Checkpoint A: Your Delivery Pipeline

You have completed Chapters 01-05. Before moving into runtime hardening, pause and look at what you have built.

This page is a consolidation — not new material. Its purpose is to show you the assembled delivery pipeline and the guardrails you can now rely on.


What You Have Built

You can now deliver code from a developer workstation to a Kubernetes cluster through a fully guarded pipeline:

Workstation ─► Git ─► CI ─► Review ─► Flux ─► Cluster
    │           │       │      │        │        │
    │           │       │      │        │        └── Chapter 04: GitOps reconciliation
    │           │       │      │        └─────────── Chapter 03: SOPS-encrypted secrets decrypted inside the cluster
    │           │       │      └──────────────────── Chapter 05: AI-assisted review + human approval gate
    │           │       └─────────────────────────── Chapter 05: Plan-Approve-Apply in GitHub Actions
    │           └─────────────────────────────────── Chapter 02: Terraform plan-review-apply with state locking
    └─────────────────────────────────────────────── Chapter 01: Context verification + one-change-per-PR

The Guardrails You Have in Place

After five chapters, these are the non-negotiable rules protecting your pipeline:

GuardrailSourceWhat It Prevents
One change per PRChapter 01Correlated blast radius
guard-kube-context.shChapter 01Wrong cluster or namespace writes
guard-terraform-plan.shChapter 01, 02Unplanned or stale applies
SOPS + Age encryptionChapter 03Plaintext secrets in Git history
GitOps reconciliationChapter 04Manual kubectl drift
Pre-commit hooksChapter 05Invalid manifests, leaked secrets, direct-to-main commits
Plan-Approve-ApplyChapter 05Automated infrastructure mutation without human sign-off

Self-Check

You are ready for Chapter 06 when you can answer without looking:

  • Where does context verification happen in the pipeline? At what stages?
  • What is the difference between a stale plan and a fresh plan, and why does it matter?
  • If a plaintext secret is accidentally committed, what is the full response sequence?
  • How does Flux know which image to deploy to each environment?
  • Which layer catches a git commit --no-verify bypass, and why is that layer also not the last one?

If any of these are unclear, revisit the relevant chapter before moving forward.


What Comes Next

The next block (Chapters 06-09) shifts from how code reaches the cluster to how workloads behave inside the cluster:

  • Chapter 06 — Network Policies: who can talk to whom
  • Chapter 07 — Security Context: how pods run with minimum privilege
  • Chapter 08 — Resource Management: how CPU and memory are shared
  • Chapter 09 — Availability Engineering: how services survive disruption

These four chapters layer runtime constraints onto the safely-deployed workloads you now know how to ship.