Skip to content

Commit be50692

Browse files
authored
Merge pull request #76 from venkatapgummadi/feat/canary-deployment-activity
feat: add Canary deployment activity to Deployment dimension
2 parents 03b33bd + f889bca commit be50692

2 files changed

Lines changed: 69 additions & 0 deletions

File tree

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,70 @@ Build and Deployment:
3838
isImplemented: false
3939
evidence: ""
4040
comments: ""
41+
Canary deployment:
42+
uuid: c4204a32-2545-4424-b524-d1cc52b46abd
43+
description: |-
44+
A *canary deployment* gradually shifts a small fraction of production
45+
traffic to a new artifact version while monitoring service-level
46+
indicators and security signals. If error rates, latency, or security
47+
scanners (such as DAST probes against the canary fleet) report
48+
anomalies, traffic is rolled back automatically before the new
49+
version reaches the broader production population.
50+
51+
Compared to *Blue/Green Deployment*, canary requires only a small
52+
delta in infrastructure cost (commonly 5-10% additional capacity
53+
rather than a doubled environment) but demands more sophisticated
54+
traffic-control infrastructure such as a service mesh, an
55+
application load balancer with weighted routing, or a feature-flag
56+
platform.
57+
risk: |-
58+
A new artifact version can introduce regressions or security
59+
issues. Promoting it to 100% of production traffic in one step
60+
exposes the entire user population to those issues before they
61+
can be detected.
62+
measure: |-
63+
Adopt a canary deployment strategy in which a small percentage of
64+
production traffic (commonly 1-10%) is routed to the new artifact
65+
version for a defined observation window. Promotion to higher
66+
traffic percentages is gated on automated SLI checks (error rate,
67+
latency, saturation) and security checks (DAST, runtime anomaly
68+
detection). Rollback must be automated and triggered by gate
69+
failure without human intervention.
70+
assessment: |
71+
- Canary stage exists in the deployment pipeline with a configured
72+
initial traffic percentage and observation window.
73+
- Automated promotion and rollback gates are defined based on SLIs
74+
and security signals.
75+
- Audit logs of canary deployments and their promotion or rollback
76+
decisions are retained.
77+
difficultyOfImplementation:
78+
knowledge: 3
79+
time: 2
80+
resources: 2
81+
usefulness: 3
82+
level: 4
83+
implementation:
84+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/canary-deployment
85+
dependsOn:
86+
- 67e1a9aa-9fbf-4ec5-a2de-400f01960c51 # Automated deployment process
87+
references:
88+
samm2:
89+
- I-SD-A-3
90+
iso27001-2017:
91+
- 12.1.2 # Change management
92+
- 12.5.1 # Installation of software on operational systems
93+
- 14.2.2 # System change control procedures
94+
- 14.2.9 # System acceptance testing
95+
- 17.2.1 # Availability of information processing facilities
96+
iso27001-2022:
97+
- 8.14
98+
- 8.19
99+
- 8.29
100+
- 8.31
101+
- 8.32
102+
isImplemented: false
103+
evidence: ""
104+
comments: ""
41105
Defined decommissioning process:
42106
uuid: da4ff665-dcb9-4e93-9d20-48cdedc50fc2
43107
description: |-

src/assets/YAML/default/implementations.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,11 @@ implementations:
7575
name: Blue/Green Deployments
7676
tags: []
7777
url: https://martinfowler.com/bliki/BlueGreenDeployment.html
78+
canary-deployment:
79+
uuid: cd49f792-a158-4b93-ac55-fd773954b217
80+
name: Canary release
81+
tags: []
82+
url: https://martinfowler.com/bliki/CanaryRelease.html
7883
docker:
7984
uuid: cc47b2e3-6ee5-4926-af3a-d418ef91c8ba
8085
name: Docker

0 commit comments

Comments
 (0)