adk-infra-expert
About
This Claude Skill provisions Vertex AI ADK infrastructure using Terraform, triggered by phrases like "deploy ADK terraform" or "provision ADK agent." It sets up core components including the Agent Engine runtime, a 14-day code execution sandbox, Memory Bank, and secure IAM roles. Use it when you need to automate the deployment of a secure, multi-agent development environment on Google Cloud.
Quick Install
Claude Code
Recommended/plugin add https://github.com/jeremylongshore/claude-code-plugins-plusgit clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/adk-infra-expertCopy and paste this command in Claude Code to install this skill
Documentation
Prerequisites
Before using this skill, ensure:
- Google Cloud project with billing enabled
- Terraform 1.0+ installed
- gcloud CLI authenticated with appropriate permissions
- Vertex AI API enabled in target project
- VPC Service Controls access policy created (for enterprise)
- Understanding of Agent Engine architecture and requirements
Instructions
- Initialize Terraform: Set up backend for remote state storage
- Configure Variables: Define project_id, region, agent configuration
- Provision VPC: Create network infrastructure with Private Service Connect
- Set Up IAM: Create service accounts with least privilege roles
- Deploy Agent Engine: Configure runtime with code execution and memory bank
- Enable VPC-SC: Apply service perimeter for data exfiltration protection
- Configure Monitoring: Set up Cloud Monitoring dashboards and alerts
- Validate Deployment: Test agent endpoint and verify all components
Output
Agent Engine Deployment:
# {baseDir}/terraform/main.tf
resource "google_vertex_ai_agent_runtime" "adk_agent" {
project = var.project_id
location = var.region
display_name = "adk-production-agent"
agent_config {
model = "gemini-2.5-flash"
code_execution {
enabled = true
state_ttl_days = 14
sandbox_type = "SECURE_ISOLATED"
}
memory_bank {
enabled = true
}
}
vpc_config {
vpc_network = google_compute_network.agent_vpc.id
private_service_connect {
enabled = true
}
}
}
VPC Service Controls:
resource "google_access_context_manager_service_perimeter" "adk_perimeter" {
parent = "accessPolicies/${var.access_policy_id}"
title = "ADK Agent Engine Perimeter"
status {
restricted_services = [
"aiplatform.googleapis.com",
"run.googleapis.com"
]
}
}
IAM Configuration:
resource "google_service_account" "adk_agent" {
account_id = "adk-agent-sa"
display_name = "ADK Agent Service Account"
}
resource "google_project_iam_member" "agent_identity" {
project = var.project_id
role = "roles/aiplatform.agentUser"
member = "serviceAccount:${google_service_account.adk_agent.email}"
}
Error Handling
Terraform State Lock
- Error: "Error acquiring the state lock"
- Solution: Use
terraform force-unlock <lock-id>or wait for lock expiry
API Not Enabled
- Error: "Vertex AI API has not been used"
- Solution: Enable with
gcloud services enable aiplatform.googleapis.com
VPC-SC Configuration
- Error: "Access denied by VPC Service Controls"
- Solution: Add project to service perimeter or adjust ingress/egress policies
IAM Permission Denied
- Error: "does not have required permission"
- Solution: Grant roles/owner temporarily to service account running Terraform
Resource Already Exists
- Error: "Resource already exists"
- Solution: Import existing resource or use data source instead
Resources
- Agent Engine: https://cloud.google.com/vertex-ai/generative-ai/docs/agent-engine/overview
- VPC-SC: https://cloud.google.com/vpc-service-controls/docs
- Terraform Google Provider: https://registry.terraform.io/providers/hashicorp/google/latest
- ADK Terraform examples in {baseDir}/examples/
GitHub Repository
Related Skills
sglang
MetaSGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.
evaluating-llms-harness
TestingThis Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.
llamaguard
OtherLlamaGuard is Meta's 7-8B parameter model for moderating LLM inputs and outputs across six safety categories like violence and hate speech. It offers 94-95% accuracy and can be deployed using vLLM, Hugging Face, or Amazon SageMaker. Use this skill to easily integrate content filtering and safety guardrails into your AI applications.
langchain
MetaLangChain is a framework for building LLM applications using agents, chains, and RAG pipelines. It supports multiple LLM providers, offers 500+ integrations, and includes features like tool calling and memory management. Use it for rapid prototyping and deploying production systems like chatbots, autonomous agents, and question-answering services.
