May's Blog

✨ Written with help of AI

If your wiki reads like filler episodes and your runbooks require a Sherpa, it’s time for a refactor. In 2025, documentation isn’t a chore—it’s operational muscle. Your AI copilots, on-call engineers, and auditors will all depend on the accuracy and structure of what you write. Think of it like building your own Urahara Shop: stocked with the right tools, clearly labeled shelves, and a map anyone can follow at 2 a.m.

Here’s my playbook—equal parts open source, cybersecurity, and practical craft.

Why IT Pros Need Better Docs Now

A Simple Framework: Audience → Outcome → Action Before you type a word, answer three questions:

  1. Who’s this for? Help desk, developers, finance, auditors?
  2. What outcome do they need? Resolve a VPN issue, deploy a service, pass a SOC 2 audit?
  3. What action will they take now? Follow a runbook, configure a client, check a dashboard?

This is step zero in most modern guides for technical documentation in 2025: define audience and scope, then choose the right format (runbook, SOP, architecture note, user guide, postmortem) [^2 ] 3.

Build A Docs Toolbox You’ll Actually Use (Open Source FTW) Pick a docs-as-code stack so you get version control, review, and CI for free:

Example quickstart:

Trends for 2025 emphasize structured authoring, content reuse, and omnichannel publishing—areas where docs-as-code and componentized docs shine 1.

A Lightweight Template That Scales Use a standard template per doc type. Here’s a Markdown runbook you can copy:

Title: Restore Access to Corporate VPN (OpenVPN)

Last updated: 2025-09-15
Owner: NetOps (on-call: @netops-oncall)
Risk level: Medium
Time to complete: 10–15 minutes

Prerequisites
- User account active in Okta
- Laptop on corporate-managed image
- On-call permissions in JumpCloud

Symptoms
- User reports “AUTH FAILED” on OpenVPN macOS client
- Logs show TLS handshake succeeded, MFA rejected

Root Causes (Common)
- Okta factor drift after device change
- Revoked cert due to offboarding error

Resolution Steps

  1. Verify user status in Okta (Active). If Suspended, coordinate with HRIS. Do not reactivate without ticket.
  2. Re-enroll MFA: Send enrollment link; confirm factor push succeeds.
  3. Regenerate VPN client profile (ovpn) from Access Gateway; confirm fingerprint with user.
  4. Test connection on user device over mobile hotspot (bypasses captive portals).
  5. Rotate user cert if prior cert mismatch in logs.

Validation

Rollback

Security Notes

References

Making Docs Runnable and Testable Nothing rots faster than untested examples. Adopt practices communities have refined over years:

Example GitHub Actions workflow:

name: docs-ci
on: [push, pull_request]
jobs:
  build:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: actions/setup-python@v5
        with:
          python-version: "3.11"
      - run: pip install mkdocs mkdocs-material
      - run: mkdocs build --strict
      - run: pip install vale
      - run: vale docs/
      - run: curl -sSfL https://github.com/lycheeverse/lychee/releases/latest/download/lychee-linux.zip -o lychee.zip && unzip lychee.zip -d lychee
      - run: ./lychee/lychee --verbose docs/**/*.md

Information Architecture and Reuse (Without Going Full Yak-Shave)

Diagrams-as-Code for Clarity That Ages Well Stop uploading stale PNGs. Keep diagrams in Git:

flowchart LR
  User -->|MFA| Okta
  Okta --> VPN[OpenVPN GW]
  VPN -->|TLS| Server
  Server --> SIEM[SIEM]

Editorial Discipline: The Boring Stuff That Wins Incidents

Security Considerations (Because Attackers Read Docs Too) Documentation can leak secrets, create blueprint-level detail for attackers, or train the wrong AI model.

Practical safeguards:

Community Angle: Docs as an Onramp, Not an Afterthought Open-source communities thrive on approachable docs—examples that build, quickstarts that actually quickstart, and issue templates that invite contributions. Borrow what works:

Mini Checklist: Tips and Tricks That Compound

Putting It All Together If you adopt docs-as-code, keep examples executable, and apply a security lens, your documentation stops being a brittle liability and becomes operational superpower. The tools are open source, the habits are learnable, and the payoff is immediate: fewer tickets, faster incidents, smarter AI assistants, happier teams.

What’s the one doc you wish existed at your company right now? Drop your pain point (or favorite tool) in the comments—let’s build a community checklist and share templates. And if you’ve got a killer Mermaid diagram or Vale config, I’m all ears. Believe it!

References


  1. Fluid Topics – Technical Documentation Trends 2025. https://www.fluidtopics.com/blog/industry-trends/technical-documentation-trends-2025/ ↩︎ ↩︎ ↩︎ ↩︎

  2. Helpjuice – IT Documentation: What It Is, Why It Matters, and Best Practices. https://helpjuice.com/blog/it-documentation ↩︎ ↩︎

  3. BetterDocs – Different Requirements Documentation Guide. https://betterdocs.co/different-requirements-documentation-guide/ ↩︎ ↩︎

  4. The Digital Project Manager – Document Management Best Practices. https://thedigitalprojectmanager.com/project-management/document-management-best-practices/ ↩︎ ↩︎

  5. OCaml Discuss – 2025 documentation best practices (page 2). https://discuss.ocaml.org/t/2025-documentation-best-practices/17008?page=2 ↩︎ ↩︎

  6. Technical Writer HQ – Good Documentation Practices. https://technicalwriterhq.com/documentation/good-documentation-practices/ ↩︎ ↩︎

#Documentation #Docs-as-Code #IT Operations #DevOps #Security Best Practices #Knowledge Management #MkDocs #CI/CD #Runbooks #Open Source Tools