# CAIRA
**Repository Path**: mirrors_microsoft/CAIRA
## Basic Information
- **Project Name**: CAIRA
- **Description**: Composable AI Reference Architecture (CAIRA)
- **Primary Language**: Unknown
- **License**: MIT
- **Default Branch**: main
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2025-08-27
- **Last Updated**: 2026-04-11
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# CAIRA
CAIRA (Composable AI Reference Architectures) provides a modular, composable foundation that accelerates the setup of AI environments using infrastructure as code. CAIRA is not a turnkey solution, but a suite of assets designed to accelerate the creation of secure, observable, and repeatable enterprise environments.
## CAIRA Assets
There are several acceleration assets within the CAIRA suite.
| Asset | Purpose | What it offers | Link |
|---------------------------------------------------|-------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------|
| **AI Foundry Acceleration** | For organizations building modern AI solutions in the cloud | • Faster time to value: Deploy enterprise AI solutions with minimal upfront investment using reliable accelerator components
• Enterprise-grade security and observability acceleration: Baseline configurations with private networking, security controls, and compliance patterns
• Infrastructure as Code: Repeatable, version-controlled deployments with composable Terraform modules for Azure AI Foundry and supporting infrastructure
• Agentic acceleration: Deploy and configure through natural language, with seamless agent communication | [Current repository](https://github.com/microsoft/CAIRA) |
| **Copilot Studio + Azure AI Search Acceleration** | For customers building enterprise solutions involving the low-code platform Copilot Studio (Power Platform) | • Rapid provisioning: Deploy a full Copilot Studio + Azure AI Search environment
• Enterprise-ready baseline: Preconfigured networking (VNets, private endpoints) and secure authentication patterns
• CI/CD friendly: Modular Terraform templates for repeatable, automated deployments
• Faster time-to-value: Move from proof-of-concept to production quickly and confidently
• Extensible architecture: Supports bring-your-own networking and Application Lifecycle Management (ALM) patterns for dev/test/prod environments | [Copilot Studio with Azure AI Search](https://github.com/Azure-Samples/Copilot-Studio-with-Azure-AI-Search) |
## AI Foundry Acceleration
This CAIRA asset provides several baseline configurations for Azure AI Foundry based solutions, so users can have a consistent, scalable, reliable deployment of Azure AI Foundry and supporting infrastructure in an accelerated time frame in support of agentic workloads.
Look [here for documentation](https://github.com/microsoft/CAIRA/tree/main/reference_architectures) that details the available configurations.
Foundry-only use case: If you only need Azure AI Foundry (account, project, model deployments, observability) and do NOT plan to use Azure AI Agent Service, choose one of the `_basic` reference architectures (`foundry_basic` for public endpoints or `foundry_basic_private` for private networking). The `_standard` variants add agent-focused dependent resources (Cosmos DB, Storage, AI Search) and capability host connection wiring that are unnecessary for a Foundry-only environment.
## Getting Started
### Quick Start
Try the ['CAIRA Assistant' chat mode](./docs/chat_modes.md) for guided deployment assistance. After cloning the repo and starting the devcontainer, simply select "caira-assistant" chatmode in copilot and start chatting.

The CAIRA assistant will walk you through the entire deployment experience of all four reference architectures, validate any necessary prerequisite resources, and even help verify resources post-deployment.

### Getting Started
To use CAIRA, you'll need to set up your development environment with the required tools and dependencies. The easiest way to do it is using the devcontainer provided in with the repository. If you rather configure the environment manually, follow the directions outlined in [Environment Setup](./docs/environment_setup.md)
Want to jump right into CAIRA? Here are the details on getting started!
1. Clone the repo: `git clone https://github.com/microsoft/CAIRA.git`
1. Start the devcontainer.
1. Explore and choose a configuration: either **ask the caira-assistant**, or check the `/reference_architectures/` folder in this repository for a configuration that matches the baseline for your scenario. For example: `cd reference_architectures/foundry_basic`.
1. Explore the configuration and customize as needed. Installation steps can be found in the nested README.md file, or through the caira-assistant.
1. Happy AI-ing!
## Contributing
This project welcomes contributions and suggestions. For detailed information, refer to the [Contributing Guide](CONTRIBUTING.md).
Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit .
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.
## Responsible AI
Microsoft encourages customers to review its Responsible AI Standard when developing AI-enabled systems to ensure ethical, safe, and inclusive AI practices. Learn more at [Responsible AI](https://www.microsoft.com/ai/responsible-ai).
## Security Posture
CAIRA reference architectures are designed to balance ease of deployment with security best practices. While the baseline configurations implement reasonable security controls, **production deployments will require additional security hardening**. For detailed information about security decisions, implementation patterns, and production recommendations, see our [Security Posture Documentation](./docs/security_posture.md).
## Data Collection
The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry as described in the repository. There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft's privacy statement. Our privacy statement is located at . You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices.
- Azure Verified Modules (AVM) collect telemetry on deployments. This is documented [on the AVM website](https://azure.github.io/Azure-Verified-Modules/help-support/telemetry/).
The partner_id configuration in `reference_architectures/*/terraform.tf` enables telemetry that helps us justify ongoing investment in maintaining and improving this repository. Keeping this enabled supports the project and future feature development. When enabled, the partner_id is appended to the User-Agent on requests made by the configured terraform providers.
### Opting Out
To opt out of AVM and partner_id telemetry, set the variable `enable_telemetry` to `false`.
## Disclaimer
This repo is provided as a sample starting point, and as such, should be validated before any usage in production. This solution also utilizes AI, which occasionally makes mistakes and misunderstands intent. Please validate all outputs before usage.
## Trademarks
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow [Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).
Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.