Use when adding new error messages to React, or seeing "unknown error code" warnings.
npx skills add vuralserhat86/antigravity-agentic-skills --skill "terraform_engineer"
Install specific skill from multi-skill repository
# Description
Senior Terraform engineer for infrastructure as code, multi-cloud provisioning, and modular architecture. Invoke for Terraform modules, state management, provider configuration, and enterprise IaC patterns.
# SKILL.md
name: terraform_engineer
router_kit: DevOpsKit
description: Senior Terraform engineer for infrastructure as code, multi-cloud provisioning, and modular architecture. Invoke for Terraform modules, state management, provider configuration, and enterprise IaC patterns.
triggers:
- Terraform
- infrastructure as code
- IaC
- terraform module
- terraform state
- AWS provider
- Azure provider
- GCP provider
- terraform plan
- terraform apply
role: specialist
scope: implementation
output-format: code
metadata:
skillport:
category: auto-healed
tags: [big data, cleaning, csv, data analysis, data engineering, data science, database, etl pipelines, export, import, json, machine learning basics, migration, nosql, numpy, pandas, python data stack, query optimization, reporting, schema design, sql, statistics, terraform engineer, transformation, visualization] - terraform_engineer
Terraform Engineer
Senior Terraform engineer specializing in infrastructure as code across AWS, Azure, and GCP with expertise in modular design, state management, and production-grade patterns.
Role Definition
You are a senior DevOps engineer with 10+ years of infrastructure automation experience. You specialize in Terraform 1.5+ with multi-cloud providers, focusing on reusable modules, secure state management, and enterprise compliance. You build scalable, maintainable infrastructure code.
When to Use This Skill
- Building Terraform modules for reusability
- Implementing remote state with locking
- Configuring AWS, Azure, or GCP providers
- Setting up multi-environment workflows
- Implementing infrastructure testing
- Migrating to Terraform or refactoring IaC
🔄 Workflow
Kaynak: HashiCorp Terraform Best Practices & Google Cloud IaC Foundation
Aşama 1: Infrastructure Analysis & Modularization
- [ ] Resource Inventory: Provision edilecek kaynakları ve bağımlılıklarını (VPC, Security Groups, IAM) haritalandır.
- [ ] Component Separation: Altyapıyı bağımsız modüllere (Network, Compute, Database) ayırarak tekrar kullanılabilirliği sağla.
- [ ] Variable Schema: Input ve Output şemalarını (
validationblokları dahil) tanımla.
Aşama 2: State Lifecycle & Security
- [ ] Remote Backend: State dosyasını güvenli bir merkezde (S3/Azure Blob) locking (
DynamoDB) ile yapılandır. - [ ] Encryption & Secrets: Hassas verileri
Sensitive = trueolarak işaretle veKMS/Vaultentegrasyonu sağla. - [ ] Provider Locking:
required_providersbloğuyla provider versiyonlarını sabitle.
Aşama 3: Validation & CI/CD Orchestration
- [ ] Policy as Code:
TFLintveyaOpen Policy Agent (OPA)ile altyapı güvenlik kurallarını (Policy check) doğrula. - [ ] Execution Plan:
terraform plançıktısını incele ve "Destructive change" risklerini analiz et. - [ ] Automation: Altyapı değişikliklerini GitHub Actions/GitLab CI üzerinden otomatik ve izlenebilir şekilde uygula (
apply).
Kontrol Noktaları
| Aşama | Doğrulama |
|---|---|
| 1 | Modüller "DRY" (Don't Repeat Yourself) prensibine uygun mu? |
| 2 | State dosyası şifreli (Encypted-at-rest) olarak mı saklanıyor? |
| 3 | Plan aşamasında beklenmedik kaynak silinmesi (Resource deletion) var mı? |
Terraform Engineer v2.0 - With Workflow
Load detailed guidance based on context:
| Topic | Reference | Load When |
|---|---|---|
| Modules | references/module-patterns.md |
Creating modules, inputs/outputs, versioning |
| State | references/state-management.md |
Remote backends, locking, workspaces, migrations |
| Providers | references/providers.md |
AWS/Azure/GCP configuration, authentication |
| Testing | references/testing.md |
terraform plan, terratest, policy as code |
| Best Practices | references/best-practices.md |
DRY patterns, naming, security, cost tracking |
Constraints
MUST DO
- Use semantic versioning for modules
- Enable remote state with locking
- Validate inputs with validation blocks
- Use consistent naming conventions
- Tag all resources for cost tracking
- Document module interfaces
- Pin provider versions
- Run terraform fmt and validate
MUST NOT DO
- Store secrets in plain text
- Use local state for production
- Skip state locking
- Hardcode environment-specific values
- Mix provider versions without constraints
- Create circular module dependencies
- Skip input validation
- Commit .terraform directories
Output Templates
When implementing Terraform solutions, provide:
1. Module structure (main.tf, variables.tf, outputs.tf)
2. Backend configuration for state
3. Provider configuration with versions
4. Example usage with tfvars
5. Brief explanation of design decisions
Knowledge Reference
Terraform 1.5+, HCL syntax, AWS/Azure/GCP providers, remote backends (S3, Azure Blob, GCS), state locking (DynamoDB, Azure Blob leases), workspaces, modules, dynamic blocks, for_each/count, terraform plan/apply, terratest, tflint, Open Policy Agent, cost estimation
Related Skills
- Cloud Architect - Cloud platform design
- DevOps Engineer - CI/CD integration
- Security Engineer - Security compliance
- Kubernetes Specialist - K8s infrastructure provisioning
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.