Documentation Index
Fetch the complete documentation index at: https://docs.cloudthinker.io/llms.txt
Use this file to discover all available pages before exploring further.
Azure
Connect your Azure subscriptions to enable CloudThinker agents to analyze costs, optimize resources, and manage infrastructure across Microsoft Azure services.Setup
Register Application
Create an app registration in Azure AD
- Navigate to Azure Portal
- Go to Azure Active Directory → App registrations → New registration
- Enter application name:
CloudThinker-ReadOnly - Select Accounts in this organizational directory only
- Click Register
Note Application Details
Copy and save these values from the app overview:
- Application (client) ID
- Directory (tenant) ID
Create Client Secret
Generate a secret for authentication
- In your app registration, go to Certificates & secrets
- Click New client secret
- Add a description and set expiration (recommended: 12 months)
- Click Add
- Immediately copy the secret value (it won’t be shown again)
Assign Reader Role
Grant access to your subscription(s)
- Go to Subscriptions → Your Subscription
- Click Access control (IAM) → Add → Add role assignment
- Select Reader role
- Search for and select your app registration
- Click Save
Required Roles
Minimum (Read-Only Analysis)
Recommended (Full Analysis)
Agent Capabilities
Once connected, agents can:| Agent | Azure Capabilities |
|---|---|
| Alex | Cost analysis, VM right-sizing, Reserved Instance recommendations, resource optimization |
| Oliver | Security Center findings, Azure AD audits, compliance checks, policy violations |
| Tony | SQL Database performance, Cosmos DB optimization, PostgreSQL tuning |
| Kai | AKS cluster management, container optimization, workload analysis |
Multi-Subscription Setup
For organizations with multiple Azure subscriptions:Troubleshooting
Authentication failed
Authentication failed
- Verify Tenant ID, Client ID, and Client Secret are correct
- Check the client secret hasn’t expired
- Confirm the app registration is in the correct Azure AD tenant
- Ensure no conditional access policies are blocking
Client secret expired
Client secret expired
- Go to Azure AD → App registrations → Your app
- Navigate to Certificates & secrets
- Create a new client secret
- Update the secret in CloudThinker connection settings
Missing resources
Missing resources
- Verify Reader role is assigned to the correct subscription(s)
- Check if resources are in a different subscription
- Ensure the app has access to all required subscriptions
No cost data
No cost data
- Verify Cost Management Reader role is assigned
- Check Cost Management + Billing access
- Ensure EA/MCA billing account access if applicable
Security Best Practices
- Minimal permissions - Use Reader role, not Contributor
- Secret rotation - Rotate client secrets every 90 days
- Expiration - Set appropriate expiration on secrets (not “Never”)
- Audit logging - Enable Azure AD sign-in logs
- Conditional access - Consider IP restrictions for the app
Related
AWS Connection
Connect Amazon Web Services
Oliver Agent
Security-focused agent for Azure compliance