Get the FREE Ultimate OpenClaw Setup Guide →

azure-usage

Scanned
npx machina-cli add skill fcakyon/claude-codex-settings/azure-usage --openclaw
Files (1)
SKILL.md
1.8 KB

Azure MCP Best Practices

Tool Selection

TaskToolExample
List resourcesmcp__azure__*_listStorage accounts, Key Vault secrets
Get resource detailsmcp__azure__*_getContainer details, database info
Create resourcesmcp__azure__*_createNew secrets, storage containers
Query datamcp__azure__*_queryLog Analytics, Cosmos DB

Common Operations

Storage

  • storage_accounts_list - List storage accounts
  • storage_blobs_list - List blobs in container
  • storage_blobs_upload - Upload file to blob

Key Vault

  • keyvault_secrets_list - List secrets
  • keyvault_secrets_get - Get secret value
  • keyvault_secrets_set - Create/update secret

Cosmos DB

  • cosmosdb_databases_list - List databases
  • cosmosdb_containers_list - List containers
  • cosmosdb_query - Query documents

AKS

  • aks_clusters_list - List AKS clusters
  • aks_nodepools_list - List node pools

Monitor

  • monitor_logs_query - Query Log Analytics

Authentication

Azure MCP uses Azure Identity SDK. Authenticate via:

  • az login (Azure CLI - recommended)
  • VS Code Azure extension
  • Environment variables (service principal)

Reference

Source

git clone https://github.com/fcakyon/claude-codex-settings/blob/main/plugins/azure-tools/skills/azure-usage/SKILL.mdView on GitHub

Overview

This skill helps you query Azure resources, list storage accounts, manage Key Vault secrets, work with Cosmos DB, and check AKS clusters using Azure MCP tools. It aligns with common operations and authentication methods to streamline Azure resource management.

How This Skill Works

User intents map to MCP commands (for example, mcp__azure__storage_accounts_list, mcp__azure__keyvault_secrets_get, mcp__azure__cosmosdb_query, mcp__azure__aks_clusters_list). Authentication is done through az login, the VS Code Azure extension, or environment variables for a service principal, after which the skill issues the appropriate command to query, create, or retrieve resource data.

When to Use It

  • List all storage accounts in a subscription or resource group
  • Retrieve a secret value from Key Vault
  • List Cosmos DB databases or containers or run a query
  • List AKS clusters or their node pools
  • Query logs or resource data with monitor_logs_query or other data queries

Quick Start

  1. Step 1: Authenticate to Azure MCP with az login or via the VS Code Azure extension
  2. Step 2: Choose a resource operation (e.g., storage_accounts_list) and run the corresponding mcp__azure__... command
  3. Step 3: If needed, retrieve details with *_get or fetch data with *_query and review results

Best Practices

  • Always start with a listing command (e.g., storage_accounts_list, aks_clusters_list) to establish scope
  • Use the *_get commands to fetch exact details before making changes (e.g., keyvault_secrets_get)
  • Use *_query for analytics and data retrieval (e.g., cosmosdb_query, monitor_logs_query)
  • Authenticate securely with az login or a service principal via environment variables
  • Verify permissions and resource scope before creating or updating resources

Example Use Cases

  • List all storage accounts in your Azure subscription: storage_accounts_list
  • Get the value of a secret from Key Vault: keyvault_secrets_get
  • List Cosmos DB databases and containers: cosmosdb_databases_list, cosmosdb_containers_list
  • List AKS clusters and their node pools: aks_clusters_list, aks_nodepools_list
  • Run a log query to analyze activity: monitor_logs_query

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers