-
Notifications
You must be signed in to change notification settings - Fork 456
The CI environment Pipeline design
This section provides an overview of the design principles applied to the CARML CI environment pipelines.
The repository hosts one pipeline for each module in the CARML library.
The purpose of each module pipeline is twofold:
- Validation: To ensure the modules hosted by the CARML library are valid and can perform the intended deployments.
- Publishing: To publish versioned and already validated modules to one or multiple target locations, from where they can be referenced by solutions consuming them.
As such, each pipeline can be mapped to Phases 1 and 2
described in the Deployment flow section.
The following paragraphs provide an overview of the different phases and shared logic the module pipelines use.
This paragraph provides an overview of the three phases performed by each module pipeline. Further details about the implementation and design of each phase are provided on the dedicated pages linked below.
-
Static Validation: Runs a set of static Pester tests on the module and its templates to ensure they comply with the design principles of CARML. Further details for this phase are provided on the corresponding wiki page - see the Static validation section.
-
Deployment Validation: An actual Azure deployment is run in a sandbox subscription leveraging a predefined set of parameter files, each validating a different configuration of the same Azure resource in parallel. The test suite is cleaned up by default, removing all test resources post-deployment. Further details for this phase are provided on the corresponding wiki page - see the Deployment validation section.
-
Publishing: Runs only if the previous steps are successful. A new module version is published to all configured target locations such as template specs, private Bicep registry and Azure DevOps Universal Packages. Published module versions can then be referenced by solutions using them. Further details for this phase are provided on the corresponding wiki page - see the Publishing page.
GitHub
GitHub workflows map each pipeline phase to a dedicated composite action, to maximize code reusability. The mapping to the specific composite action is provided below:
Composite Action | Pipeline phase |
---|---|
validateModulePester | Static validation |
validateModuleDeployment | Deployment validation |
publishModule | Publishing |
In addition, workflows leverage the following composite actions:
Composite Action | Description |
---|---|
getWorkflowInput | This action allows fetching workflow input values from the module's workflow file, even if the pipeline was not triggered via a workflow_dispatch action. Without it, we would not be able to process the contained information and would need to duplicate the configuration as workflow variables. Such input values are for example, the removal switch removeDeployment . |
setEnvironmentVariables | This action parses the variables file (global.variables.yml ) and sets the key-value pairs in the variables list as environment variables. |
Technical documentation for each composite action, such as required input and output variables, is included in each action.yml
file located in path .github/actions/templates
.
Azure DevOps
Azure DevOps pipelines map each pipeline phase to a dedicated pipeline template, to maximize code reusability. The mapping to the specific YAML template file is provided below:
Template Name | Pipeline phase |
---|---|
jobs.validateModulePester.yml | Static validation |
jobs.validateModuleDeployment.yml | Deployment validation |
jobs.publishModule.yml | Publishing |
Technical documentation for each template, such as required input and output variables, is included in each .yml
file located in path .azuredevops/pipelineTemplates
.
Each module pipeline comes with the following runtime parameters:
-
'Branch' dropdown
: A dropdown to select the branch to run the pipeline from. -
'Remove deployed module' switch
: Can be enabled or disabled and controls whether the test-deployed resources are removed after testing. It is enabled by default. -
'Publish prerelease module' switch
: Can be enabled or disabled and allows publishing a prerelease version for the corresponding module when running the pipeline from a branch different thanmain|master
. It is disabled by default. For further information of how the input is processed refer to the Publishing dedicated page.
In addition to module pipelines, the repository includes several platform pipelines covering further tasks as described below.
In order to successfully run module pipelines to validate and publish CARML modules to the target environment, certain Azure resources need to be deployed beforehand.
For example, any instance of the [Virtual Machine] module needs an existing virtual network to be connected to and a Key Vault hosting its required local admin credentials to be referenced.
The dependencies pipeline covers this requirement and is intended to be run before using the module pipelines.
The pipeline leverages resource parameters from the utilities\pipelines\dependencies
subfolder and either one of the following pipelines:
- GitHub workflow:
.github\workflows\platform.dependencies.yml
- Azure DevOps pipeline:
.azuredevops\platformPipelines\platform.dependencies.yml
The dependencies pipeline comes with the following runtime parameters:
-
'Branch' dropdown
: A dropdown to select the branch to run the pipeline from. -
'Enable SqlMI dependency deployment' switch
: Can be enabled or disabled and controls whether the dependencies for the [SQL managed instance] module are configured during deployment. It is disabled by default. -
'Enable deployment of a vhd stored in a blob container' switch
: Can be enabled or disabled and controls whether including the baking of a VHD and subsequent backup to a target storage blob container during the deployment. This is a dependency for the [Compute Images] and [Compute Disks] modules. This task requires up to two hours completion and is disabled by default.
The resources deployed by the dependencies pipeline need to be in place before testing all the modules.
Note: Some dependency resources (e.g., [storage account], [Key Vault] and [event hub namespace]) require a globally unique resource name. By default, the parameter files make use of the placeholder token
'<<namePrefix>>'
to make all resource names specific to an environment. Refer to Parameter File Tokens Design for more details.
Since also dependency resources are in turn subject to dependencies with each other, resources are deployed in the following grouped order.
- Resource Group: leveraged by all modules.
- 'validation-rg': The resource group to which resources are deployed by default during the test deployment phase. This same resource group is also the one hosting the dependencies.
- 'adp-<<namePrefix>>-az-locks-rg-001': Dedicated resource group to be leveraged by the [authorization locks] resource.
This group of resources has a dependency only on the resource group which will host them. Resources in this group can be deployed in parallel.
- Storage account: This resource is leveraged by all resources supporting diagnostic settings on a storage account.
Note: This resource has a global scope name.
- Event hub namespace and Event hub: This resource is leveraged by all resources supporting diagnostic settings on an event hub.
Note: This resource has a global scope name.
- Log analytics workspaces: These resources are leveraged by all resources supporting diagnostic settings on LAW. Multiple instances are deployed:
- 'adp-<<namePrefix>>-az-law-x-001': Default LAW.
- 'adp-<<namePrefix>>-az-law-aut-001': Dedicated LAW to be leveraged by the [automation account] resource.
- 'adp-<<namePrefix>>-az-law-appi-001': Dedicated LAW to be leveraged by the [application insights] resource.
- 'adp-<<namePrefix>>-az-law-sol-001': Dedicated LAW to be leveraged by the [operations management solutions] resource.
- User assigned identity: This resource is leveraged by the [role assignment], [Key Vault] and [recovery services vault] dependency resources.
Note: The object ID of the [user assigned identity] is needed by several dependency parameter files. However, before running the dependencies pipeline for the first time, the [user assigned identity] resource does not exist yet, thus its object ID is unknown. For this reason, instead of the object ID value, some dependency parameter files contain the
"<<msiPrincipalId>>"
token, for which the correct value is retrieved and replaced by the pipeline at runtime. - Shared image gallery and definition: These resources are leveraged by the [image template] resource.
- Route table: This resource is leveraged by the virtual network subnet dedicated to test [SQL managed instance].
Note: This resource is deployed and configured only if SQL-MI dependency resources are enabled.
- Route table: This resource is leveraged by a test subnet deployment of the [Virtual Network] module.
- Action group: This resource is leveraged by [activity log alert] and [metric alert] resources.
- Application security group: This resource is leveraged by the [network security group] resource.
- Policy assignment: This resource is leveraged by the [policy exemption] resource.
- Proximity placement group: This resource is leveraged by a test deployment of the [Availability set] module.
This group of resources has a dependency on one or more resources in the group above. Resources in this group can be deployed in parallel.
- Storage Account Upload: An upload job to populate the storage account configured in
parameters.json
with a test script that can be referenced - AVD host pool: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. This resource is leveraged by the [AVD application group] resource.
- Network Security Groups: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. This resource is leveraged by different virtual network subnets. Multiple instances are deployed:
- 'adp-<<namePrefix>>-az-nsg-x-apgw': NSG with required network security rules to be leveraged by the [application gateway] subnet.
- 'adp-<<namePrefix>>-az-nsg-x-ase': NSG with required network security rules to be leveraged by the [app service environment] subnet.
- 'adp-<<namePrefix>>-az-nsg-x-bastion': NSG with required network security rules to be leveraged by the [bastion host] subnet.
- 'adp-<<namePrefix>>-az-nsg-x-sqlmi': NSG with required network security rules to be leveraged by the [sql managed instance] subnet.
Note: This resource is deployed and configured only if SQL-MI dependency resources are enabled.
- 'adp-<<namePrefix>>-az-nsg-x-001': default NSG leveraged by all other subnets.
- Application insight: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. This resource is leveraged by the [machine learning service] resource.
- Automation account: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. This resource is leveraged by the [log analytics workspace] resource.
- Public IP addresses: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. Multiple instances are deployed:
- 'adp-<<namePrefix>>-az-pip-x-apgw': Leveraged by the [application gateway] resource.
- 'adp-<<namePrefix>>-az-pip-x-bas': Leveraged by the [bastion host] resource.
- 'adp-<<namePrefix>>-az-pip-x-lb': Leveraged by the [load balancer] resource.
- 'adp-<<namePrefix>>-az-pip-min-lb': Leveraged by the [load balancer] resource.
- 'adp-<<namePrefix>>-az-pip-x-fw': Leveraged by the [Azure firewall] resource.
- Role assignment: This resource assigns the 'Contributor' role on the subscription to the [user assigned identity] deployed as part of the group above. This is needed by the [image template] deployment.
- Key Vault: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. Multiple instances are deployed:
- 'adp-<<namePrefix>>-az-kv-x-001': KV with required secrets, keys, certificates and access policies to be leveraged by all resources requiring access to a Key Vault key, secret and/or certificate, i.e., [application gateway], [azure NetApp file], [azure SQL server], [disk encryption set], [machine learning service], [virtual machine], [virtual machine scale set], [virtual network gateway connection].
- 'adp-<<namePrefix>>-az-kv-x-pe': KV to be leveraged by the [private endpoint] resource.
- 'adp-<<namePrefix>>-az-kv-x-sqlmi': KV with required secrets, keys and access policies to be leveraged by the [SQL managed instance] resource.
Note: This resource is deployed and configured only if SQL-MI dependency resources are enabled.
Note: This resource has a global scope name.
- Recovery services vault: This resource supports monitoring, hence it has a dependency on the [storage account], [log analytics workspace] and [event hub] deployed in the group above. This resource is leveraged by the [virtual machine] resource when backup is enabled.
This group of resources has a dependency on one or more resources in the groups above. Resources in this group can be deployed in parallel.
- AVD application group: This resource is leveraged by the [AVD workspace] resource.
- Virtual Networks: This resource is depending on the route table and network security groups deployed above. Multiple instances are deployed:
- 'adp-<<namePrefix>>-az-vnet-x-peer01': Leveraged by the [virtual network peering] resource.
- 'adp-<<namePrefix>>-az-vnet-x-peer02': Leveraged by the [virtual network peering] resource.
- 'adp-<<namePrefix>>-az-vnet-x-azfw': Leveraged by the [azure firewall] resource.
- 'adp-<<namePrefix>>-az-vnet-x-aks': Leveraged by the [azure kubernetes service] resource.
- 'adp-<<namePrefix>>-az-vnet-x-sqlmi': Leveraged by the [sql managed instance] resource.
Note: This resource is deployed and configured only if sqlmi dependency resources are enabled.
- 'adp-<<namePrefix>>-az-vnet-x-001': Hosting multiple subnets to be leveraged by [virtual machine], [virtual machine scale set], [service bus], [azure NetApp files], [azure bastion], [private endpoints], [app service environment] and [application gateway] resources.
- Azure Image Builder template: This resource triggers the build and distribution of a VHD in a storage account. The VHD file is copied to a known storage account blob container and leveraged by [compute disks] and [compute images] resources. >Note: This resource is deployed and configured only if the 'Enable deployment of a VHD stored in a blob container' option is selected.
This group of resources has a dependency on one or more resources in the groups above.
- Virtual Machine: This resource is depending on the [virtual networks] and [Key Vault] deployed above. This resource is leveraged by the [network watcher] resource.
- Private DNS zone: This resource is depending on the [virtual networks] deployed above. This resource is leveraged by the [private endpoint] resource.
In addition to the above resources, the following secrets, keys and certificates are created in the Key Vaults deployed by the dependencies pipeline.
-
Shared Key Vault 'adp-<<namePrefix>>-az-kv-x-001'
- Key Vault secrets:
- administratorLogin: For [azure SQL server] .
- administratorLoginPassword: For [azure SQL server].
- vpnSharedKey: For [virtual network gateway connection].
- adminUserName: For [virtual machine].
- adminPassword: For [virtual machine].
- Key Vault keys:
- keyEncryptionKey: For [disk encryption set].
- Key Vault certificate:
- applicationGatewaySslCertificate: For [application gateway].
- Key Vault secrets:
-
SQL Mi Key Vault 'adp-<<namePrefix>>-az-kv-x-sqlmi'
- Key Vault secrets:
- administratorLogin: For [SQL managed instance].
- administratorLoginPassword: For [SQL managed instance].
- Key Vault keys:
- keyEncryptionKeySqlMi: For [SQL managed instance].
- Key Vault secrets:
The repository includes two major ReadMe files that should stay in sync with the available modules.
The first can be found in the repository root (README.md
) and the second in the modules folder (modules/README.md
).
The ReadMe pipeline is triggered each time changes are pushed to the main
branch and only if a template in the modules
folder is being altered. The pipeline leverages the script documented on the GitHub ReadMe module table update page.
Once triggered, the pipeline crawls through the library and updates the tables in each corresponding ReadMe file, creating links to the corresponding pipeline runs and updating the list of entries.
The purpose of the wiki pipeline is to sync any files from the docs/wiki
folder to the wiki repository. It is triggered each time changes are pushed to the main
branch and only if files in the docs/wiki
folder are altered.
Note: Any changes performed directly on the wiki via the UI will be overwritten by this pipeline.