Skip to main content

Step 1: Create Your Agent

5 min · Deploy your agent and grant it access to your Azure resources.

What you'll accomplish

By the end of this step, your agent will:

  • Be deployed in your Azure subscription
  • Have access to any resources you granted during setup (you can add more later)
  • Be ready to answer questions about your infrastructure

Prerequisites

RequirementDetails
Azure subscriptionActive subscription with the Microsoft.App resource provider registered
PermissionsOwner or User Access Administrator role on the subscription (needed to assign RBAC roles to the agent's managed identity)
Resource groupExisting or create one during setup
Network access*.azuresre.ai must be allowed through your firewall — see Network Requirements
RegionYour subscription must allow resource creation in Sweden Central, East US 2, or Australia East
Resource provider registration

If the Create button is unavailable or deployment fails with "DeploymentNotFound", register the resource provider:

az provider register --namespace "Microsoft.App"

Then try creating the agent again.


Step 1: Open the creation wizard

  1. Go to sre.azure.com.

    If you're not signed in, you'll see the landing page — an overview of SRE Agent capabilities with sample demos and getting-started resources. Click Sign In to proceed.

  2. After signing in, click Create agent.

Agent list with Create button


Step 2: Configure basics

Fill in the required fields:

FieldWhat to enter
SubscriptionYour Azure subscription
Resource groupChoose existing or create new
Agent nameDescriptive name (e.g., prod-monitoring)
RegionSweden Central, East US 2, or Australia East
Application InsightsCreate new (recommended)

Create agent wizard basics

Click Next.


Step 3: Select resource groups to monitor (optional)

Choose which Azure resources your agent can access. This step is optional—you can skip it and grant access later (see Alternative: Subscription-level access below).

Prerequisites for assigning resource groups

You need Owner or User Access Administrator permissions on any resource groups you want to assign to the agent.

  1. Select resource groups containing your apps, databases, or infrastructure.
  2. Use filters to find specific groups across subscriptions.
  3. Select multiple resource groups as needed.
What happens here?

The agent gets read access to resources in these groups—logs, metrics, configurations. It cannot make changes unless you grant Privileged permissions later.

Start small

Select 1-2 resource groups to start, or skip this step entirely. You can add more resources later from Settings → Managed resources.

Click Next.


Step 4: Choose permission level

This step sets the permission level for the managed resource groups you selected. If you skipped Step 3, these permissions won't apply to anything yet—but you'll still need to complete this step.

LevelWhat it meansWhen to use
Reader (recommended)Agent can read only. Actions require your approval.Start here—safest option
PrivilegedAgent can execute approved actions directly.After you trust the agent

The wizard shows which Azure RBAC roles will be assigned (Log Analytics Reader, Monitoring Reader, AKS Cluster User, etc.).

Control autonomous actions with run modes

To control whether actions execute automatically or require approval, see run modes.

Click Next.


Step 5: Review and deploy

  1. Review your configuration.
  2. Click Create.
  3. Wait a few minutes for deployment.
  4. Click Chat with agent when complete.

Verify it works

Ask your agent:

What Azure resources can you see?

You should see: A summary like "I found 251 resources across 3 resource groups, including 5 Container Apps, 2 AKS clusters..."

Your agent also shows:

  • Resource groups table with monitored groups
  • Resource analysis by type
  • Suggested prompts tailored to YOUR resources

What you unlocked

✅ Your agent now:

  • Has read access to resources in your selected resource groups
  • Can query Azure Monitor logs and metrics for those resources
  • Is ready to answer questions about your infrastructure


Alternative: Subscription-level access

If you skipped Step 3 or want broader access than individual resource groups, you can grant the agent Reader access on your entire subscription:

  1. Go to Settings → Basics in your agent.
  2. Click the Managed identity link to open it in Azure portal.
  3. Navigate to your subscription's Access control (IAM).
  4. Add a Reader role assignment for the agent's managed identity.

This gives the agent visibility into all resources in the subscription without selecting individual resource groups.


Next step

Step 2: Add Your Team's Knowledge


Learn more

Was this page helpful?