home / skills / jeremylongshore / claude-code-plugins-plus-skills / envoy-proxy-config

This skill provides guided envoy proxy config setup and validation with production-ready examples, accelerating secure, scalable deployments.

npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill envoy-proxy-config

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
2.1 KB
---
name: "envoy-proxy-config"
description: |
  Configure envoy proxy config operations. Auto-activating skill for DevOps Advanced.
  Triggers on: envoy proxy config, envoy proxy config
  Part of the DevOps Advanced skill category. Use when configuring systems or services. Trigger with phrases like "envoy proxy config", "envoy config", "envoy".
allowed-tools: "Read, Write, Edit, Bash(cmd:*), Grep"
version: 1.0.0
license: MIT
author: "Jeremy Longshore <[email protected]>"
---

# Envoy Proxy Config

## Overview

This skill provides automated assistance for envoy proxy config tasks within the DevOps Advanced domain.

## When to Use

This skill activates automatically when you:
- Mention "envoy proxy config" in your request
- Ask about envoy proxy config patterns or best practices
- Need help with advanced devops skills covering kubernetes, terraform, advanced ci/cd, monitoring, and infrastructure as code.

## Instructions

1. Provides step-by-step guidance for envoy proxy config
2. Follows industry best practices and patterns
3. Generates production-ready code and configurations
4. Validates outputs against common standards

## Examples

**Example: Basic Usage**
Request: "Help me with envoy proxy config"
Result: Provides step-by-step guidance and generates appropriate configurations


## Prerequisites

- Relevant development environment configured
- Access to necessary tools and services
- Basic understanding of devops advanced concepts


## Output

- Generated configurations and code
- Best practice recommendations
- Validation results


## Error Handling

| Error | Cause | Solution |
|-------|-------|----------|
| Configuration invalid | Missing required fields | Check documentation for required parameters |
| Tool not found | Dependency not installed | Install required tools per prerequisites |
| Permission denied | Insufficient access | Verify credentials and permissions |


## Resources

- Official documentation for related tools
- Best practices guides
- Community examples and tutorials

## Related Skills

Part of the **DevOps Advanced** skill category.
Tags: kubernetes, terraform, helm, monitoring, iac

Overview

This skill automates and guides Envoy proxy configuration tasks for advanced DevOps workflows. It produces production-ready Envoy YAML/JSON snippets, validates configuration patterns, and explains best practices. Use it to streamline proxy setup, routing, and observability integrations in Kubernetes, Terraform, or CI/CD pipelines.

How this skill works

The skill inspects user intent and environment context to generate or modify Envoy configurations, ensuring required fields and common patterns are present. It can produce listeners, clusters, routes, TLS and mTLS sections, health checks, and observability hooks, and it runs basic validation checks against common schema expectations. It provides step-by-step instructions for applying changes via kubectl, helm, or Terraform and suggests remediation for common errors.

When to use it

  • When you need to create or update Envoy listeners, clusters, routes, or filters
  • When integrating Envoy with Kubernetes Deployments, Services, or Ingress/Service Mesh patterns
  • When adding TLS/mTLS, health checks, retry and timeout policies, or observability hooks
  • When automating Envoy config through Terraform, Helm, or CI/CD pipelines
  • When validating configurations before applying to production environments

Best practices

  • Use version-controlled config and generate snapshots for safe rollouts through CI/CD
  • Keep listeners and routes minimal and explicit; prefer explicit host and path matching
  • Enable health checks and circuit breaking to protect upstream services
  • Use TLS/mTLS with proper certificate management; rotate keys regularly
  • Test config changes in a staging environment and use gradual traffic shifting for production

Example use cases

  • Generate an Envoy listener and route for a new microservice and show kubectl apply steps
  • Convert an HTTP reverse proxy rule into Envoy route configuration with retries and timeouts
  • Add mutual TLS between Envoy and upstream clusters and produce certificate configuration snippets
  • Integrate Envoy logging and metrics hooks for Prometheus and Jaeger
  • Validate a generated Envoy bootstrap config and suggest fixes for missing fields

FAQ

Can this skill apply configs directly to a cluster?

It produces the commands and manifests to apply configs (kubectl/helm) but does not perform changes itself; run the provided commands in your environment.

Does it support schema validation?

Yes. It runs basic validation against common expectations and flags missing required sections, but you should complement this with environment-specific schema checks.