Guides for deploying the Ambient Code Platform to various environments.
- OpenShift Deployment - Deploy to production OpenShift cluster
- OAuth Configuration - Set up OpenShift OAuth authentication
- Git Authentication - Configure Git credentials for runners
- GitHub App Setup - GitHub App integration
- GitLab Integration - GitLab configuration
- Langfuse Deployment - LLM observability and tracing
- Operator Metrics - Operator monitoring (if exists)
- S3 Storage Configuration - S3-compatible storage setup (if exists)
- MinIO Quickstart - MinIO deployment (if exists)
- OpenShift or Kubernetes cluster with admin access
- Container registry access (or use default
quay.io/ambient_code) -
ocorkubectlCLI configured - Anthropic API key or Vertex AI credentials
# 1. Prepare environment
cp components/manifests/env.example components/manifests/.env
# Edit .env and set ANTHROPIC_API_KEY
# 2. Deploy
make deploy
# 3. Verify
oc get pods -n ambient-code
oc get routes -n ambient-code-
Configure Runner Secrets:
- Access web UI
- Navigate to Settings → Runner Secrets
- Add Anthropic API key
-
Set Up Git Authentication (optional):
- See Git Authentication Guide
- Configure per-project or use GitHub App
-
Enable Observability (optional):
- Deploy Langfuse: Langfuse Guide
- Configure runner to send traces
Fastest deployment using pre-built images from quay.io/ambient_code:
make deployBuild and deploy your own images:
# Build all images
make build-all CONTAINER_ENGINE=podman
# Push to registry
make push-all REGISTRY=quay.io/your-username
# Deploy with custom images
make deploy CONTAINER_REGISTRY=quay.io/your-usernameDeploy to a different namespace:
make deploy NAMESPACE=my-namespaceProduction (Required):
- OpenShift OAuth with user tokens
- Namespace-scoped RBAC
- No shared credentials
Local Development (Insecure):
- Authentication disabled
- Mock tokens accepted
- See Local Development
The platform uses namespace-scoped RBAC:
- Each project maps to a Kubernetes namespace
- Users need appropriate permissions in namespace
- Backend uses user tokens (not service account)
See ADR-0002: User Token Authentication
- API Keys: Stored in Kubernetes Secrets
- Git Credentials: Per-project secrets
- OAuth Tokens: Managed by OpenShift OAuth
# Backend health
curl https://backend-route/health
# Frontend accessibility
curl https://frontend-route/
# Operator status
oc get pods -n ambient-code -l app=agentic-operator# Backend logs
oc logs -n ambient-code deployment/backend-api -f
# Frontend logs
oc logs -n ambient-code deployment/frontend -f
# Operator logs
oc logs -n ambient-code deployment/agentic-operator -f
# Runner job logs (in project namespaces)
oc logs -n <project-namespace> job/<job-name>- Prometheus-compatible metrics (if configured)
- Langfuse for LLM observability
- OpenShift monitoring integration
make cleanoc delete namespace ambient-code# Uninstall platform
make clean
# Remove CRDs
oc delete crd agenticsessions.vteam.ambient-code
oc delete crd projectsettings.vteam.ambient-code
oc delete crd rfeworkflows.vteam.ambient-code
# Remove cluster-level RBAC
oc delete clusterrole ambient-code-operator
oc delete clusterrolebinding ambient-code-operator# Check pod status
oc get pods -n ambient-code
# Describe pod for events
oc describe pod <pod-name> -n ambient-code
# View logs
oc logs <pod-name> -n ambient-code# Check image pull secrets
oc get deployment backend-api -n ambient-code -o jsonpath='{.spec.template.spec.imagePullSecrets}'
# Verify image exists
podman pull quay.io/ambient_code/vteam_backend:latest# Check route
oc get route frontend-route -n ambient-code
# Check service
oc get svc frontend-service -n ambient-code
# Test service directly
oc port-forward svc/frontend-service 3000:3000 -n ambient-code# Check operator logs
oc logs -n ambient-code deployment/agentic-operator -f
# Check CRDs are installed
oc get crd agenticsessions.vteam.ambient-code
# Verify operator has permissions
oc get clusterrolebinding ambient-code-operator- Architecture Overview - System design
- Component Documentation - Component-specific guides
- Local Development - Development environments
- Testing - Test suite documentation
When adding deployment features:
- Update relevant deployment guide
- Test on both OpenShift and Kubernetes
- Document any new configuration options
- Update this index
See CONTRIBUTING.md for full guidelines.