Skip to content

Latest commit

 

History

History
 
 

releasegates

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
title layout sidebar permalink folder
Controlling Deployments using Release Gates
page
vsts2
/labs/vstsextend/releasegates/
/labs/vstsextend/releasegates/

Overview

As you may be aware, a release pipeline specifies the end-to-end release process for an application to be deployed across a range of environments. Deployments to each environment are fully automated by using jobs and tasks. Ideally, you do not want new updates to the applications to be exposed to all the users at the same time. It is a best practice to expose updates in a phased manner i.e. expose to a subset of users, monitor their usage and expose to other users based on the experience the initial set of users had.

Approvals and gates enable you to take control over the start and completion of the deployments in a release. With approvals, you can wait for users to manually approve or reject deployments. Using release gates, you can specify application health criteria that must be met before release is promoted to the next environment. Prior to or after any environment deployment, all the specified gates are automatically evaluated until they all pass or until they reach your defined timeout period and fail.

Gates can be added to an environment in the release definition from the pre-deployment conditions or the post-deployment conditions panel. Multiple gates can be added to the environment conditions to ensure all the inputs are successful for the release.

As an example:

Pre-deployment gates ensures there are no active issues in the work item or problem management system before deploying a build to an environment.

Post-deployment gates ensures there are no incidents from the monitoring or incident management system for the app after it's been deployed, before promoting the release to the next environment.

4 types of gates are included by default for every account.

  1. Invoke Azure function: Trigger execution of an Azure function and ensures a successful completion. For more details, see Azure function task

  2. Query Azure monitor alerts: Observe the configured Azure monitor alert rules for active alerts. For more details, see Azure monitor task

  3. Invoke REST API: Make a call to a REST API and continue if it returns a successful response. For more details, see HTTP REST API task

  4. Query Workitems: Ensures the number of matching work items returned from a query is within a threshold. For more details, see Query Workitems task

What's covered in this lab?

This lab covers the configuration of the deployment gates and details how to add the control to Azure pipelines. You will configure a release definition with two environments for an Azure Web App. You will deploy to the Canary environment only when there are no blocking bugs for the app and mark the Canary environment complete only when there are no active alerts in Azure Monitor (Application Insights).

Before you begin

  1. Refer the Getting Started page to know the prerequisites for this lab.

  2. Click the Azure DevOps Demo Generator link and follow the instructions in Getting Started page to provision the project to your Azure DevOps.

Setting up the Target Environment

You will create two Web Apps in Azure to depict two environments Canary and Production to deploy the application.

  1. Launch the Azure Cloud Shell from the Azure portal and choose Bash.

  2. Create a Resource Group. Replace <region> with the region of your choosing, for example eastus.

    az group create -n MyResourceGroup -l <region>
  3. To create an App service plan

    az appservice plan create -g MyResourceGroup -n MyPlan --sku S1
  4. Create two web apps with a unique app names.

    az webapp create -g MyResourceGroup -p MyPlan -n PartsUnlimited-Canary
    az webapp create -g MyResourceGroup -p MyPlan -n PartsUnlimited-Prod
  5. Navigate to the resource group you created, you will see the resources as shown.

    azure_resources

  6. Now select the Canary web app and click on Application insights setting. Select Turn on Application Insights.

  7. With the default settings click Apply to create and connect Application insights resource to your Canary web app.

  8. Now navigate back to your resource group and select application insights resource created.

  9. You will create monitor alerts here, which you will use in later part of this lab. Choose Alerts and click on +Create and choose Add rule.

  10. Choose Select condition. Search for Failed Requests rule and select.

  11. In the Condition section set Threshold value as 0.

  12. Now in Actions section, choose the values as below

  13. Now in Details section, provide the value for Alert rule name. Then Review + Create

  14. Once the rule is created you will be able to see that rule under Alerts

    You can create multiple alert rules on different metrics like

    Availability < 99 Percent
    
    Server response time > 5 Seconds
    
    Server exceptions > 0 Count
    

    For this lab we just created one monitor alert to trigger on condition Whenever the count requests/failed is greater than 0

Exercise 1: Configure Release pipeline

Navigate to the project created by Azure DevOps Demo Generator above.

Update Release Tasks

  1. Navigate to Releases under Pipelines and Edit the pipeline PartsUnlimited-CD. Edit Release

    In this pipeline, you have two environments viz. Canary Environment & Production. Click on “1 job, 2 tasks” link for Canary Environment to view and update the tasks.

    canary_env

  2. The canary environment has 2 tasks which will publish the package to Azure Web App, enables continuous monitoring of the application after deployment.

    canary_release

  3. Select Canarys Environment stage. In Azure Subscription field, select your Azure subscription from the dropdown and click on Authorize. Provide your credentials, if required, to complete the authorization to your Azure account.

    azure_subscription

    {% include note.html content= "Disable pop-up blocker in your browser if you see a blank screen after clicking Authorize, and retry the step." %}

  4. Select the App Service, Resource Group and Application Insights that you created for Canary environment from the drop-down.

    canary_app_details

  5. For Production, select the Azure subscription from the drop-down. Pick the App service you created for Production and click on Save button.

    prod_release

  6. Navigate to Pipelines | Pipelines and select PartsUnlimited-CI build pipeline.

    Click on Run Pipeline then select Run to trigger the pipeline.

    queue_build

  7. After the build succeeds, the release will be triggered automatically and the application will be deployed to both the environments. Browse the websites after the application is deployed.

    build1_complete

    release1_complete

Now we have our application with CI/CD configured. In the following exercise we will see how to setup Gates in release pipeline.

Exercise 2: Configure Deployment Gates.

Enabling Pre-deployment Gate

  1. Edit the release pipeline PartsUnlimited-CD.

    edit_release

  2. Click on Pre-deployment conditions.

    predeployment

  3. In Pre-deployment conditions pane, enable Pre-deployment approvals. Add yourself as an Approver for the lab purpose.

    add_approver

  4. In the same pane enable Gates and click on +Add

  5. Add Query Work Items to the Gates.

    querywi

  6. Select Bugs under Shared Queries in the Query field. As the maximum threshold is set to "0", if this query returns any active bug work Item, the release gate will fail.

    qwi

  7. Set the evaluation options.

    Delay before evaluation: Time before the added gates are evaluated for the first time. If no gates are added, then the deployments wait for the duration before proceeding. To allow gate functions to initialize and stabilize (it may take some time for it to begin returning accurate results), we configure a delay before the results are evaluated and used to determine if the deployment should be approved or rejected.

    Time between re-evaluation of gates: The time interval between each evaluation of all the gates. At each sampling interval, new requests are sent concurrently to each gate for fresh results. The sampling interval must be greater than the longest typical response time of any configured gate to allow time for all responses to be received.

    Timeout after which gates fail: The maximum evaluation period for all gates. The deployment will be rejected if the timeout is reached before all gates succeed during the same sampling interval. The minimum value we can specify for timeout is 6 minutes and 5 minutes for the sampling interval.

    For this demo purpose, set Delay before evaluation as 5 minutes (so that you can see the results reasonably quick), Time between re-evaluation of gates as 5 minutes (sampling interval) and Timeout after which gates fail as 8 minutes but in reality these durations might be in hours. When the release is triggered, gate will validate the samples at 0th and 5th minutes. If the result is "Pass", notification will be sent for approval. If the result is "Fail", the release will time-out after 8th minute.

    Select On successful gates, ask for approvals radio button.

    gate_duration

Enabling Post-deployment Gate.

  1. Click on Post-deployment conditions

    PostDeploymentGates

  2. Enable Gates and Add Query Azure Monitor Alerts to the gate. enablegates2

    qam

  3. Update the details from the dropdown.

    monitor_details

  4. Expand the Evaluation options and specify the details as below.

    post_deployment_gates

    The sampling interval and timeout work together so that the gates will call their functions at suitable intervals and reject the deployment if they don't succeed during the same sampling interval within the timeout period.

  5. Click Save to save the changes.

Exercise 3: Update and deploy application after adding release gates

In this exercise, you will make a small code change in the application and commit to the repository which in-turn triggers build and release.

  1. Go to Repos and click Files. Navigate to the path "src/PartsUnlimitedWebsite/Views/Home/Index.cshtml" and modify the content to "30%" from "20%" in line 30. After the modification, Commit the changes.

    commit

  2. Run PartsUnlimited-CI build pipeline. Once the build succeeds, navigate to the Releases tab. You will notice the release have been triggered after the successful build.

  3. Go to release Logs to see the progress. You will see Query Work Items gate have failed in a delay before evaluation, which indicates there are active bugs. These bugs should be closed in order to proceed further. Next sampling time will be after 5 minutes.

    log1

  4. Navigate to Queries under Boards tab.

    goto_queries

  5. Select Bugs under Shared Queries.

    bugs

  6. You will see a bug with title "Disk out of space in Canary Environment" in New State. Assuming that Infrastructure team has fixed the disk space issue, change the state to Closed and Save it.

    close_bug

  7. Go back to release logs. You will see the evaluation has passed.

    log2

  8. When the evaluation is successful, you will see the request for pre-deployment approval. Click on Approve to deploy in Canary environment

    pre_approval

  9. Once the deployment to Canary environment is successful, we will see the post-deployment gates in action which will start monitoring the application for any exceptions.

    post_deployment

  10. Now, quickly verify the application. Go to CanaryRelease Azure Web App in Azure Portal and click on Browse.

    browse

  11. After the application is launched, click on More. You will encounter with an error page. Do this couple of times to trigger alerts.

    This error scenario is just for the purpose of the lab and in the real world, analysis of the alert and a resolution like “disabling a feature flag” or “upgrading the infra” would be realistic.

    exception

  12. This exception is monitored by Application Insights which will trigger an alert. In Azure Portal, we will be able to see the alert triggered.

    alert_triggered alert_triggered

  13. As there was an alert triggered by the exception, Query Azure Monitor gate failed. However, the gate is still under a delay period, you should wait for the next evaluation to proceed.

    qamlog

  14. As the next step, Query Azure Monitor gate will block the pipeline and prevents the deployment to Production Environment.

    timeout

    release_failed

Summary

Gates ensures that the release waits for you to react to the feedback and fix any issues within a timeout period. The gate samples continue to fail and the deployment waits until the issues are fixed. Once the issues are fixed, the next sample from the gates becomes successful and the deployment automatically proceeds.

If a new release is required to fix the issues, then you can cancel the deployment and manually abandon the current release.

So here are release gates, enabling teams to release applications with higher confidence with fewer manual steps. There is now a built-in audit of all the necessary criteria for a deployment being met.

Reference

Thanks to Nagaraj Bhairaji for making a video on this lab. You can watch the following video that walks you through all the steps explained in this lab

<iframe width="560" height="315" src="https://www.youtube.com/embed/8jbMnFiEow0" frameborder="0" allowfullscreen="true"> </iframe>