azure-architect
Scannednpx machina-cli add skill waelouf/cc-powerup-azure-architect/azure-architect --openclaw<quick_start>
- Review the 13-option intake menu to select your task (provision, deploy, monitor, etc.)
- Respond with your choice - Claude will route to the appropriate workflow
- Follow the step-by-step workflow with provided Azure CLI commands
- Verify deployment using the validation commands
- Check success criteria: infrastructure deployed, monitoring active, security enabled, costs tracked </quick_start>
<success_criteria>
- All Azure resources defined in Infrastructure as Code (Bicep or Terraform, no manual portal changes)
- Infrastructure deployed successfully and resources accessible
- Monitoring configured (Application Insights, Log Analytics) and collecting data
- Security best practices enabled (HTTPS only, Managed Identity, RBAC, no hardcoded secrets)
- Cost estimates provided for current configuration
- All changes version controlled in git
- Verification commands run successfully </success_criteria>
<essential_principles> <overview> Core principles that guide all Azure DevOps architecture workflows in this powerup. These principles must be followed across all tasks - from provisioning through production operations. </overview>
<principle name="infrastructure_as_code"> <title>Infrastructure as Code is the Source of Truth</title> <description> All Azure resources MUST be defined in code (Bicep, Terraform, or ARM templates). Never create resources manually in the portal for production - manual changes create configuration drift and are impossible to replicate or version control. </description><tool_selection>
<option name="bicep"> <use_when> - Azure-only infrastructure - You want the newest Azure features immediately - Team prefers native Azure tooling - No state file management complexity </use_when> </option> <option name="terraform"> <use_when> - Multi-cloud or hybrid environments - Need mature ecosystem and community modules - Require advanced state management and drift detection - Team has existing Terraform expertise </use_when> </option> </tool_selection> </principle> <principle name="azure_cli_first"> <title>Azure CLI First, Portal Never</title> <description> Use Azure CLI (az) for all operations. The portal is for viewing and understanding, not for making changes. </description> <benefits> - Repeatable and scriptable - Version controlled - Auditable - Automatable in CI/CD pipelines </benefits> </principle> <principle name="security_by_default"> <title>Security by Default</title> <description> Never hardcode secrets. Security must be baked into infrastructure from the start, not added later. </description><required_practices>
- Azure Key Vault for secrets, keys, and certificates
- Managed Identity for authentication (no credentials in code)
- RBAC for access control (principle of least privilege)
- Azure AD integration for user authentication
- RBAC has replaced legacy access policies - always use RBAC permission model for Key Vault and other resources </required_practices> </principle>
<cost_strategies>
- Right-size resources (don't over-provision)
- Use auto-scaling to match actual demand
- Implement auto-shutdown for non-production resources
- Use Reserved Instances/Savings Plans for predictable workloads
- Tag all resources for cost allocation and tracking </cost_strategies> </principle>
<required_components>
- Application Insights for application telemetry
- Log Analytics for centralized logging
- Azure Monitor for infrastructure metrics
- Alerts for proactive issue detection </required_components> </principle>
<pipeline_options>
- Azure DevOps Pipelines (Azure-native)
- GitHub Actions (code-to-cloud integration)
- YAML-based pipeline definitions (version controlled) </pipeline_options>
<deployment_strategies> Use deployment strategies like blue-green or canary to minimize risk. </deployment_strategies> </principle> </essential_principles>
<security_checklist>
<title>Pre-Deployment Security Validation</title> <description> Run this checklist before deploying any infrastructure to production. All items must pass. </description><check>No secrets or credentials hardcoded in IaC templates or application code</check> <check>All services configured to use Managed Identity (no connection strings with credentials)</check> <check>HTTPS only enabled for all web services (httpsOnly: true)</check> <check>RBAC roles assigned with least privilege principle</check> <check>Network security groups (NSGs) configured to restrict traffic</check> <check>Azure Key Vault configured for secret management</check> <check>Private Endpoints enabled for data services (no public access)</check> <check>All resources tagged for governance and cost tracking</check> </security_checklist>
<intake> <prompt>What would you like to do?</prompt> <options> <option number="1" label="Provision new infrastructure"> Create Azure resources from scratch using Infrastructure as Code </option> <option number="2" label="Setup CI/CD pipeline"> Configure automated deployment pipeline with GitHub Actions or Azure DevOps </option> <option number="3" label="Deploy application"> Deploy app to Azure (App Service, AKS, Functions, Container Apps, etc.) </option> <option number="4" label="Setup monitoring"> Configure Application Insights, Log Analytics, alerts, and dashboards </option> <option number="5" label="Debug deployment"> Troubleshoot failed deployments or infrastructure issues </option> <option number="6" label="Optimize costs"> Analyze and reduce Azure spending with FinOps strategies </option> <option number="7" label="Secure infrastructure"> Implement security best practices (Key Vault, RBAC, Managed Identity) </option> <option number="8" label="Setup networking"> Configure VNets, NSGs, Application Gateway, Private Endpoints </option> <option number="9" label="Design shared resources"> Architect multi-product shared infrastructure (database servers, storage, etc.) </option> <option number="10" label="Scale infrastructure"> Handle growth and traffic increases with auto-scaling </option> <option number="11" label="Setup environments"> Create dev/staging/prod environments with appropriate configurations </option> <option number="12" label="Implement disaster recovery"> Setup backup, restore, and failover strategies </option> <option number="13" label="Something else"> Describe what you need and Claude will provide guidance </option> </options><instruction>Wait for user response before proceeding.</instruction> </intake>
<routing> <route patterns="1|provision|create|infrastructure|new|bicep|terraform" workflow="workflows/provision-infrastructure.md"> Create new Azure infrastructure from scratch </route><route patterns="2|cicd|ci/cd|pipeline|devops|github actions|deploy automation" workflow="workflows/setup-cicd-pipeline.md"> Configure CI/CD with Azure DevOps or GitHub Actions </route>
<route patterns="3|deploy|app|application|release|publish" workflow="workflows/deploy-application.md"> Deploy applications to Azure services </route>
<route patterns="4|monitor|monitoring|logs|alerts|insights|observability" workflow="workflows/setup-monitoring.md"> Configure monitoring, logging, and alerts </route>
<route patterns="5|debug|troubleshoot|fix|broken|error|failed|issue" workflow="workflows/debug-deployment.md"> Troubleshoot failed deployments and issues </route>
<route patterns="6|cost|optimize|expensive|finops|spending|budget" workflow="workflows/optimize-costs.md"> Analyze and reduce Azure spending </route>
<route patterns="7|secure|security|rbac|key vault|identity|managed identity" workflow="workflows/secure-infrastructure.md"> Implement security best practices </route>
<route patterns="8|network|vnet|nsg|gateway|subnet|firewall" workflow="workflows/setup-networking.md"> Configure VNets, NSGs, Application Gateway </route>
<route patterns="9|shared|multi-product|multi-tenant|share|database server" workflow="workflows/design-shared-resources.md"> Architect shared infrastructure for multiple products </route>
<route patterns="10|scale|scaling|autoscale|grow|traffic|performance" workflow="workflows/scale-infrastructure.md"> Handle growth and traffic scaling </route>
<route patterns="11|environment|dev|staging|prod|production|test" workflow="workflows/setup-environments.md"> Create dev/staging/prod environments </route>
<route patterns="12|disaster|recovery|backup|restore|failover|dr|bcdr" workflow="workflows/implement-disaster-recovery.md"> Setup backup, restore, and failover </route>
<route patterns="13|migrate|migration|move to azure" workflow="workflows/migrate-to-azure.md"> Migrate existing infrastructure to Azure </route>
<instruction>After reading the routed workflow, follow it exactly step by step.</instruction> </routing>
<verification> <title>After Every Change</title> <description> Run these verification commands to ensure your changes work correctly. Execute all applicable steps and report results to the user. </description> <step number="1" name="validate_iac"> <description>Validate Infrastructure as Code templates</description> <commands> <bicep>az bicep build --file main.bicep</bicep> <terraform>terraform validate && terraform plan</terraform> </commands> </step> <step number="2" name="check_deployment"> <description>Check resource deployment status</description> <command>az deployment group show --name <deployment-name> --resource-group <rg-name></command> </step> <step number="3" name="verify_resources"> <description>Verify resources are running</description> <command>az resource list --resource-group <rg-name> --output table</command> </step> <step number="4" name="test_endpoint"> <description>Test application endpoint (if applicable)</description> <commands> <option>curl https://<your-app>.azurewebsites.net/health</option> <option>az webapp show --name <app-name> --resource-group <rg-name> --query "state"</option> </commands> </step> <step number="5" name="check_errors"> <description>Check recent deployments and errors</description> <command>az monitor activity-log list --resource-group <rg-name> --max-events 10</command> </step> <reporting> <title>Report to User</title> <status_items> <item>Infrastructure: ✓ Deployed / ✗ Failed (with error details)</item> <item>Application: ✓ Running / ✗ Stopped</item> <item>Monitoring: ✓ Collecting data / ⚠ Needs configuration</item> <item>Cost estimate: $X/month for current configuration</item> </status_items> <requirement>Always provide next steps or recommendations for improvement</requirement> </reporting> </verification> <references> <title>Domain Knowledge</title> <description>All reference files located in references/ directory</description> <category name="Infrastructure"> <file name="infrastructure-as-code.md">Bicep vs Terraform, Azure Verified Modules, state management</file> <file name="compute-services.md">App Service, Functions, Container Apps, AKS, VMs decision matrix</file> <file name="storage-data.md">Azure SQL, Cosmos DB, Storage Accounts with pricing</file> </category> <category name="Architecture"> <file name="architecture-patterns.md">Microservices, API Gateway, CQRS, Circuit Breaker, BFF</file> <file name="multi-tenancy-patterns.md">Shared database/schema, database-per-tenant, governance</file> <file name="anti-patterns.md">What NOT to do across all domains</file> </category> <category name="Deployment"> <file name="cicd-pipelines.md">GitHub Actions with OIDC (no secrets!), Azure DevOps</file> <file name="deployment-strategies.md">Blue-green, canary, rolling updates, zero-downtime</file> </category> <category name="Networking"> <file name="networking.md">VNets, NSGs, Private Endpoints, Application Gateway</file> </category> <category name="Kubernetes"> <file name="kubernetes-aks.md">Production AKS setup, node pools, auto-scaling, security</file> </category> <category name="Security"> <file name="security-identity.md">Managed Identity (zero credentials), RBAC, Key Vault</file> </category> <category name="Observability"> <file name="monitoring-observability.md">Application Insights, Log Analytics, KQL queries</file> </category> <category name="Operations"> <file name="cost-optimization.md">FinOps fundamentals, real pricing, savings calculations</file> <file name="disaster-recovery.md">RTO/RPO, Azure Backup, Site Recovery, DR testing</file> </category> <category name="Organization"> <file name="resource-organization.md">Naming conventions, tagging strategies, management groups</file> </category> </references> <workflows> <title>Available Workflows</title> <description>All workflow files located in workflows/ directory</description> <workflow name="provision-infrastructure.md"> Create new Azure infrastructure from scratch with IaC </workflow> <workflow name="setup-cicd-pipeline.md"> Configure CI/CD with Azure DevOps or GitHub Actions </workflow> <workflow name="deploy-application.md"> Deploy applications to Azure services </workflow> <workflow name="setup-monitoring.md"> Configure monitoring, logging, and alerts </workflow> <workflow name="debug-deployment.md"> Troubleshoot failed deployments and issues </workflow> <workflow name="optimize-costs.md"> Analyze and reduce Azure spending </workflow> <workflow name="secure-infrastructure.md"> Implement security best practices </workflow> <workflow name="setup-networking.md"> Configure VNets, NSGs, Application Gateway </workflow> <workflow name="design-shared-resources.md"> Architect shared infrastructure for multiple products </workflow> <workflow name="scale-infrastructure.md"> Handle growth and traffic scaling </workflow> <workflow name="setup-environments.md"> Create dev/staging/prod environments </workflow> <workflow name="implement-disaster-recovery.md"> Setup backup, restore, and failover </workflow> <workflow name="migrate-to-azure.md"> Migrate existing infrastructure to Azure </workflow> </workflows>Source
git clone https://github.com/waelouf/cc-powerup-azure-architect/blob/main/skills/azure-architect/SKILL.mdView on GitHub Overview
Build production-grade Azure cloud infrastructure and DevOps pipelines from initial provisioning through production operations. This skill emphasizes infrastructure as code with Bicep or Terraform, Azure CLI automation, CI/CD pipelines, and secure deployments to App Service, AKS, and Functions, with monitoring and cost-aware lifecycle management.
How This Skill Works
Define all resources in code using Bicep or Terraform, then provision and manage them via Azure CLI. Choose the IaC approach based on use case (native Azure tooling vs multi-cloud), implement CI/CD automation, configure monitoring (Application Insights, Log Analytics), and enforce security by default with Key Vault, Managed Identity, and RBAC. All changes are version-controlled and validated against success criteria.
When to Use It
- Provision new Azure resources using infrastructure as code (Bicep or Terraform) with Azure CLI automation.
- Set up and maintain CI/CD pipelines for deployments to Azure services (App Service, AKS, Functions).
- Deploy applications to App Service, AKS, or Functions using repeatable, auditable workflows.
- Configure monitoring and security from the start, including Application Insights, Log Analytics, Key Vault, and RBAC.
- Manage ongoing Azure infrastructure lifecycle with cost optimization, governance, and strict version control.
Quick Start
- Step 1: Review the 13-option intake menu to select your task (provision, deploy, monitor, etc.).
- Step 2: Respond with your choice and let the workflow route to the appropriate Azure CLI-based steps.
- Step 3: Follow the step-by-step workflow and run the provided Azure CLI commands, then verify with the validation commands.
Best Practices
- All resources must be defined in code (Bicep, Terraform, or ARM templates) with no production portal edits.
- Azure CLI is the primary interface; use the portal only for viewing and understanding, not for changes.
- Security by Default: store secrets in Key Vault, use Managed Identities, and enforce RBAC; avoid hardcoded credentials.
- Adopt CI/CD pipelines and keep all IaC under version control for reproducibility and auditability.
- Design for cost consciousness: implement budgets, cost tracking, and right-sizing in IaC.
Example Use Cases
- Provision a multi-tier web app using App Service and SQL via Bicep and GitHub Actions with automated testing and monitoring.
- Deploy a containerized app to AKS with a Helm-based release and a GitOps-style CI/CD workflow.
- Create a serverless Functions app with event-driven triggers, integrated Key Vault, and managed identities.
- Set up end-to-end monitoring with Application Insights and Log Analytics across services.
- Enforce security posture by configuring RBAC, Managed Identities, and secret rotation via Key Vault in production deployments.