azure-reliability

Assess and improve the reliability posture of Azure Functions: zone redundancy, ZRS storage, health probes, multi-region failover. Scans deployed resources,…

INSTALLATION
npx skills add https://github.com/microsoft/azure-skills --skill azure-reliability
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

Azure Reliability Assessment & Configuration

Quick Reference

Property

Details

Best for

Reliability posture assessment, zone redundancy enablement, multi-region failover setup

Primary capabilities

Reliability assessment table, Zone Redundancy Configuration, Multi-Region IaC Generation

Supported services

Azure Functions (App Service and Container Apps planned for a future version)

MCP tools

Azure Resource Graph queries, Azure CLI commands

When to Use This Skill

Activate this skill when user wants to:

  • "Assess my Functions app's reliability"
  • "Check the reliability of my resource group" (Functions resources only)
  • "Is my function app zone redundant?"
  • "Make my function app zone redundant"
  • "Set up multi-region failover for my Functions app"
  • "Check my reliability posture"
  • "Find single points of failure" (in Functions workloads)
  • "Enable high availability for my Functions app"
  • "Check disaster recovery readiness"
  • "Improve my Functions app's resilience"

Scope note: This skill currently covers Azure Functions only. If the user asks about Azure App Service or Azure Container Apps reliability, acknowledge that support is planned but not yet available, and only proceed with the parts that apply to Functions resources in scope.

Prerequisites

  • Authentication: user is logged in to Azure via az login
  • Permissions: Reader access on target subscription/resource group (for assessment)
  • Permissions: Contributor access (for configuration changes)
  • Azure Resource Graph extension: az extension add --name resource-graph

MCP Tools

Tool

Purpose

mcp_azure_mcp_extension_cli_generate

Generate az CLI commands for resource queries and configuration

mcp_azure_mcp_subscription_list

List available subscriptions

mcp_azure_mcp_group_list

List resource groups

Primary query method: Azure Resource Graph via az graph query (requires az extension add --name resource-graph).

Assessment Workflow

Phase 1: Discover Resources

  • Identify scope — Ask user for resource group, subscription, or app name
  • Query Azure Resource Graph to discover all resources in scope
  • Classify resources by service type (Functions, Storage, etc.). If non-Functions compute (App Service sites that aren't Function Apps, Container Apps) is found, note it but do not deep-dive — those services are planned for a future version of this skill.

Important: Always scope queries to the user's specified resource group or subscription. Add these filters to every Resource Graph query:

  • Resource group: | where resourceGroup =~ '<rg-name>'
  • Subscription: Use --subscriptions <sub-id> flag on az graph query
  • App name: | where name =~ '<app-name>'

Phase 2: Assess Reliability

Two-step assessment: platform-level discovery first, then per-service deep dive.

Step 1 — Platform discovery (find what's there). Use these to enumerate resources in scope and detect cross-cutting reliability gaps:

Platform check

Reference

Zone redundancy — discovery

references/zone-redundancy-checks.md

Storage redundancy (cross-service)

references/storage-redundancy-checks.md

Multi-region &#x26; global load balancers

references/multi-region-checks.md

Front Door / Traffic Manager / App Insights probes

references/health-probe-checks.md

Step 2 — Per-service deep dive. For each compute resource discovered in Step 1, load the matching service reference. The service reference is the single source of truth for that service's plan/SKU rules, assessment queries, CLI commands, IaC patches (Bicep + Terraform + AVM), and reporting hints.

This skill version ships only the Azure Functions per-service reference. Other compute services are listed below explicitly so the dispatch logic is unambiguous: if a resource matches an unsupported row, do not attempt to load a reference, fabricate CLI commands, or generate IaC patches for it.

Service detected

Reference

Azure Functions (microsoft.web/serverfarms with kind contains 'functionapp')

references/services/functions/reliability.md

Azure App Service (non-Functions sites: microsoft.web/sites without kind contains 'functionapp', microsoft.web/serverfarms without kind contains 'functionapp')

⚪ Not yet shipped — planned for a future version

Azure Container Apps (microsoft.app/containerapps, microsoft.app/managedenvironments)

⚪ Not yet shipped — planned for a future version

Handling unsupported services: If a resource matches an unsupported row above, surface it in the discovery summary, mark it as ⚪ not assessed (planned) in the Phase 3 table, and skip the per-service remediation steps for it. Do not attempt to fabricate CLI commands or IaC patches for those services.

Phase 3: Generate Reliability Checklist

Present findings as a feature-pivoted table: one row per reliability feature (Zone redundancy on compute, Zone-redundant storage, Health probes, Multi-region failover), with a single status indicator and the specific resources that are relevant to that feature. This avoids the noise of one-row-per-resource with mostly n/a cells. Do not assign numeric scores or grades.

🔍 Reliability Assessment — {scope}

─────────────────────────────────────────────────────────────────────────────────────────────

Reliability Feature              Status      Resources

─────────────────────────────────────────────────────────────────────────────────────────────

Zone redundancy — compute        🔴 OFF      • plan-ii5trxva2ark4 (FC1)

Zone-redundant storage           🔴 GRS      • stii5trxva2ark4 (defaulted; no SKU set in IaC)

Health probes                    🔴 OFF      • func-api-ii5trxva2ark4 — needs code change (FC1)

Multi-region failover            🔴 OFF      • Single region (eastus) only — Front Door not configured

─────────────────────────────────────────────────────────────────────────────────────────────

Want me to fix the 🔴 items? I'll do the quick wins first (Function App

plan zone redundancy + health checks on supported plans), then ask before

storage migration and multi-region setup. (yes/no)

Rules for the table:

  • Four feature rows, in this order: Zone redundancy — compute · Zone-redundant storage · Health probes · Multi-region failover. Omit a row entirely only if no resource in scope could ever apply to it.
  • Status column is one symbol + one short word, no other characters:
  • 🟢 ON — feature is fully enabled across all relevant resources in scope
  • 🟡 PARTIAL — some resources have it, some don't (or partial config like liveness-only)
  • 🔴 OFF — feature is missing on all relevant resources
  • For storage, replace OFF with the current SKU when relevant (🔴 LRS, 🔴 GRS, 🟢 ZRS, 🟢 GZRS). When no SKU is set in IaC, label as 🔴 GRS (ARM/AVM default) and note that in the resource line.
  • Resources column lists only what's relevant to that feature, one bullet per resource:
  • For "needs fixing" resources, include a short inline reason ((FC1), (defaulted; no SKU set), liveness only, needs code change (FC1)).
  • For resources that are already ON for that feature, mention them on the same row with — already ON so the user sees credit for what's right.
  • Do not include n/a, , or empty cells. If a feature doesn't apply to any resource in scope, drop the row.
  • Do not include numeric scores, grades, or point totals.
  • End the assessment with a single yes/no question that kicks off the staged remediation flow. Do not enumerate the per-resource fix list here — the user will see it after they say yes (Configuration Workflow Step 1).

UX Note: If the assessment finds the app already has all core reliability features (zone redundancy, ZRS/GZRS storage, health probes), skip the fix-it question and jump straight to Configuration Workflow [Step 3](#step-3-both-paths-multi-region-followup--ask-and-wait) (Multi-region follow-up). Do NOT start any multi-region work without explicit consent.

Configuration Workflow

When user wants to fix findings from the assessment:

⛔ ALWAYS confirm with user before executing changes. Show what will change, any cost implications, and any destructive actions (e.g., environment recreation).

Step 1: Present Fix Plan + Choose Path

After assessment, if user says "fix it" / "improve my reliability" / "enable zone redundancy":

  • List each fixable finding with the specific action
  • Flag any cost implications or breaking changes
  • Ask user which path they want:
I'll start with the quick wins (no downtime, fast):

1. ✏️  Enable zone redundancy on plan-ii5trxva2ark4 (Flex Consumption — no cost change)

2. ✏️  Set health check path to /api/health on func-api-ii5trxva2ark4

Then, separately, I'll ask if you want to upgrade storage:

3. 🕒  Upgrade stii5trxva2ark4 from LRS → ZRS (small cost increase, migration takes hours)

   — Required for full zone redundancy, but I'll confirm with you before starting.

How would you like to apply these changes?

  A) Fix now — Run az CLI commands against your live resources (immediate, one-time)

  B) Patch my IaC — Update your Bicep/Terraform files so changes persist across deploys

(If you use azd or Terraform, option B is recommended so `azd up` won't overwrite changes.)

Path A: Fix Now (CLI)

Run fixes against live resources using az CLI commands. Quick wins first, then ask before the slow storage migration.

The exact CLI commands per service live in the per-service references — pick the one(s) matching the resources discovered in Phase 2:

Fix

Reference

Enable zone redundancy / configure health probes (Functions)

references/services/functions/reliability.md

Upgrade storage replication (cross-service)

references/configure-storage.md

Set up multi-region (cross-service)

references/configure-multi-region.md

Platform overview / verification

references/configure-zone-redundancy.md, references/configure-health-probes.md

Execution order — always quick wins first:

-

Zone redundancy on compute (fast, in-place property update on the Function App's plan).

-

Health probes (Premium / Dedicated only — in-place; for FC1 / Consumption, follow the consent gate in configure-health-probes.md).

-

Verify the compute changes succeeded before doing anything else.

-

⛔ STOP — Ask about storage upgrade. Compute is now zone-redundant, but storage may still be LRS or GRS. Ask the user explicitly:

✅ Compute is now zone-redundant.

To be **fully zone-redundant**, your storage account also needs to be upgraded:

  • stii5trxva2ark4: currently `Standard_LRS` → needs `Standard_ZRS`

⚠️  This is a live storage redundancy conversion:

   • Takes hours to days depending on data volume

   • Small ongoing cost increase (~$0.01/GB/month more)

   • Only supported for Standard general-purpose v2 accounts

Do you want me to start the storage migration now? (yes / no / later)
  • yes → run az storage account update --sku Standard_ZRS (or migration start if needed); poll az storage account show --query sku.name until it reports Standard_ZRS.
  • no / later → leave storage as-is; note in the re-assessment that ZR storage remains a gap.

-

Multi-region — do NOT auto-run. Handled in Step 3 below as an explicit follow-up after re-assessment.

⚠️ Warning: If the user uses azd up or terraform apply later, CLI-only changes may be overwritten by the IaC definitions. Recommend also patching IaC after CLI fixes.

Path B: Patch IaC

Update the user's Bicep or Terraform files so reliability settings are persistent.

Step 1: Detect IaC type

  • Look for infra/ folder in project root
  • If not found, check project root for *.bicep or *.tf files
  • If still not found, ask user: "Where are your IaC files located?"
  • Check for *.bicep files → use Bicep patching
  • Check for *.tf files → use Terraform patching
  • If both exist, ask user which to patch
  • If no IaC exists, fall back to Path A (CLI) and inform user

Step 2: Classify each fix by risk level

Fix

Risk Level

What Happens

Zone redundancy (Function App plan)

🟢 Safe patch

In-place property update on next deploy

Storage LRS → ZRS

🟡 Pre-migration required

Live storage migration must complete before the IaC SKU change can deploy. Never bundle with safe patches — use the two-deploy flow in Steps 3–5.

Health check path (Premium / Dedicated)

🟢 Safe patch

In-place update, but causes app restart

Health check path (FC1 / Consumption)

⚪ Code-only — ask first

healthCheckPath is unsupported. Adding a health endpoint requires adding an HTTP-triggered /api/health function to app code. Always ask the user for explicit consent before touching source code. Do not patch IaC.

Step 3: Apply patches in two deploys (quick wins first)

The IaC patching framework (detection, AVM-module guidance, deploy-order rule, storage SKU patch) lives in:

IaC Type

Framework reference

Bicep

references/iac-patching-bicep.md

Terraform

references/iac-patching-terraform.md

The actual per-service compute patches (Function App plan ZR, etc.) live in the per-service references — load the matching service file from Phase 2 for the exact Bicep / Terraform / AVM snippets. Only Azure Functions has a per-service reference in this skill version; non-Functions compute (App Service / Container Apps) is out of scope.

Deploy 1 — Quick wins only. Patch the 🟢 Safe items (zone redundancy on the Function App plan, health probes on Premium / Dedicated). Do NOT include the storage SKU patch in this deploy.

After patching, the skill runs the deploy itself (do not stop and tell the user to run it). Detect the deployment tool and confirm once before executing:

📦 Patches applied to your IaC. Ready to deploy:

   Tool detected: azd (found azure.yaml)

   Command:       azd up

Proceed with deployment? (yes / no)

On yes, run the appropriate command, stream output back to the user, and continue to the next step on success:

  • AZD project (has azure.yaml): azd up
  • Bicep-only: az deployment group create --resource-group <rg> --template-file infra/main.bicep --parameters @infra/main.parameters.json
  • Terraform: terraform plan -out tfplan → (show plan summary) → terraform apply tfplan

On no, stop and report the patched files; do not proceed to Step 4 / Re-Assess.

If deployment fails, surface the error and stop — do not continue to the storage step.

⛔ STOP — Ask about storage upgrade before Deploy 2. After Deploy 1 succeeds, ask the user explicitly:

✅ Quick-win patches deployed. Compute is now zone-redundant.

To be **fully zone-redundant**, your storage account also needs to be upgraded:

  • stii5trxva2ark4: currently `Standard_LRS` → needs `Standard_ZRS`

⚠️  This is a two-part change:

   1. Live storage migration (`az storage account migration start`) — takes hours to days

   2. A second deploy to update your IaC's storage SKU to match

Do you want me to start the storage migration now? (yes / no / later)
  • yes → the skill runs the migration command itself, polls until complete, then patches the storage SKU in IaC and runs Deploy 2 (now a no-op confirmation). The user does not need to run anything manually.
  • no / later → leave the storage SKU patch unapplied. Note in the re-assessment that ZR storage remains a gap; suggest revisiting later.

Step 4: Storage migration (only if user said yes in Step 3)

The skill runs these commands itself — do not ask the user to run them. Show progress as you go:

🔄 Starting storage migration (this can take up to 72 hours)...

   az storage account migration start --name stii5trxva2ark4 \

     --resource-group rg-example --sku Standard_ZRS --no-wait

   Polling: az storage account show --name stii5trxva2ark4 --query sku.name

   ...

   ✅ Migration complete: sku.name = Standard_ZRS

For very long migrations, you may surface a checkpoint to the user ("this is still running, check back later") rather than blocking the entire conversation.

Step 5: Deploy 2 — storage SKU patch

After the migration completes, the skill patches the storage SKU in IaC and runs the same deploy command as Step 3 (e.g. azd up). This deploy is a no-op confirmation that the IaC matches the live state. Confirm once with the user before executing, then run it directly.

Step 2 (both paths): Re-Assess

After changes are applied (CLI) or deployed (IaC), automatically re-run the assessment and show the same feature-pivoted table as Phase 3, with each feature row's status updated to reflect the new state. Briefly call out what changed since the previous run.

🔄 Reliability Re-Assessment — rg-eventhubs-python-jan13 (eastus)

───────────────────────────────────────────────────────────────────────────────────────

Reliability Feature              Status      Resources

───────────────────────────────────────────────────────────────────────────────────────

Zone redundancy — compute        🟢 ON       • plan-ii5trxva2ark4 (FC1)              — now ON

Zone-redundant storage           🟢 ZRS      • stii5trxva2ark4                       — GRS → ZRS

Health probes                    🔴 OFF      • func-api-ii5trxva2ark4                — still off (FC1, code change declined)

Multi-region failover            🔴 OFF      • Single region (eastus) only

───────────────────────────────────────────────────────────────────────────────────────

What changed: Function App plan zone redundancy and storage replication.

(Multi-region offered next — see Step 3.)

Step 3 (both paths): Multi-region follow-up — ASK and WAIT

Multi-region is a significant cost/complexity step. Do NOT start it automatically. After re-assessment, only if all core single-region reliability features are 🟢 ON (zone-redundant compute, ZRS/GZRS storage, health probes), explicitly ask the user and wait for their response before doing anything:

🟢 Your app is now fully zone-redundant in {region}.

The next step (optional) is multi-region failover with Azure Front Door:

   • Deploys compute + storage in a second region (paired region recommended)

   • Adds Azure Front Door for global load balancing with health-probe-driven failover

   • Protects against full region outages

   • Estimated additional cost: ~2x compute (active-passive); Front Door ~$35/month base

Do you want me to set up multi-region failover now? (yes / no / later)
  • Generate the multi-region IaC (Bicep / Terraform additions for the secondary region + Front Door).
  • Confirm once with the user: 📦 Multi-region IaC generated. Ready to deploy with \azd up. Proceed? (yes / no)
  • On yes, the skill runs the deploy itself (azd up / az deployment group create / terraform apply) and streams output. Do not stop and tell the user to run it.
  • After successful deploy, run a final re-assessment so the user sees Multi-region failover flip to 🟢 ON.
  • no / later → leave the deployment as-is. Note that single-region zone-redundant is a reliable end state; multi-region can be revisited anytime.

⛔ Do not skip the wait. Do not generate multi-region IaC, deploy a Front Door, or modify any files until the user has explicitly said yes. If core reliability is not yet all 🟢, do not ask about multi-region — finish the core gaps first.

Priority Classification

Priority

Criteria

Action

Critical

No zone redundancy AND production workload

Fix immediately

High

LRS storage on zone-redundant compute

Fix within days

Medium

No multi-region (single region but zone-redundant)

Plan for next sprint

Low

Missing health probes or monitoring gaps

Track and fix

Error Handling

Error

Message

Remediation

Authentication required

"Please login"

Run az login and retry

Access denied

"Forbidden"

Confirm Reader/Contributor role assignment

Plan doesn't support ZR

"Upgrade required"

Inform user of plan upgrade path + cost delta

Region doesn't support AZ

"Region limitation"

Suggest supported regions

Best Practices

  • Run reliability assessments after every significant infrastructure change
  • Test failover scenarios periodically (at least quarterly)

Skill Boundaries

Action

This skill does

Hand off to

Assess reliability posture

✅ Yes

Recommend improvements

✅ Yes

Enable zone redundancy (CLI commands)

✅ Yes

Patch Bicep/Terraform for reliability

✅ Yes

Generate multi-region IaC

✅ Yes (additions for the secondary region + Front Door)

azure-prepare for full new-app IaC scaffolding

Deploy IaC for reliability changes

✅ Yes (runs azd up / terraform apply / az deployment itself, after user confirmation)

azure-deploy for general/non-reliability deploys

Validate pre-deployment

Reliability checks only

azure-validate for full validation

BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card