Skip to main content

Step 1: Create and Set Up Your Azure SRE Agent

Deploy an Azure SRE Agent, connect your code repository, and add Azure resource access.

What you'll accomplish

  • Deploy an Azure SRE Agent to your subscription
  • Connect your GitHub code repository
  • Grant the agent Reader access to your Azure resources

Prerequisites

RequirementDetails
Azure subscriptionAn active Azure subscription with permission to create resources
RoleContributor on the subscription (needed to register resource providers and create resources). If your team assigns managed resource groups with RBAC, you also need Owner or User Access Administrator to create role assignments.
Network access*.azuresre.ai must be reachable from your browser

Open the onboarding wizard

  1. Navigate to sre.azure.com.
  2. Sign in with your Azure credentials.
  3. The wizard opens with a three-step flow: Basics → Review → Deploy.

Basics

Fill in the fields to define your agent:

FieldDescriptionExample
SubscriptionThe Azure subscription that will own the agent resourceMy Production Subscription
Resource groupAn existing resource group or create a new onerg-sre-agent
Agent nameA unique name for your agent instancecontoso-sre-agent
RegionAzure region for deploymentEast US 2
Model providerChoose the AI model provider for your agentSee provider table below
Application InsightsCreate a new instance or use an existing oneCreate new (default)

After you select a region, the Model provider field appears. Choose the AI provider that powers your agent's investigations and conversations:

note

Organizations with EU data residency requirements should select Azure OpenAI — Anthropic is excluded from EU Data Boundary (EUDB) commitments. Anthropic (Claude) models require a direct Anthropic agreement and are not available to all tenants.

ProviderDescription
AnthropicClaude models — marked Preferred for most regions
Azure OpenAIGPT models — covered by EU Data Boundary commitments for Sweden Central deployments

Anthropic is selected by default for most regions. For Sweden Central, Azure OpenAI is selected by default. You can change the model provider after creation in Settings → Basics.

Model provider radio buttons showing Anthropic and Azure OpenAI options

Click Next to proceed.

Create agent wizard with subscription, resource group, agent name, and region fields filled in

Checkpoint: All fields are filled, including the model provider. The Next button is enabled.


Review

The wizard shows a summary of your configuration. Verify:

  • Subscription and resource group are correct.
  • Agent name and region match your intent.

Click Create to begin provisioning.

Review step showing agent configuration summary before deployment

Checkpoint: The summary matches what you entered. No validation errors appear.


Deploy

The deployment creates the following Azure resources:

ResourcePurpose
Managed IdentityAuthenticates the agent to Azure services
Log Analytics WorkspaceStores agent telemetry and diagnostic logs
Application InsightsMonitors agent health and performance
Role AssignmentsGrants the managed identity required access
Azure SRE Agent resourceThe agent itself

If you selected Create new for Application Insights, the deployment also creates an Application Insights instance and Log Analytics Workspace.

Wait for the deployment to complete. This typically takes 2–5 minutes.

Deployment succeeded with all resources created

Checkpoint: Deployment status shows Succeeded. All resources are listed as created.


Set up your agent

After deployment finishes, click Set up your agent to open the setup page. You'll see the header "More context. Better investigations." This page has two tabs:

TabData sources
QuickstartCode, Logs, Deployments, Incidents
Full setupEverything in Quickstart + Azure Resources + Knowledge Files

Start with the Quickstart tab. Not all sources are required — but connecting more gives your agent better context for investigations. This guide walks through connecting code (from Quickstart) and Azure resources (from Full setup).

Setup page showing data source cards for Code, Logs, Deployments, and Incidents

Connect your code repository

  1. On the Code card, click the + button to connect repositories.
  2. Choose a platform: Select GitHub (Azure DevOps is also supported).
  3. Choose sign in method: Select Auth or PAT.
    • Auth: Click Sign in, authenticate in the browser, and approve access when prompted.
    • PAT: Paste your Personal Access Token and click Connect.
  4. Click Next to proceed to repository selection.
  5. Pick repositories: Use the dropdown to select one or more repositories — they're listed alphabetically for easy browsing.
Repository picker dropdown showing available GitHub repositories
  1. Click Add repository.
Code card showing green checkmark with connected repository

Checkpoint: The Code card shows a green checkmark and lists the connected repositories.

tip

Connect the repository that contains the service you'll investigate first. Once connected, your agent immediately starts exploring the codebase and building expertise — learning your project structure, deployment configurations, and code patterns through Deep Context.


Add Azure resource access

Granting the agent Reader access to your Azure resources allows it to query metrics, logs, and resource configurations during investigations.

  1. On the setup page, switch to the Full setup tab (or use the Azure Resources card if visible on Quickstart).
  2. On the Azure Resources card, click the + button to add resources.
  3. Choose resource type: Select Subscriptions or Resource groups, then click Next.

If you chose Subscriptions:

  1. Select subscriptions: Use the search box to find subscriptions. Check the ones you want the agent to access.
  2. Click Next to review agent permissions.
  3. The agent's managed identity is automatically granted Reader role on each selected subscription. Review the permissions status.
  4. Click Add subscriptions.

If you chose Resource groups:

  1. Filter by subscription: Use the subscription dropdown to filter which resource groups are shown.
  2. Select resource groups: Use the search box to find resource groups. Check the ones you want the agent to access. The grid shows the resource group name, subscription, and region.
  3. Click Next to review agent permissions.
  4. Choose the permission level for the agent, and review the role assignments.
  5. Click Add resource group.

Checkpoint: The Azure Resources card shows the connected subscriptions or resource groups.

note

After you add subscriptions or resource groups, the agent automatically assigns the required permissions to its managed identity. This can take a few seconds — you'll see the status update on the permissions review step. Reader role provides read-only access. For advanced permission management, see Manage permissions and access.


Click "Done and go to agent"

Once you've connected your data sources, click Done and go to agent. This takes you into the agent chat to start team onboarding.

Checkpoint: The agent chat opens.


CapabilityWhat it adds
ConnectorsHow the agent connects to external data sources
User RolesWho can access your agent and what they can do
PermissionsHow permission levels and RBAC roles work

Next step

→ Step 2: Team onboarding

Was this page helpful?