×

iFour Logo

What is new in dotnet monitor?

Kapil Panchal - June 04, 2021

Listening is fun too.

Straighten your back and cherish with coffee - PLAY !

  • play
  • pause
  • pause
What is new in dotnet monitor?

Introduction


Dotnet monitor is an experimental tool utilized to attain simple access on diagnostic information in the process. Now, dotnet-monitor has support in the tools of .NET ecosystem. dotnet monitor will provide full support when the first stable version will release later this year.

In production environments and diverse local can make collecting diagnostics artifacts (e.g., traces, logs, process, dumps) challenging when running a dotnet application. The aim of dotnet monitor is - regardless of where your application is run, simplify the process by exposing a consistent REST API.

This blog includes the details about some of the major new features in the preview4 release of dotnet monitor:

 
  • Egress providers

  • Custom metrics

  • Security and Hardening

Getting Started


dotnet monitor is available from the two different distributed mechanisms.

 
  • As .NET global tool; and

  • As a container image available via the MCR (Microsoft Container Registry)

The setup instructions for dotnet monitor modify based on the target environment.

Dotnet configuration binds to two different groups of URLs in the default configuration. The URLs which is controlled via the --urls (defaults to http://localhost:52323) that exposes all the collection endpoints and the URLs which is controlled via the --metricsUrls parameters (default to http://localhost:52325) It is strongly recommended that you do not publicly expose the endpoints because diagnostics artifacts such as dumps, logs, and traces can leak the sensitive information about the application.

.Net global tool


As a pre-requisite, the dotnet monitor global tool requires a .NET 3.1 or installed newer SDK. You can install a new SDK from the Download .NET webpage if you do not have a new enough SDK.

On Nuget, you can see the latest public preview of dotnet monitor and you can download the latest version of dotnet monitor tool using the following command:

 
dotnet tool install -g dotnet-monitor --version 5.0.0-preview.4.*

You can update the dotnet monitor if you have already installed it using the following command:

 
dotnet tool update -g dotnet-monitor --version 5.0.0-preview.4.*

Container image


On MCR (Microsoft Container Registry), You can see the latest public preview of the dotnet monitor container image and you can use the following command if you want to pull the image:

 
docker pull mcr.microsoft.com/dotnet/monitor:5.0.0-preview.4

Egress Providers


We could only use one way to egress diagnostic artifacts from dotnet monitor and that is via the HTTP response stream in previous previews and this works well for over-reliable connections but this becomes increasingly challenging for less reliable connections and very large artifacts.

You can configure dotnet monitor to egress artifacts to other destinations in preview4: the local file system and Azure Blob Storage. It is also possible if you want to specify the multiple egress providers via configuration as shown in the example below:

Example

 
{
"Egress": {
"Providers": {
"sampleBlobStorageEgressProvider": {
"accountUri": "https://contoso.blob.core.windows.net",
"containerName": "dotnet-monitor",
 "type": "azureBlobStorage",
"blobPrefix": "artifacts",
"accountKeyName": "MonitorBlobAccountKey"
}
},
"Properties": {
"MonitorBlobAccountKey": "accountKey"
}
}
}
            

Once it is configured, then at the time of triggering the artifact collection via an HTTP request, you can specify that which egress provider will use. With the above configuration, now you can make the request like the following:

 
GET /dump/?egressProvider=sampleBlobStorageEgressProvider HTTP/1.1

Look at the egress configuration documentation for more detailed instructions on configuring egress providers.

Custom metrics


To add the collection of Microsoft.AspNetCore.Hosting metrics and System.Runtime, now it is possible to collect additional metrics (emitted via EventCounters) in the Prometheus exposition format for exporting.

Example

 
 {
 "Metrics": {
"Providers": [
{
"ProviderName": "Microsoft-AspNetCore-Server-Kestrel"
}
]
}
}
              

Look at the metrics configuration documentation for more detailed instructions about collecting custom metrics.

Security and Hardening


In production environments, authentication requirement is one of the parts of the work that’s gone into hardening dotnet monitor to make it suitable for deployment. Additionally, if you want to protect the credentials which were sent over the wire as part of authentication then dotnet monitor will also default to requiring that the underlying channel which uses HTTPS.

In preview4 the /trace, /dump, /gcdump, /processes, and /logs API endpoints will require authentication and the /metrics endpoint will still be available on a separately configured metricsUrl without authentication for scraping from scrapping via exterior tools like Prometheus.

In the scenario of the local machine, if .NET SDK is already installed then dotnet monitor will default to using HTTPS development certificate of ASP.NET Core. For secure experience, we also enable Windows authentication as another option to API token auth.

You can use the official documentation that shows more detailed instructions about some steps to configuring dotnet monitor securely that have been omitting for brevity in the blog.

Looking for Trusted ASP.Net Development Company ? Your Search ends here.

Generating an SSL Certificate


If you want to configure dotnet monitor to run securely, you have to generate an SSL certificate with an EKU (Extended Key Usage) for server usage. You can either generate a self-signed certificate or request this certificate from your certificate authority.

By invoking the dotnet dev-certs tool, if you wish to generate another self-signed certificate for use on any other machine then you may do so.

 
dotnet dev-certs https -export-path self-signed-certificate.pfx -p 
                

Generating an API token


To use an API token, you should generate a 32-byte cryptographically random secret.

 
dotnet monitor generatekey

the output produced form this will look like this :

Example

 
Authorization: MonitorApiKey H2O2yT1c9yLkbDnU9THxGSxje+RhGwhjjTGciRJ+cx8=
ApiKeyHash: B4D54269DB7D948A8C640DB65B46D2D705A516134DA61CD97E424AC08E5021ED
ApiKeyHashType: SHA256

Once you have both an API Token and an SSL certificate generated, to respond to authenticated HTTP requests over a secure TLS (Transport Layer Security) channel you can configure dotnet monitor using the following configuration:

Example

 
{
"ApiAuthentication": {
"ApiKeyHash": "",
"ApiKeyHashType": "SHA256"
},
"Kestrel": {
"Certificates": {
"Default":{
"Path": "",
"Password": ""
}
}
}
}

                

Your browser will automatically handle the Windows authentication challenge when using Windows Authentication. You must specify it via the Authorization header on HTTP requests when you are using an API Key.

Example

curl.exe -H "Authorization: MonitorApiKey H2O2yT1c9yLkbDnU9THxGSxje+RhGwhjjTGciRJ+cx8="

Roadmap


Until the stable version of dotnet monitor will be released later this year, the dotnet monitor will continue to iterate with monthly updates.

Conclusion


In this blog, we have seen the major new updates in dotnet monitor and how to use it by the example which is helpful to makes it easier to get access to diagnostics information in a dotnet process.

What is new in dotnet monitor? Table of Content 1. Introduction 2.Getting Started 3. Net global tool 4. Container image 5. Egress Providers 6. Custom metrics 7. Security and Hardening 8. Generating an SSL Certificate 9. Generating an API token 10. Roadmap 11. Conclusion Introduction Dotnet monitor is an experimental tool utilized to attain simple access on diagnostic information in the process. Now, dotnet-monitor has support in the tools of .NET ecosystem. dotnet monitor will provide full support when the first stable version will release later this year. In production environments and diverse local can make collecting diagnostics artifacts (e.g., traces, logs, process, dumps) challenging when running a dotnet application. The aim of dotnet monitor is - regardless of where your application is run, simplify the process by exposing a consistent REST API. This blog includes the details about some of the major new features in the preview4 release of dotnet monitor:   Egress providers Custom metrics Security and Hardening Getting Started dotnet monitor is available from the two different distributed mechanisms.   As .NET global tool; and As a container image available via the MCR (Microsoft Container Registry) The setup instructions for dotnet monitor modify based on the target environment. Dotnet configuration binds to two different groups of URLs in the default configuration. The URLs which is controlled via the --urls (defaults to http://localhost:52323) that exposes all the collection endpoints and the URLs which is controlled via the --metricsUrls parameters (default to http://localhost:52325) It is strongly recommended that you do not publicly expose the endpoints because diagnostics artifacts such as dumps, logs, and traces can leak the sensitive information about the application. .Net global tool As a pre-requisite, the dotnet monitor global tool requires a .NET 3.1 or installed newer SDK. You can install a new SDK from the Download .NET webpage if you do not have a new enough SDK. On Nuget, you can see the latest public preview of dotnet monitor and you can download the latest version of dotnet monitor tool using the following command:   dotnet tool install -g dotnet-monitor --version 5.0.0-preview.4.* You can update the dotnet monitor if you have already installed it using the following command:   dotnet tool update -g dotnet-monitor --version 5.0.0-preview.4.* Read More: .net Highcharts With Mvc Applications Container image On MCR (Microsoft Container Registry), You can see the latest public preview of the dotnet monitor container image and you can use the following command if you want to pull the image:   docker pull mcr.microsoft.com/dotnet/monitor:5.0.0-preview.4 Egress Providers We could only use one way to egress diagnostic artifacts from dotnet monitor and that is via the HTTP response stream in previous previews and this works well for over-reliable connections but this becomes increasingly challenging for less reliable connections and very large artifacts. You can configure dotnet monitor to egress artifacts to other destinations in preview4: the local file system and Azure Blob Storage. It is also possible if you want to specify the multiple egress providers via configuration as shown in the example below: Example   { "Egress": { "Providers": { "sampleBlobStorageEgressProvider": { "accountUri": "https://contoso.blob.core.windows.net", "containerName": "dotnet-monitor", "type": "azureBlobStorage", "blobPrefix": "artifacts", "accountKeyName": "MonitorBlobAccountKey" } }, "Properties": { "MonitorBlobAccountKey": "accountKey" } } } Once it is configured, then at the time of triggering the artifact collection via an HTTP request, you can specify that which egress provider will use. With the above configuration, now you can make the request like the following:   GET /dump/?egressProvider=sampleBlobStorageEgressProvider HTTP/1.1 Look at the egress configuration documentation for more detailed instructions on configuring egress providers. Custom metrics To add the collection of Microsoft.AspNetCore.Hosting metrics and System.Runtime, now it is possible to collect additional metrics (emitted via EventCounters) in the Prometheus exposition format for exporting. Example   { "Metrics": { "Providers": [ { "ProviderName": "Microsoft-AspNetCore-Server-Kestrel" } ] } } Look at the metrics configuration documentation for more detailed instructions about collecting custom metrics. Security and Hardening In production environments, authentication requirement is one of the parts of the work that’s gone into hardening dotnet monitor to make it suitable for deployment. Additionally, if you want to protect the credentials which were sent over the wire as part of authentication then dotnet monitor will also default to requiring that the underlying channel which uses HTTPS. In preview4 the /trace, /dump, /gcdump, /processes, and /logs API endpoints will require authentication and the /metrics endpoint will still be available on a separately configured metricsUrl without authentication for scraping from scrapping via exterior tools like Prometheus. In the scenario of the local machine, if .NET SDK is already installed then dotnet monitor will default to using HTTPS development certificate of ASP.NET Core. For secure experience, we also enable Windows authentication as another option to API token auth. You can use the official documentation that shows more detailed instructions about some steps to configuring dotnet monitor securely that have been omitting for brevity in the blog. Looking for Trusted ASP.Net Development Company ? Your Search ends here. See here Generating an SSL Certificate If you want to configure dotnet monitor to run securely, you have to generate an SSL certificate with an EKU (Extended Key Usage) for server usage. You can either generate a self-signed certificate or request this certificate from your certificate authority. By invoking the dotnet dev-certs tool, if you wish to generate another self-signed certificate for use on any other machine then you may do so.   dotnet dev-certs https -export-path self-signed-certificate.pfx -p Generating an API token To use an API token, you should generate a 32-byte cryptographically random secret.   dotnet monitor generatekey the output produced form this will look like this : Example   Authorization: MonitorApiKey H2O2yT1c9yLkbDnU9THxGSxje+RhGwhjjTGciRJ+cx8= ApiKeyHash: B4D54269DB7D948A8C640DB65B46D2D705A516134DA61CD97E424AC08E5021ED ApiKeyHashType: SHA256 Once you have both an API Token and an SSL certificate generated, to respond to authenticated HTTP requests over a secure TLS (Transport Layer Security) channel you can configure dotnet monitor using the following configuration: Example   { "ApiAuthentication": { "ApiKeyHash": "", "ApiKeyHashType": "SHA256" }, "Kestrel": { "Certificates": { "Default":{ "Path": "", "Password": "" } } } } Your browser will automatically handle the Windows authentication challenge when using Windows Authentication. You must specify it via the Authorization header on HTTP requests when you are using an API Key. Example curl.exe -H "Authorization: MonitorApiKey H2O2yT1c9yLkbDnU9THxGSxje+RhGwhjjTGciRJ+cx8=" Roadmap Until the stable version of dotnet monitor will be released later this year, the dotnet monitor will continue to iterate with monthly updates. Conclusion In this blog, we have seen the major new updates in dotnet monitor and how to use it by the example which is helpful to makes it easier to get access to diagnostics information in a dotnet process.
Kapil Panchal

Kapil Panchal

A passionate Technical writer and an SEO freak working as a Content Development Manager at iFour Technolab, USA. With extensive experience in IT, Services, and Product sectors, I relish writing about technology and love sharing exceptional insights on various platforms. I believe in constant learning and am passionate about being better every day.

Build Your Agile Team

Enter your e-mail address Please enter valid e-mail

Categories

Ensure your sustainable growth with our team

Talk to our experts
Sustainable
Sustainable
 
Blog Our insights
10 Executive Dashboard Examples for Consultants and CEOs
10 Executive Dashboard Examples for Consultants and CEOs

There is a principle behind every business. “If you don’t keep track of essentials, you won’t get clear direction, eventually causing your company to stumble.” To manage this scenario,...

How Spatial Data Analysis Improves Healthcare
How Spatial Data Analysis Improves Healthcare

Do you know when geospatial analysis took traction in healthcare? It was when John Snow, a London-based physician, used it to analyze the spread of cholera, which ultimately proved...

4 Types of Power BI Dashboards: Analytical, Strategic, Operational, and Tactical
4 Types of Power BI Dashboards: Analytical, Strategic, Operational, and Tactical

One interesting aspect you truly love about Power BI, as a CTO, is how it lets you step back and see the bigger picture of your business. Isn’t it? Without getting bogged down in minute...