not have to be strictly linear - you can run some sets of software tests in parallel, for example user acceptance tests and performance tests.
However, you may find there鈥檚 a single production environment that鈥檚 later than all others and a single entry point that precedes all others.
Managing variable configuration
To build a single artifact, your deployment mechanism should provide a way to inject configuration that varies between environments, like URLs of dependent services. For example, passwords and locations for external services like databases.
Your application should follow the so that you can inject specific configuration for your environments.
Securing passwords and keys
To secure your software, you must take extra care when managing database passwords or TLS (Transport Layer Security) private keys. Make sure:
- confidential information cannot be accessed outside of the environment it鈥檚 intended for
- confidential information is known only by the machines that need to know it
For example, in a 3-tier app with database, application and web servers:
- the database server does not need to know the TLS private keys for the site
- the web server does not need to know the database credentials
Learn more about for government services.
Using smoke tests after you deploy
Once you鈥檝e deployed your software, you should check whether it鈥檚 working as expected using a 鈥榮moke test鈥�.
If it鈥檚 not working, you can cancel or roll back the deployment.
A good smoke test should:
- be simple and fast
- exercise the software and all its essential dependencies
- and allow you to
If your software needs a database to be present to operate effectively, your smoke test should exercise an application code path that will fail if the database is not present or returns an error.
If a smoke test fails
You should plan what to do if a smoke test fails - the simplest option is to manually roll back to a previous version of the application.
You could also have a system that automatically detects smoke test failures and cancels the deployment, or rolls back to the previous version.
Ideally the system you have will not add the updated application to the production load balancer until it has been smoke tested and verified (if the application fails the smoke test, it鈥檚 discarded).
This ensures no rollback is necessary, and no interruption in service happens. This works particularly well with the
Get help
Get in touch with the web operations community directly to:
- discuss this page
- share ideas across government
- find support from teams that have worked on similar services
Related guides
You may also find the Uptime and availability guide useful.
- Last update:
-
Integrated elements on Discovering vulnerabilities and Implementing a vulnerability management process.
-
Changed reference from SSL to TLS as this was out of date.
-
Restructured bullet points and added guidance on managing artifacts in response to recent feedback in user testing.
-
Guidance first published