You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/CI-CD/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ For a much deeper understanding of all of these concepts, the books [Continuous
22
22
- We want the latest version of the code to always be deployed to our dev/test environments
23
23
- We want a reliable release strategy, where the policies for release are well understood by all
24
24
25
-
## The fundamentals
25
+
## The Fundamentals
26
26
27
27
- We run a quality pipeline (with linting, unit tests etc.) on each PR/update of the main branch
28
28
- All cloud resources (including secrets and permissions) are provisioned through infrastructure as code templates – ex. Terraform, Bicep (ARM), Pulumi etc.
Copy file name to clipboardexpand all lines: docs/CI-CD/continuous-delivery.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -49,15 +49,15 @@ Code changes released into the *test* environment typically targets the main bra
49
49
50
50
The very first deployment of any application should be showcased to the customer in a production-like environment (*UAT*) to solicit feedback early. The UAT environment is used to obtain product owner sign-off acceptance to ultimately promote the release to production.
51
51
52
-
#### Criteria for a production-like environment
52
+
#### Criteria for a Production-Like Environment
53
53
54
54
* Runs the same operating system as production.
55
55
* Has the same software installed as production.
56
56
* Is sized and configured the same way as production.
57
57
* Mirrors production's networking topology.
58
58
* Simulated production-like load tests are executed following a release to surface any latency or throughput degradation.
59
59
60
-
#### Modeling your Release Pipeline
60
+
#### Modeling Your Release Pipeline
61
61
62
62
It's critical to model your test and release process to establish a common understanding between the application engineers and customer stakeholders. Specifically aligning expectations for how many cloud environments need to be pre-provisioned as well as defining sign-off gate roles and responsibilities.
63
63
@@ -85,7 +85,7 @@ The stages within your release workflow are ultimately testing a version of your
85
85
86
86
A release should be running for a period of time before it's considered live and allowed to accept user traffic. These *warm up* activities may include application server(s) and database(s) pre-fill any dependent cache(s) as well as establish all service connections (eg *connection pool allocations, etc*).
87
87
88
-
#### Pre-production releases
88
+
#### Pre-production Releases
89
89
90
90
Application release candidates should be deployed to a staging environment similar to production for carrying out final manual/automated tests (*including capacity testing*). Your production and staging / pre-prod cloud environments should be setup at the beginning of your project.
91
91
@@ -135,13 +135,13 @@ Canary releases simplify rollbacks as you can avoid routing users to bad applica
135
135
136
136
Try to limit the number of versions of your application running parallel in production, as it can complicate maintenance and monitoring controls.
137
137
138
-
### Low code solutions
138
+
### Low Code Solutions
139
139
140
140
Low code solutions have increased their participation in the applications and processes and because of that it is required that a proper conjunction of disciplines improve their development.
141
141
142
142
Here is a guide for [continuous deployment for Low Code Solutions](recipes/cd-on-low-code-solutions.md).
143
143
144
-
## References
144
+
## Resources
145
145
146
146
*[Continuous Delivery](https://www.continuousdelivery.com/) by Jez Humble, David Farley.
147
147
*[Continuous integration vs. continuous delivery vs. continuous deployment](https://www.atlassian.com/continuous-delivery/principles/continuous-integration-vs-delivery-vs-deployment)
Copy file name to clipboardexpand all lines: docs/CI-CD/continuous-integration.md
+21-21
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ A robust build automation pipeline will:
25
25
26
26
## Build Definition Managed in Git
27
27
28
-
### Code / manifest artifacts required to build your project should be maintained in within your project(s) git repository(s)
28
+
### Code / Manifest Artifacts Required to Build Your Project Should be Maintained Within Your Projects Git Repository
29
29
30
30
- CI provider-specific build pipeline definition(s) should reside within your project(s) git repository(s).
31
31
@@ -57,21 +57,21 @@ An automated build should encompass the following principles:
57
57
58
58
- It's essential to have a build that's runnable through standalone scripts and not dependent on a particular IDE. Build pipeline targets can be triggered locally on their desktops through their IDE of choice. The build process should maintain enough flexibility to run within a CI server as well. As an example, dockerizing your build process offers this level of flexibility as VSCode and IntelliJ supports [docker plugin](https://code.visualstudio.com/docs/containers/overview) extensions.
59
59
60
-
### DevOps security checks
60
+
### DevOps Security Checks
61
61
62
62
- Introduce security to your project at early stages. Follow the [DevSecOps section](dev-sec-ops/README.md) to introduce security practices, automation, tools and frameworks as part of the CI.
63
63
64
64
## Build Environment Dependencies
65
65
66
-
### Automated local environment setup
66
+
### Automated Local Environment Setup
67
67
68
68
- We encourage maintaining a consistent developer experience for all team members. There should be a central automated manifest / process that streamlines the installation and setup of any software dependencies. This way developers can replicate the same build environment locally as the one running on a CI server.
69
69
- Build automation scripts often require specific software packages and version pre-installed within the runtime environment of the OS. This presents some challenges as build processes typically version lock these dependencies.
70
70
- All developers on the team should be able to emulate the build environment from their local desktop regardless of their OS.
71
71
- For projects using VS Code, leveraging [Dev Containers](../developer-experience/devcontainers.md) can really help standardize the local developer experience across the team.
72
72
- Well established software packaging tools like Docker, Maven, npm, etc should be considered when designing your build automation tool chain.
73
73
74
-
### Document local setup
74
+
### Document Local Setup
75
75
76
76
- The setup process for setting up a local build environment should be well documented and easy for developers to follow.
77
77
@@ -183,16 +183,16 @@ The schema has 30+ [validators](https://json-schema.org/implementations.html#val
183
183
184
184
An effective way to identify bugs in your build at a rapid pace is to invest early into a reliable suite of automated tests that validate the baseline functionality of the system:
185
185
186
-
### End to end integration tests
186
+
### End-to-End Integration Tests
187
187
188
188
- Include tests in your pipeline to validate the build candidate conforms to automated business functionality assertions. Any bugs or broken code should be reported in the test results including the failed test and relevant stack trace. All tests should be invoked through a single command.
189
189
- Keep the build fast. Consider automated test runtime when deciding to pull in dependencies like databases, external services and mock data loading into your test harness. Slow builds often become a bottleneck for dev teams when parallel builds on a CI server are not an option. Consider adding max timeout limits for lengthy validations to fail fast and maintain high velocity across the team.
190
190
191
-
### Avoid checking in broken builds
191
+
### Avoid Checking in Broken Builds
192
192
193
193
- Automated build checks, tests, lint runs, etc should be validated locally before committing your changes to the scm repo. [Test Driven Development](https://martinfowler.com/bliki/TestDrivenDevelopment.html) is a practice dev crews should consider to help identify bugs and failures as early as possible within the development lifecycle.
194
194
195
-
### Reporting build failures
195
+
### Reporting Build Failures
196
196
197
197
- If the build step happens to fail then the build pipeline run status should be reported as failed including relevant logs and stack traces.
198
198
@@ -206,22 +206,22 @@ An effective way to identify bugs in your build at a rapid pace is to invest ear
206
206
207
207
## Git Driven Workflow
208
208
209
-
### Build on commit
209
+
### Build on Commit
210
210
211
211
- Every commit to the baseline repository should trigger the CI pipeline to create a new build candidate.
212
212
- Build artifact(s) are built, packaged, validated and deployed continuously into a non-production environment per commit. Each commit against the repository results into a CI run which checks out the sources onto the integration machine, initiates a build, and notifies the committer of the result of the build.
213
213
214
-
### Avoid commenting out failing tests
214
+
### Avoid Commenting Out Failing Tests
215
215
216
216
- Avoid commenting out tests in the mainline branch. By commenting out tests, we get an incorrect indication of the status of the build.
217
217
218
-
### Branch policy enforcement
218
+
### Branch Policy Enforcement
219
219
220
220
- Protected [branch policies](https://help.github.com/en/github/administering-a-repository/about-protected-branches) should be setup on the main branch to ensure that CI stage(s) have passed prior to starting a code review. Code review approvers will only start reviewing a pull request once the CI pipeline run passes for the latest pushed git commit.
221
221
- Broken builds should block pull request reviews.
222
222
- Prevent commits directly into main branch.
223
223
224
-
### Branch strategy
224
+
### Branch Strategy
225
225
226
226
- Release branches should auto trigger the deployment of a build artifact to its target cloud environment. You can find additional guidance on the Azure DevOps documentation site under the [Manage deployments](https://learn.microsoft.com/en-us/azure/devops/repos/git/git-branching-guidance?view=azure-devops#manage-deployments) section
227
227
@@ -231,7 +231,7 @@ An effective way to identify bugs in your build at a rapid pace is to invest ear
231
231
232
232
In the spirit of transparency and embracing frequent communication across a dev crew, we encourage developers to commit code on a daily cadence. This approach provides visibility to feature progress and accelerates pair programming across the team. Here are some principles to consider:
233
233
234
-
### Everyone commits to the git repository each day
234
+
### Everyone Commits to the Git Repository Each Day
235
235
236
236
- End of day checked-in code should contain unit tests at the minimum.
237
237
- Run the build locally before checking in to avoid CI pipeline failure saturation. You should verify what caused the error, and try to solve it as soon as possible instead of committing your code. We encourage developers to follow a [lean SDLC principles](https://leankit.com/learn/lean/principles-of-lean-development/).
@@ -241,19 +241,19 @@ In the spirit of transparency and embracing frequent communication across a dev
241
241
242
242
One of the key goals of build validation is to isolate and identify failures in staging environment(s) and minimize any disruption to live production traffic. Our E2E automated tests should run in an environment which mimics our production environment(as much as possible). This includes consistent software versions, OS, test data volume simulations, network traffic parity with production, etc.
243
243
244
-
### Test in a clone of production
244
+
### Test in a Clone of Production
245
245
246
246
- The production environment should be duplicated into a staging environment(QA and/or Pre-Prod) at a minimum.
- New commits related to a pull request should trigger a build / release into an integration environment. The production environment should be fully isolated from this process.
251
251
252
-
### Promote infrastructure changes across fixed environments
252
+
### Promote Infrastructure Changes Across Fixed Environments
253
253
254
254
- Infrastructure as code changes should be tested in an integration environment and promoted to all staging environment(s) then migrated to production with zero downtime for system users.
255
255
256
-
### Testing in production
256
+
### Testing in Production
257
257
258
258
- There are various [approaches](https://medium.com/@copyconstruct/testing-in-production-the-safe-way-18ca102d0ef1) with safely carrying out automated tests for production deployments. Some of these may include:
259
259
- Feature flagging
@@ -264,28 +264,28 @@ One of the key goals of build validation is to isolate and identify failures in
264
264
265
265
Our devops workflow should enable developers to get, install and run the latest system executable. Release executable(s) should be auto generated as part of our CI/CD pipeline(s).
266
266
267
-
### Developers can access latest executable
267
+
### Developers can Access the Latest Executable
268
268
269
269
- The latest system executable is available for all developers on the team. There should be a well-known place where developers can reference the release artifact.
270
270
271
-
### Release artifact is published for each pull request or merges into main branch
271
+
### Release Artifacts are Published for Each Pull Request or Merges into the Main Branch
272
272
273
273
## Integration Observability
274
274
275
275
Applied state changes to the mainline build should be made available and communicated across the team. Centralizing logs and status(s) from build and release pipeline failures are essential for developers investigating broken builds.
276
276
277
277
We recommend integrating Teams or Slack with CI/CD pipeline runs which helps keep the team continuously plugged into failures and build candidate status(s).
278
278
279
-
### Continuous integration top level dashboard
279
+
### Continuous Integration Top Level Dashboard
280
280
281
281
- Modern CI providers have the capability to consolidate and report build status(s) within a given dashboard.
282
282
- Your CI dashboard should be able to correlate a build failure with a git commit.
283
283
284
-
### Build status badge in project readme
284
+
### Build Status Badge in the Project Readme
285
285
286
286
- There should be a build status badge included in the root README of the project.
287
287
288
-
### Build notifications
288
+
### Build Notifications
289
289
290
290
- Your CI process should be configured to send notifications to messaging platforms like Teams / Slack once the build completes. We recommend creating a separate channel to help consolidate and isolate these notifications.
Copy file name to clipboardexpand all lines: docs/CI-CD/dev-sec-ops/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# DevSecOps
2
2
3
-
## The concept of DevSecOps
3
+
## The Concept of DevSecOps
4
4
5
5
DevSecOps or DevOps security is about introducing security earlier in the life cycle of application development (a.k.a shift-left), thus minimizing the impact of vulnerabilities and bringing security closer to development team.
Copy file name to clipboardexpand all lines: docs/CI-CD/dev-sec-ops/secrets-management/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Secrets management
1
+
# Secrets Management
2
2
3
3
Secret management refers to the tools and practices used to manage digital authentication credentials (like API keys, tokens, passwords, and certificates). These secrets are used to protect access to sensitive data and services, making their management critical for security.
Copy file name to clipboardexpand all lines: docs/CI-CD/dev-sec-ops/secrets-management/credential_scanning.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
Credential scanning is the practice of automatically inspecting a project to ensure that no secrets are included in the project's source code. Secrets include database passwords, storage connection strings, admin logins, service principals, etc.
4
4
5
-
## Why Credential scanning
5
+
## Why Credential Scanning
6
6
7
7
Including secrets in a project's source code is a significant risk, as it might make those secrets available to unwanted parties. Even if it seems that the source code is accessible to the same people who are privy to the secrets, this situation is likely to change as the project grows. Spreading secrets in different places makes them harder to manage, access control, and revoke efficiently. Secrets that are committed to source control are also harder to discard of, since they will persist in the source's history.
8
8
Another consideration is that coupling the project's code to its infrastructure and deployment specifics is limiting and considered a bad practice. From a software design perspective, the code should be independent of the runtime configuration that will be used to run it, and that runtime configuration includes secrets.
GitOps with Flux v2 can be enabled in Azure Kubernetes Service (AKS) managed clusters or Azure Arc-enabled Kubernetes connected clusters as a cluster extension. After the microsoft.flux cluster extension is installed, you can create one or more fluxConfigurations resources that sync your Git repository sources to the cluster and reconcile the cluster to the desired state. With GitOps, you can use your Git repository as the source of truth for cluster configuration and application deployment.
Copy file name to clipboardexpand all lines: docs/CI-CD/gitops/github-workflows.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ A workflow is a configurable automated process made up of one or more jobs where
4
4
5
5
Additional information on GitHub actions and GitHub Workflows in the links posted in the [references](#references) section below.
6
6
7
-
## Workflow Per Environment
7
+
## Workflow per Environment
8
8
9
9
The general approach is to have one pipeline, where the code is built, tested and deployed, and the artifact is then promoted to the next environment, eventually to be deployed into production.
10
10
@@ -16,7 +16,7 @@ One way to get around the complexity of a single workflow is to have separate wo
0 commit comments