Azure DevOps Services Unavailability and Resolution

Author

Reads 379

Men Working on a Computer
Credit: pexels.com, Men Working on a Computer

Azure DevOps services can become unavailable due to scheduled maintenance, which typically occurs during weekends or late evenings. This maintenance is necessary to ensure the services run smoothly and efficiently.

If you're experiencing unavailability, check the Azure status page for updates on the current status of Azure DevOps services. You can also check the Azure DevOps service health dashboard for more information.

Azure DevOps services are designed to be highly available, but sometimes issues can arise due to technical difficulties or high traffic volumes. In such cases, the Azure DevOps team works to resolve the issue as quickly as possible.

Reporting and Resolution

If you see an issue reported on the Azure DevOps Services health page, we're already working to restore normal operations.

You can check the health page for updates on the issue. If the issue isn't reported, you can ask a question through the Azure DevOps Services virtual support agent.

For issues not related to availability, refer to our Developer Community portal.

Readers also liked: Azure Services Health

Azure DevOps Service Issues

Credit: youtube.com, Day 16/16 Azure DevOps Troubleshooting & Solutions for Common Issues

If you're experiencing issues with Azure DevOps services, check the Status history page for detailed information on active and past events. Each event log contains associated information such as the impacted service, geography, and event duration.

You can filter the logs to adjust the scope of your search into past events. Additionally, you can use the REST API to build automated alerting solutions to stay on top of events.

Common issues include access and permission problems. Here are some common reasons a project member can't access a project, service, or feature:

Concurrency Insufficient

You don't have enough concurrency to run all your jobs simultaneously.

To check your concurrency limits, navigate to Project settings, Parallel jobs, or visit https://dev.azure.com/{org}/_settings/buildqueue?_a=concurrentJobs.

Choose the pool you want to check concurrency on, and select View in-progress jobs.

Currently running X/X jobs indicates whether you have reached your concurrency limit.

If both numbers are the same, pending jobs will wait until currently running jobs complete.

Credit: youtube.com, How to troubleshoot azure pipeline issue step by step #devopstutorial #azuredevops #azurepipeline

You can view all jobs, including queued jobs, by selecting Agent pools from the Project settings.

Here's a step-by-step guide to check concurrency:

  1. Navigate to Project settings, Parallel jobs.
  2. Choose the pool you want to check concurrency on.
  3. Select View in-progress jobs.

If your concurrency limit is reached, the following message may be displayed: The agent request is not running because all potential agents are running other requests.

Service Health Indicators

The Azure DevOps Services status portal displays four indicators that reflect the severity of a service health event: Healthy, Degraded, Unhealthy, and Advisory.

The highest severity events, which affect a large percentage of customers, render some parts of the product unusable.

You can access detailed information on active and past events from the Status history page, where each event log contains associated information such as the impacted service, geography, and event duration.

The Azure DevOps Services status portal uses these indicators to reflect the severity of a service health event, making it easy to understand the impact of an issue.

Credit: youtube.com, Setting up Service Health Alerts

You can filter the logs to adjust the scope of your search into past events, helping you to quickly find the information you need.

The indicators are a useful tool for staying on top of service health events and ensuring that you're aware of any issues that may be affecting your work.

Azure Key Vault and Firewall

Azure Key Vault and Firewall issues can be a real pain. If you're having trouble accessing Azure Key Vault from your pipeline, it's likely due to the firewall blocking the Azure DevOps Services agent IP address.

The solution is to allowlist the IP addresses published in the weekly JSON file. This file is a crucial resource that can help you troubleshoot networking issues with Microsoft-hosted agents.

For more information on how to allowlist these IP addresses, check out the Microsoft-hosted agents: Networking article.

Tfs Agent Connection Issues

Tfs Agent Connection Issues can be frustrating, but there are some common causes to look out for. One possible reason is that the agent connection configuration fails while testing, which can happen on-premises TFS only.

Credit: youtube.com, Deploy & Configure Azure DevOps Self-Hosted Agent | Private Agent Pool | Azure DevOps | YAML | Ep-5

Another issue is that the agent lost communication with the server. This can be due to a misconfigured notification URL, which is a common problem with 1.x agent versions.

If you're experiencing issues with the TFS Job Agent not starting, it might be because the Windows service is not running. Check the web console for a message saying "Waiting for an agent to be requested" and make sure the Visual Studio Team Foundation Background Job Agent service is started.

Here are some possible causes of Tfs Agent Connection Issues:

  • Config fails while testing agent connection (on-premises TFS only)
  • Agent lost communication
  • TFS Job Agent not started
  • Misconfigured notification URL (1.x agent version)

Don't worry if you're not sure what's causing the issue - these are just some of the most common problems to look out for. By checking these potential causes, you should be able to get your Tfs Agent Connection Issues sorted out.

Azure Subscription and Access

Azure subscription and access issues can arise from various reasons, including expired Visual Studio subscriptions, inactive Azure subscriptions, and old user tokens cached in Azure DevOps Services.

Credit: youtube.com, SERVICE CONNECTIONS | Connect Your AZURE SUBSCRIPTION and AZURE DEVOPS Account

To troubleshoot Azure subscription and access issues, you can refer to the following steps:

  • If a user's Visual Studio subscription has expired, they can work as a Stakeholder or be given Basic access until the subscription is renewed. Azure DevOps will automatically restore access after the user signs in.
  • If the Azure subscription used for billing is no longer active, all purchases made with this subscription, including Visual Studio subscriptions, will be affected. To fix this issue, visit the Azure account portal.

Azure DevOps features are based on a user's access level and security group. To use Azure DevOps features, users must be added to a security group with the appropriate permissions and have access to the web portal. The following access levels are available: Stakeholder, Basic, Basic + Test Plans, and Visual Studio subscription.

Here are some reasons why users may lose access to Azure DevOps:

If your Azure subscription isn't listed when creating a service connection, it might be due to an old user token cached in Azure DevOps Services. To resolve this issue, manually update the cached user token in Azure DevOps Services.

Authentication and Token Issues

Authentication and token issues can occur when using Azure DevOps services, causing unavailability or restricted access.

A common issue is when a project member's access level doesn't support access to a service or feature, requiring a determination of their access level and subscription status.

Credit: youtube.com, Overview of Azure AD Tokens and access denied errors | Microsoft

Group rules governing a user's access level or project membership can also restrict access, necessitating a review of these rules.

If a service principal's token has expired, it needs to be renewed by verifying and saving the service connection in Project settings.

When creating a service connection, a maximum of 50 Azure subscriptions are listed, and an old user token cached in Azure DevOps Services can prevent a subscription from being listed.

To resolve this issue, manually update the cached user token by following the steps outlined in the Azure DevOps documentation.

Here are some common error messages related to authentication and token issues:

  • AADSTS7000215: Invalid client secret is provided
  • AADSTS7000222: The provided client secret keys for app '***' are expired
  • Invalid client id or client secret

These error messages can be resolved by renewing the access token for an automatically created service principal, as described in the Azure DevOps documentation.

Token Expired

If your service principal's token has expired, you may see error messages like AADSTS7000215: Invalid client secret is provided, AADSTS7000222: The provided client secret keys for app '***' are expired, or Invalid client id or client secret.

Credit: youtube.com, Why do access tokens expire?

To renew the access token for an automatically created service principal, go to Project settings > Service connections, and select the service connection you want to modify.

Select Edit in the upper-right corner, and then select Verify. Finally, select Save.

This operation is available even if the service principal's token has not expired, and it will update the secret for the app registered for the service principal.

Failed to Obtain JWT with Service Principal Client ID

This issue occurs when you try to verify a service connection that has an expired secret. The error messages you may see include "AADSTS7000215: Invalid client secret is provided", "AADSTS7000222: The provided client secret keys for app '***' are expired", or "Invalid client id or client secret".

To resolve this issue, go to Project settings > Service connections, and then select the service connection you want to modify. Select Edit in the upper-right corner, and then make any change to your service connection, such as adding a description. Select Save to save the service connection, but do not try to verify it at this step.

Credit: youtube.com, Create Azure Service Principal | Azure RBAC | Programmatic access | Az CLI authentication | Ep-2

Exit the service connection edit window, and then refresh the service connections page. Select Edit in the upper-right corner again, and now select Verify. Select Save to save your service connection.

A simpler approach is to renew the access token for an automatically created service principal by going to Project settings > Service connections, selecting the service connection you want to modify, and then selecting Edit and Verify.

Job Approval Pending

If you're seeing a job stuck in limbo, it might be because it's waiting for approval.

Your pipeline might not move to the next stage because it's waiting on approval. For more information, see Define approvals and checks.

If you're unsure why your job is pending, check the pipeline to see if there are any approval stages holding it back.

In some cases, a job might be waiting for approval because the pipeline is configured to require it.

Cora Stoltenberg

Junior Writer

Cora Stoltenberg is a skilled writer with a passion for crafting engaging content on a wide range of topics. Her expertise spans various categories, including Search Engine Optimization (SEO) Strategies, where she provides actionable tips and insights to help businesses improve their online presence. With a keen eye for detail and a knack for simplifying complex concepts, Cora's writing is both informative and accessible to readers of all levels.

Love What You Read? Stay Updated!

Join our community for insights, tips, and more.