You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+17-14Lines changed: 17 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,9 +17,9 @@ Last updated: 2026-03-19
17
17
18
18
-[Microsoft Foundry SDKs and Endpoints](https://learn.microsoft.com/en-us/azure/ai-foundry/how-to/develop/sdk-overview?view=foundry&pivots=programming-language-python)
19
19
- Microsoft Defender for Cloud (DevOps security):
20
-
-[Connect GitHub to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-github)
21
-
-[Connect Azure DevOps to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-devops)
22
-
-[DevOps security permissions and prerequisites](https://learn.microsoft.com/azure/defender-for-cloud/devops-support)
20
+
-[Connect GitHub to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-github)
21
+
-[Connect Azure DevOps to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-devops)
22
+
-[DevOps security permissions and prerequisites](https://learn.microsoft.com/azure/defender-for-cloud/devops-support)
-[More Security with Microsoft Defender](#more-security-with-microsoft-defender)
32
-
-[If the Azure portal blade errors](#if-the-azure-portal-blade-errors)
32
+
-[If the Azure portal blade errors](#if-the-azure-portal-blade-errors)
33
33
-[About A2A Protocol](#about-a2a-protocol)
34
34
-[Architecture](#architecture)
35
35
-[What Happens Under the Hood](#what-happens-under-the-hood)
@@ -54,12 +54,12 @@ Last updated: 2026-03-19
54
54
## Deployment Approaches (pick one)
55
55
56
56
-**Container Apps (recommended default in this repo)**
57
-
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "containerapps"`
58
-
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
57
+
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "containerapps"`
58
+
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
59
59
60
60
-**App Service (Linux custom container)**
61
-
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "appservice"` and choose `app_service_sku` (e.g. `P0v3`)
62
-
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
61
+
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "appservice"` and choose `app_service_sku` (e.g. `P0v3`)
62
+
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
63
63
64
64
## Key Features
65
65
@@ -80,6 +80,7 @@ Last updated: 2026-03-19
80
80
81
81
> [!NOTE]
82
82
> Visibility-first rollout (recommended for demos):
83
+
>
83
84
> - Onboard **GitHub connector only** first to validate the Defender dashboards/workbooks.
84
85
> - Onboard **Azure DevOps connector** only in a **sandbox org/project**.
85
86
> - Keep **PR annotations OFF** initially (no write-back to PRs) until you decide to enable them.
@@ -104,18 +105,19 @@ This repo supports two complementary “Defender” scenarios:
104
105
105
106
> [!NOTE]
106
107
> Opt out (disable Defender): In [terraform-infrastructure/terraform.tfvars](terraform-infrastructure/terraform.tfvars), set:
107
-
> -`enable_defender_for_cloud = false`
108
-
> -`enable_defender_devops_security = false`
108
+
>
109
+
> -`enable_defender_for_cloud = false`
110
+
> -`enable_defender_devops_security = false`
109
111
110
112
### If the Azure portal blade errors
111
113
112
114
> If the Azure portal **Defender for Cloud → Environment settings** page fails to load with an error like: `ECS feature flags for project 'Defenders' are not initialized (ErrorAcquiringViewModel)`. Use one of these workarounds:
113
115
114
116
-**Open the connector resource directly** (bypasses the Environment Settings blade):
115
-
- Find the connector resource IDs from Terraform outputs (look for `defender_devops_security_connector_ids`).
-**List the connector IDs via CLI** (then open them with the URL above): `az resource list -g <rg-name> --resource-type Microsoft.Security/securityConnectors -o table`
120
122
-**Browser reset**: try InPrivate/Incognito, disable extensions (ad blockers), and sign out/in.
121
123
@@ -156,6 +158,7 @@ This repo supports two complementary “Defender” scenarios:
156
158
157
159
> [!IMPORTANT]
158
160
> A2A vs the default deployed chat runtime:
161
+
>
159
162
> -**A2A server path**: event/task oriented framework under `src/a2a/` (only available if you deploy/run that server)
160
163
> -**Default path**: `/ws` WebSocket chat + routing + sequential handoffs to real Foundry agents (no event queue required for the default flow)
0 commit comments