home / skills / pluginagentmarketplace / custom-plugin-devops / configuration-management
This skill helps automate infrastructure configuration using Ansible, Puppet, Chef, and SaltStack, ensuring idempotent deployments and centralized variable
npx playbooks add skill pluginagentmarketplace/custom-plugin-devops --skill configuration-managementReview the files below or copy the command above to add this skill to your agents.
---
name: configuration-management
description: Infrastructure configuration with Ansible, Chef, Puppet, and SaltStack for automated server management
sasmp_version: "1.3.0"
bonded_agent: 04-infrastructure-as-code
bond_type: PRIMARY_BOND
---
# Configuration Management Skill
## MANDATORY
- Ansible playbooks and roles
- Inventory management (static and dynamic)
- Idempotent configuration patterns
- Variable management and templating
- Common modules (package, service, file, user)
## OPTIONAL
- Chef cookbooks and recipes
- Puppet manifests and modules
- SaltStack states and pillars
- Configuration drift detection
- Secret management integration
## ADVANCED
- Custom Ansible modules
- Multi-environment orchestration
- Performance optimization for large fleets
- Integration with IaC tools
- Compliance as Code
## Assets
- See `assets/ansible-patterns.yaml` for playbook templates
This skill provides practical configuration management patterns and tooling for automated server management using Ansible, Chef, Puppet, and SaltStack. It focuses on idempotent, templated configurations, inventory strategies, and common modules to keep infrastructure consistent and reproducible. The goal is predictable CI/CD-ready deployments and scalable fleet management.
The skill inspects and generates configuration artifacts like Ansible playbooks and roles, inventory files (static and dynamic), and templated variables. It emphasizes idempotent tasks using common modules (package, service, file, user) and supports optional content for Chef cookbooks, Puppet manifests, and SaltStack states. Advanced capabilities include custom Ansible modules, multi-environment orchestration, and integration points for IaC and secret management.
Does this skill generate full playbooks and roles?
Yes — it provides templates and patterns for Ansible playbooks and roles and can scaffold inventory and variable structures; optional guidance is available for Chef, Puppet, and SaltStack.
How does it handle secrets and sensitive data?
It recommends integrating secret backends (Vault, KMS) and keeping secrets out of code by using templating and encrypted variable mechanisms.