terraform-state-operations
npx skills add https://github.com/lgbarn/devops-skills --skill terraform-state-operations
Agent 安装分布
Skill 文档
Terraform State Operations
Overview
State operations modify Terraform’s understanding of infrastructure without changing actual resources. These are dangerous because mistakes can orphan resources or cause Terraform to recreate existing infrastructure.
Announce at start: “I’m using the terraform-state-operations skill for safe state surgery.”
CRITICAL: Pre-Operation Safety
1. Create State Backup
ALWAYS create a backup before ANY state operation:
# Create timestamped backup
BACKUP_NAME="state-backup-$(date +%Y%m%d-%H%M%S).tfstate"
# For local state
cp terraform.tfstate "$BACKUP_NAME"
# For remote state (S3 example)
terraform state pull > "$BACKUP_NAME"
echo "Backup created: $BACKUP_NAME"
2. Document the Operation
Before proceeding, create a record:
## State Operation Record
**Date:** [timestamp]
**Environment:** [env name]
**Operator:** [user]
**Reason:** [why this operation is needed]
### Planned Operations
1. [operation 1]
2. [operation 2]
### Backup Location
- Local: [path]
- Remote: [if applicable]
### Rollback Plan
[How to restore if something goes wrong]
3. Get User Approval
Present the plan and require explicit approval before executing.
State Operations Guide
terraform state mv
Use case: Rename resources, reorganize modules, refactor code
# List current resources
terraform state list
# Move/rename a resource
terraform state mv aws_instance.old_name aws_instance.new_name
# Move into a module
terraform state mv aws_instance.web module.web.aws_instance.this
# Move between modules
terraform state mv module.old.aws_instance.web module.new.aws_instance.web
Verification after mv:
# Should show no changes
terraform plan
terraform state rm
Use case: Remove from state without destroying actual resource (adopting externally-managed resources)
# Remove single resource
terraform state rm aws_instance.legacy
# Remove module
terraform state rm module.legacy
WARNING: The actual resource continues to exist but is no longer managed by Terraform.
Verification after rm:
# Resource should appear as "new" if still in code
# Remove from code if intentionally unmanaging
terraform plan
terraform import
Use case: Bring existing infrastructure under Terraform management
# Import existing resource
terraform import aws_instance.web i-1234567890abcdef0
# Import with module path
terraform import module.web.aws_instance.this i-1234567890abcdef0
Before import:
- Write the resource configuration in code
- Ensure configuration matches actual resource
- Import
- Run plan to verify no changes
Verification after import:
# Should show no changes (or only acceptable differences)
terraform plan
terraform state pull/push
Use case: Backup, migrate, or restore state
# Pull current state
terraform state pull > state.json
# Push state (DANGEROUS - can overwrite!)
# terraform state push state.json # BLOCKED by hook
Recovery Procedures
If State Becomes Corrupted
# Restore from backup
cp "$BACKUP_NAME" terraform.tfstate
# For remote state - may need to disable locking temporarily
# Consult your backend documentation
If Resources Are Orphaned
- Identify orphaned resources in AWS console
- Either:
- Import them back:
terraform import ... - Delete them manually if no longer needed
- Import them back:
If Wrong Resources Removed
# Restore backup
cp "$BACKUP_NAME" terraform.tfstate
# Re-initialize to sync with backend
terraform init -reconfigure
Approval Workflow
For state mv (Low Risk)
- Show planned move
- Explain impact
- Request approval
- Execute with verification
For state rm (Medium Risk)
- Show what will be unmanaged
- Explain orphan implications
- Confirm resource won’t be deleted
- Request explicit approval
- Execute with verification
For state push (High Risk)
Hook blocks this command. If genuinely needed:
- Explain why state push is necessary
- Show state diff
- Request explicit approval with acknowledgment of risks
- User must disable hook manually
Verification Checklist
Before any state operation:
- Backup created and verified
- Operation documented
- Impact explained to user
- User explicitly approved
- Rollback plan established
After operation:
- terraform plan shows expected result
- No unintended changes detected
- Backup retained for rollback window
- Operation logged to memory