azure-quickstart-templates/1-CONTRIBUTION-GUIDE
Bleau Gowland 36740c036e
docs: corrected typo
2023-08-10 16:14:03 +01:00
..
images new deploy to azure china graphics (#12162) 2022-02-14 17:38:06 -06:00
README.md docs: corrected typo 2023-08-10 16:14:03 +01:00
best-practices.md doc updates (#13037) 2022-12-07 15:35:56 -06:00
git-tutorial.md All readmes (#12580) 2022-07-05 18:31:54 -05:00
sample-README.md Update sample-README.md 2022-03-28 15:51:34 -05:00
useful-tools.md All readmes (#12580) 2022-07-05 18:31:54 -05:00

README.md

Azure Resource Manager QuickStart Templates

This repo contains all currently available Azure Resource Manager templates contributed by the community. A searchable template index is maintained at Azure Resource Manager Templates.

The following information is relevant to get started with contributing to this repository.

Deploying Samples

You can deploy these samples directly through the Azure Portal or by using the scripts supplied in the root of the repo.

To deploy a sample using the Azure Portal, click the Deploy to Azure button found in the README.md of each sample.

To deploy the sample via the command line (using Azure PowerShell or the Azure CLI) you can use the scripts below.

Simply execute the script and pass in the folder name of the sample you want to deploy.

For example:

PowerShell

.\Deploy-AzureResourceGroup.ps1 -ResourceGroupLocation 'eastus' -ArtifactStagingDirectory '[foldername]'

Bash

Please ensure that you have node and npm, jq and azure-cli installed.

./az-group-deploy.sh -a [foldername] -l eastus
  • If you see the following error: "syntax error near unexpected token `$'in\r''", run this command: 'dos2unix az-group-deploy.sh'.
  • If you see the following error: "jq: command not found", run this command: "sudo apt install jq".
  • If you see the following error: "node: not found", install node and npm.
  • If you see the following error: "az-group-deploy.sh is not a command", make sure you run "chmod +x az-group-deploy.sh".

Uploading Artifacts

If the sample has artifacts that need to be "staged" for deployment (Configuration Scripts, Nested Templates, DSC Packages) then set the upload switch on the command. You can optionally specify a storage account to use, if so the storage account must already exist within the subscription. If you don't want to specify a storage account one will be created by the script or reused if it already exists (think of this as "temp" storage for AzureRM).

PowerShell (explicit staging)

.\Deploy-AzureResourceGroup.ps1 -ResourceGroupLocation 'eastus' -ArtifactStagingDirectory '201-vm-custom-script-windows' -UploadArtifacts

Bash (explicit staging)

./az-group-deploy.sh -a [foldername] -l eastus -u

Note, that for samples that follow the best practices for artifacts in the repo, the -UploadArtifacts switch is not needed.

Contribution Guide

To make sure your template is added to Azure.com index, please follow these guidelines. PRs that do not follow these guidelines will not be merged.

Files, folders and naming conventions

  1. Every deployment template and its associated files must be contained in its own folder. Name this folder something that describes what your template does. Usually this naming pattern looks like someresource-someconfiguration or some-platform-Capability-to-demo (e.g. vm-from-user-image or active-directory-new-domain)
  • Required - samples should be located in the appropriate subfolder, not in the root.

    • application-workloads - contains templates that model specific application workloads for use in Azure. After deploying the workload users should be able to utilize the application as in a production environment.
    • demos - contains samples that demonstrate a particular workload or capability of the Azure platform. After deploying the sample users should be able to exercise those capabilities described. These samples are typically not meant to be general purpose or production workloads, though some may be suitable after modification
    • managementgroup-deployments - contains sample templates that must be deployed at the management group scope.
    • modules - contains reusable templates or modules that can be used to simplify the creation of common or standard resources. These can also be used as prereqs for samples in this repo.
    • quickstarts - contains sample templates that can be used to quickly provision a single or set of resources to for the purposes of evaluating the infrastructure.
    • subscription-deployments - contains sample templates that must be deployed at the subscription scope.
    • tenant-deployments - contains sample templates that must be deployed at the tenant scope.
  • Protip - Try to keep the name of your template folder short so that it fits inside the Github folder name column width.

  1. Github uses ASCII for ordering files and folder. For consistent ordering create all files and folders in lowercase. The only exception to this guideline is the README.md file, that should be in the format UPPERCASE.lowercase.

  2. Include a README.md file that explains how the template works.

  • Guidelines on the README.md file below.
  1. The bicep deployment file (optional) must be named main.bicep
  2. The JSON deployment template file (required only when bicep is not included) must be named azuredeploy.json.
  3. There should be a parameters file named azuredeploy.parameters.json.
  • Guidelines on using Bicep below

  • Use defaultValues in the template whenever there is a value that will work for all users. The parameters file, should contain only GEN* values for generating values for a test deployment. Do NOT use values that require changes by the user for a successful deployment (e.g. changeme).

  1. The template folder must contain a metadata.json file, the information in this file is used to create a searchable index at https://learn.microsoft.com/samples.
  • Pull Request Guidelines
  1. A single PR should reference a single template. There shouldn't be multiple templates/samples being updated in a single PR. Testing will block samples that update more than one sample.
  2. For each PR created the contributor needs to acknowledge the Contribution and Best Practices Guide.
  3. Each PR will run through the arm-ttk and Template Analyzer to ensure best practices
  4. Part of the pre-merge checks will be a deployment to both the Public and USGov Clouds unless otherwise indicated by metadata.json. All clouds must be supported unless the platform support is incomplete.

Target Scopes

Samples can be deployed to resourceGroup, subscription, managementGroup and tenant scope. The scope of deployment should match the scope of the workload. For example, while it's possible to deploy resources to a resourceGroup from a subscription scope template, this requires elevated permissions that users may not have. For example, resourceGroups should not be created as part of a resourceGroup workload by requiring deployment to the subscription scope. If the workload targets a resourceGroup, the sample's targetScope should target a resourceGroup.

The target scope itself should not be created by the sample unless the creation of the scope is the sample, for example creating managementGroup hierarchies.

Bicep support

We encourage new samples to be written directly in Bicep and encourage existing samples to be converted to support Bicep.

  1. The bicep file must be named main.bicep
  2. The azuredeploy.json must not be included in the PR as it will be built automatically when the sample is merged.
  3. The README.md file must include a link to the bicep badge
  4. The parameter file must still be named azuredeploy.parameters.json

An easy way to convert an existing sample to support Bicep is to use the Bicep decompiler:

bicep decompile azuredeploy.json --outfile main.bicep

The decompiler is not guaranteed to produce correct Bicep code from JSON, so you will need to inspect and modify the main.bicep file afterwards. Some general guidelines:

  1. Rename (F2 in VsCode) parameters and variables to be camel-cased.

  2. Rename resource symbolic names to a logical, short name, such as 'storage' or 'vmStorage' for a resource of type Microsoft.Storage/storageAccounts. Remove Name from the symbolic name if the decompiler creates it that way.

  3. Remove _var, _param and _resource prefixes if they are present in variables, parameters and resources.

  4. Use bicep concepts when possible

  5. See decompiling for current limitations of the Bicep decompiler.

  6. The top-level elements of the file must be in this order (if they exist):

    • targetScope
    • parameters
    • variables
    • resources and modules references
    • outputs
  7. Parameters should have a @description or @metadata decorator, and if other decorators are present, @description/@metadata should come first. Place a blank line before and after each parameter.

    @description('The location into which the resources should be deployed.')
    param location string = resourceGroup().location

    @description('The name of the SKU to use when creating the Azure Storage account.')
    @allowed([
      'Standard_LRS'
      'Standard_GRS'
      'Standard_ZRS'
      'Premium_LRS'
    ])

See also Best practices for Bicep

README.md

The README.md describes your deployment. A good description helps other community members to understand your deployment. The README.md uses Github Flavored Markdown for formatting text. If you want to add images to your README.md file, store the images in the images folder. Reference the images in the README.md with a relative path (e.g. ![alt text](images/namingConvention.png "Files, folders and naming conventions")). This ensures the link will reference the target repository if the source repository is forked. A good README.md contains the following sections:

  • Deploy to Azure/AzureGov button
  • Visualize button
  • Description of what the template will deploy
  • Tags, that can be used for search. Specify the tags comma separated and enclosed between two back-ticks (e.g Tags: cluster, ha, sql)
  • *Optional: Prerequisites
  • *Optional: Description on how to use the application
  • *Optional: Notes

You can download a sample README.md for use in your deployment scenario. The sample README.md also contains the code for the Deploy to Azure and Visualize buttons, that you can use as a reference.

metadata.json

A valid metadata.json must adhere to the following structure

{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/...",
  "itemDisplayName": "60 char limit",
  "description": "1000 char limit",
  "summary": "200 char limit",
  "githubUsername": "<e.g. bmoore-msft>",
  "dateUpdated": "<e.g. 2015-12-20>",
  "type": "QuickStart"
}

Guidelines on the metadata.json:

  • The schema for the metadata.json file can be found here
  • itemDisplayName: short description of the sample
  • summary: short summary of what the sample does or is meant to illustrate, 200 chars in length
  • description: long description for the sample, can be up to 1000 chars
  • githubUsername: user that owns the sample, don't change this unless you want to assume ownership
  • docOwner: used to identify the owner of any documentation that references this sample - the doc owner is notified of changes via PRs
  • validationType: if the sample requires manual validation, set this to Manual otherwise omit the property
  • type: type of sample, see the schema for possible value
  • environments: list of supported clouds, if omitted, all clouds will be tested and listed as supported
  • dateUpdated: the date the sample was last updated, this will be automatically updated when the PR is merged

Cloud Specific Parameter Files

If the sample needs separate parameter files for each cloud you can add each to the sample:

Cloud Parameter Filename
Azure Public Cloud azuredeploy.parameters.json
Azure US Government Cloud azuredeploy.parameters.us.json

If only one is provided it will be used for testing in all clouds.

Azure DevOps CI

We have automated template validation through Azure DevOps CI. These builds can be accessed by clicking the 'Details' link at the bottom of the pull-request dialog. This process will ensure that your template conforms to all the rules mentioned above and will also deploy your template to our test subscription.

Parameters File Placeholders

To ensure your template passes, special placeholder values are required when deploying a template, depending on how the parameter is used. For static values you can see the actual value used in the .config.json file in this repo.

  • GEN-UNIQUE[-N] - use this for a new globally unique resource name. The value will always be alpha numeric value with a length of [N], where [N] can be any number from 3 to 32 inclusive. The default length when N is not specified is 18.
  • GEN-SSH-PUB-KEY - use this if you need an SSH public key
  • GEN-PASSWORD - use this if you need a password
  • GEN-GUID - use this to generate a random GUID

Quickstart CI engine provides few pre-created azure components which can be used by templates for automated validation. This includes a key vault with sample SSL certificate stored, specialized and generalized Windows Server VHD's, a custom domain and SSL cert data for Azure App Service templates and more.

Virtual Network Related placeholders:

  • GEN-VNET-NAME - the name of the virtual network - this uses an existing vnet in the subscription and will not create a new vnet
  • GEN-VNET-RESOURCEGROUP-NAME - the name of the resource group for the virtual network
  • GEN-VNET-SUBNET1-NAME - the name of subnet-1
  • GEN-VNET-SUBNET2-NAME - the name of subnet-2

Key Vault Related placeholders:

  • GEN-KEYVAULT-NAME - the name of the keyvault
  • GEN-KEYVAULT-RESOURCEGROUP-NAME - the name of the resource group for the keyvault
  • GEN-KEYVAULT-FQDN-URI - the FQDN URI of the keyvault
  • GEN-KEYVAULT-RESOURCE-ID - the resource ID of the keyvault
  • GEN-KEYVAULT-PASSWORD-SECRET-NAME - the secret name for a password reference
  • GEN-KEYVAULT-PASSWORD-REFERENCE - the reference parameter used to retrieve a KeyVault Secret (use "reference" for the property name, not "value")
  • GEN-KEYVAULT-SSL-SECRET-NAME - the name of the secret where the sample SSL cert is stored in the keyvault
  • GEN-KEYVAULT-SSL-SECRET-URI - the URI of the sample SSL cert stored in the test keyvault
  • GEN-KEYVAULT-ENCRYPTION-KEY - the name of the sample encryption key stored in keyvault, used for disk encryption
  • GEN-KEYVAULT-ENCRYPTION-KEY-URI - the URI of the sample encryption key
  • GEN-KEYVAULT-ENCRYPTION-KEY-VERSION - the secret version of the sample encryption key
  • GEN-SF-CERT-URL - the URL of the sample service fabric certificate stored in keyvault
  • GEN-SF-CERT-THUMBPRINT - the thumbprint of the sample service fabric certificate stored in keyvault

Existing VHD related placeholders:

  • GEN-SPECIALIZED-WINVHD-URI - URI of a specialized Windows VHD stored in an existing storage account
  • GEN-GENERALIZED-WINVHD-URI - URI of a generalized Windows VHD stored in an existing storage account
  • GEN-GENERALIZED-WINVHD-FILENAME - the filename of the existing VHD
  • GEN-DATAVHD-URI - URI of a sample data disk VHD stored in an existing storage account
  • GEN-VHDSTORAGEACCOUNT-NAME - Name of storage account in which the VHD's are stored
  • GEN-VHDRESOURCEGROUP-NAME - Name of resource group in which the existing storage account having VHD's resides

Custom Domain & SSL Cert related placeholders:

  • GEN-CUSTOM-WEBAPP-NAME - placeholder for the name of azure app service where you'd want to attach custom domain
  • GEN-CUSTOM-FQDN-NAME - sample custom domain which can be added to an App Service
  • GEN-CUSTOM-DOMAIN-SSLCERT-THUMBPRINT - SSL cert thumbprint for the custom domain used in the custom FQDN
  • GEN-CUSTOM-DOMAIN-SSLCERT-PASSWORD - Password of the sample SSL cert
  • GEN-CUSTOM-DOMAIN-SSLCERT-PFXDATA - PFX data for the sample SSL cert
  • GEN-SELFSIGNED-CERT-PFXDATA - PFX data for a sample self signed cert
  • GEN-SELFSIGNED-CERT-CERDATA - CER data for a sample self signed cert
  • GEN-SELFSIGNED-CERT-PASSWORD - password for a sample self signed cert
  • GEN-SELFSIGNED-CERT-DNSNAME - DNS name for a sample self signed cert

Custom Domain & SSL Cert related placeholders:

  • GEN-FRONTDOOR-NAME - placeholder for the frontdoor name reserved for CI/CD
  • GEN-FRONTDOOR-CUSTOM-HOSTNAME - custom hostname with CNAME record mapped for the GEN-FRONTDOOR-NAME value

AppConfiguration Store related placeholders:

  • GEN-APPCONFIGSTORE-NAME - placeholder for the Microsoft.AppConfiguration/configurationStores

  • GEN-APPCONFIGSTORE-RESOURCEGROUP-NAME - resource group name for the AppConfig store

  • GEN-APPCONFIGSTORE-KEY1 - sample key/value stored in the AppConfig store, label is "template"

  • GEN-APPCONFIGSTORE-WINDOWSOSVERSION - sample key/value with a SKU Name for a windows server image, label is "template"

  • GEN-APPCONFIGSTORE-DISKSIZEGB - sample key/value with a disk size, in GB for a VM disk, label is "template"

  • GEN-USER-ASSIGNED-IDENTITY-NAME - name of a userAssigned MSI that has permission to the keyvault secrets

  • GEN-USER-ASSIGNED-IDENTITY-RESOURCEGROUP-NAME - resource group of the userAssigned identity for retrieving the resourceId

  • GEN-MACHINE-LEARNING-SP-OBJECTID - objectId of the Azure ML Service Principal in the tenant

  • GEN-COSMOS-DB-SP-OBJECTID - objectId of the Cosmos DB Service Principal in the tenant

Static website related placeholders:

  • GEN-STATIC-WEBSITE-URL - full URL of a static website
  • GEN-STATIC-WEBSITE-HOST-NAME - host name of a static website

Here's an example in an azuredeploy.parameters.json file:


{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
 "newStorageAccountName":{
  "value": "GEN-UNIQUE"
 },
 "adminUsername": {
  "value": "GEN-UNIQUE"
 },
 "sshKeyData": {
  "value": "GEN-SSH-PUB-KEY"
 },
 "dnsNameForPublicIP": {
  "value": "GEN-UNIQUE-13"
 }
}

In general, when following the best practices for the repo, you should never have any absolute URLs in a sample. Any files needed for the sample must be hosted in the Azure/azure-quickstart-templates repo and the samples must reference those samples using the pattern described in the best practices document.

Template Pre-requisites

If your template has some pre-requisite such as existing Virtual Network or storage account, you should also submit pre-requisite template which deploys the pre-requisite components. CI automated validation engine automatically validates and deploy the pre-requisite template first and then deploys the main template. Prereqs can be provided using JSON or bicep templates following the same guidelines used for the sample templates. In addition, the following guidelines would help you in understanding how to leverage this capability.

  • Create a folder named prereqs in root of your template folder, Store pre-requisite template file, parameters file and artifacts inside this folder.
  • Store pre-requisite template file with name prereq.azuredeploy.json or prereq.main.bicep and parameters files with name prereq.azuredeploy.parameters.json
  • The prereq template should deploy all required pre-existing resources by your main template and also output the values required by main template to leverage those resources. For example, if your template needs an existing VNET to be available prior to the deployment of main template, you should develop a pre-req template which deploys a VNET and outputs the VNET ID or VNET name of the virtual network created.
  • In order to use the values generated by outputs after deployment of the prereq template, you will need to define parameter values as GET-PREREQ-OutputName. For example, if you generated a output with name vnetID in pre-req template, in order use the value of this output in main template, enter the value of corresponding parameter in main template parameters file as GET-PREREQ-vnetID
  • You can search for other samples that use prereqs to see examples of how to provide them
  • If the prereqs and the sample must be deployed to the same resource group add a file named .settings.json to the prereqs folder and put the following json snippet into the file (the comment is optional). Do this only if required by the sample, otherwise it may block customer deployment scenarios:
{
    "comment": "If prereqs need to be deployed to the same resourceGroup as the rest of the sample set the PrereqResourceGroupNameSuffix property to an empty string - otherwise you can omit this file",
    "PrereqResourceGroupNameSuffix": ""
}

Portal Deployments with createUiDefinition.json

You can optionally provide a UI Definition file to customize the deployment experience in the Azure portal. If one is provided, be sure to update the links in the readme file to include the createUiDefinition.json file in the url. See the sample-README.md file for an example.

More information can be found at the links below - the documentation is tailored for the marketplace but the schema and behavior for createUiDefinition is a generic construct for the Azure portal.

createUiDefinition Overview

createUiDefinition UI elements reference

testing createUiDefinition

Diagnosing Failures

If your deployment fails, check the details link of the Azure DevOps build, which will take you to the log. If the template deployment was attempted, you can see what parameters were used and the error that was encountered during deployment. These values are the values you need to reproduce the error. Keep in mind, that depending on the resources allocated, it can take a few minutes for the CI system to cleanup provisioned resources.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.