Infrastructure and DevOps conventions — Terraform, AWS, CI/CD, monitoring, and security for Repo
From claude-toolkitnpx claudepluginhub johwer/marketplace --plugin claude-toolkitThis skill uses the workspace's default tool permissions.
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
monitoring, waf, rds)required_providers block)description and type fieldsterraform import / terraform state mvterraform plan before terraform applyprevent_destroy lifecycle for critical resourcesenvironment, service, managed-by* actions{service}-{environment}-{resource-type} (e.g., service-c-prod-rds){service}-{action}-role (e.g., ecr-scan-role)resource "aws_wafv2_rate_based_statement" "api_rate_limit" {
limit = 2000
aggregate_key_type = "IP"
# Always set per-environment: dev=10000, accept=5000, prod=2000
}
When legitimate payloads trigger XSS rules, add targeted exceptions — never disable the rule globally.
resource "aws_cloudwatch_metric_alarm" "high_cpu" {
alarm_name = "${var.service}-${var.environment}-high-cpu"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = 2
metric_name = "CPUUtilization"
namespace = "AWS/RDS"
period = 300
statistic = "Average"
threshold = 80
alarm_actions = [aws_sns_topic.alerts.arn]
# Tag: environment, service
}
#alerts-prod, #alerts-acceptOTEL_SERVICE_NAME)resource "aws_ecr_repository" "service" {
name = var.service_name
image_tag_mutability = "IMMUTABLE" # Always immutable in prod
image_scanning_configuration {
scan_on_push = true # Scan every push
}
}
rds.force_ssl = 1 in parameter groupmax_connections to instance sizeterraform-plan.yml — runs on PR, posts plan as commentterraform-apply.yml — runs on merge to main, requires approval for prodinfra/ directory# Separate channels per environment
- if: env.ENVIRONMENT == 'production'
run: send-to-slack channel="#deploy-prod"
- if: env.ENVIRONMENT == 'accept'
run: send-to-slack channel="#deploy-accept"
permissions: write-allDTF includes two scripts for infra workflow steps:
terraform-plan-summary.sh — Runs terraform plan and shows a structured summary box with add/change/destroy counts. Warns loudly on destroy operations.verify-infra-workflows.sh — Checks that GH Actions plan/apply workflows exist, trigger on infra/, have environment protection, CODEOWNERS covers the path, and lock files are committed.Install for enhanced Terraform support:
# TerraShark — failure-mode-first Terraform skill (600 tokens activation)
git clone https://github.com/LukasNiessen/terrashark.git ~/.claude/skills/terrashark
# Terramate agent skills — 37 rules across 10 categories
npx skills add terramate-io/agent-skills --skill terraform-best-practices
# AWS cost optimization with MCP servers
/plugin marketplace add zxkane/aws-skills