You’ve provisioned infrastructure and deployed the application. This final step verifies everything works correctly. You will:
After this step, your deployment is verified and ready for users.
Before testing the application, verify all infrastructure components are healthy.
All nodes should show Ready:
Nodes stuck in NotReady? Check for issues:
Look at the “Conditions” section for clues. Common causes: network plugin issues, insufficient resources, or failed health checks.
Verify the database is accessible from the cluster by checking backend logs:
You should see successful connection messages, not connection refused errors.
Check PostgreSQL status in Azure Portal:
Verify secrets exist and External Secrets can read them:
Verify the storage account and containers exist:
You should see three containers (e.g., confidentai-stage-testcases, confidentai-stage-payloads, and confidentai-stage-chbackups).
Storage is used for file uploads. If storage connectivity fails, users
won’t be able to upload datasets or export reports. The backend uses Azure
Workload Identity to access Storage—verify the confident-storage-sa service
account exists.
The NGINX Ingress controller has an Azure Load Balancer IP. DNS records must point to it.
Example output:
Azure uses IP addresses, not hostnames. Unlike AWS ALBs which have hostnames, Azure Load Balancers use static IP addresses. You create DNS A records (not CNAME records) pointing your domains to this IP.
Add A records for each hostname you configured in the ingress:
A records vs. CNAME:
Corporate DNS changes may require approval. If your DNS is managed by an internal team, submit change requests for all four records. Factor in approval time—this can delay verification by hours or days.
After adding records, verify they resolve correctly:
You should see the Load Balancer IP in the response. If you see “NXDOMAIN” or your old values, wait for DNS propagation (typically 5-30 minutes, up to 48 hours for some providers).
Open your frontend URL in a browser:
What you should see:
Certificate errors?
kubectl get certificate -n confident-aiThe backend exposes a health endpoint:
Expected response:
Connection refused or timeout?
kubectl get ingress -n confident-ai for an addresskubectl get pods -n confident-aiExpected: {"status":"healthy"}
Expected: {"status":"ok"}
https://app.yourdomain.comOAuth errors?
https://api.yourdomain.com/api/auth/callback/google.confident_subdomain may be misconfigured. Must be root domain, not full subdomain.This verifies database connectivity and basic write operations.
From your local machine (or any machine that can reach the backend):
Expected: True or success message
SDK can’t connect?
If your machine can’t reach the backend directly (internal LB), run this test from within the same network (VPN) or from a pod inside the cluster.
Expected: Evaluation runs and results appear in the dashboard.
Evaluation fails with API errors?
openai_api_key not configured or invalidapi.openai.comYour cluster needs outbound HTTPS access to OpenAI (or your configured LLM provider).
Run comprehensive health checks on all services:
Before announcing the deployment is ready for users, verify:
terraform.tfvars not committed to version controlDon’t panic. Most issues have straightforward fixes:
kubectl logs for pod issues, Azure Portal for service-level issueskubectl get commandsYou’ve completed the Confident AI deployment on Azure:
Your deployment is now ready for users. Welcome to Confident AI!
Need help? Contact your Confident AI representative or email support@confident-ai.com with details about your deployment and any issues encountered.