CloudEval Cloud sync reads Azure Resource Manager metadata, exports resource-group templates for analysis, and stores a project snapshot. It does not needDocumentation Index
Fetch the complete documentation index at: https://docs.cloudeval.ai/llms.txt
Use this file to discover all available pages before exploring further.
Contributor for normal sync.
Recommended role
Create a custom role scoped to each resource group you want CloudEval to evaluate.| Permission | Why CloudEval needs it |
|---|---|
*/read | Read subscription, resource group, resource, provider, deployment, and topology metadata inside the assigned scope. |
Microsoft.Resources/deployments/exportTemplate/action | Export deployment templates used to build report inputs from live Azure resources. |
Microsoft.Network/networkWatchers/topology/action | Read Network Watcher topology relationships used to enrich the live architecture graph. |
| Data actions | None. CloudEval Cloud sync does not need data-plane access such as storage blob contents or Key Vault secret values. |
Create the service principal and role
Run this from an Azure CLI session that can create app registrations and role definitions in the target subscription. The command also usesjq to extract the generated service principal fields. Replace RG with the resource group CloudEval should evaluate.
az role definition update with the same JSON.
For multiple resource groups, repeat the target resource-group az role assignment create step for each group and select the same groups in the CloudEval connection form.
The NetworkWatcherRG assignment is needed only when CloudEval should enrich the graph with Network Watcher topology and the Network Watcher resource lives outside the target resource group. If your tenant uses a different Network Watcher resource group, replace NW_RG. If that assignment is omitted, Cloud sync can still read resources and export templates, but Network Watcher relationship enrichment may be incomplete.
When subscription scope is acceptable
Resource-group scope is the default recommendation. Use subscription scope only when CloudEval should discover and sync every accessible resource group in the subscription.Do not use Contributor for production sync
This smoke-test command is intentionally broader than CloudEval needs:Troubleshooting
| Symptom | Likely cause | Fix |
|---|---|---|
| Connection test authenticates but no resource groups appear | Role assignment has not propagated or is scoped to a different subscription/resource group | Wait a few minutes, verify the assignment scope, then test again. |
| Sync sees the resource group but reports fail to build | The custom role is missing Microsoft.Resources/deployments/exportTemplate/action | Update the role definition and rerun sync. |
| Graph sync works but network relationships are sparse | The custom role is missing Microsoft.Network/networkWatchers/topology/action or lacks assignment on the Network Watcher resource group | Add the topology action and assign the role on NetworkWatcherRG or the subscription scope used for Network Watcher. |
| Sync unexpectedly includes too many resource groups | The role is assigned at subscription scope or the CloudEval resource-group list is empty | Assign at resource-group scope and select target resource groups in CloudEval. |
| Key Vault secret values or storage blob contents are expected in reports | Cloud sync uses management-plane metadata only | Do not add data actions unless a separate workflow explicitly requires them. |
