Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Deploy, monitor, and manage Azure services with battle-tested patterns.
Deploy, monitor, and manage Azure services with battle-tested patterns.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Stopped VMs still pay for attached disks and public IPs โ deallocate fully with az vm deallocate not just stop from portal Premium SSD default on VM creation โ switch to Standard SSD for dev/test, saves 50%+ Log Analytics workspace retention defaults to 30 days free, then charges per GB โ set data retention policy and daily cap before production Bandwidth between regions is charged both ways โ keep paired resources in same region, use Private Link for cross-region when needed Cosmos DB charges for provisioned RU/s even when idle โ use serverless for bursty workloads or autoscale with minimum RU setting
Resource Groups don't provide network isolation โ NSGs and Private Endpoints do. RG is for management, not security boundary Managed Identity eliminates secrets for Azure-to-Azure auth โ use System Assigned for single-resource, User Assigned for shared identity Key Vault soft-delete enabled by default (90 days) โ can't reuse vault name until purged, plan naming accordingly Azure AD conditional access policies don't apply to service principals โ use App Registrations with certificate auth, not client secrets Private Endpoints don't automatically update DNS โ configure Private DNS Zone and link to VNet or resolution fails
NSG rules evaluate by priority (lowest number first) โ default rules at 65000+ always lose to custom rules Application Gateway v2 requires dedicated subnet โ at least /24 recommended for autoscaling Azure Firewall premium SKU required for TLS inspection and IDPS โ standard can't inspect encrypted traffic VNet peering is non-transitive โ hub-and-spoke requires routes in each spoke, or use Azure Virtual WAN Service Endpoints expose entire service to VNet โ Private Endpoints give private IP for specific resource instance
Azure Functions consumption plan has cold start โ Premium plan with minimum instances for latency-sensitive Cosmos DB partition key choice is permanent and determines scale โ can't change without recreating container App Service plan density: P1v3 handles ~10 slots, more causes resource contention โ monitor CPU/memory per slot Azure Cache for Redis Standard tier has no SLA for replication โ use Premium for persistence and clustering Blob storage hot tier for frequent access โ cool has 30-day minimum, archive has 180-day and hours-long rehydration
Application Insights sampling kicks in at high volume โ telemetry may miss intermittent errors, adjust MaxTelemetryItemsPerSecond Azure Monitor alert rules charge per metric tracked โ consolidate metrics in Log Analytics for complex alerts Activity Log only shows control plane operations โ diagnostic settings required for data plane (blob access, SQL queries) Alert action groups have rate limits โ 1 SMS per 5 min, 1 voice call per 5 min, 100 emails per hour per group Log Analytics query timeout is 10 minutes โ optimize queries with time filters first, then other predicates
ARM templates fail silently on some property changes โ use what-if deployment mode to preview changes Terraform azurerm provider state contains secrets in plaintext โ use remote backend with encryption (Azure Storage + customer key) Bicep is ARM's replacement โ transpiles to ARM, better tooling, use for new projects Resource locks prevent accidental deletion but block some operations โ CanNotDelete lock still allows modifications Azure Policy evaluates on resource creation and updates โ existing non-compliant resources need remediation task
RBAC role assignments take up to 30 minutes to propagate โ pipeline may fail immediately after assignment Owner role can't manage role assignments if PIM requires approval โ use separate User Access Administrator Service principal secret expiration defaults to 1 year โ set calendar reminder or use certificate with longer validity Azure AD B2C is separate from Azure AD โ different tenant, different APIs, different pricing
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.