Skip to main content
Glama

Azure MCP Server

Official
MIT License
1,161
  • Linux
  • Apple
test-resources.bicep5.18 kB
targetScope = 'resourceGroup' @minLength(4) @maxLength(21) @description('The base resource name.') param baseName string = resourceGroup().name @description('The location of the resource. By default, this is the same as the resource group.') param location string = resourceGroup().location @description('The tenant ID to which the application and resources belong.') param tenantId string = '72f988bf-86f1-41af-91ab-2d7cd011db47' @description('The client OID to grant access to test resources.') param testApplicationOid string resource workspace 'Microsoft.OperationalInsights/workspaces@2023-09-01' = { name: baseName location: location properties: { retentionInDays: 30 sku: { name: 'PerGB2018' } features: { searchVersion: 1 workspaceCapping: 'Off' } publicNetworkAccessForIngestion: 'Enabled' publicNetworkAccessForQuery: 'Enabled' } } // Create a storage account to monitor resource storageAccount 'Microsoft.Storage/storageAccounts@2022-09-01' = { name: '${baseName}mon' location: location sku: { name: 'Standard_LRS' } kind: 'StorageV2' properties: { allowSharedKeyAccess: false } resource blobServices 'blobServices' = { name: 'default' resource fooContainer 'containers' = { name: 'foo' } resource barContainer 'containers' = { name: 'bar' } resource bazContainer 'containers' = { name: 'baz' } } resource tableServices 'tableServices' = { name: 'default' resource fooTable 'tables' = { name: 'foo' } resource barTable 'tables' = { name: 'bar' } resource bazTable 'tables' = { name: 'baz' } } } // Diagnostic settings for Storage Account (main account level) resource storageAccountDiagnostics 'Microsoft.Insights/diagnosticSettings@2021-05-01-preview' = { name: 'storage-account-diagnostics' scope: storageAccount properties: { workspaceId: workspace.id metrics: [ { category: 'Transaction' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'Capacity' enabled: true retentionPolicy: { enabled: false days: 0 } } ] } } // Diagnostic settings for Blob Service resource blobServiceDiagnostics 'Microsoft.Insights/diagnosticSettings@2021-05-01-preview' = { name: 'blob-service-diagnostics' scope: storageAccount::blobServices properties: { workspaceId: workspace.id logs: [ { category: 'StorageRead' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'StorageWrite' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'StorageDelete' enabled: true retentionPolicy: { enabled: false days: 0 } } ] metrics: [ { category: 'Transaction' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'Capacity' enabled: true retentionPolicy: { enabled: false days: 0 } } ] } } // Diagnostic settings for Table Service resource tableServiceDiagnostics 'Microsoft.Insights/diagnosticSettings@2021-05-01-preview' = { name: 'table-service-diagnostics' scope: storageAccount::tableServices properties: { workspaceId: workspace.id logs: [ { category: 'StorageRead' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'StorageWrite' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'StorageDelete' enabled: true retentionPolicy: { enabled: false days: 0 } } ] metrics: [ { category: 'Transaction' enabled: true retentionPolicy: { enabled: false days: 0 } } { category: 'Capacity' enabled: true retentionPolicy: { enabled: false days: 0 } } ] } } // Role assignment for the test application to access the storage account resource blobContributorRoleDefinition 'Microsoft.Authorization/roleDefinitions@2018-01-01-preview' existing = { scope: subscription() // This is the Storage Blob Data Contributor role. // Read, write, and delete Azure Storage containers and blobs // See https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#storage name: 'ba92f5b4-2d11-453d-a403-e96b0029c9fe' } resource appBlobRoleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = { name: guid(blobContributorRoleDefinition.id, testApplicationOid, storageAccount.id) scope: storageAccount properties:{ principalId: testApplicationOid roleDefinitionId: blobContributorRoleDefinition.id description: 'Blob Contributor for testApplicationOid' } }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Azure/azure-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server