From elastic-agent-skills
Configures Elastic Cloud authentication by verifying EC_API_KEY, setting base URL and region defaults, and validating connection. Use for initial setup or before other cloud skills.
npx claudepluginhub elastic/agent-skills --plugin elastic-cloudThis skill uses the workspace's default tool permissions.
Configure Elastic Cloud authentication and preferences. All other `cloud/*` skills depend on this setup.
Conducts multi-round deep research on GitHub repos via API and web searches, generating markdown reports with executive summaries, timelines, metrics, and Mermaid diagrams.
Dynamically discovers and combines enabled skills into cohesive, unexpected delightful experiences like interactive HTML or themed artifacts. Activates on 'surprise me', inspiration, or boredom cues.
Generates images from structured JSON prompts via Python script execution. Supports reference images and aspect ratios for characters, scenes, products, visuals.
Configure Elastic Cloud authentication and preferences. All other cloud/* skills depend on this setup.
Setup Progress:
- [ ] Step 1: Verify API key
- [ ] Step 2: Set defaults
- [ ] Step 3: Validate connection
Check whether EC_API_KEY is already set:
echo "${EC_API_KEY:?Not set}"
If not set, instruct the user to set it. Never ask the user to paste an API key into the chat — secrets must not appear in conversation history.
If the user indicates they do not have an Elastic Cloud account yet, propose starting a free trial at Elastic Cloud free trial. The trial provides 14 days of full access to Elastic Cloud Serverless with no credit card required. Once the user has registered and logged in, proceed with API key generation below.
Direct the user to:
.env file in the project root (recommended — works in sandboxed agent shells):EC_API_KEY=your-api-key
All cloud/* scripts auto-load .env from the working directory — no manual sourcing needed.
Alternatively, export directly in the terminal:
export EC_API_KEY="your-api-key"
Terminal exports might not be visible to sandboxed agents running in a separate shell session. Prefer the .env file
when working with an agent.
Remind the user that storing secrets in local files is acceptable for development, but for production or shared environments, use a centralized secrets manager (for example, HashiCorp Vault, AWS Secrets Manager, 1Password CLI) to avoid secrets sprawl.
Export the base URL and default region:
export EC_BASE_URL="https://api.elastic-cloud.com"
export EC_REGION="gcp-us-central1"
Ask the user if they want a different region. To list available regions:
curl -s -H "Authorization: ApiKey ${EC_API_KEY}" \
"${EC_BASE_URL}/api/v1/serverless/regions" | python3 -m json.tool
Confirm the API key works by calling the regions endpoint:
curl -sf -H "Authorization: ApiKey ${EC_API_KEY}" \
"${EC_BASE_URL}/api/v1/serverless/regions" > /dev/null && echo "Authenticated." || echo "Authentication failed."
If validation fails, check:
api.elastic-cloud.comUser: set up my cloud environment
Agent: Check if EC_API_KEY is set in your terminal. If not, generate a key at
https://cloud.elastic.co/account/keys and run:
export EC_API_KEY="your-key"
Then confirm and I'll validate the connection.
User: set up cloud with eu region
Agent: [runs setup, sets EC_REGION to user's preferred EU region]
gcp-us-central1 — only change if the user requests a different region.EC_API_KEY is missing.| Variable | Required | Description |
|---|---|---|
EC_API_KEY | Yes | Elastic Cloud API key |
EC_BASE_URL | No | Cloud API base URL (default: https://api.elastic-cloud.com) |
EC_REGION | No | Default region (default: gcp-us-central1) |
| Problem | Fix |
|---|---|
401 Unauthorized | API key is invalid or expired — generate a new one |
connection refused | Check network access to api.elastic-cloud.com |