From task
探索项目DevOps和基础设施:分析Docker/K8s容器化配置、CI/CD流水线、云服务部署、IaC模板、监控告警。当需要理解部署架构、环境差异、运维配置时触发。
npx claudepluginhub lazygophers/ccplugin --plugin taskThis skill uses the workspace's default tool permissions.
分析项目DevOps配置:容器化(Docker/K8s/Podman)、CI/CD(GitHub Actions/GitLab CI/CircleCI/Jenkins)、云服务(AWS/GCP/Azure/Vercel)、IaC(Terraform/CloudFormation/Pulumi)、监控(Datadog/Prometheus/ELK)。
Provides Ktor server patterns for routing DSL, plugins (auth, CORS, serialization), Koin DI, WebSockets, services, and testApplication testing.
Conducts multi-source web research with firecrawl and exa MCPs: searches, scrapes pages, synthesizes cited reports. For deep dives, competitive analysis, tech evaluations, or due diligence.
Provides demand forecasting, safety stock optimization, replenishment planning, and promotional lift estimation for multi-location retailers managing 300-800 SKUs.
分析项目DevOps配置:容器化(Docker/K8s/Podman)、CI/CD(GitHub Actions/GitLab CI/CircleCI/Jenkins)、云服务(AWS/GCP/Azure/Vercel)、IaC(Terraform/CloudFormation/Pulumi)、监控(Datadog/Prometheus/ELK)。
配置文件是真相来源 | 安全敏感(不暴露实际值) | 分析环境差异(dev/staging/prod) | 建立依赖拓扑
| 类别 | 工具 | 文件模式 |
|---|---|---|
| 容器 | Docker | Dockerfile, docker-compose.yml |
| 编排 | K8s | k8s/, kubernetes/, kind: Deployment |
| CI/CD | GitHub Actions | .github/workflows/*.yml |
| CI/CD | GitLab CI | .gitlab-ci.yml |
| IaC | Terraform | *.tf, terraform/ |
| IaC | CloudFormation | cloudformation/, template.yaml |
| 云 | AWS | aws-sdk, AWS::, arn:aws: |
| 云 | GCP | @google-cloud/, googleapis |
| 云 | Azure | @azure/, Microsoft. |
JSON包含:containerization{type,dockerfile,services} + orchestration{type,config_dir} + ci_cd{platform,workflows[{name,file,triggers,stages}]} + cloud{provider,services,iac} + environments{list,config_management} + monitoring{logging,metrics} + summary
容器:glob("**/Dockerfile*") + glob("**/docker-compose*.yml")
CI/CD:glob(".github/workflows/*.yml") | glob(".gitlab-ci.yml")
K8s:glob("**/k8s/**/*.yaml") + grep("kind: Deployment")
IaC:glob("**/*.tf") | glob("**/Pulumi.yaml")
云:grep("aws-sdk|@google-cloud/|@azure/")
环境:glob("**/.env*") — 不读实际值,只报告管理方式
安全第一:不暴露.env实际值 | 多文件交叉验证引用关系 | 重点分析环境差异