home / skills / partme-ai / full-stack-skills / cloud-tencent-cvm

cloud-tencent-cvm skill

/skills/cloud-tencent-cvm

This skill provides guidance for creating, configuring, and managing Tencent Cloud CVM instances with security groups and best practices.

npx playbooks add skill partme-ai/full-stack-skills --skill cloud-tencent-cvm

Review the files below or copy the command above to add this skill to your agents.

Files (2)
SKILL.md
691 B
---
name: cloud-tencent-cvm
description: Provides comprehensive guidance for Tencent Cloud CVM including instance creation, configuration, security groups, and CVM management. Use when the user asks about Tencent Cloud CVM, needs to create CVM instances, configure CVM, or manage Tencent Cloud compute resources.
license: Complete terms in LICENSE.txt
---

## When to use this skill

Use this skill whenever the user wants to:
- [待完善:根据具体工具添加使用场景]

## How to use this skill

[待完善:根据具体工具添加使用指南]

## Best Practices

[待完善:根据具体工具添加最佳实践]

## Keywords

[待完善:根据具体工具添加关键词]

Overview

This skill provides practical guidance for managing Tencent Cloud CVM (Cloud Virtual Machine), covering instance creation, configuration, security groups, networking, and lifecycle operations. It helps engineers and DevOps operators choose instance types, set up secure access, and implement common management tasks for production and development workloads. The guidance emphasizes reproducible steps and operational best practices.

How this skill works

The skill inspects the typical CVM workflow: selecting images and instance types, configuring disks and network interfaces, and applying security group and firewall rules. It explains operations such as start/stop, snapshot and image management, resizing, and instance recovery. It also highlights automation points like using CLI/SDK for batch operations and integrating with Tencent Cloud services for monitoring and scaling.

When to use it

  • Creating new CVM instances for development, staging, or production workloads
  • Designing secure network access with security groups and firewall rules
  • Migrating workloads or creating images and snapshots for backups
  • Automating instance lifecycle (start/stop, resize, recreate) with CLI or SDK
  • Troubleshooting boot, networking, or SSH access issues

Best practices

  • Choose instance type and disk performance that match workload I/O and CPU needs to avoid overprovisioning
  • Use security groups with least-privilege rules and restrict SSH/RDP to known IP ranges or VPNs
  • Automate image and snapshot creation on a schedule for reliable backups
  • Tag resources consistently for billing, inventory, and automation
  • Use instance metadata and cloud-init (or custom scripts) to perform repeatable provisioning

Example use cases

  • Provision a web server fleet: create CVMs with load balancer integration, security group rules, and auto-scaling hooks
  • Prepare a machine image: configure a CVM, install dependencies, create a custom image for rapid deployment
  • Implement backups: schedule snapshots for system and data disks and verify restores in a test project
  • Scale compute: resize or replace instances to handle seasonal load or migrate to newer generations
  • Secure access: configure bastion host patterns, limit public IPs, and enforce SSH key or password policies

FAQ

How do I choose the right CVM type?

Match CPU, memory, and disk performance to your workload. Use burstable types for variable loads, compute-optimized for CPU-bound tasks, and memory-optimized for in-memory databases.

What is the recommended way to secure SSH access?

Disable password login, use SSH keys, restrict access with security group rules to trusted IPs or a VPN, and consider a bastion host for centralized access control.