Debug X++ against a copy of a production database

This topic explains how to configure X++ debugging so that you can investigate issues in the production environment. For this procedure, you make a copy of the production database and then configure a developer environment to connect to the copied database.

Solution overview

When an issue that requires X++ debugging occurs in a production environment, the system administrator and developer work together to configure debugging and then debug the issue. The following illustration shows an overview of the process. Debug X+=

  1. In Microsoft Dynamics Lifecycle Services (LCS), the system administrator requests that a copy of the database be added to the sandbox environment.
  2. In Microsoft Visual Studio Team Services (VSTS), the developer synchronizes the local code to the same build that is running in the production environment.
  3. In the sandbox Azure SQL Database instance, the system administrator creates a temporary SQL sign-in for the developer. The developer then configures the environment to connect to the sandbox database.
  4. A firewall exception is added so that the developer environment can connect to the sandbox database.
  5. The developer debugs the issue.

Note: When debugging is completed, the system administrator can remove the temporary sign-in from the sandbox Azure SQL Database instance.

Before you begin

Before you begin to configure X++ debugging in a production environment, note the following points:

  • You can't debug directly against the production environment, because debugging might cause data corruption. However, developers can manipulate values at run time. Alternatively, in their own instance, developers can make a code change that changes data.
  • The developer environment that is used for debugging must exist in the same Microsoft Azure subscription as the sandbox environment. This requirement helps strengthen the security of the sandbox database. By default, there is a firewall restriction on both the sandbox and production Azure SQL Database instances. This restriction allows only servers that are in those environments to connect to the databases. To enable debugging, a firewall exception is added to allow a developer environment to connect to the sandbox database.
  • A one-time manual change to the developer environment is required, to allow the IP address of the environment to connect to the sandbox database. Submit a request to the Microsoft Support Team to allow the IP address.
  • We recommend that you not use a build environment for debugging. Otherwise, there is a risk that the developer’s activities on the computer might break the automated build process.

Solution details

When an issue occurs in the production environment, the system administrator can sign in to LCS and request that a database copy be added to a sandbox environment. While the database copy is running, the system administrator can notify the developer of the issue. The developer can then sync to the correct build of the code to match the production environment.

  1. In Microsoft Visual Studio, in Source Control Explorer, right-click the root node of the branch to sync, and then click Advanced > Get specific version.
  2. In the dialog box, select Type=Label, and then click the ellipsis (...).
  3. In the dialog box, click Find. All the builds from the build server are listed.
  4. Select the build that is currently deployed to the production environment, and then select to run a full build. When the database is copied, only the system administrator will be able to access the sandbox database. The system administrator must complete the following tasks:

    • Remove any data that you don't want in the sandbox database, such as employee salaries.
    • Enable or add the developer as a user.
    • Create a new SQL sign-in for the developer to use. This step lets the system administrator maintain the security of the sandbox environment. The developer will only have access to one database for a time. The following code can be used to create the new SQL sign-in.

      CREATE USER devtempuser WITH PASSWORD = ''
      EXEC sp_addrolemember 'db_owner', 'devtempuser'

Next, the developer edits the web.config file for Application Object Server (AOS).

  1. Go to J:\AosService\WebRoot\web.config.
  2. Save a copy of the original web.config file, so that you can switch back later.
  3. Edit the following section in the web.config file. Before your changes

    <add key="DataAccess.Database" value="sandboxDatabaseName" />
    <add key="DataAccess.DbServer" value="" />
    <add key="DataAccess.SqlPwd" value="password" />
    <add key="DataAccess.SqlUser" value="devtempuser" />

    After your changes

    <add key="DataAccess.Database" value="TariqRTW_axdb_dd78f8aadbc6c481" />
    <add key="DataAccess.DbServer" value="" />
    <add key="DataAccess.SqlPwd" value="P@ssw0rd" />
    <add key="DataAccess.SqlUser" value="devtempuser" />
  4. Debug the issue.

After the developer has finished, the system administrator can remove "devtempuser" from the sandbox database. This step prevents the developer from having permanent access to the sandbox database.