Cerulean

Azure Storage

Cloud Service Diagnostics

Trace Logs

Using Cerulean you can search for Trace Logs collected by Cloud Services running in your Azure Subscription. Both "Historical" and "Live" search modes are supported.

In "Historical" mode you can search for diagnostics data that has already been collected by selecting from pre-defined date/time ranges (e.g. last 24 hours, current month etc.). You can also define custom date/time range as well.

In "Live" mode, you see the data as it is being stored in your storage account.

Once the trace logs data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on event levels, deployment ids, role names and/or role instance names.

Using Cerulean you can download trace logs on your local computer in CSV format for further analysis.

Using Cerulean you can delete old log entries based on date/time range and/or event levels from your Azure storage account.

Event Logs

Using Cerulean you can search for Event Logs collected by Cloud Services running in your Azure Subscription. Both "Historical" and "Live" search modes are supported.

In "Historical" mode you can search for diagnostics data that has already been collected by selecting from pre-defined date/time ranges (e.g. last 24 hours, current month etc.). You can also define custom date/time range as well.

In "Live" mode, you see the data as it is being stored in your storage account.

Once the event logs data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on event levels, event channels, provider names, deployment ids, role names and/or role instance names.

Using Cerulean you can download event logs on your local computer in CSV format for further analysis.

Using Cerulean you can delete old log entries based on date/time range and/or event levels from your Azure storage account.

Diagnostics Infrastructure Logs

Using Cerulean you can search for Infrastructure Logs collected by Cloud Services running in your Azure Subscription. Both "Historical" and "Live" search modes are supported.

In "Historical" mode you can search for diagnostics data that has already been collected by selecting from pre-defined date/time ranges (e.g. last 24 hours, current month etc.). You can also define custom date/time range as well.

In "Live" mode, you see the data as it is being stored in your storage account.

Once the infrastructure logs data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on event levels, deployment ids, role names and/or role instance names.

Using Cerulean you can download infrastructure logs on your local computer in CSV format for further analysis.

Using Cerulean you can delete old log entries based on date/time range and/or event levels from your Azure storage account.

IIS Logs

Using Cerulean you can search for IIS Logs collected by Cloud Services running in your Azure Subscription.

Once the IIS logs data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on deployment ids, role names and/or role instance names.

Using Cerulean you can download one or more log files on your local computer for further analysis.

Using Cerulean you can open a log file and view it.

IIS Failed Request Logs

Using Cerulean you can search for IIS Failed Requests Logs collected by Cloud Services running in your Azure Subscription.

Once the IIS failed requests logs data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on deployment ids, role names and/or role instance names.

Using Cerulean you can download one or more log files on your local computer for further analysis.

Using Cerulean you can open a log file and view it.

Crash Dumps

Using Cerulean you can search for Crash Dumps collected by Cloud Services running in your Azure Subscription.

Once the crash dumps data is retrieved, you can further filter it down by a number of criteria. You can filter data retrieved data based on deployment ids, role names and/or role instance names.

Using Cerulean you can download one or more crash dump files on your local computer for further analysis.

Using Cerulean you can open a crash dump file and view it.