Azure Quick Review (azqr)is a powerful command-line interface (CLI) tool that specializes in analyzing Azure resources to ensure compliance with Azure's best practices and recommendations. Its main objective is to offer users a comprehensive overview of their Azure resources, allowing them to easily identify any non-compliant configurations or areas for improvement.
Azure Quick Review (azqr)scans your resources with 2 types of recommendations:
- Azure Resource Graph (ARG)queries provided by theAzure Proactive Resiliency Library v2 (APRL)project.
- Azure Resource Manager (ARM)queries built with the Golang SDK
To learn more about the recommendations used byAzure Quick Review (azqr),you can refer to the documentation availablehere.
The output generated byAzure Quick Review (azqr)is written by default to an Excel file, which contains the following sheets:
- Recommendations:a list with all recommendations with the number of resources that are impacted. You can youse this table as an action plan to improve the compliance of your resources.
- ImpactedResources:a list with all resources that are impacted. You can use this table to identify resources that have issues that need to be addressed.
- ResourceTypes:a list of impacted resource types.
- Inventory:a list of all resources scanned by the tool. Here you'll find details such as SKU, Tier, Kind or calculated SLA.
- Advisor:a list of recommendations provided by Azure Advisor.
- Defender:a list of Microsoft Defender for Cloud plans and their tiers.
- Costs:a list of costs associated with the scanned subscription for the last 3 months.
By default, Azure Quick Review (azqr) obfuscates the Subscription Ids in the output to ensure the protection of sensitive information and maintain data privacy and security. If you want to display the Subscription Ids without obfuscation, you can use the
--mask=false
flag when executing the tool.
Azure Quick Review can also generate an csv files with the same information as the excel. To generate the csv files, you can use the
--csv
flag when running the tool.
A Power BI template is also available to help you visualize the results generated by Azure Quick Review. You can create the template running Azure Quick Review with the
pbi
command and then loading the excel file generated by the tool.
Azure Quick Review (azqr)currently supports the following Azure services:
- Microsoft.AVS/privateClouds
- Microsoft.AnalysisServices/servers
- Microsoft.ApiManagement/service
- Microsoft.App/containerApps
- Microsoft.App/managedenvironments
- Microsoft.AppConfiguration/configurationStores
- Microsoft.Automation/automationAccounts
- Microsoft.Batch/batchAccounts
- Microsoft.Cache/Redis
- Microsoft.Cdn/profiles
- Microsoft.CognitiveServices/accounts
- Microsoft.Compute/galleries
- Microsoft.Compute/virtualMachineScaleSets
- Microsoft.Compute/virtualMachines
- Microsoft.ContainerInstance/containerGroups
- Microsoft.ContainerRegistry/registries
- Microsoft.ContainerService/managedClusters
- Microsoft.DBforMariaDB/servers
- Microsoft.DBforMariaDB/servers/databases
- Microsoft.DBforMySQL/flexibleServers
- Microsoft.DBforMySQL/servers
- Microsoft.DBforPostgreSQL/flexibleServers
- Microsoft.DBforPostgreSQL/servers
- Microsoft.Dashboard/grafana
- Microsoft.DataFactory/factories
- Microsoft.Databricks/workspaces
- Microsoft.DesktopVirtualization/hostPools
- Microsoft.DesktopVirtualization/scalingPlans
- Microsoft.DesktopVirtualization/workspaces
- Microsoft.Devices/IotHubs
- Microsoft.DocumentDB/databaseAccounts
- Microsoft.EventGrid/domains
- Microsoft.EventHub/namespaces
- Microsoft.Insights/activityLogAlerts
- Microsoft.Insights/components
- Microsoft.KeyVault/vaults
- Microsoft.Kusto/clusters
- Microsoft.Logic/workflows
- Microsoft.NetApp/netAppAccounts
- Microsoft.Network/ExpressRoutePorts
- Microsoft.Network/applicationGateways
- Microsoft.Network/azureFirewalls
- Microsoft.Network/connections
- Microsoft.Network/expressRouteCircuits
- Microsoft.Network/frontdoorWebApplicationFirewallPolicies
- Microsoft.Network/loadBalancers
- Microsoft.Network/natGateways
- Microsoft.Network/networkSecurityGroups
- Microsoft.Network/networkWatcherScanners
- Microsoft.Network/privateDnsZones
- Microsoft.Network/privateEndpoints
- Microsoft.Network/publicIPAddresses
- Microsoft.Network/routeTables
- Microsoft.Network/trafficManagerProfiles
- Microsoft.Network/virtualNetworkGateways
- Microsoft.Network/virtualNetworks
- Microsoft.OperationalInsights/workspaces
- Microsoft.RecoveryServices/vaults
- Microsoft.ServiceBus/namespaces
- Microsoft.SignalRService/SignalR
- Microsoft.SignalRService/webPubSub
- Microsoft.Sql/servers
- Microsoft.Sql/servers/databases
- Microsoft.Sql/servers/elasticPools
- Microsoft.Storage/storageAccounts
- Microsoft.Synapse workspaces/bigDataPools
- Microsoft.Synapse/workspaces
- Microsoft.Synapse/workspaces/sqlPools
- Microsoft.VirtualMachineImages/imageTemplates
- Microsoft.Web/serverFarms
- Microsoft.Web/sites
- Specialized.Workload/AVD
- Specialized.Workload/AVS
- Specialized.Workload/HPC
- Specialized.Workload/SAP
latest_azqr=$(curl -sL https://api.github /repos/Azure/azqr/releases/latest|jq -r".tag_name"|cut -c1-)
wget https://github /Azure/azqr/releases/download/$latest_azqr/azqr-ubuntu-latest-amd64 -O azqr
chmod +x azqr
Usewinget
:
winget install azqr
or download the executable file:
$latest_azqr=$(iwr https://api.github /repos/Azure/azqr/releases/latest).content | convertfrom-json | Select-Object -ExpandProperty tag_name
iwr https://github /Azure/azqr/releases/download/$latest_azqr/azqr-windows-latest-amd64.exe -OutFile azqr.exe
Download the latest release fromhere.
Azure Quick Review (azqr)supports the following authentication methods:
- Service Principal. You'll need to set the following environment variables:
- AZURE_CLIENT_ID
- AZURE_CLIENT_SECRET
- AZURE_TENANT_ID
- Azure Managed Identity
- Azure CLI (Using this type of authentication will make scans run slower)
Azure Quick Review (azqr)requires the following permissions:
- Subscription Reader
To scan all resource groups in all subscription run:
./azqr scan
To scan all resource groups in a specific subscription run:
./azqr scan -s<subscription_id>
To scan a specific resource group in a specific subscription run:
./azqr scan -s<subscription_id>-g<resource_group_name>
For information on available commands and help run:
./azqr -h
You can configure Azure Quick Review to include or exclude specific subscriptions or resource groups and also exclude services or recommendations. To do so, create ayaml
file with the following format:
azqr:
include:
subscriptions:
-<subscription_id>#format: <subscription_id>
resourceGroups:
-<resource_group_resource_id>#format: /subscriptions/<subscription_id>/resourceGroups/<resource_group_name>
exclude:
subscriptions:
-<subscription_id>#format: <subscription_id>
resourceGroups:
-<resource_group_resource_id>#format: /subscriptions/<subscription_id>/resourceGroups/<resource_group_name>
services:
-<service_resource_id>#format: /subscriptions/<subscription_id>/resourceGroups/<resource_group_name>/providers/<service_provider>/<service_name>
recommendations:
-<recommendation_id>#format: <recommendation_id>
Then run the scan with the--filters
flag:
./azqr scan --filters<path_to_yaml_file>
Check therulesto get the recommendation ids.
If you encounter any issue while usingAzure Quick Review (azqr),please set theAZURE_SDK_GO_LOGGING
environment variable toall
,run the tool with the--debug
flag and then share the console output with us by filing a newissue.
This project uses GitHub Issues to track bugs and feature requests. Before logging an issue please check ourtroubleshootingguide.
Please search the existing issues before filing new issues to avoid duplicates.
- For new issues, file your bug or feature request as a newissue.
- For help, discussion, and support questions about using this project, join or start adiscussion.
Support for this project / product is limited to the resources listed above.
Thanks to everyone who has contributed!
This project has adopted theMicrosoft Open Source Code of Conduct
TrademarksThis project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft’s Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party’s policies.