Production-ready AI skills and automation for Red Hat platforms — install specialized plugins for SREs, developers, platform administrators, and AI engineers working with RHEL, OpenShift, and Red Hat automation platforms.
Install collections using Lola, the AI skills package manager. Installation applies to the current folder only — run commands from your project directory.
lola market add rh-agentic-collections https://raw.githubusercontent.com/RHEcosystemAppEng/agentic-collections/main/marketplace/rh-agentic-collection.ymllola install -f rh-srefor m in ocp-admin rh-ai-engineer rh-automation rh-developer rh-sre rh-virt; do lola install -f $m; doneUse the -a option to target Claude Code or Cursor:
lola install -f rh-sre -a claude-code # Claude Code only
lola install -f rh-sre -a cursor # Cursor onlylola market add rh-agentic-collections https://raw.githubusercontent.com/RHEcosystemAppEng/agentic-collections/main/marketplace/rh-agentic-collection.yml# For Site Reliability Engineers
lola install -f rh-sre
# For Developers
lola install -f rh-developer
# For OpenShift Administrators
lola install -f ocp-admin
# For Virtualization Administrators
lola install -f rh-virt
# For AI/ML Engineers
lola install -f rh-ai-engineer
# For Ansible Automation Platform Engineers
lola install -f rh-automationSee each module's README for available skills and usage examples.
for m in ocp-admin rh-ai-engineer rh-automation rh-developer rh-sre rh-virt; do lola install -f $m; doneNote: Re-run lola install -f <module> anytime to pick up newer module content after marketplace updates.
7 persona-focused plugins with 60+ production-ready skills:
| Plugin | Version | Skills | Description | Personas |
|---|---|---|---|---|
| rh-sre | 1.0.0 | 13 | CVE remediation, system compliance, RHEL automation | Site Reliability Engineers |
| rh-developer | 1.0.0 | 14 | Application deployment, S2I builds, Helm charts | Application Developers |
| openshift-virtualization | 1.0.0 | 10 | VM lifecycle, snapshots, migrations, cloning | Virtualization Admins |
| ocp-admin | 1.0.0 | 3 | Multi-cluster management, health reports, monitoring | OpenShift Administrators |
| rh-ai-engineer | 1.0.0 | 12 | Model serving, vLLM, KServe, NVIDIA NIM | AI/ML Engineers |
| rh-automation | 1.0.0 | 11 | Ansible Automation Platform governance, safety checks | Automation Leads |
| rh-support-engineer | 1.0.0 | 0* | Technical support and troubleshooting | Support Engineers |
Total: 63 skills across 7 plugins | License: Apache 2.0 | Status: Production Ready
* Coming soon
-
Claude Code (latest version recommended)
- Desktop app (claude.ai/code)
- VS Code extension, JetBrains extension, or Web app
- CLI tool
-
Container Runtime (Podman or Docker)
- Required for MCP servers used by most plugins
- Podman (recommended for Linux):
sudo dnf install podman - Docker Desktop (macOS/Windows): docker.com
-
Network Access
- Internet connectivity for marketplace installation
- Access to container registries (quay.io, registry.redhat.io)
- Access to Red Hat platforms (depending on plugins used)
Each plugin has additional requirements:
- Credentials: Red Hat API keys, cluster kubeconfigs, service tokens
- Platform Access: OpenShift clusters, RHEL systems, Ansible Automation Platform
- Permissions: Cluster admin, namespace edit, or view roles
See each plugin's README for detailed requirements and setup instructions.
- 🎯 Role-Specific: Each plugin is designed for specific personas and workflows
- 🔒 Security First: Credential handling, human-in-the-loop for destructive operations
- 🔧 Production Ready: 60+ skills validated against design principles
- 📚 Documentation: AI-optimized docs with semantic indexing (rh-sre reference)
- 🔌 MCP Integration: Red Hat Lightspeed, Ansible Automation Platform servers
- ✅ Quality Assured: Automated compliance checks and specification linting
Want to add your own skill to the marketplace? We've made it easy with our interactive skill builder!
Use the /agentic-contribution-skill skill to create production-ready skills with automated validation, or contribute manually following our design principles. The skill builder guides you through discovery, definition, generation, validation, and git workflow - no prior experience needed!
📖 See the complete guide: CONTRIBUTING.md
View the interactive documentation at: https://rhecosystemappeng.github.io/agentic-collections
The site provides:
- Agentic Collections: Browse all available collections, skills, and agents with detailed descriptions
- MCP Servers: Explore MCP server configurations and integration details
- Search: Find collection, skills, agents, and servers by keyword across all content
The documentation tools use uv for fast, isolated Python environment management:
# Install uv (one-time setup)
curl -LsSf https://astral.sh/uv/install.sh | sh
# Or on macOS with Homebrew
brew install uvGenerate and view documentation locally:
# Install dependencies (first time only)
make install
# Validate pack structure + collection compliance (COLLECTION_SPEC.md, catalog/schema.yaml)
make validate
# Optional: collection-only targets
# make validate-collection-schema
# make validate-collection-compliance
# make catalog-mirror-json # refresh .catalog/collection.json from YAML
# Validate skills against Design Principles (SKILL_DESIGN_PRINCIPLES.md)
# Validate only changed skills (staged + unstaged) - recommended for local dev:
make validate-skill-design-changed
# Or validate all skills / a specific pack:
make validate-skill-design
make validate-skill-design PACK=rh-sre
# Generate docs/data.json
make generate
# Start local server at http://localhost:8000
make serve
# Or run full test suite with auto-open
make test-fullUpdates are automatically deployed to GitHub Pages when changes are pushed to main.
For more details, see docs/README.md.
Use the validate-skill-design and validate-skill-design-changed targets to check skills against the Design Principles referenced from CLAUDE.md. CI runs this validation automatically on pull requests and pushes to main, but only for changed skills. For local development, run validate-skill-design-changed to validate only your modified skills (staged + unstaged). To perform full validation or validate a specific pack, run validate-skill-design. Ensure compliance with:
- Document consultation transparency (DP1)
- Parameter specification and ordering (DP2)
- Description conciseness (DP3)
- Dependencies declaration (DP4)
- Human-in-the-loop requirements for critical operations (DP5)
- Mandatory sections (Prerequisites, When to Use, Workflow) (DP6)
- Credential security (no
echo $VARexposure) (DP7)
# Validate only changed skills (staged + unstaged) - recommended for local dev
make validate-skill-design-changed
# Validate all packs
make validate-skill-design
# Validate a specific pack only
make validate-skill-design PACK=rh-sre
# Treat warnings as errors
uv run python scripts/validate_skill_design.py --warnings-as-errors
This repository uses gitleaks and the pre-commit framework to block accidental secrets and to run scoped validation before commits.
# One-time: Python deps + dev tools (includes pre-commit), then install the git hook
make install
scripts/install-hooks.shscripts/install-hooks.sh runs uv sync / uv sync --group dev, ensures gitleaks is available when possible, then uv run pre-commit install. It backs up a non–pre-commit .git/hooks/pre-commit (for example an old gitleaks-only hook) before replacing it.
On commit, hooks defined in .pre-commit-config.yaml run: gitleaks, make validate when catalog/roster-related paths change, and make validate-skill-design-changed when pack skills/*/SKILL.md files change. CI still enforces the full checks in .github/workflows/compliance-check.yml (make validate and related jobs).
- API keys: OpenAI, GitHub, AWS, Google Cloud
- Private keys: SSH, SSL/TLS certificates
- Hardcoded credentials in
mcps.jsonfiles - Database connection strings with passwords
- JWT tokens and authentication secrets
✅ CORRECT - Use environment variable references:
{
"env": {
"LIGHTSPEED_CLIENT_ID": "${LIGHTSPEED_CLIENT_ID}",
"LIGHTSPEED_CLIENT_SECRET": "${LIGHTSPEED_CLIENT_SECRET}"
}
}❌ BLOCKED - Hardcoded values:
{
"env": {
"LIGHTSPEED_CLIENT_SECRET": "sk-proj-abc123..."
}
}# Scan entire repository history
gitleaks detect --source . --verbose
# Scan only staged changes
gitleaks protect --stagedSee SECURITY.md for details.
To add a new MCP server to an agentic pack and display it on the documentation site:
Add the server configuration to <pack>/mcps.json:
{
"mcpServers": {
"your-server-name": {
"command": "podman|docker|npx",
"args": ["run", "--rm", "-i", "..."],
"env": {
"VAR_NAME": "${VAR_NAME}" // Always use env var references
},
"description": "Brief description of the MCP server",
"security": {
"isolation": "container",
"network": "local",
"credentials": "env-only|none"
}
}
}
}Security Requirements:
- ✅ Always use
${ENV_VAR}references for credentials - ❌ Never hardcode API keys, tokens, or secrets
- ✅ Set appropriate security isolation level
Platform Notes (Linux vs macOS):
On Linux, you may want to add --userns=keep-id:uid=65532,gid=65532 to the Podman args for proper UID/GID mapping inside the container. This ensures the container process runs with the correct non-root user identity.
On macOS, this flag is not supported because Podman runs inside a Linux VM where user namespace mapping behaves differently. Omit it on macOS or the container will fail to start.
To display repository links and tool descriptions on the documentation site, add an entry to docs/mcp.json:
{
"your-server-name": {
"repository": "https://github.com/org/repo",
"tools": [
{
"name": "tool_name",
"description": "What this tool does and when to use it"
}
]
}
}Fields:
repository: GitHub repository URL (appears as README badge on server card)tools: Array of tool objects with name and description (displayed in server details modal)
Regenerate the documentation site data:
make generateThis will:
- Parse the
mcps.jsonfile from your pack - Merge it with custom data from
docs/mcp.json - Update
docs/data.jsonwith the new server
Test the changes locally:
make serveVisit http://localhost:8000 and verify:
- Server appears in MCP Servers section
- Server card shows correct information
- README badge appears (if repository URL provided)
- Tools count displays (if tools provided)
- Details modal shows all configuration
git add <pack>/mcps.json docs/mcp.json docs/data.json
git commit -m "feat: add <server-name> MCP server to <pack>"
git pushThe documentation site will automatically update via GitHub Actions.
File: rh-sre/mcps.json
{
"mcpServers": {
"lightspeed-mcp": {
"command": "podman",
"args": ["run", "--rm", "-i",
"--env", "LIGHTSPEED_CLIENT_ID",
"--env", "LIGHTSPEED_CLIENT_SECRET",
"quay.io/redhat-services-prod/insights-mcp:latest"],
"env": {
"LIGHTSPEED_CLIENT_ID": "${LIGHTSPEED_CLIENT_ID}",
"LIGHTSPEED_CLIENT_SECRET": "${LIGHTSPEED_CLIENT_SECRET}"
},
"description": "Red Hat Lightspeed MCP server for CVE data and remediation",
"security": {
"isolation": "container",
"network": "local",
"credentials": "env-only"
}
}
}
}File: docs/mcp.json
{
"lightspeed-mcp": {
"repository": "https://github.com/RedHatInsights/insights-mcp",
"tools": [
{
"name": "vulnerability__get_cves",
"description": "Get list of CVEs affecting the account"
},
{
"name": "vulnerability__get_cve",
"description": "Get details about specific CVE"
}
]
}
}Server not appearing:
- Run
make validateto check for JSON syntax errors - Verify
mcps.jsonfile is in the pack directory - Check that pack directory is listed in
scripts/generate_pack_data.pyPACK_DIRS
Tools not showing:
- Ensure
docs/mcp.jsonhas entry for your server - Verify tool objects have both
nameanddescriptionfields - Regenerate with
make generate
Security errors:
- Check for hardcoded credentials with
gitleaks protect --staged - Ensure all env values use
${VAR}format - Review security isolation settings
Test the marketplace locally before publishing:
cd /path/to/agentic-collections
lola market add rh-agentic-collections ./marketplace/rh-agentic-collection.ymllola install -f rh-sre# Structure, mcps.json, CLAUDE.md, skill frontmatter; validates plugin.json only when present
make validateIf you use the Claude Code /plugin marketplace workflow against a local checkout:
claude plugin validate .
# Or from within Claude Code
/plugin validate .That CLI checks marketplace/plugin manifests for that workflow, including plugin.json when present under .claude-plugin/.
- Documentation Site: Browse all collections, skills, and MCP servers
- CLAUDE.md: Repository structure and development workflow
- Skill Design Principles: Quality guidelines for skills
- VALIDATION_REPORT.md: Marketplace compliance verification
- Security Policy: Credential handling and vulnerability reporting
Apache License 2.0 - see LICENSE for details.
Maintained by: Red Hat Ecosystem Engineering
Questions? Open an issue or check the documentation site.