slowbro/devops icon
public
Published on 3/11/2025
DevOps Assistant

Senior DevOps Engineer specializing in GitLab CI/CD, Terraform-driven AWS cloud infrastructure, and scalable automation with Kubernetes and Helm.

Rules
Prompts
Models
Context
anthropic Claude 3.7 Sonnet model icon

Claude 3.7 Sonnet

anthropic

200kinput·8.192koutput
mistral Codestral model icon

Codestral

mistral

voyage voyage-code-3 model icon

voyage-code-3

voyage

voyage Voyage AI rerank-2 model icon

Voyage AI rerank-2

voyage

You are a Senior DevOps Engineer specializing in cloud infrastructure and automation tools. Your expertise includes:
- GitLab for CI/CD pipeline creation, management, and security automation
- Terraform for AWS infrastructure provisioning with clean, modular, reusable code
- Kubernetes (EKS) and Helm for container orchestration, application deployment, scalability, and lifecycle management
- Docker for containerization, image building, optimization, and best practices
- AWS services such as EC2, S3, IAM, VPC, Lambda, ECS, ECR, CloudWatch, and CloudTrail for secure, reliable infrastructure
- Linux administration, scripting, and best practices for secure container images (Ubuntu, Debian, Alpine)
- Security-focused workflows emphasizing least privilege, secure secrets management, and automated vulnerability scanning
- Clear, concise documentation integrated with infrastructure-as-code to ensure maintainability and easy onboarding
GitLab Docshttps://docs.gitlab.com/
Terraform Docshttps://developer.hashicorp.com/terraform/docs
AWS Docshttps://docs.aws.amazon.com/
Kubernetes Docshttps://kubernetes.io/docs/
Helm Docshttps://helm.sh/docs/
Docker Docshttps://docs.docker.com/
Vault Docshttps://developer.hashicorp.com/vault/docs
Ansible Docshttps://docs.ansible.com/
MirthConnect Docshttps://docs.nextgen.com/bundle/Mirth_User_Guide_4_5_0

Prompts

Learn more
GitLab CI/CD Terraform Deployment
GitLab CI pipeline setup for Terraform to AWS
Provide a complete GitLab CI/CD pipeline example that meets the following requirements:

Pipeline Requirements:
- Stages: validate, plan, manual approval, apply
- Validate Terraform syntax and format (`terraform validate`, `terraform fmt`)
- Securely handle AWS credentials without hardcoding secrets
- Generate and persist Terraform plans as job artifacts
- Implement manual approval gate before applying changes
- Ensure pipeline follows security best practices

Documentation & Explanation:
- Explain each stage and its purpose
- Highlight critical security considerations
- Provide inline comments in pipeline code
- Suggest best practices and potential improvements

The user has provided the following details:
AWS Terraform Module Best Practices
Create scalable, reusable AWS Terraform modules
Generate a structured, reusable Terraform module for deploying AWS infrastructure components. The module must include:

Module Structure:
- Clearly defined input variables with descriptions and defaults
- Outputs with meaningful resource information
- Secure handling of sensitive inputs (like IAM credentials or secrets)
- Compliance with Terraform best practices for scalability and readability
- Proper file organization (main.tf, variables.tf, outputs.tf)

AWS Infrastructure Components:
- Example using common AWS services (EKS, EC2, S3, IAM roles/policies, security groups, and VPCs)
- Include resource tagging and standard naming conventions

Documentation:
- README with module usage examples
- Inline code comments to clarify configurations and decisions
- Suggestions for module testing and validation

The user has provided the following requirements:
Kubernetes Application Deployment with Helm
Deploy scalable and secure applications using Helm charts
Provide a comprehensive example Helm chart configuration to deploy applications to Kubernetes (EKS) with the following features:

Helm Chart Requirements:
- Values.yaml structured clearly for easy configuration and overrides
- Kubernetes resources: Deployments, Services, Ingress, ConfigMaps, Secrets
- Resource allocation, limits, and autoscaling parameters
- Security best practices, including RBAC definitions and Pod Security Context
- Recommended methods for handling application secrets securely

Documentation & Validation:
- Chart README with deployment instructions and example usage
- Inline comments explaining templating and customization points
- Helm best practices for maintainability and upgrades
- Instructions for validating and linting the chart (`helm lint`)

The user has provided the following details:
Recommend Infrastructure Security & Best Practices
Recommend secure practices for AWS infrastructure managed by Terraform and Kubernetes
Outline the essential security practices and configurations to secure AWS infrastructure deployed using Terraform and Kubernetes. Provide specific recommendations for:

AWS Security:
- IAM least privilege policies and role management
- VPC isolation, security groups, and NACLs
- Secure data storage (S3 encryption, lifecycle policies, backups)
- Monitoring with CloudWatch and auditing with CloudTrail

Kubernetes Security:
- Secure EKS cluster setup (networking, control plane, managed node groups)
- Secure container image management and scanning strategies
- Kubernetes RBAC roles and namespaces best practices
- Handling Kubernetes secrets securely (Vault, Sealed Secrets, External Secrets)

Documentation:
- Provide actionable guidance for security compliance
- Include best practice checklists for auditing infrastructure security

The user has provided the following infrastructure context:
Comprehensive System Analysis
Guide the assistant in gathering all necessary information to accurately understand and document system dependencies, external repositories, and infrastructure connections.
You are tasked with conducting a detailed analysis of the provided infrastructure configuration. To accurately document and understand the system, follow these steps:

1. **Initial Review & Understanding**:
   - Summarize the system based on the provided configuration files, IaC (Terraform, Helm, etc.), and related documentation.
   - Identify the primary AWS services, Kubernetes resources, and CI/CD tools involved.

2. **External Dependencies Identification**:
   - Clearly list any external Terraform modules, Helm repositories, Docker registries, or third-party integrations referenced in the configuration.
   - Highlight dependencies that are external or potentially missing, noting any unclear references or missing sources.

3. **Infrastructure Connections & Relationships**:
   - Map out the logical connections between services, resources, and dependencies.
   - Describe interactions and data flow between system components clearly and concisely.

4. **Documentation & Diagrams**:
   - Provide a concise textual description summarizing your understanding of the entire system.
   - Suggest a structure for creating visual diagrams (flowcharts, architecture diagrams) if applicable.

5. **Recommendations & Clarifications**:
   - Recommend actions for addressing missing or ambiguous dependencies.
   - Clarify points that require additional user input or confirmation.

Based on your findings, ask targeted questions to the user for any missing or ambiguous details required to finalize your understanding.

Context

Learn more
@diff
Reference all of the changes you've made to your current branch
@codebase
Reference the most relevant snippets from your codebase
@url
Reference the markdown converted contents of a given URL
@folder
Uses the same retrieval mechanism as @Codebase, but only on a single folder
@terminal
Reference the last command you ran in your IDE's terminal and its output
@code
Reference specific functions or classes from throughout your project
@file
Reference any file in your current workspace
@currentFile
Reference the currently open file
@docs
Reference the contents from any documentation site
@repo-map
Reference the outline of your codebase
@open
Reference the contents of all of your open files
@os
Reference the architecture and platform of your current operating system
@commit
@clipboard
Reference recent clipboard items
@problems
Get Problems from the current file
@jira
Reference the conversation in a Jira issue

No Data configured

MCP Servers

Learn more

Docker MCP Sequential Thinking

docker run --rm -i mcp/sequentialthinking

Filesystem

npx -y @modelcontextprotocol/server-filesystem ${{ secrets.slowbro/devops/anthropic/filesystem-mcp/PATH }}

Docker MCP Git

docker run --rm -i --mount type=bind,src=${{ secrets.slowbro/devops/docker/mcp-git/GIT_DIR }},dst=${{ secrets.slowbro/devops/docker/mcp-git/GIT_DIR }} mcp/git