Loading...
Loading...
Found 264 Skills
Guide for implementing Grafana Tempo - a high-scale distributed tracing backend for OpenTelemetry traces. Use when configuring Tempo deployments, setting up storage backends (S3, Azure Blob, GCS), writing TraceQL queries, deploying via Helm, understanding trace structure, or troubleshooting Tempo issues on Kubernetes.
Execute use when generating infrastructure as code configurations. Trigger with phrases like "create Terraform config", "generate CloudFormation template", "write Pulumi code", or "IaC for AWS/GCP/Azure". Produces production-ready code for Terraform, CloudFormation, Pulumi, ARM templates, and CDK across multiple cloud providers.
Multi-cloud security assessment skill for AWS, Azure, and GCP. This skill should be used when performing cloud security audits, scanning for misconfigurations, testing IAM policies, auditing storage permissions, and identifying privilege escalation paths. Triggers on requests to audit cloud security, scan AWS/Azure/GCP, check cloud misconfigurations, or perform cloud penetration testing.
Cloud security posture management and container security assessment for AWS, Azure, GCP, and Kubernetes.
Cloud & AI FinOps advisory skill. Structured cost optimization using the FinOps Foundation framework. Covers AWS, Azure, GCP, OCI, AI inference, and data platforms (Databricks, Snowflake). Use for: cloud costs, cost optimization, cloud spend, AI costs, cloud bill, FinOps assessment, GreenOps, right-sizing, commitment strategy, tagging governance.
Cloud infrastructure design and deployment patterns for AWS, Azure, and GCP. Use when designing cloud architectures, implementing IaC with Terraform, optimizing costs, or setting up multi-region deployments.
Generate/create Loki configs — ingester, querier, compactor, ruler, S3/GCS/Azure backends.
Configure an MCP server for GitHub Copilot with your Dataverse environment.
Cloud design patterns for distributed systems architecture covering 42 industry-standard patterns across reliability, performance, messaging, security, and deployment categories. Use when designing, reviewing, or implementing distributed system architectures.
Professional Skills and Methodologies for Cloud Security Audits
Search and fetch Microsoft Learn documentation
Detect compromised O365 and Google Workspace email accounts by analyzing inbox rule creation, suspicious sign-in locations, mail forwarding rules, and unusual API access patterns via Microsoft Graph and audit logs.