Skip to content
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.

Microsoft Ignite | The Tour

SRE30 - Diagnosing Failure in the Cloud

Tailwind Trader’s modern monitoring and alerting processes are working great. So great they have detected some issues with our application and how it is behaving in the cloud. It's time to make sense of what's going on and how to resolve trouble.

In this module, we will explore the processes and tools available to us to troubleshoot issues as they come up with running applications and infrastructure on Azure. Participants will gain exposure to querying log data found in Log Analytics as well as what to look for within Application Insights and Network Monitor to lead engineers to understanding and solving problems quickly.

Setting up a demo environment

In Azure CloudShell

Note: the git commands below require some auth setup, see Appendix A at the end of this document.

Get the code

mkdir ~/source
pushd ~/source

# This repo has all the setup scripts for SRE30 and application code
git clone

# This repo has the database schema scripts
git clone

Set up the demo environment

By default, the scripts will set up a resource group named SRE30-${CITY}-${APP_ENVIRONMENT} so each person will have an individual standalone environment.

All of the naming parameters are defined in ./setup/

pushd ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30

# edit the parameters to meet your needs
code ./setup/



Output from each of the commands in the scripts can be found in a corresponding log file in ./setup/log (e.g. for ./ there will be a ./2-database.log).

Generate traffic to app for demo

NOTE: If you want some good graphs, do this at several points before the talk and vary the number of requests.

In CloudShell, we will generate some traffic against one of the backend services.

Some good traffic

source ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/setup/ 
for i in `seq 1 86`;
    curl $goodurl

and some bad traffic

source ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/setup/ 
for i in `seq 1 14`;
    curl $badurl

Also, visit https://tw-frontend-sre30-${city} a few times.

Create the Troubleshooting Guide

  • Open the inv-tw-insights-SRE30-$CITY-prod` resource Troubleshooting Guide
  • Open the "Request Failures" Troubleshooting Guide
  • Choose "Edit"
  • Edit the text box that says "Failure Trend"
## Service Level Objective - 90% Sucessful Requests

Successful Requests / Total Requests

As measured at the app service.

The chart below shows the trend of successful requests against the objective 
  • Edit the chart.
    • Replace the query with the below
    • Run the query
| where timestamp > ago(30d)
| summarize succeed = count (success == true), failed = count (success == false), total = count() by bin(timestamp, 1h)
| extend SLI = succeed * 100.00 / total 
| extend SLO = 90.0
| project SLI, timestamp, SLO 
| render timechart  
  • Change the Visualization to Line chart
  • Change the legend to Maximum Value
  • Save the changes
    • Make the title SLO Example
    • Save
  • Click Done editing

Break the database connection

pushd ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/demos/

Running the Demo

Setting Up Health Alerts

  • Sign in to
  • Go to "Monitor" Azure Monitor
  • Select "Service Health" Service Health
  • Select "Health Alerts" Health Alerts
  • Select "Create service health alert"
    • Set up alert target Alert Target
    • Set up action group
      • Name
      • Short name
      • Subscription
      • Add a new action
        • Action Name
        • Action Type
        • Click on Edit Details to add an email address Action Group
    • Define Alert Details
      • Name the alert
      • Give it a description
      • Save the alert to a resource group
      • Click "Create alert rule" Alert Details Alert Details

Show an Application Map

  • In the Azure Portal, open up the SRE30-app-$CITY-prod resource group
  • Under Monitoring, click "Insights (preview)" Resource Group Monitoring
  • Click Application Map (you might have to scroll down) Show Application Map

Live Debugging with Log Streaming

Unhandled Exception: System.Data.SqlClient.SqlException: A connection was successfully established with the server, but then an error occurred during the login process.

  • In CloudShell
pushd ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/demos/

Troubleshooting Guides

  • Open the inv-tw-insights-SRE30-$CITY-prod` resource Troubleshooting Guide
  • Open "Workbooks" and scroll through the default templates.
  • Pick "Performance Analysis Perf Analysis
  • Scroll through the report.
  • Choose edit workbook
  • Open of few of the existing bits of the report
    • Show the markdown
    • Show parameters parameters
    • Show the query builder backing the graphs query
  • Click "Done Editing"
  • Click Troubleshooting Guide
  • Open the SLO example query
  • Explore the guide
    • Show the query
    • Explain
      • extend (SLI and SLO)
      • project

Clean up

cd ~
source ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/setup/
az group delete -n "${LEARNING_PATH}${SESSION_NUMBER}-app-${CITY}-prod" --yes --no-wait
az group delete -n "${LEARNING_PATH}${SESSION_NUMBER}-db-${CITY}-prod" --yes --no-wait

rm ~/source/IgniteTheTour/SRE - Operating applications and infrastructure in the cloud/SRE30/setup/.dbpass
rm -rf ~/source/tailwind-traders
rm -rf ~/source/IgniteTheTour


Appendix A: git auth

During the period of time where the code for this demo env lives in private repos, there are two separate sets of git auth that have to be set up a single time:

  1. auth for create a personal access token by choosing Settings->Developer settings->personal access tokens from the drop down menu under your picture on (when logged in). When you create a person access token, be sure to choose the "[ ] repo Full control of private repositories" scope box. Note: you must also be a member of the Azure-Samples Organization for the repo to be accessible. For more infomation on personal auth tokens see Your github username and the personal access token you created will be used for the git clone prompts.
You can’t perform that action at this time.