microsoft azure. troubleshooting and monitoring
TRANSCRIPT
1CONFIDENTIAL
Troubleshooting and Monitoring.
JANUARY 27, 2016
Alex Feshchenko,SENIOR SOFTWARE ENGINEER
4CONFIDENTIAL
Remote Debugging
• Is not recommended• Avoid long stops• Bandwidth affected• 48 hours limit• Not only w3wp.exe
5CONFIDENTIAL
Diagnostic Logs
• Application tracing logsThe application creates these logs by calling methods of the System.Diagnostics.Trace class.• Web server logsThe web server creates a log entry for every HTTP request to the web app.• Detailed error message logsThe web server creates an HTML page with some additional information for failed HTTP requests (those that result in status code 400 or greater). • Failed request tracing logsThe web server creates an XML file with detailed tracing information for failed HTTP requests. The web server also provides an XSL file to format the XML in a browser.
8CONFIDENTIAL
What does ELK do?
• Collect all logs and event data• Democratize your data by putting it in the hands of
people who need it• Make it searchable in fast and meaningful way• Use powerful analytics to summarize data across
many dimensions
11CONFIDENTIAL
ELK components
Near real-time search and analysis tool
LOGSTASH | ELASTICSEARCH | KIBANA