NetClaw Adds HashiCorp Terraform and Vault: Infrastructure as Code Meets Natural Language
Infrastructure automation through conversation. NetClaw now integrates with HashiCorp Terraform Cloud and Vault, bringing 6 new skills for managing infrastructure as code and secrets. Query workspace state, explore the Terraform Registry, retrieve certificates, and manage secrets—all through natural language.
The HashiCorp Stack
HashiCorp tools are foundational to modern infrastructure:
- Terraform defines infrastructure as code, managing everything from cloud resources to network devices
- Vault secures secrets, manages certificates, and provides encryption as a service
Network engineers increasingly rely on both. Now NetClaw speaks their language.
Terraform Cloud Integration: 3 Skills
terraform-registry
Explore the Terraform ecosystem:
Search the Terraform Registry for Cisco ACI providers
Show details for the hashicorp/aws provider
What modules exist for network automation?
List versions of the PAN-OS provider
Tools included: search_providers, get_provider, get_provider_versions, search_modules, get_module, get_module_versions
terraform-workspaces
Understand your infrastructure state:
List all Terraform workspaces in my organization
Show the current state of the production-network workspace
What resources are managed in the dmz-firewalls workspace?
Compare state between staging and production workspaces
Tools included: list_workspaces, get_workspace, get_workspace_state, list_state_versions, get_state_version, list_workspace_resources
terraform-operations
Monitor infrastructure changes:
Show recent runs for the network-core workspace
What's the status of the latest plan?
List runs that failed in the last 24 hours
Show the plan output for run-abc123
Tools included: list_runs, get_run, get_plan, list_applies, get_apply, get_run_logs
HashiCorp Vault Integration: 3 Skills
vault-secrets
Secure secrets management:
List secrets in the network-credentials path
Get the SNMP community strings from Vault
What secrets are stored under infrastructure/routers?
Show metadata for the admin-credentials secret
Tools included: list_secrets, get_secret, get_secret_metadata, list_secret_versions
vault-pki
Certificate lifecycle management:
List PKI roles in the network-ca mount
Generate a certificate for core-rtr-01.example.com
Show the CA certificate chain
What certificates are about to expire?
Tools included: list_pki_roles, get_pki_role, issue_certificate, get_ca_chain, list_certificates, get_certificate, revoke_certificate
vault-mounts
Understand your secrets architecture:
List all secrets engines in Vault
Show configuration for the network-kv mount
What auth methods are enabled?
Get details on the PKI secrets engine
Tools included: list_mounts, get_mount, list_auth_methods, get_auth_method
Quick Setup
Terraform Cloud
export TF_CLOUD_TOKEN="your-terraform-cloud-token"
export TF_CLOUD_ORGANIZATION="your-org-name"
Generate a token at app.terraform.io → User Settings → Tokens.
HashiCorp Vault
export VAULT_ADDR="https://vault.example.com:8200"
export VAULT_TOKEN="your-vault-token"
# Or use other auth methods:
export VAULT_ROLE_ID="your-role-id"
export VAULT_SECRET_ID="your-secret-id"
Real-World Workflow: Network Device Provisioning
Here’s how these integrations work together:
1. Find the Right Provider
netclaw: Search Terraform Registry for Juniper Junos providers
2. Check Workspace State
netclaw: Show resources in the juniper-spine-switches workspace
3. Get Credentials Securely
netclaw: Get the Juniper admin credentials from Vault
4. Generate Device Certificates
netclaw: Issue a certificate for spine-sw-01.dc1.example.com from the network-ca
5. Monitor the Deployment
netclaw: Show the status of the latest Terraform run for juniper-spine-switches
6. Verify State
netclaw: List all resources managed in the workspace after the apply
All secure. All audited. All conversational.
Integration Architecture
{
"terraform-cloud-mcp": {
"command": "npx",
"args": ["-y", "@hashicorp/terraform-mcp-server"],
"env": {
"TF_CLOUD_TOKEN": "${TF_CLOUD_TOKEN}",
"TF_CLOUD_ORGANIZATION": "${TF_CLOUD_ORGANIZATION}"
}
},
"vault-mcp": {
"command": "uvx",
"args": ["mcp-vault"],
"env": {
"VAULT_ADDR": "${VAULT_ADDR}",
"VAULT_TOKEN": "${VAULT_TOKEN}"
}
}
}
Why This Matters for Network Engineers
Modern network infrastructure is increasingly defined in code:
- Cisco ACI fabrics managed through Terraform
- Palo Alto firewalls configured via providers
- Cloud networking (VPCs, subnets, security groups) in HCL
- Device credentials secured in Vault
- Certificates for mutual TLS between network devices
By integrating Terraform and Vault, NetClaw bridges the gap between network operations and infrastructure as code practices.
Before:
# Check workspace state
terraform login
cd workspace
terraform state list
terraform state show resource.name
# Get credentials
vault login
vault kv get secret/network/credentials
After:
netclaw: List resources in the aci-production workspace
and get the APIC credentials from Vault
Security First
These integrations respect the security models of both platforms:
- Terraform Cloud: Token-based auth with organization scoping
- Vault: Full support for token, AppRole, and other auth methods
- Audit: All operations logged through Vault’s audit backend
- RBAC: Permissions enforced by the respective platforms
NetClaw never bypasses security—it just makes it more accessible.
The Infrastructure Stack
With Terraform and Vault joining Ansible, NetClaw now covers the major infrastructure automation tools:
| Platform | Use Case | NetClaw Skills |
|---|---|---|
| Ansible | Configuration management | Existing |
| Terraform | Infrastructure as code | 3 skills |
| Vault | Secrets management | 3 skills |
Network engineers have a complete automation toolkit through natural language.
NetClaw now supports 68 MCP servers with 124 skills. Your infrastructure as code just became conversational.
Get started at github.com/automateyournetwork/netclaw
