Summary
In this chapter, you created a Cloud Deploy delivery pipeline to deliver your application to a series of runtime environments. You also tried deploying to multiple target runtimes at the same time, and you ran a verification script against your deployed application. Finally, you performed a canary deployment strategy.
You now understand how to use Cloud Deploy to reliably deliver your applications to target runtimes.
In the next chapter, you’ll learn how to use binary authorization to ensure that only trusted container images are deployed to your GKE or Cloud Run environment.