Skip to content

Commit d2df422

Browse files
authored
Noted that separate instances can be used for PCI compliance (#2635)
1 parent 1ffcb46 commit d2df422

1 file changed

Lines changed: 6 additions & 3 deletions

File tree

src/pages/docs/platform-engineering/enterprise-patterns.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: src/layouts/Default.astro
33
pubDate: 2023-01-01
4-
modDate: 2023-01-01
4+
modDate: 2025-02-20
55
title: Octopus enterprise patterns
66
description: This section describes common patterns for deploying octopus in enterprise environments.
77
navOrder: 2
@@ -166,12 +166,15 @@ You can find more information about the [Octopus REST API in our documentation](
166166

167167
![Multiple environments diagram](/docs/platform-engineering/multiple-environments.png "width=500")
168168

169-
This solution creates Octopus installations in each environment. It treats Octopus upgrades and other maintenance tasks in the same manner as a regular application deployment by promoting the changes through environments like development, test, and production.
169+
This pattern creates Octopus installations in each environment. It treats Octopus upgrades and other maintenance tasks in the same manner as a regular application deployment by promoting the changes through environments like development, test, and production.
170170

171171
You need to synchronize the Octopus installations to ensure their configuration is as similar to one another as possible.
172172

173173
Unlike the previous patterns, this pattern is less concerned with providing the ability for teams and customers to log into Octopus installations. Rather, DevOps teams use non-production Octopus installations to test upgrades and validate project changes.
174174

175+
This pattern may also use used to isolate Octopus installations for compliance reasons, such as PCI. Having a separate Octopus installation for the production environment makes it easy demonstrate access controls and other security measures when undertaking
176+
security audits.
177+
175178
| Feature | Solves |
176179
|---|---|
177180
| Independent projects, runbooks, dashboards etc | N/A |
@@ -198,4 +201,4 @@ The following patterns are implemented using the strategies documented in the [m
198201

199202
- Managed space per business unit/application
200203
- Managed instance per business unit/region
201-
- Managed instance per environment
204+
- Managed instance per environment

0 commit comments

Comments
 (0)