You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sre-agent/diagnose-azure-observability.md
+23-51Lines changed: 23 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Diagnose with Azure Observability in Azure SRE Agent
3
3
description: Learn how your agent queries Application Insights, Log Analytics, Azure Monitor metrics, Activity Logs, Resource Graph, and resource-specific diagnostics automatically without connectors.
4
4
ms.topic: conceptual
5
5
ms.service: azure-sre-agent
6
-
ms.date: 03/04/2026
6
+
ms.date: 03/18/2026
7
7
author: craigshoemaker
8
8
ms.author: cshoe
9
9
ms.ai-usage: ai-assisted
@@ -17,16 +17,16 @@ Your agent queries Application Insights, Log Analytics, Azure Monitor metrics, R
17
17
> [!TIP]
18
18
> Key benefits of Azure observability diagnostics:
19
19
>
20
-
> - Your agent queries App Insights, Log Analytics, Azure Monitor metrics, Resource Graph, Activity Logs, and resource-specific diagnostics — all in one investigation.
21
-
> - No connectors are needed — everything works through managed identity and Azure RBAC.
20
+
> - Your agent queries App Insights, Log Analytics, Azure Monitor metrics, Resource Graph, Activity Logs, and resource-specific diagnostics, all in one investigation.
21
+
> - No connectors are needed. Everything works through managed identity and Azure RBAC.
22
22
> - Your agent decides which sources to query based on the symptom, correlates evidence across them, and explains what it found.
23
-
> - Deep diagnostics go beyond metrics — CPU profiling, memory analysis, connectivity checks, and deployment history.
23
+
> - Deep diagnostics go beyond metrics including CPU profiling, memory analysis, connectivity checks, and deployment history.
24
24
25
25
## The problem: too many places to look
26
26
27
27
Azure's observability stack is comprehensive. Application Insights captures traces and dependencies. Log Analytics stores custom logs and events. Azure Monitor tracks resource metrics. Resource Graph maps topology. Activity Logs record configuration changes. Each Azure service has its own diagnostics including Container Apps console logs, App Service deployment history, Function App health checks, and AKS pod status.
28
28
29
-
That breadth is the problem. During an incident, you need data from several of these sources, but you have to remember which portal has which data, write KQL from scratch, manually copy operation IDs between tools, and correlate timestamps across tabs. The data exists everywhere. Knowing where to look and connecting what you find is what takes the most time.
29
+
That breadth is the problem. During an incident, you need data from several of these sources, but you have to remember which portal has which data, write KQL from scratch, manually copy operation IDs between tools, and correlate timestamps across tabs. The data exists everywhere. Knowing where to look and connecting what you find takes the most time.
30
30
31
31
## How your agent investigates
32
32
@@ -36,31 +36,26 @@ The following diagram shows how your agent diagnoses Azure services by querying
36
36
37
37
Your agent has built-in access to Azure's full diagnostic surface. Grant permissions once, and your agent queries the right sources automatically based on the symptom:
38
38
39
-
1.**Discovers resources** — Resource Graph finds topology, relationships, and connected resources across your subscriptions.
40
-
1.**Queries logs** — Application Insights for request traces, exceptions, and dependencies; Log Analytics for custom workspace data.
41
-
1.**Analyzes metrics** — Azure Monitor for CPU, memory, request rates, and availability with automatic time-series analysis.
42
-
1.**Checks changes** — Activity Logs surface recent configuration changes and deployments that might correlate with the issue.
43
-
1.**Runs deep diagnostics** — Built-in skills perform CPU profiling, memory analysis, latency assessment, connectivity checks, and resource-specific health analysis.
44
-
1.**Executes Azure CLI commands** — Reads resource state, checks configurations, and inspects properties that APIs don't expose directly.
45
-
1.**Correlates everything** — Evidence from all sources is connected automatically, with no copy-paste between portals.
39
+
1.**Discovers resources**: Resource Graph finds topology, relationships, and connected resources across your subscriptions.
40
+
1.**Queries logs**: Application Insights for request traces, exceptions, and dependencies; Log Analytics for custom workspace data.
41
+
1.**Analyzes metrics**: Azure Monitor for CPU, memory, request rates, and availability with automatic time-series analysis.
42
+
1.**Checks changes**: Activity Logs surface recent configuration changes and deployments that might correlate with the issue.
43
+
1.**Runs deep diagnostics**: Built-in skills perform CPU profiling, memory analysis, latency assessment, connectivity checks, and resource-specific health analysis.
44
+
1.**Executes Azure CLI commands**: Reads resource state, checks configurations, and inspects properties that APIs don't expose directly.
45
+
1.**Correlates everything**: Evidence from all sources is connected automatically, with no copy-paste between portals.
46
46
47
47
> [!NOTE]
48
48
> Your agent selects the right tools for each resource type automatically. You don't configure which tools to use. Your agent decides based on the symptom and the resource involved.
49
49
50
-
## What makes this different
50
+
## What makes this approach different
51
51
52
52
Azure's observability capabilities are excellent. The challenge is navigating them under pressure. Your agent eliminates the cognitive overhead of knowing where to look and how to connect what you find.
53
53
54
-
**Single investigation instead of portal-hopping.** Your agent queries all sources in one investigation. You don't need to remember whether a specific metric lives in Azure Monitor, Application Insights, or a resource-specific blade.
54
+
**Single investigation instead of portal-hopping.** Your agent queries all sources in one investigation. You don't need to remember whether a specific metric lives in Azure Monitor, Application Insights, or a resource-specific window.
55
55
56
56
**Symptom-driven queries instead of writing KQL from scratch.** Your agent constructs queries based on the symptom. It knows which tables to query, which dimensions to split by, and how to interpret the results in context.
57
57
58
-
**Automatic correlation instead of manual correlation.** Your agent follows the thread automatically by inspecting operation IDs, timestamps, resource relationships, deployment timelines across every source it queries.
59
-
60
-
| Capability | What it contributes |
61
-
|---|---|
62
-
|[Memory and knowledge](memory.md)| Recalls what worked for similar issues; your docs explain application-specific telemetry |
63
-
|[Run modes](run-modes.md)| Control whether your agent investigates only or also takes action |
58
+
**Automatic correlation instead of manual correlation.** Your agent follows the thread automatically by inspecting operation IDs, timestamps, resource relationships, and deployment timelines across every source it queries.
64
59
65
60
## Before and after
66
61
@@ -95,7 +90,7 @@ Your agent discovers available metrics for any resource type, queries time-serie
95
90
96
91
When your agent uses Azure Monitor as its incident platform, it also manages alerts directly by acknowledging and closing them during investigation.
97
92
98
-
### Resource Graph and Activity Logs
93
+
### Resource graph and activity logs
99
94
100
95
Your agent uses Resource Graph and Activity Logs to discover resources and correlate changes with incidents.
101
96
@@ -109,10 +104,10 @@ Beyond metrics and logs, your agent has specialized capabilities that go deeper.
| Log Analytics workspace | **Log Analytics Reader** | KQL queries on workspace data |
166
-
167
-
> [!NOTE]
168
-
> If your agent uses Azure Monitor as its incident platform, the **Monitoring Contributor** role is required at the subscription level. Your agent receives this role automatically when created through the portal. This permission enables your agent to acknowledge and close alerts during investigation. Without it, your agent can still query metrics and resource health, but can't manage alert states.
169
-
170
-
> [!TIP]
171
-
> If your agent uses Azure Monitor as its incident platform and its managed identity is missing the **Monitoring Contributor** role, a warning banner appears in the chat interface. This role is required specifically for alert management which acknowledges and closes Azure Monitor alerts. Your agent can still read metrics, logs, and resource health without it.
172
-
>
173
-
> The banner includes an **Assign Monitoring Contributor role** button that assigns the role directly. There's no need to navigate to the Azure portal. You can also dismiss the banner if you prefer to assign the role manually.
174
-
175
-
## When to use external tools
176
-
177
-
Azure observability covers most scenarios for applications running on Azure. You might need other tools when your data lives elsewhere.
153
+
Azure observability works automatically when you grant your agent Reader access to your subscription during initial setup.
178
154
179
-
| Scenario | Solution |
180
-
|---|---|
181
-
| Custom metrics in Azure Data Explorer | [Set up Kusto tools](kusto-tools.md) |
182
-
| Logs in Datadog, Splunk, or other platforms | [Configure external observability](diagnose-observability.md) |
0 commit comments