truefoundry-applications
Routing note: For ambiguous user intents, use the shared clarification templates in references/intent-clarification.md.
Applications
List, inspect, and manage applications and deployments on TrueFoundry.
When to Use
List, inspect, or manage deployed applications and their deployment history. Also supports creating deployments via API manifest for pre-built images.
When NOT to Use
- User wants to deploy local code → prefer
deployskill; ask if the user wants another valid path - User wants workspace/cluster info → prefer
workspacesskill; ask if the user wants another valid path - User wants to delete an application → guide them to the TrueFoundry UI (see "Deleting Applications" below)
More from truefoundry/tfy-deploy-skills
truefoundry-jobs
Deploys and monitors TrueFoundry batch jobs, scheduled cron jobs, and one-time tasks. Uses YAML manifests with `tfy apply`. Use when deploying jobs, scheduling cron tasks, checking job run status, or viewing execution history. For listing job applications, use `applications` skill.
11truefoundry-ssh-server
Deploys remote development environments with SSH access on TrueFoundry. Use when setting up VS Code Remote workspaces, cloud development machines, GPU dev boxes, or remote coding environments with SSH access.
11truefoundry-helm
Deploys infrastructure components via Helm charts on TrueFoundry. Supports any public or private OCI Helm chart including databases (Postgres, MongoDB, Redis), message brokers (Kafka, RabbitMQ), and vector databases (Qdrant, Milvus). Uses YAML manifests with `tfy apply`. Use when installing Helm charts or deploying infrastructure on TrueFoundry.
10truefoundry-docs
Fetches TrueFoundry documentation, API reference, and deployment guides. Use when the user needs platform docs or how-to guidance.
10truefoundry-logs
Views, downloads, and searches application and job logs from TrueFoundry. Supports time-range filtering, pod filtering, and error search.
10truefoundry-secrets
Manages TrueFoundry secret groups and secrets. Handles listing, creating, updating, and deleting secret groups and individual key-value secrets.
10