This repository demonstrates AI-powered GitOps practices for Azure Landing Zones using Azure Verified Modules (AVM). It showcases how modern AI tools like Warp can accelerate enterprise infrastructure deployment while maintaining security and compliance through automated validation and policy enforcement.
What makes this different: Instead of traditional manual infrastructure deployment, this project combines Microsoft's battle-tested AVM modules with GitOps automation and AI-assisted development to create a reproducible, secure, and cost-effective Azure Landing Zone in minutes rather than weeks.
Based on the LinkedIn article, this demonstrates modern infrastructure patterns that enterprise teams can adopt immediately.
π Repository Update (Sept 2025): This repository has been reorganized for better structure and usability. Documentation moved from nested folders to
docs/, deployment reports now include interactive HTML dashboards indeployment-reports/, and production-ready templates are consolidated inblueprints/with development work ininfra/. All links have been updated accordingly.π Policy Compliance Update (Oct 2025): Updated configurations for DEP policy compliance. App Service Plans now use B1 SKU (development-appropriate), AKS updated to latest stable version (1.27), and deployment tags updated for GitHub Actions integration. See Policy Compliance Update for details.
- ποΈ Hub and Spoke Network Architecture
- β‘ Quick Start - Choose Your Path
- π Documentation Library
- π GitHub Actions Workflows
- π― How to Use This Repository
- π‘οΈ Repository Standards & Best Practices
- ποΈ Repository Structure
- π― Why This Matters
- π‘ Key Features
- π° FinOps & Cost Estimation
- π― Azure Verified Modules (AVM) Overview
- π§ͺ Testing & Deployment
- π Learning Resources & Official Guides
- π€ Contributing
- π Related Documents
- π License
- π Acknowledgments
Enterprise-Grade Network Design with Modern Security
This Azure Landing Zone implements a comprehensive hub and spoke network architecture based on Zero Trust principles and modern Azure services. The design provides scalable, secure, and cost-effective infrastructure patterns for enterprise workloads.
Key Features:
- β Zero Trust Networking - Entra Private Access replaces traditional VPN
- β Private Cluster Support - Full AKS integration with CNI networking
- β Modern Security - Azure Firewall Premium with IDPS and TLS inspection
- β Scalable Design - Ready for multi-spoke expansion
- β Cost Optimized - Flexible SKUs for dev/test vs production
- β AVM Based - Uses Microsoft's verified modules for consistency
| Component | Bicep Status | Terraform Status | Configuration |
|---|---|---|---|
| Core Networking | β Complete | β Complete | Hub-Spoke VNets with peering |
| Application Services | β Web Apps, Storage | β Web Apps, Storage | App Service Plan, Storage Account |
| Container Services | β ACR Premium | β ACR Premium | Private endpoints enabled |
| AKS Integration | β Complete | Private cluster, dual node pools | |
| Security Services | Azure Firewall, NSGs | ||
| Data Services | PostgreSQL Flexible, Key Vault | ||
| Monitoring | β Log Analytics | β Log Analytics | Centralized logging |
| Private Networking | β Private DNS | β Private DNS | Private endpoints, DNS zones |
Legend: β
Complete,
π Complete Configuration Management Guide β
Centralized YAML Configuration - Single source of truth for all deployments:
# config/alz-components.yaml
global:
environment: 'sandbox'
organizationPrefix: 'alz'
location: 'westeurope'
containers:
aks:
enabled: true
version: '1.30'
privateCluster: true
containerRegistry:
enabled: true
sku: 'Premium' # Auto-adjusts to "Standard" for sandbox
applications:
webApps:
enabled: true
servicePlan:
sku: 'B1' # Cost-optimized for sandboxAuto-Generate Deployment Files:
# Generate both Bicep and Terraform configurations
./scripts/parse-config.py config/alz-components.yaml --all
# Output:
# β
Generated Bicep parameters: main.parameters.generated.json
# β
Generated Terraform variables: terraform.generated.tfvars
# β
Generated status report: component-status.mdKey Benefits:
- π― Single Source of Truth - One file controls all deployments
- π Environment Overrides - Different SKUs for dev/prod automatically
- π° Cost Optimization - Automatic tier adjustments by environment
- π Component Tracking - Auto-generated status reports
- β‘ Consistency - Same config generates both Bicep and Terraform files
Choose your deployment method:
# Navigate to Terraform foundation template
cd blueprints/terraform/foundation
# Initialize and deploy
terraform1.9 init
terraform1.9 plan -var-file="terraform.tfvars" -out="tfplan"
terraform1.9 apply tfplanCost: ~$55/month | Resources: 21/22 deployed | Time: 3 minutes
az login
az account set --subscription "your-subscription-id"
az deployment sub create \
--location "westeurope" \
--template-file blueprints/bicep/hub-spoke/main.bicep \
--parameters blueprints/bicep/hub-spoke/main.parameters.json \
--name "alz-sandbox-$(date +%Y%m%d-%H%M%S)"Cost: ~$30/month | Result: Complete hub-spoke ALZ with compliance
Enhanced deployments with full observability and cost tracking:
# Deploy with automated reporting, cost analysis, and security assessment
./automation/scripts/deploy-with-report.shKey Features:
- π Pre-deployment validation and resource inventory
- π° Cost analysis with Infracost integration
- π Security assessment and compliance scoring
- π Interactive HTML reports with historical tracking
π View Live Deployment Reports Dashboard
π Comprehensive Reporting Documentation:
- Deployment Reporting Guide - Complete setup and usage
- Cost Estimation Guide - Infracost integration and optimization
- GitHub Pages Setup - Auto-publishing reports
New to Azure Landing Zones? Start here:
- Azure Sandbox Policies Overview - Understand the rules and requirements
- Hub-Spoke Design - β Core network architecture including AKS integration
- Configuration Management Guide - ποΈ Centralized component configuration
- AVM Deployment Guide - Complete deployment walkthrough
- AKS Configuration Guide - Comprehensive AKS setup and configuration
- AKS Deployment Guide - Step-by-step AKS deployment walkthrough
- Pre-commit Errors Analysis - Fix common issues
Setting up for contribution:
git clone https://github.com/ma3u/azm-alz-min.git
cd azm-alz-min
pip install pre-commit && pre-commit install
# Run comprehensive validation
./automation/scripts/validate-deployment.shThe validation script checks: Prerequisites, template compilation, AVM modules, pre-commit hooks, and security configuration.
Official setup guides:
For automated CI/CD pipelines with Azure authentication:
This repository includes GitHub Actions workflows that require Azure authentication. Set up a Service Principal for secure, automated deployments:
π Automated Setup (Recommended):
# Run the automated authentication setup script
./automation/scripts/setup-github-auth.shWhat this creates:
- β
Service Principal:
sp-github-actions-alz-sandboxwith Contributor access - π GitHub Secrets: All 5 required secrets automatically set in your repository
- π Local Credentials: Stored securely in
.secrets/directory (git-ignored) - π§ͺ Authentication Test: Verifies Service Principal can access your Azure resources
π Manual Setup (Alternative):
If you prefer manual setup, follow the detailed guide: GitHub Authentication Setup Guide
Required GitHub Secrets:
AZURE_CREDENTIALS- Full JSON credentials objectAZURE_CLIENT_ID- Service Principal application IDAZURE_CLIENT_SECRET- Service Principal passwordAZURE_SUBSCRIPTION_ID- Your Azure subscription IDAZURE_TENANT_ID- Your Azure tenant ID
π Verify Setup:
# Check if secrets are configured
gh secret list
# Test Service Principal authentication locally
az login --service-principal \
--username $(cat .secrets/sp-client-id.txt) \
--password $(cat .secrets/sp-client-secret.txt) \
--tenant $(cat .secrets/azure-credentials.json | jq -r '.tenantId')π‘οΈ Security Notes:
- Service Principal has sandbox-only access (limited to your subscription)
- Credentials are encrypted in GitHub and git-ignored locally
- Regular credential rotation recommended for production use
- Setup creates comprehensive audit trail in
.secrets/github-auth-setup-report.md
π‘ Pro Tip: After setup, your GitHub Actions workflows will automatically authenticate and deploy without manual intervention. Check the Actions tab to see deployments in progress!
Successfully deployed on October 7, 2025 using blueprints/terraform/foundation/:
π Deployment Summary:
- Total Resources: 21 of 22 planned resources deployed successfully
- Deployment Time: ~3 minutes
- Estimated Cost: ~$8-10/month (without web app due to policy)
- Status: β PRODUCTION READY
ποΈ Successfully Deployed Infrastructure:
β
Core Networking:
β’ Hub Resource Group: rg-alz-hub-sandbox
β’ Spoke Resource Group: rg-alz-spoke-sandbox
β’ Hub VNet: vnet-alz-hub-sandbox (10.0.0.0/16)
β’ Spoke VNet: vnet-alz-spoke-sandbox (10.1.0.0/16)
β’ VNet Peering: Hub β Spoke (Connected)
β
Security & Services:
β’ Container Registry: acralzsandboxxoi9q02m (Premium SKU)
β’ Private Endpoint: ACR with private DNS zone
β’ Storage Account: stalzsandboxxoi9q02m
β’ Log Analytics: log-alz-hub-sandbox
β’ App Service Plan: asp-alz-sandbox
β οΈ Expected Policy Block:
β’ Web App: Blocked by governance policy (expected behavior)π― Key Benefits Demonstrated:
- Native Azure Provider resources (no AVM module dependencies)
- Hub-Spoke networking with proper security segmentation
- Premium Container Registry with vulnerability scanning
- Private endpoints for secure connectivity
- Comprehensive monitoring and logging setup
- Cost-optimized for sandbox environments
π° Cost Breakdown:
- Container Registry Premium: ~$50/month (includes security scanning)
- App Service Plan B1: ~$13/month
- Private Endpoints: ~$7/month
- Other services: ~$2/month
- Sandbox Total: ~$70/month (production-grade) or ~$18/month (dev-optimized)
π Quick Deployment:
cd blueprints/terraform/foundation
terraform1.9 init
terraform1.9 plan -var-file="terraform.tfvars" -out="tfplan"
terraform1.9 apply tfplanπ Learn More: Terraform Deployment Guide
- π Azure Sandbox Policies Overview - Main policy reference and rules
- β‘ AVM Deployment Guide - Primary deployment walkthrough
- π Pre-commit Errors Analysis - Fix common issues
- ποΈ Configuration Management Guide - β Centralized YAML-based configuration system
- π οΈ Pre-commit Hooks Guide - Code quality automation
- π GitHub Authentication Setup Guide - Service Principal setup for GitHub Actions
- ποΈ Terraform Deployment Guide - Terraform-specific procedures
- π Terraform CI/CD Guide - GitHub Actions automation
- π AVM Modules Guide - AVM reference and best practices
- π Deployment Reporting Guide - Comprehensive deployment insights with HTML dashboards
π Complete Workflows Documentation β
Comprehensive guide to all GitHub Actions workflows supporting both Bicep and Terraform deployments:
π― Core Deployment Workflows:
- Bicep ALZ Sandbox - Deploy and validate ALZ using Bicep templates
- Terraform ALZ Deployment - Deploy ALZ using Terraform with enhanced error handling
- Terraform ALZ Full Deployment - Complete enterprise-scale deployment
π Security & Compliance:
- Security Compliance - Comprehensive security scanning and validation
- Infrastructure Validation - Code quality and best practices validation
π§Ή Cleanup & Maintenance:
- Terraform ALZ Cleanup - Clean up resources with 'tf' and 'bi' prefixes
- Pre-commit - Automated code quality checks
π° Cost Management:
- Infracost - Automated cost estimation for infrastructure changes
Key Features:
- β Enhanced resource conflict detection and import handling
- π Automatic workspace management
- π‘οΈ Comprehensive security scanning
- π° Integrated cost estimation
- π Deployment reporting and documentation publishing
- π§Ή Automated cleanup for sandbox environments
- π’ Azure DevOps Setup - Enterprise CI/CD pipelines
- π GitHub-Azure DevOps Sync - Dual repository strategy
- π Deployment Guide - Classic step-by-step deployment
- π ACR Vulnerability Scanning Guide - Container security
- π‘οΈ Zero Trust Maturity Roadmap - Security progression
πββοΈ First-Time Users
- Read Azure Sandbox Policies Overview
- Follow AVM Deployment Guide
- Result: Working ALZ (~$30/month, 10 minutes)
π§ Developers
- Set up tools: Pre-commit Hooks Guide
- Choose IaC: Terraform Deployment Guide or Bicep
- Automate: Terraform CI/CD Guide
π Enterprise Teams
- Plan: Azure DevOps Setup
- Secure: Zero Trust Maturity Roadmap
- Scale: GitHub-Azure DevOps Sync
Required:
- Azure subscription with Contributor permissions
- Azure CLI (v2.50.0+)
- Bicep or Terraform 1.9+
Recommended:
- Warp Terminal for AI assistance
- Pre-commit framework for quality checks
- VS Code with Bicep or Terraform extensions
Check AVM module availability:
az rest --method GET --url "https://mcr.microsoft.com/v2/bicep/avm/res/{service}/{resource}/tags/list" | jq -r '.tags[]' | sort -V | tail -5| Priority | Template | Status | Use Case | Last Verified |
|---|---|---|---|---|
| 1st | blueprints/bicep/hub-spoke/main.bicep |
β WORKING | Hub-Spoke ALZ | Sept 2025 |
| 2nd | blueprints/bicep/foundation/main.bicep |
β WORKING | Basic ALZ | Sept 2025 |
| 3rd | blueprints/terraform/foundation/ |
β VERIFIED | Terraform ALZ | Oct 2025 |
- Check AVM First: Always verify module availability at AVM Registry
- Use Working Templates: Start from tested templates above
- Follow Naming: Use consistent Azure naming conventions
- Pre-commit Validation: Run hooks before every commit
Quick AVM pattern:
module keyVault 'br/public:avm/res/key-vault/vault:0.4.0' = {
name: 'keyVaultDeployment'
params: {
name: 'kv-${environment}-${uniqueString(subscription().id)}'
location: location
enableRbacAuthorization: true
}
}For detailed guidance: Pre-commit Errors Analysis
The Problem: Traditional Azure Landing Zone deployments take weeks of manual configuration, prone to security gaps and inconsistencies.
Our Solution: AI-enhanced GitOps using Microsoft's battle-tested Azure Verified Modules (AVM) delivers secure, compliant infrastructure in minutes.
- β‘ Speed: Deploy complete ALZ in 10 minutes vs. weeks
- π‘οΈ Security: Built-in Zero Trust Level 1 compliance
- π° Cost-Effective: Sandbox testing for ~$30/month
- π€ AI-Enhanced: Warp integration for intelligent development
- π Standardized: Microsoft's 14+ million deployment track record
azure-landingzone/
βββ blueprints/ # π Production-ready templates (RECOMMENDED)
β βββ bicep/ # β
Bicep templates using AVM modules
β β βββ hub-spoke/ # Hub-spoke ALZ (~$30/month sandbox)
β β βββ foundation/ # Basic foundation ALZ
β βββ terraform/ # β
Terraform alternatives with AVM
β βββ foundation/ # Terraform-based ALZ
βββ infra/ # π§ Development and legacy templates
β βββ accelerator/ # Original AVM-based deployment templates
β βββ bicep/ # Development Bicep templates
β β βββ sandbox/ # Sandbox-specific implementations
β βββ terraform/ # Development Terraform templates
βββ docs/ # π Complete documentation library
βββ automation/scripts/ # π€ Deployment and validation scripts
βββ deployment-reports/ # π Automated deployment reports with HTML dashboards
βββ sandbox/ # π§ͺ Terraform sandbox examples and testing
βββ .github/workflows/ # βοΈ GitHub Actions CI/CD automation
βββ environments/ # π Environment-specific configurations
βββ examples/ # π‘ Sample implementations and tutorials
βββ archived/ # π¦ Archived templates and deprecated code
- Hub-Spoke Architecture: Cost-optimized networking with centralized services (~$30/month) - Available in
blueprints/bicep/hub-spoke/ - Foundation Pattern: Basic single-subscription ALZ for development and testing - Available in
blueprints/bicep/foundation/ - Enterprise Pattern: Multi-subscription with management groups and subscription vending - Available in
infra/accelerator/ - Security Framework: Zero Trust progression from Level 1 to enterprise-grade
- Deployment Reports: Interactive HTML dashboards available in
deployment-reports/with cost, security, and resource analysis
- Sandbox: Single subscription testing (~$30/month)
- Enterprise: Multi-subscription with management groups
- Hybrid: Bicep and Terraform support
- Zero Trust Level 1: MFA, RBAC, network segmentation
- Policy as Code: 13+ automated security validations
- Audit Trail: Complete GitOps change tracking
- Warp Terminal: Context-aware infrastructure assistance
- Intelligent Debugging: AI-powered error resolution
- Template Generation: Automated AVM module discovery
- Pre-commit Hooks: 13+ validation tools
- Multi-stage CI/CD: GitHub Actions and Azure DevOps
- Compliance Scanning: Checkov, TFSec, PSRule integration
Professional infrastructure cost management integrated into your deployment pipeline using industry-standard tools and real-time Azure pricing data.
Why Cost Estimation Matters:
- Prevent Surprises: Know costs before deploying infrastructure
- Budget Planning: Accurate monthly estimates for financial planning
- Cost Optimization: Identify expensive resources and alternatives
- Compliance: Track spending against budgets and policies
Infracost - Industry-standard Infrastructure as Code cost estimation:
- β Real-time Azure Pricing: Direct API integration with Microsoft Azure pricing
- β 400+ Resources Supported: Comprehensive coverage of Azure services
- β CI/CD Native: Automatic cost estimates on every pull request
- β Zero Maintenance: No manual price updates or resource mapping
- β Free Tier: 10,000 resources per month at no cost
Automated cost estimation for Terraform templates:
# Local cost analysis
cd blueprints/terraform/foundation
infracost breakdown --path .
# Project-wide analysis
infracost breakdown --config-file infracost.ymlExample Output:
Name Monthly Qty Unit Monthly Cost
azurerm_container_registry.main
ββ Registry usage (Premium) 30 days $50.00
ββ Storage (over 500GB) 100 GB $10.00
ββ Build vCPU 0 seconds $0.00
azurerm_service_plan.main
ββ Instance usage (B1) 730 hours $13.14
OVERALL TOTAL $73.14
Automatic cost analysis on every PR:
- π¬ PR Comments: Detailed cost breakdowns posted automatically
- π Cost Diffs: Compare costs between branches
- π¨ Cost Alerts: Warnings for high-cost changes
- π Optimization Tips: Recommendations for cost reduction
Azure Landing Zone Foundation Template (Terraform) - Actual deployment tested October 7, 2025:
| Resource Type | Monthly Cost | Purpose | Deployment Status | Optimization Options |
|---|---|---|---|---|
| Container Registry Premium | $49.99 | Enterprise security, geo-replication | β Deployed | Basic tier: $5.00 (dev) |
| App Service Plan B1 | $13.14 | Basic web workloads | β Deployed | Free tier (limitations) |
| Private Endpoint | $7.30 | Secure connectivity | β Deployed | Public endpoints (free, less secure) |
| Private DNS Zone | $0.50 | DNS resolution | β Deployed | Required for private networking |
| Web App | $0.00 | Application hosting | Policy restriction (expected) | |
| Total Deployed Costs | $70.94 | Per month (full config) | 21/22 resources | Actual: ~$55/month |
β Verified Deployment Results:
- Resources Deployed: 21 out of 22 planned resources
- Policy Compliance: Web app blocked by governance (expected)
- Actual Monthly Cost: ~$55/month (without blocked web app)
- Deployment Time: 3 minutes using
terraform1.9
Usage-Based Resources:
- Log Analytics: $2.76/GB ingested
- Storage Account: $0.0196/GB + operations
- VNet Peering: $0.01/GB transferred
- Container Registry Storage: $0.10/GB over 500GB
| Environment | Monthly Cost | Key Features | Use Case |
|---|---|---|---|
| Development | $18-25 | Basic tiers, public endpoints | Learning, testing |
| Sandbox | $30-35 | Standard tiers, basic security | Proof of concept |
| Production | $70-100 | Premium tiers, private networking | Enterprise workloads |
| Enterprise ALZ | $4,140+ | Full compliance, redundancy | Multi-subscription setup |
-
Get Infracost API Key:
- Sign up at https://dashboard.infracost.io
- Free tier: 10,000 resources/month
-
Configure Locally:
# Install Infracost brew install infracost # Set API key infracost configure set api_key ico-your-api-key-here # Test on Azure Landing Zone cd blueprints/terraform/foundation infracost breakdown --path .
-
GitHub Integration:
# Add repository secret Repository β Settings β Secrets and variables β Actions Name: INFRACOST_API_KEY Value: ico-your-api-key-here
Project Configuration (infracost.yml):
version: 0.1
projects:
- path: blueprints/terraform/foundation
name: alz-terraform-foundation
terraform_plan_flags: -var-file=terraform.tfvars
currency: USDUsage Patterns (infracost-usage.yml):
resource_usage:
azurerm_log_analytics_workspace.main:
monthly_data_ingestion_gb: 50 # Monitoring data
azurerm_storage_account.main:
storage_gb: 1000 # Application data
monthly_tier_1_requests: 100000 # Read operationsReduce costs to ~$18/month:
# terraform.tfvars - Development settings
enable_container_registry = false # Save $50/month
# OR
container_registry_sku = "Basic" # Save $45/month
enable_private_endpoints = false # Save $8/month
app_service_plan_sku = "F1" # Free tier (limitations)Optimize without sacrificing security:
- Reserved Instances: 37% savings for predictable workloads
- Azure Hybrid Benefit: Use existing Windows licenses
- Auto-shutdown: Schedule VM downtime for dev/test environments
- Right-sizing: Monitor actual usage vs. allocated resources
Track costs across environments:
- π GitHub Actions Summary: Automatic cost tracking in workflows
- π Deployment Reports: Cost breakdown in HTML dashboards
- π¨ Budget Alerts: Configurable thresholds for cost overruns
- π± Mobile Notifications: Slack/Teams integration for cost alerts
Issue: Infracost shows "price not found"
# Solution: Update to latest module versions
terraform init -upgrade
infracost breakdown --path .Issue: Cost estimates seem high
# Solution: Check for premium SKUs
grep -r "Premium\|Standard" *.tf
# Consider Basic tiers for development- Regular Reviews: Review cost estimates monthly
- Environment Parity: Keep cost configurations aligned across environments
- Team Training: Ensure developers understand cost implications
- Budget Monitoring: Set up Azure Cost Management budgets for actual tracking
- Automation: Use Infracost in CI/CD for every infrastructure change
- Complete Cost Estimation Guide - Detailed setup and usage
- Infracost Test Results - Real-world analysis results
- Cost Optimization Examples - Savings strategies
- Infracost Documentation - Official Infracost docs
- Azure Pricing Calculator - Manual cost estimation
- Azure Cost Management - Actual spend tracking
Azure Verified Modules represents Microsoft's production-ready Infrastructure as Code standard with 14+ million deployments and full enterprise support.
- β Battle-Tested: 14+ million real deployments
- β Microsoft Backed: Full FTE team support
- β Security Built-in: Compliance and best practices by default
- β Consistent: Standardized patterns across all Azure services
Learn more: AVM Documentation | AVM Modules Guide
Cost-effective validation: Test all AVM patterns in a single subscription for ~$30/month without Management Group requirements.
Quick deployment:
az login
az deployment sub create \
--location "westeurope" \
--template-file blueprints/bicep/hub-spoke/main.bicep \
--parameters blueprints/bicep/hub-spoke/main.parameters.json \
--name "alz-sandbox-$(date +%Y%m%d-%H%M%S)"Learn more: AVM Deployment Guide | Terraform Deployment Guide
Full-scale ALZ: Management groups, subscription vending, compliance policies, and Zero Trust Level 1 security framework.
Key components: Hub-spoke networking, private endpoints, policy enforcement, cost management, monitoring.
Learn more: Azure DevOps Setup | Zero Trust Maturity Roadmap
- Azure Landing Zones - Microsoft's official ALZ guidance
- Azure Verified Modules - Complete AVM reference
- AVM Bicep Registry - Source code for all AVM Bicep modules
- AVM Terraform Registry - Terraform AVM modules search
- Azure Well-Architected Framework - Enterprise architecture principles
- Azure Bicep Documentation - Infrastructure as Code with Bicep
- Azure CLI Tutorial - Get started with Azure CLI
- Terraform on Azure - Official Terraform + Azure guide
- GitHub Actions for Azure - CI/CD automation
- Azure DevOps Pipelines - Enterprise CI/CD
- Azure Security Benchmark - Security baseline
- Zero Trust Architecture - Microsoft Zero Trust guidance
- Azure Policy - Governance and compliance
- Azure RBAC - Access control best practices
- Warp Terminal - AI-powered terminal for developers
- GitHub Copilot - AI pair programming
- Azure OpenAI Service - Enterprise AI services
We welcome contributions! Please follow our development workflow:
- Fork the repository
- Create feature branch:
git checkout -b feature/new-feature - Install pre-commit hooks:
pre-commit install - Make changes and test locally
- Submit Pull Request
Development guidelines: Pre-commit Hooks Guide
- π Azure Sandbox Policies Overview - Main policy reference and rules
- β‘ AVM Deployment Guide - Primary deployment walkthrough
- π Pre-commit Errors Analysis - Fix common issues
- π οΈ Pre-commit Hooks Guide - Code quality automation
- ποΈ Terraform Deployment Guide - Terraform-specific procedures
- π Terraform CI/CD Guide - GitHub Actions automation
- π AVM Modules Guide - AVM reference and best practices
- π’ Azure DevOps Setup - Enterprise CI/CD pipelines
- π GitHub-Azure DevOps Sync - Dual repository strategy
- π Deployment Guide - Classic step-by-step deployment
- π ACR Vulnerability Scanning Guide - Container security
- π‘οΈ Zero Trust Maturity Roadmap - Security progression
This project is licensed under the MIT License - see the LICENSE file for details.
Special thanks to:
- Azure Landing Zones Community for enterprise-grade architecture guidance and patterns
- Azure Verified Modules (AVM) Community for production-ready Infrastructure as Code modules
- VS Code Extension Teams for Terraform and Bicep development tools
- Warp Team for building AI-enhanced development workflows
π Article: AI-Powered GitOps for Azure Landing Zones ποΈ AVM Version: 0.4.0+ π Last Updated: 2025-09-28 π¨βπ» Author: Matthias Buchhorn-Roth
