Skip to content

Commit ae79ac7

Browse files
committed
fix title case on headings
1 parent a4bedca commit ae79ac7

File tree

176 files changed

+647
-832
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

176 files changed

+647
-832
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ A [breakdown of sections](docs/SPRINT-STRUCTURE.md) according to the structure o
3838
* Report product issues found and provide clear and repeatable engineering feedback!
3939
* We all own our code and each one of us has an obligation to make all parts of the solution great.
4040

41-
## QuickLinks
41+
## Resources
4242

4343
* [Engineering Fundamentals Checklist](docs/ENG-FUNDAMENTALS-CHECKLIST.md)
4444
* [Structure of a Sprint](docs/SPRINT-STRUCTURE.md)

docs/CI-CD/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For a much deeper understanding of all of these concepts, the books [Continuous
2222
- We want the latest version of the code to always be deployed to our dev/test environments
2323
- We want a reliable release strategy, where the policies for release are well understood by all
2424

25-
## The fundamentals
25+
## The Fundamentals
2626

2727
- We run a quality pipeline (with linting, unit tests etc.) on each PR/update of the main branch
2828
- All cloud resources (including secrets and permissions) are provisioned through infrastructure as code templates – ex. Terraform, Bicep (ARM), Pulumi etc.

docs/CI-CD/continuous-delivery.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -49,15 +49,15 @@ Code changes released into the *test* environment typically targets the main bra
4949

5050
The very first deployment of any application should be showcased to the customer in a production-like environment (*UAT*) to solicit feedback early. The UAT environment is used to obtain product owner sign-off acceptance to ultimately promote the release to production.
5151

52-
#### Criteria for a production-like environment
52+
#### Criteria for a Production-Like Environment
5353

5454
* Runs the same operating system as production.
5555
* Has the same software installed as production.
5656
* Is sized and configured the same way as production.
5757
* Mirrors production's networking topology.
5858
* Simulated production-like load tests are executed following a release to surface any latency or throughput degradation.
5959

60-
#### Modeling your Release Pipeline
60+
#### Modeling Your Release Pipeline
6161

6262
It's critical to model your test and release process to establish a common understanding between the application engineers and customer stakeholders. Specifically aligning expectations for how many cloud environments need to be pre-provisioned as well as defining sign-off gate roles and responsibilities.
6363

@@ -85,7 +85,7 @@ The stages within your release workflow are ultimately testing a version of your
8585

8686
A release should be running for a period of time before it's considered live and allowed to accept user traffic. These *warm up* activities may include application server(s) and database(s) pre-fill any dependent cache(s) as well as establish all service connections (eg *connection pool allocations, etc*).
8787

88-
#### Pre-production releases
88+
#### Pre-production Releases
8989

9090
Application release candidates should be deployed to a staging environment similar to production for carrying out final manual/automated tests (*including capacity testing*). Your production and staging / pre-prod cloud environments should be setup at the beginning of your project.
9191

@@ -135,13 +135,13 @@ Canary releases simplify rollbacks as you can avoid routing users to bad applica
135135

136136
Try to limit the number of versions of your application running parallel in production, as it can complicate maintenance and monitoring controls.
137137

138-
### Low code solutions
138+
### Low Code Solutions
139139

140140
Low code solutions have increased their participation in the applications and processes and because of that it is required that a proper conjunction of disciplines improve their development.
141141

142142
Here is a guide for [continuous deployment for Low Code Solutions](recipes/cd-on-low-code-solutions.md).
143143

144-
## References
144+
## Resources
145145

146146
* [Continuous Delivery](https://www.continuousdelivery.com/) by Jez Humble, David Farley.
147147
* [Continuous integration vs. continuous delivery vs. continuous deployment](https://www.atlassian.com/continuous-delivery/principles/continuous-integration-vs-delivery-vs-deployment)

docs/CI-CD/continuous-integration.md

+21-21
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ A robust build automation pipeline will:
2525

2626
## Build Definition Managed in Git
2727

28-
### Code / manifest artifacts required to build your project should be maintained in within your project(s) git repository(s)
28+
### Code / Manifest Artifacts Required to Build Your Project Should be Maintained Within Your Projects Git Repository
2929

3030
- CI provider-specific build pipeline definition(s) should reside within your project(s) git repository(s).
3131

@@ -57,21 +57,21 @@ An automated build should encompass the following principles:
5757

5858
- It's essential to have a build that's runnable through standalone scripts and not dependent on a particular IDE. Build pipeline targets can be triggered locally on their desktops through their IDE of choice. The build process should maintain enough flexibility to run within a CI server as well. As an example, dockerizing your build process offers this level of flexibility as VSCode and IntelliJ supports [docker plugin](https://code.visualstudio.com/docs/containers/overview) extensions.
5959

60-
### DevOps security checks
60+
### DevOps Security Checks
6161

6262
- Introduce security to your project at early stages. Follow the [DevSecOps section](dev-sec-ops/README.md) to introduce security practices, automation, tools and frameworks as part of the CI.
6363

6464
## Build Environment Dependencies
6565

66-
### Automated local environment setup
66+
### Automated Local Environment Setup
6767

6868
- We encourage maintaining a consistent developer experience for all team members. There should be a central automated manifest / process that streamlines the installation and setup of any software dependencies. This way developers can replicate the same build environment locally as the one running on a CI server.
6969
- Build automation scripts often require specific software packages and version pre-installed within the runtime environment of the OS. This presents some challenges as build processes typically version lock these dependencies.
7070
- All developers on the team should be able to emulate the build environment from their local desktop regardless of their OS.
7171
- For projects using VS Code, leveraging [Dev Containers](../developer-experience/devcontainers.md) can really help standardize the local developer experience across the team.
7272
- Well established software packaging tools like Docker, Maven, npm, etc should be considered when designing your build automation tool chain.
7373

74-
### Document local setup
74+
### Document Local Setup
7575

7676
- The setup process for setting up a local build environment should be well documented and easy for developers to follow.
7777

@@ -183,16 +183,16 @@ The schema has 30+ [validators](https://json-schema.org/implementations.html#val
183183

184184
An effective way to identify bugs in your build at a rapid pace is to invest early into a reliable suite of automated tests that validate the baseline functionality of the system:
185185

186-
### End to end integration tests
186+
### End-to-End Integration Tests
187187

188188
- Include tests in your pipeline to validate the build candidate conforms to automated business functionality assertions. Any bugs or broken code should be reported in the test results including the failed test and relevant stack trace. All tests should be invoked through a single command.
189189
- Keep the build fast. Consider automated test runtime when deciding to pull in dependencies like databases, external services and mock data loading into your test harness. Slow builds often become a bottleneck for dev teams when parallel builds on a CI server are not an option. Consider adding max timeout limits for lengthy validations to fail fast and maintain high velocity across the team.
190190

191-
### Avoid checking in broken builds
191+
### Avoid Checking in Broken Builds
192192

193193
- Automated build checks, tests, lint runs, etc should be validated locally before committing your changes to the scm repo. [Test Driven Development](https://martinfowler.com/bliki/TestDrivenDevelopment.html) is a practice dev crews should consider to help identify bugs and failures as early as possible within the development lifecycle.
194194

195-
### Reporting build failures
195+
### Reporting Build Failures
196196

197197
- If the build step happens to fail then the build pipeline run status should be reported as failed including relevant logs and stack traces.
198198

@@ -206,22 +206,22 @@ An effective way to identify bugs in your build at a rapid pace is to invest ear
206206

207207
## Git Driven Workflow
208208

209-
### Build on commit
209+
### Build on Commit
210210

211211
- Every commit to the baseline repository should trigger the CI pipeline to create a new build candidate.
212212
- Build artifact(s) are built, packaged, validated and deployed continuously into a non-production environment per commit. Each commit against the repository results into a CI run which checks out the sources onto the integration machine, initiates a build, and notifies the committer of the result of the build.
213213

214-
### Avoid commenting out failing tests
214+
### Avoid Commenting Out Failing Tests
215215

216216
- Avoid commenting out tests in the mainline branch. By commenting out tests, we get an incorrect indication of the status of the build.
217217

218-
### Branch policy enforcement
218+
### Branch Policy Enforcement
219219

220220
- Protected [branch policies](https://help.github.com/en/github/administering-a-repository/about-protected-branches) should be setup on the main branch to ensure that CI stage(s) have passed prior to starting a code review. Code review approvers will only start reviewing a pull request once the CI pipeline run passes for the latest pushed git commit.
221221
- Broken builds should block pull request reviews.
222222
- Prevent commits directly into main branch.
223223

224-
### Branch strategy
224+
### Branch Strategy
225225

226226
- Release branches should auto trigger the deployment of a build artifact to its target cloud environment. You can find additional guidance on the Azure DevOps documentation site under the [Manage deployments](https://learn.microsoft.com/en-us/azure/devops/repos/git/git-branching-guidance?view=azure-devops#manage-deployments) section
227227

@@ -231,7 +231,7 @@ An effective way to identify bugs in your build at a rapid pace is to invest ear
231231
232232
In the spirit of transparency and embracing frequent communication across a dev crew, we encourage developers to commit code on a daily cadence. This approach provides visibility to feature progress and accelerates pair programming across the team. Here are some principles to consider:
233233

234-
### Everyone commits to the git repository each day
234+
### Everyone Commits to the Git Repository Each Day
235235

236236
- End of day checked-in code should contain unit tests at the minimum.
237237
- Run the build locally before checking in to avoid CI pipeline failure saturation. You should verify what caused the error, and try to solve it as soon as possible instead of committing your code. We encourage developers to follow a [lean SDLC principles](https://leankit.com/learn/lean/principles-of-lean-development/).
@@ -241,19 +241,19 @@ In the spirit of transparency and embracing frequent communication across a dev
241241

242242
One of the key goals of build validation is to isolate and identify failures in staging environment(s) and minimize any disruption to live production traffic. Our E2E automated tests should run in an environment which mimics our production environment(as much as possible). This includes consistent software versions, OS, test data volume simulations, network traffic parity with production, etc.
243243

244-
### Test in a clone of production
244+
### Test in a Clone of Production
245245

246246
- The production environment should be duplicated into a staging environment(QA and/or Pre-Prod) at a minimum.
247247

248-
### Pull request update(s) trigger staged releases
248+
### Pull Request Updates Trigger Staged Releases
249249

250250
- New commits related to a pull request should trigger a build / release into an integration environment. The production environment should be fully isolated from this process.
251251

252-
### Promote infrastructure changes across fixed environments
252+
### Promote Infrastructure Changes Across Fixed Environments
253253

254254
- Infrastructure as code changes should be tested in an integration environment and promoted to all staging environment(s) then migrated to production with zero downtime for system users.
255255

256-
### Testing in production
256+
### Testing in Production
257257

258258
- There are various [approaches](https://medium.com/@copyconstruct/testing-in-production-the-safe-way-18ca102d0ef1) with safely carrying out automated tests for production deployments. Some of these may include:
259259
- Feature flagging
@@ -264,28 +264,28 @@ One of the key goals of build validation is to isolate and identify failures in
264264

265265
Our devops workflow should enable developers to get, install and run the latest system executable. Release executable(s) should be auto generated as part of our CI/CD pipeline(s).
266266

267-
### Developers can access latest executable
267+
### Developers can Access the Latest Executable
268268

269269
- The latest system executable is available for all developers on the team. There should be a well-known place where developers can reference the release artifact.
270270

271-
### Release artifact is published for each pull request or merges into main branch
271+
### Release Artifacts are Published for Each Pull Request or Merges into the Main Branch
272272

273273
## Integration Observability
274274

275275
Applied state changes to the mainline build should be made available and communicated across the team. Centralizing logs and status(s) from build and release pipeline failures are essential for developers investigating broken builds.
276276

277277
We recommend integrating Teams or Slack with CI/CD pipeline runs which helps keep the team continuously plugged into failures and build candidate status(s).
278278

279-
### Continuous integration top level dashboard
279+
### Continuous Integration Top Level Dashboard
280280

281281
- Modern CI providers have the capability to consolidate and report build status(s) within a given dashboard.
282282
- Your CI dashboard should be able to correlate a build failure with a git commit.
283283

284-
### Build status badge in project readme
284+
### Build Status Badge in the Project Readme
285285

286286
- There should be a build status badge included in the root README of the project.
287287

288-
### Build notifications
288+
### Build Notifications
289289

290290
- Your CI process should be configured to send notifications to messaging platforms like Teams / Slack once the build completes. We recommend creating a separate channel to help consolidate and isolate these notifications.
291291

docs/CI-CD/dev-sec-ops/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# DevSecOps
22

3-
## The concept of DevSecOps
3+
## The Concept of DevSecOps
44

55
DevSecOps or DevOps security is about introducing security earlier in the life cycle of application development (a.k.a shift-left), thus minimizing the impact of vulnerabilities and bringing security closer to development team.
66

docs/CI-CD/dev-sec-ops/azure-devops-service-connection-security.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ steps:
3535
}
3636
```
3737
38-
## Pipeline Security caveat
38+
## Pipeline Security Caveat
3939
4040
YAML pipelines can be triggered without the need for a pull request, this introduces a security risk.
4141

docs/CI-CD/dev-sec-ops/secrets-management/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Secrets management
1+
# Secrets Management
22

33
Secret management refers to the tools and practices used to manage digital authentication credentials (like API keys, tokens, passwords, and certificates). These secrets are used to protect access to sensitive data and services, making their management critical for security.
44

docs/CI-CD/dev-sec-ops/secrets-management/credential_scanning.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Credential scanning is the practice of automatically inspecting a project to ensure that no secrets are included in the project's source code. Secrets include database passwords, storage connection strings, admin logins, service principals, etc.
44

5-
## Why Credential scanning
5+
## Why Credential Scanning
66

77
Including secrets in a project's source code is a significant risk, as it might make those secrets available to unwanted parties. Even if it seems that the source code is accessible to the same people who are privy to the secrets, this situation is likely to change as the project grows. Spreading secrets in different places makes them harder to manage, access control, and revoke efficiently. Secrets that are committed to source control are also harder to discard of, since they will persist in the source's history.
88
Another consideration is that coupling the project's code to its infrastructure and deployment specifics is limiting and considered a bad practice. From a software design perspective, the code should be independent of the runtime configuration that will be used to run it, and that runtime configuration includes secrets.

docs/CI-CD/dev-sec-ops/secrets-management/recipes/README.md

-4
This file was deleted.

docs/CI-CD/dev-sec-ops/secrets-management/recipes/detect-secrets-ado.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Running detect-secrets in Azure DevOps Pipelines
1+
# Running `detect-secrets` in Azure DevOps Pipelines
22

33
## Overview
44

docs/CI-CD/dev-sec-ops/secrets-management/recipes/detect-secrets.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Credential Scanning Tool: detect-secrets
1+
# Credential Scanning Tool: `detect-secrets`
22

33
## Background
44

@@ -28,7 +28,7 @@ python3 -m pip install detect-secrets
2828
detect-secrets scan > .secrets.baseline
2929
```
3030

31-
## Pre-commit hook
31+
## Pre-Commit Hook
3232

3333
It is recommended to use `detect-secrets` in your development environment as a Git pre-commit hook.
3434

@@ -45,7 +45,7 @@ repos:
4545
args: ['--baseline', '.secrets.baseline']
4646
```
4747
48-
## Usage in CI pipelines
48+
## Usage in CI Pipelines
4949
5050
```sh
5151
# backup the list of known secrets

docs/CI-CD/gitops/deploying-with-gitops.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Some popular GitOps frameworks for Kubernetes backed by [CNCF](https://landscape
1919
- [Argo CD](https://argo-cd.readthedocs.io/en/stable/)
2020
- [Rancher Fleet](https://fleet.rancher.io/)
2121

22-
## Deploying using GitOps
22+
## Deploying Using GitOps
2323

2424
GitOps with Flux v2 can be enabled in Azure Kubernetes Service (AKS) managed clusters or Azure Arc-enabled Kubernetes connected clusters as a cluster extension. After the microsoft.flux cluster extension is installed, you can create one or more fluxConfigurations resources that sync your Git repository sources to the cluster and reconcile the cluster to the desired state. With GitOps, you can use your Git repository as the source of truth for cluster configuration and application deployment.
2525

docs/CI-CD/gitops/github-workflows.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ A workflow is a configurable automated process made up of one or more jobs where
44

55
Additional information on GitHub actions and GitHub Workflows in the links posted in the [references](#references) section below.
66

7-
## Workflow Per Environment
7+
## Workflow per Environment
88

99
The general approach is to have one pipeline, where the code is built, tested and deployed, and the artifact is then promoted to the next environment, eventually to be deployed into production.
1010

@@ -16,7 +16,7 @@ One way to get around the complexity of a single workflow is to have separate wo
1616

1717
![Workflow-Designs-Independent-Workflows](images/Workflow-Designs-Independent-Workflows.png)
1818

19-
## References
19+
## Resources
2020

2121
- [GitHub Actions](https://docs.github.com/en/actions)
2222
- [GitHub Workflows](https://docs.github.com/en/actions/reference/workflow-syntax-for-github-actions)

0 commit comments

Comments
 (0)