From antigravity-awesome-skills
Provides multi-cluster Kubernetes dashboard with AI-powered operations via MCP server and 10+ agent skills for debugging, testing, CI analysis, and troubleshooting.
npx claudepluginhub sickn33/antigravity-awesome-skillsThis skill uses the workspace's default tool permissions.
KubeStellar Console is an open-source multi-cluster Kubernetes dashboard (CNCF project) with AI-powered operations. It ships with `kc-agent`, an MCP server that bridges coding agents to kubeconfig and Kubernetes APIs, plus 10+ built-in agent skills for development, testing, and operations.
Orchestrates multi-agent swarm for Kubernetes/OpenShift platform operations: cluster lifecycle (Atlas), GitOps (Flow/ArgoCD/Helm), security (Shield/RBAC), observability (Pulse), artifacts (Cache), dev experience (Desk).
Manages Kubernetes and OpenShift clusters: operations (upgrades, backups, scaling), troubleshooting (pods, networking, storage), manifests (Deployments, Services, RBAC), security (audits, scans), GitOps (ArgoCD, Flux, Helm).
Manages Kubernetes cluster resources via kubectl across multiple clusters. Views pod/deployment statuses, logs/events; troubleshoots with exec/port-forward; modifies via scale/rollout.
Share bugs, ideas, or general feedback.
KubeStellar Console is an open-source multi-cluster Kubernetes dashboard (CNCF project) with AI-powered operations. It ships with kc-agent, an MCP server that bridges coding agents to kubeconfig and Kubernetes APIs, plus 10+ built-in agent skills for development, testing, and operations.
brew tap kubestellar/tap && brew install kc-agent
kc-agent
This bridges your kubeconfig to any MCP-compatible coding agent.
The project ships with agent skills accessible via CLAUDE.md and AGENTS.md:
kc-agent bridges your kubeconfig to MCP-compatible agents. If your kubeconfig carries cluster-admin or write permissions, agents will inherit those capabilities. Always use a least-privilege RBAC context.kc-agent to least-privilege read-only RBAC before using it with an agent:
kubectl create clusterrole kc-agent-readonly --verb=get,list,watch --resource='*'
kubectl create clusterrolebinding kc-agent-readonly --clusterrole=kc-agent-readonly --serviceaccount=default:kc-agent
kc-agent on a public network without authentication.kc-agent) installed separately via Homebrew.