> airflow-dag-patterns
Build production Apache Airflow DAGs with best practices for operators, sensors, testing, and deployment. Use when creating data pipelines, orchestrating workflows, or scheduling batch jobs.
curl "https://skillshub.wtf/sickn33/antigravity-awesome-skills/airflow-dag-patterns?format=md"Apache Airflow DAG Patterns
Production-ready patterns for Apache Airflow including DAG design, operators, sensors, testing, and deployment strategies.
Use this skill when
- Creating data pipeline orchestration with Airflow
- Designing DAG structures and dependencies
- Implementing custom operators and sensors
- Testing Airflow DAGs locally
- Setting up Airflow in production
- Debugging failed DAG runs
Do not use this skill when
- You only need a simple cron job or shell script
- Airflow is not part of the tooling stack
- The task is unrelated to workflow orchestration
Instructions
- Identify data sources, schedules, and dependencies.
- Design idempotent tasks with clear ownership and retries.
- Implement DAGs with observability and alerting hooks.
- Validate in staging and document operational runbooks.
Refer to resources/implementation-playbook.md for detailed patterns, checklists, and templates.
Safety
- Avoid changing production DAG schedules without approval.
- Test backfills and retries carefully to prevent data duplication.
Resources
resources/implementation-playbook.mdfor detailed patterns, checklists, and templates.
> related_skills --same-repo
> audit-skills
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
> audit-context-building
Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.
> audio-transcriber
Transform audio recordings into professional Markdown documentation with intelligent summaries using LLM integration
> attack-tree-construction
Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.