Container Previews

Deploy container image previews with enterprise-grade security and performance. Namespace's Previews enable development teams to test applications in isolated, ephemeral environments accessible to the whole team enabling quick feedback cycles.

Why Namespace Previews?

Getting Started

Ensure access to Namespace

Using the CLI, log into your workspace. If you're accessing Namespace from a cloud provider or your CI platform, we recommend to set up workflow federation instead.

$ nsc login

Start your preview

$ nsc run --image nginx -p 80
# Prints a preview URL, e.g.: https://4bi2reg-grijlvs6ciapa.ord2.namespaced.app

Done!

Your preview is now available. All requests to the exposed URL require authentication.

How it works

Namespace preview clusters build on Namespace Compute to deliver interactive access to a flexible, isolated test environment. Any public images, or any image present in your private container registry can seamlessly run in a preview. Namespace generates public, authenticated ingress URLs using managed TLS certificates, whether you use a Namespace-provided app domain, or employ custom domain configurations.

Preview Access

Namespace ingresses preserve original headers for application-level routing and support path-based and header-based routing within your application.

Monitoring and Debugging

By building on Namespace Compute, you directly benefit from its comprehensive observability features providing deep insights into preview environment performance and behavior.

  • Real-time Logging Access centralized logs from all pods, from the CLI or the Dashboard.
  • Performance Monitoring Track resource utilization and network performance.
Preview Summary

Namespace also grants root SSH access to each instance, allowing you to inspect the underlying infrastructure powering the preview.

Terminal access

Wildcard Ingresses

For complex applications requiring multiple endpoints or dynamic routing, Namespace supports wildcard ingress configurations. Wildcard ingresses excel in scenarios requiring microservice architectures with dynamic service discovery and when testing API gateways managing multiple backend services.

Enable wildcard support

Create an instance with wildcard ingress capability.

$ nsc create --ingress wildcard
# Outputs the ID of the created cluster, e.g.: 072higp5dg0bg

Start your application

Connect your local Docker to the remote preview environment.

$ nsc docker attach-context --to 072higp5dg0bg --use

Using your existing tooling, you can now run your application in the preview.

$ docker run --name nginx-foobar -p 80:80 -d nginx

Configure a wildcard ingress

$ nsc expose container 072higp5dg0bg --wildcard \
    --container nginx-foobar --container_port 80

After creating a wildcard ingress, all subdomain traffic is routed to your specified service:

*.<instance-id>.<region>.namespaced.app