Skip to main content

Azure DevOps( Server) –Check repository health and usage

Azure DevOps offers a repository health feature, which allows to monitor multiple metrics that contribute to the health of your Git repositories. If you are using Azure DevOps services, you maybe already know this feature. But with the latest release of Azure DevOps server (December 2025) , it finally arrived on-premise as well. Reasons enough to have a deeper look at it and write this post.

Let’s dive in!

Why is this feature relevant for my team?

Think of your Git repository like a living organism. As it grows with more commits, blobs, branches, and objects, it can become sluggish and unwieldy. Large repositories increase the load on Azure DevOps infrastructure, affecting performance and user experience. Without proper maintenance, your team could face slower clone times, degraded git operations, and even service disruptions.

The repository health feature now provides visibility into key health metrics and offers actionable recommendations before problems escalate.

Getting to your repository's health dashboard is straightforward. Navigate to your Azure Repos Git repository, select Repo > Files, and choose "Health and usage" from the ellipsis menu.

This opens the Repository health and usage panel, where you'll find a comprehensive overview of your repository's vital statistics.

The interface uses a traffic light system: factors highlighted in red indicate unhealthy conditions that need immediate attention, while amber warnings suggest you're approaching problematic thresholds.

Key metrics

The health feature tracks the following key metrics:

Repository size

Microsoft recommends keeping your repository size under 100 GB for optimal performance. Smaller repositories clone faster and are easier to manage. If you're exceeding this threshold, consider using Git Large File Storage (Git-LFS), or Scalar to manage large repositories.

Binary and large files

Storing large binary files like images, videos, or compiled artifacts directly in Git is problematic. Different versions of these files don't compress efficiently through Git's delta compression, meaning each version consumes substantial disk space. The health dashboard helps you identify when these files are becoming a problem.

Object counts

Azure Repos has a hard limit of 100 million objects in a single repository. The health panel tracks several object types:

  • Reachable blobs: The total size of file content stored in your repository. These should stay well under 100 GB, leaving room for other object types.
  • Reachable trees: Tree objects represent directory structures. They grow as you add directories and files, and Git creates copies of trees whenever files change. Distributing files across multiple subdirectories rather than having flat directory structures helps keep tree counts manageable.
  • Reachable commits: The total number of commit objects in your repository. While commits are smaller than blobs, a large number can slow down history traversal operations.

Reference count

If your Git repository contains more than 10,000 refs, you should consider enabling Limited Refs. As reference counts increase, so does the data that needs to be negotiated between client and server, potentially degrading user experience.

Best practices for repository health

Based on the health metrics Azure DevOps monitors, here are some best practices to keep your repositories in top shape:

  1. Regularly review your health dashboard: Make repository health checks part of your routine maintenance, especially for high-activity repositories.
  2. Refactor large files: Move binary assets, build artifacts, and other large files to appropriate storage solutions like Azure Artifacts or Git-LFS.
  3. Maintain reasonable directory structures: Avoid deep nesting or overly flat hierarchies. A balanced approach reduces tree object proliferation.
  4. Archive stale branches: Old feature branches and experimental work can be archived or deleted to reduce ref counts.
  5. Consider repository splitting: If a repository has grown beyond manageable size, evaluate whether it makes sense to split it into multiple repositories organized by logical boundaries.

More information

Repository health - Azure Repos | Microsoft Learn

Azure DevOps Server Release Notes - Azure DevOps Server & TFS | Microsoft Learn

Limited Refs - Azure DevOps Server & TFS | Microsoft Learn

Work with large files in your Git repo - Azure Repos | Microsoft Learn

Popular posts from this blog

Azure DevOps/ GitHub emoji

I’m really bad at remembering emoji’s. So here is cheat sheet with all emoji’s that can be used in tools that support the github emoji markdown markup: All credits go to rcaviers who created this list.

Kubernetes–Limit your environmental impact

Reducing the carbon footprint and CO2 emission of our (cloud) workloads, is a responsibility of all of us. If you are running a Kubernetes cluster, have a look at Kube-Green . kube-green is a simple Kubernetes operator that automatically shuts down (some of) your pods when you don't need them. A single pod produces about 11 Kg CO2eq per year( here the calculation). Reason enough to give it a try! Installing kube-green in your cluster The easiest way to install the operator in your cluster is through kubectl. We first need to install a cert-manager: kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml Remark: Wait a minute before you continue as it can take some time before the cert-manager is up & running inside your cluster. Now we can install the kube-green operator: kubectl apply -f https://github.com/kube-green/kube-green/releases/latest/download/kube-green.yaml Now in the namespace where we want t...

Podman– Command execution failed with exit code 125

After updating WSL on one of the developer machines, Podman failed to work. When we took a look through Podman Desktop, we noticed that Podman had stopped running and returned the following error message: Error: Command execution failed with exit code 125 Here are the steps we tried to fix the issue: We started by running podman info to get some extra details on what could be wrong: >podman info OS: windows/amd64 provider: wsl version: 5.3.1 Cannot connect to Podman. Please verify your connection to the Linux system using `podman system connection list`, or try `podman machine init` and `podman machine start` to manage a new Linux VM Error: unable to connect to Podman socket: failed to connect: dial tcp 127.0.0.1:2655: connectex: No connection could be made because the target machine actively refused it. That makes sense as the podman VM was not running. Let’s check the VM: >podman machine list NAME         ...