home / skills / partme-ai / full-stack-skills / cloud-tencent-cvm
This skill provides guidance for creating, configuring, and managing Tencent Cloud CVM instances with security groups and best practices.
npx playbooks add skill partme-ai/full-stack-skills --skill cloud-tencent-cvmReview the files below or copy the command above to add this skill to your agents.
---
name: cloud-tencent-cvm
description: Provides comprehensive guidance for Tencent Cloud CVM including instance creation, configuration, security groups, and CVM management. Use when the user asks about Tencent Cloud CVM, needs to create CVM instances, configure CVM, or manage Tencent Cloud compute resources.
license: Complete terms in LICENSE.txt
---
## When to use this skill
Use this skill whenever the user wants to:
- [待完善:根据具体工具添加使用场景]
## How to use this skill
[待完善:根据具体工具添加使用指南]
## Best Practices
[待完善:根据具体工具添加最佳实践]
## Keywords
[待完善:根据具体工具添加关键词]
This skill provides practical guidance for managing Tencent Cloud CVM (Cloud Virtual Machine), covering instance creation, configuration, security groups, networking, and lifecycle operations. It helps engineers and DevOps operators choose instance types, set up secure access, and implement common management tasks for production and development workloads. The guidance emphasizes reproducible steps and operational best practices.
The skill inspects the typical CVM workflow: selecting images and instance types, configuring disks and network interfaces, and applying security group and firewall rules. It explains operations such as start/stop, snapshot and image management, resizing, and instance recovery. It also highlights automation points like using CLI/SDK for batch operations and integrating with Tencent Cloud services for monitoring and scaling.
How do I choose the right CVM type?
Match CPU, memory, and disk performance to your workload. Use burstable types for variable loads, compute-optimized for CPU-bound tasks, and memory-optimized for in-memory databases.
What is the recommended way to secure SSH access?
Disable password login, use SSH keys, restrict access with security group rules to trusted IPs or a VPN, and consider a bastion host for centralized access control.