Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
In this tutorial, you learn how to deploy a data-driven ASP.NET Core app to Azure App Service and connect to an Azure SQL Database. You'll also deploy an Azure Cache for Redis to enable the caching code in your application. Azure App Service is a highly scalable, self-patching, web-hosting service that can easily deploy apps on Windows or Linux. Although this tutorial uses an ASP.NET Core 8.0 app, the process is the same for other versions of ASP.NET Core.
In this tutorial, you learn how to:
If you just want to see the sample app in this tutorial running in Azure, just run the following commands in the Azure Cloud Shell, and follow the prompt:
dotnet tool install --global dotnet-ef
mkdir msdocs-app-service-sqldb-dotnetcore
cd msdocs-app-service-sqldb-dotnetcore
azd init --template msdocs-app-service-sqldb-dotnetcore
azd up
First, you set up a sample data-driven app as a starting point. For your convenience, the sample repository, includes a dev container configuration. The dev container has everything you need to develop an application, including the database, cache, and all environment variables needed by the sample application. The dev container can run in a GitHub codespace, which means you can run the sample on any computer with a web browser.
Step 1: In a new browser window:
Step 2: In the GitHub fork:
Step 3: In the codespace terminal:
dotnet ef database update
.dotnet run
.Your application running on port 5093 is available.
, select Open in Browser.
You should see the sample application in a new browser tab.
To stop the application, type Ctrl
+C
.Tip
You can ask GitHub Copilot about this repository. For example:
Having issues? Check the Troubleshooting section.
In this step, you create the Azure resources. The steps used in this tutorial create a set of secure-by-default resources that include App Service, Azure SQL Database, and Azure Cache. For the creation process, you'll specify:
https://<app-name>-<hash>.<region>.azurewebsites.net
.Sign in to the Azure portal and follow these steps to create your Azure App Service resources.
Step 1: In the Azure portal:
Step 2: In the Create Web App + Database page, fill out the form as follows.
Step 3: The deployment takes a few minutes to complete. Once deployment completes, select the Go to resource button. You're taken directly to the App Service app, but the following resources are created:
The creation wizard generated the connectivity variable for you already as .NET connection strings and app settings. However, the security best practice is to keep secrets out of App Service completely. You'll move your secrets to a key vault and change your app setting to Key Vault references with the help of Service Connectors.
Tip
To use passwordless authentication, see How do I change the SQL Database connection to use a managed identity instead?
Step 1: Retrieve the existing connection string
Step 2: Create a key vault for secure management of secrets
Step 3: Secure the key vault with a Private Endpoint
Step 4:
Step 5: Establish the Key Vault connection
Step 6: Finalize the SQL Database connector settings
Step 7: Configure the Redis connector to use Key Vault secrets
Step 8: Verify the Key Vault integration
@Microsoft.KeyVault(...)
, which means that it's a key vault reference because the secret is now managed in the key vault.@Microsoft.KeyVault(...)
too.To summarize, the process for securing your connection secrets involved:
In this step, you configure GitHub deployment using GitHub Actions. It's just one of many ways to deploy to App Service, but also a great way to have continuous integration in your deployment process. By default, every git push
to your GitHub repository kicks off the build and deploy action.
Step 1: In the left menu, select Deployment > Deployment Center.
Step 2: In the Deployment Center page:
.github/workflows
directory.
By default, the deployment center creates a user-assigned identity for the workflow to authenticate using Microsoft Entra (OIDC authentication). For alternative authentication options, see Deploy to App Service using GitHub Actions.Step 3: Back in the GitHub codespace of your sample fork, run git pull origin starter-no-infra
.
This pulls the newly committed workflow file into your codespace.
Step 4 (Option 1: with GitHub Copilot):
MyDatabaseContext
class and how it's configured in Program.cs.Step 4 (Option 2: without GitHub Copilot):
AZURE_SQL_CONNECTIONSTRING
and connects to the Redis cache by using the app setting AZURE_REDIS_CONNECTIONSTRING
.Step 5 (Option 1: with GitHub Copilot):
dotnet publish
step and select Step 5 (Option 2: without GitHub Copilot):
dotnet publish
step, add a step to install the Entity Framework Core tool with the command dotnet tool install -g dotnet-ef --version 8.*
.dotnet ef migrations bundle --runtime linux-x64 -o ${{env.DOTNET_ROOT}}/myapp/migrationsbundle
.
The migration bundle is a self-contained executable that you can run in the production environment without needing the .NET SDK. The App Service linux container only has the .NET runtime and not the .NET SDK.Step 6:
Configure Azure database and cache connections
. Or, select Step 7: Back in the Deployment Center page in the Azure portal:
Step 8: You're taken to your GitHub repository and see that the GitHub action is running. The workflow file defines two separate stages, build and deploy. Wait for the GitHub run to show a status of Success. It takes about 5 minutes.
Having issues? Check the Troubleshooting section.
With the SQL Database protected by the virtual network, the easiest way to run dotnet database migrations is in an SSH session with the Linux container in App Service.
Step 1: Back in the App Service page, in the left menu,
Step 2: In the SSH session:
cd /home/site/wwwroot
. Here are all your deployed files../migrationsbundle -- --environment Production
. If it succeeds, App Service is connecting successfully to the SQL Database. Remember that --environment Production
corresponds to the code changes you made in Program.cs.In the SSH session, only changes to files in /home
can persist beyond app restarts. Changes outside of /home
aren't persisted.
Having issues? Check the Troubleshooting section.
Step 1: In the App Service page:
Step 2: Add a few tasks to the list. Congratulations, you're running a web app in Azure App Service, with secure connectivity to Azure SQL Database.
Tip
The sample application implements the cache-aside pattern. When you visit a data view for the second time, or reload the same page after making data changes, Processing time in the webpage shows a much faster time because it's loading the data from the cache instead of the database.
Azure App Service captures all console logs to help you diagnose issues with your application. The sample app includes logging code in each of its endpoints to demonstrate this capability.
Step 1: In the App Service page:
Step 2: From the left menu, select Log stream. You see the logs for your app, including platform logs and logs from inside the container.
When you're finished, you can delete all of the resources from your Azure subscription by deleting the resource group.
Step 1: In the search bar at the top of the Azure portal:
Step 2: In the resource group page, select Delete resource group.
Step 3:
In this step, you create the Azure resources and deploy a sample app to App Service on Linux. The steps used in this tutorial create a set of secure-by-default resources that include App Service, Azure SQL Database, and Azure Cache for Redis.
The dev container already has the Azure Developer CLI (AZD).
From the repository root, run azd init
.
azd init --template dotnet-app-service-sqldb-infra
When prompted, give the following answers:
Question | Answer |
---|---|
The current directory is not empty. Would you like to initialize a project here in '<your-directory>'? | Y |
What would you like to do with these files? | Keep my existing files unchanged |
Enter a new environment name | Type a unique name. The AZD template uses this name as part of the DNS name of your web app in Azure (<app-name>-<hash>.azurewebsites.net ). Alphanumeric characters and hyphens are allowed. |
Sign into Azure by running the azd auth login
command and following the prompt:
azd auth login
Create the necessary Azure resources and deploy the app code with the azd up
command. Follow the prompt to select the desired subscription and location for the Azure resources.
azd up
The azd up
command takes about 15 minutes to complete (the Redis cache takes the most time). It also compiles and deploys your application code, but you'll modify your code later to work with App Service. While it's running, the command provides messages about the provisioning and deployment process, including a link to the deployment in Azure. When it finishes, the command also displays a link to the deploy application.
This AZD template contains files (azure.yaml and the infra directory) that generate a secure-by-default architecture with the following Azure resources:
Once the command finishes creating resources and deploying the application code the first time, the deployed sample app doesn't work yet because you must make small changes to make it connect to the database in Azure.
Having issues? Check the Troubleshooting section.
Tip
The default SQL database connection string uses SQL authentication. For more secure, passwordless authentication, see How do I change the SQL Database connection to use a managed identity instead?
The AZD template you use generated the connectivity variables for you already as app settings and outputs the them to the terminal for your convenience. App settings are one way to keep connection secrets out of your code repository.
In the AZD output, find the settings AZURE_SQL_CONNECTIONSTRING
and AZURE_REDIS_CONNECTIONSTRING
. Only the setting names are displayed. They look like this in the AZD output:
App Service app has the following connection strings: - AZURE_SQL_CONNECTIONSTRING - AZURE_REDIS_CONNECTIONSTRING - AZURE_KEYVAULT_RESOURCEENDPOINT - AZURE_KEYVAULT_SCOPE
AZURE_SQL_CONNECTIONSTRING
contains the connection string to the SQL Database in Azure, and AZURE_REDIS_CONNECTIONSTRING
contains the connection string to the Azure Redis cache. You need to use them in your code later.
For your convenience, the AZD template shows you the direct link to the app's app settings page. Find the link and open it in a new browser tab.
Having issues? Check the Troubleshooting section.
In the GitHub codespace, start a new chat session by selecting the Chat view, then selecting +.
Ask, "@workspace How does the app connect to the database and the cache?" Copilot might give you some explanation about the MyDatabaseContext
class and how it's configured in Program.cs.
Ask, "In production mode, I want the app to use the connection string called AZURE_SQL_CONNECTIONSTRING for the database and the app setting called AZURE_REDIS_CONNECTIONSTRING*." Copilot might give you a code suggestion similar to the one in the Option 2: without GitHub Copilot steps below and even tell you to make the change in the Program.cs file.
Open Program.cs in the explorer and add the code suggestion.
GitHub Copilot doesn't give you the same response every time, and it's not always correct. You might need to ask more questions to fine-tune its response. For tips, see What can I do with GitHub Copilot in my codespace?.
Before you deploy these changes, you still need to generate a migration bundle.
Having issues? Check the Troubleshooting section.
With the SQL Database protected by the virtual network, the easiest way to run database migrations is in an SSH session with the App Service container. However, the App Service Linux containers don't have the .NET SDK, so the easiest way to run database migrations is to upload a self-contained migrations bundle.
Generate a migrations bundle for your project with the following command:
dotnet ef migrations bundle --runtime linux-x64 -o migrationsbundle
Tip
The sample application (see DotNetCoreSqlDb.csproj) is configured to include this migrationsbundle file. During the azd package
stage, migrationsbundle will be added to the deploy package.
Deploy all the changes with azd up
.
azd up
In the AZD output, find the URL for the SSH session and navigate to it in the browser. It looks like this in the output:
Open SSH session to App Service container at: https://<app-name>.scm.azurewebsites.net/webssh/host
In the SSH session, run the following commands:
cd /home/site/wwwroot
./migrationsbundle -- --environment Production
If it succeeds, App Service is connecting successfully to the database. Remember that --environment Production
corresponds to the code changes you made in Program.cs.
Note
Only changes to files in /home
can persist beyond app restarts. Changes outside of /home
aren't persisted.
Having issues? Check the Troubleshooting section.
In the AZD output, find the URL of your app and navigate to it in the browser. The URL looks like this in the AZD output:
Deploying services (azd deploy) (✓) Done: Deploying service web - Endpoint: https://<app-name>-<hash>.azurewebsites.net/
Add a few tasks to the list.
Congratulations, you're running a web app in Azure App Service, with secure connectivity to Azure SQL Database.
Having issues? Check the Troubleshooting section.
Azure App Service can capture console logs to help you diagnose issues with your application. For convenience, the AZD template already enabled logging to the local file system and is shipping the logs to a Log Analytics workspace.
The sample application includes standard logging statements to demonstrate this capability, as shown in the following snippet:
public async Task<IActionResult> Index()
{
var todoItems = await _cache.GetAsync(_TodoItemsCacheKey);
if (todoItems != null)
{
_logger.LogInformation("Data from cache.");
var todoList = JsonConvert.DeserializeObject<List<Todo>>(Encoding.UTF8.GetString(todoItems));
return View(todoList);
}
else
{
_logger.LogInformation("Data from database.");
var todoList = await _context.Todo.ToListAsync();
var serializedTodoList = JsonConvert.SerializeObject(todoList);
await _cache.SetAsync(_TodoItemsCacheKey, Encoding.UTF8.GetBytes(serializedTodoList));
return View(todoList);
}
}
In the AZD output, find the link to stream App Service logs and navigate to it in the browser. The link looks like this in the AZD output:
Stream App Service logs at: https://portal.azure.com/#@/resource/subscriptions/<subscription-guid>/resourceGroups/<group-name>/providers/Microsoft.Web/sites/<app-name>/logStream
Learn more about logging in .NET apps in the series on Enable Azure Monitor OpenTelemetry for .NET, Node.js, Python and Java applications.
Having issues? Check the Troubleshooting section.
To delete all Azure resources in the current deployment environment, run azd down
and follow the prompts.
azd down
SSH CONN CLOSED
Connected!
but no logsDepending on your subscription and the region you select, you might see the deployment status for Azure SQL Database to be Conflict
, with the following message in Operation details:
Location '<region>' is not accepting creation of new Windows Azure SQL Database servers at this time.
This error is most likely caused by a limit on your subscription for the region you select. Try choosing a different region for your deployment.
You might see this error:
Unable to open a connection to your app. This may be due to any network security groups or IP restriction rules that you have placed on your app. To use log streaming, please make sure you are able to access your app directly from your current network.
This is usually a transient error when the app is first started. Wait a few minutes and check again.
It takes a few minutes for the Linux container to start up. Wait a few minutes and check again.
After you configure diagnostic logs, the app is restarted. You might need to refresh the page for the changes to take effect in the browser.
Pricing for the created resources is as follows:
sqlcmd
from the app's SSH terminal. The app's container doesn't come with sqlcmd
, so you must install it manually. Remember that the installed client doesn't persist across app restarts.Take the autogenerated workflow file from App Service as an example, each git push
kicks off a new build and deployment run. From a local clone of the GitHub repository, you make the desired updates push it to GitHub. For example:
git add .
git commit -m "<some-message>"
git push origin main
If a step fails in the autogenerated GitHub workflow file, try modifying the failed command to generate more verbose output. For example, you can get more output from any of the dotnet
commands by adding the -v
option. Commit and push your changes to trigger another deployment to App Service.
See Set up GitHub Actions deployment from the Deployment Center.
The default connection string to the SQL database is managed by Service Connector, with the name defaultConnector, and it uses SQL authentication. To replace it with a connection that uses a managed identity, run the following commands in the cloud shell after replacing the placeholders:
az extension add --name serviceconnector-passwordless --upgrade
az sql server update --enable-public-network true
az webapp connection delete sql --connection defaultConnector --resource-group <group-name> --name <app-name>
az webapp connection create sql --connection defaultConnector --resource-group <group-name> --name <app-name> --target-resource-group <group-name> --server <database-server-name> --database <database-name> --client-type dotnet --system-identity --config-connstr true
az sql server update --enable-public-network false
By default, the command az webapp connection create sql --client-type dotnet --system-identity --config-connstr
does the following:
AZURE_SQL_CONNECTIONGSTRING
, which your app is already using at the end of the tutorial.Your app should now have connectivity to the SQL database. For more information, see Tutorial: Connect to Azure databases from App Service without secrets using a managed identity.
Tip
Don't want to enable public network connection? You can skip az sql server update --enable-public-network true
by running the commands from an Azure cloud shell that's integrated with your virtual network if you have the Owner role assignment on your subscription.
To grant the identity the required access to the database that's secured by the virtual network, az webapp connection create sql
needs direct connectivity with Entra ID authentication to the database server. By default, the Azure cloud shell doesn't have this access to the network-secured database.
You might have noticed that the GitHub Copilot chat view was already there for you when you created the codespace. For your convenience, we include the GitHub Copilot chat extension in the container definition (see .devcontainer/devcontainer.json). However, you need a GitHub Copilot account (30-day free trial available).
A few tips for you when you talk to GitHub Copilot:
@workspace
. For more information, see Use the @workspace agent.@workspace
) even where to make the changes, but it's not allowed to make the changes for you. It's up to you to add the suggested changes and test it.Here are some other things you can say to fine-tune the answer you get:
Advance to the next tutorial to learn how to secure your app with a custom domain and certificate.
Or, check out other resources:
Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayTraining
Module
Customize a .NET Aspire app to use existing Azure resources - Training
In this module, you'll learn how to move backing services for your Azure-hosted .NET Aspire app from containers into native Azure services.
Certification
Microsoft Certified: Azure Developer Associate - Certifications
Build end-to-end solutions in Microsoft Azure to create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, and more.
Documentation
Tutorial: ASP.NET app with Azure SQL Database - Azure App Service
Learn how to deploy a C# ASP.NET app to Azure and to Azure SQL Database
Quickstart: Deploy an ASP.NET web app - Azure App Service
Learn how to run web apps in Azure App Service by deploying your first ASP.NET app.
Publish an ASP.NET Core app to Azure with Visual Studio Code
Learn how to publish an ASP.NET Core app to Azure App Service using Visual Studio Code