A practical agent skill pack for DevOps work in Claude Code and Codex.
npx skills add https://github.com/akin-ozer/cc-devops-skills --skill k8s-debugInstallez cette compétence avec la CLI et commencez à utiliser le flux de travail SKILL.md dans votre espace de travail.
A practical skill pack for DevOps work in Claude Code and Codex desktop.
This repository ships 31 skills:
k8s-debug) for cluster troubleshootingThe goal is simple: make infra and pipeline work faster without skipping correctness checks.
/plugin marketplace add akin-ozer/cc-devops-skills
/plugin install devops-skills@akin-ozer
Skills only:
$skill-installer install https://github.com/akin-ozer/cc-devops-skills/tree/main/devops-skills-plugin/skills
Manual plugin install:
git clone https://github.com/akin-ozer/cc-devops-skills.git ~/.codex/devops-skills
mkdir -p ~/plugins ~/.agents/plugins
ln -s ~/.codex/devops-skills/devops-skills-plugin ~/plugins/devops-skills
~/.agents/plugins/marketplace.json so Codex can discover the plugin:{
"name": "local-plugins",
"interface": {
"displayName": "Local Plugins"
},
"plugins": [
{
"name": "devops-skills",
"source": {
"source": "local",
"path": "./plugins/devops-skills"
},
"policy": {
"installation": "AVAILABLE",
"authentication": "ON_INSTALL"
},
"category": "Productivity"
}
]
}
If you already use ~/.agents/plugins/marketplace.json, append the devops-skills entry instead of replacing the file.
The packaged Codex manifest lives at devops-skills-plugin/.codex-plugin/plugin.json. It exists alongside the Claude manifest and points at the same skills/ directory.
Add this to project-level .claude/settings.json:
{
"extraKnownMarketplaces": {
"devops-skills": {
"source": {
"source": "github",
"repo": "akin-ozer/cc-devops-skills"
}
}
}
}
This repository also publishes a drop-in wrapper around anthropics/claude-code-action@v1.
Replace:
uses: anthropics/claude-code-action@v1
With:
uses: akin-ozer/cc-devops-skills@v1
Behavior stays compatible with upstream v1, and DevOps skills are injected by default through:
https://github.com/akin-ozer/cc-devops-skills.gitdevops-skills@akin-ozerTag policy:
akin-ozer/cc-devops-skills@v1 tracks this wrapper's latest v1.x.y release.anthropics/claude-code-action@v1 (tag), not a pinned SHA.To run as pure passthrough (no auto-injection):
uses: akin-ozer/cc-devops-skills@v1
with:
inject_devops_skills: "false"
Docs and examples:
docs/drop-in-wrapper.mdexamples/github-actions/iac-pr-review.ymlscripts/check_upstream_action_surface.shMost workflows are generator + validator loops.
flowchart LR
A["Ask for generator skill"] --> B["Create artifact"]
B --> C["Run matching validator"]
C --> D{"Passes checks?"}
D -- "No" --> E["Patch + re-run checks"]
D -- "Yes" --> F["Ship to PR/CI"]
Typical prompts:
Use terraform-generator to scaffold a reusable AWS VPC module with outputs and examples.
Validate ./infra/vpc with terraform-validator and list only high-severity findings.
Use k8s-debug to diagnose pods stuck in Pending in namespace payments.
scripts/ folders.terraform, tflint, checkov, helm, kubeconform, actionlint, and act.| Skill | Primary use |
|---|---|
ansible-generator |
Scaffold playbooks, roles, inventories, and vars |
ansible-validator |
Validate/lint/security-check playbooks, roles, and inventories |
terraform-generator |
Generate Terraform modules/resources/variables/outputs |
terraform-validator |
Run Terraform validation, linting, security audit, and planning |
terragrunt-generator |
Scaffold Terragrunt root/child/stack layouts |
terragrunt-validator |
Validate Terragrunt HCL, stacks, and module wiring |
| Skill | Primary use |
|---|---|
azure-pipelines-generator |
Generate azure-pipelines.yml and reusable templates |
azure-pipelines-validator |
Validate syntax/security/best-practice rules for Azure Pipelines |
github-actions-generator |
Scaffold workflows and action.yml actions |
github-actions-validator |
Validate and test workflows under .github/workflows |
gitlab-ci-generator |
Generate .gitlab-ci.yml pipelines and job stages |
gitlab-ci-validator |
Validate and secure GitLab CI configs |
jenkinsfile-generator |
Generate declarative/scripted Jenkinsfiles |
jenkinsfile-validator |
Validate Jenkinsfiles and shared-library pipeline code |
| Skill | Primary use |
|---|---|
dockerfile-generator |
Create production-friendly Dockerfiles |
dockerfile-validator |
Lint and security-check Dockerfiles |
helm-generator |
Scaffold Helm charts, values, and templates |
helm-validator |
Validate chart structure, templates, schemas, and CRD usage |
k8s-yaml-generator |
Generate Kubernetes manifests (including CRDs) |
k8s-yaml-validator |
Validate/lint/dry-run Kubernetes YAML |
k8s-debug |
Troubleshoot runtime cluster failures |
| Skill | Primary use |
|---|---|
fluentbit-generator |
Generate Fluent Bit pipelines (INPUT/FILTER/OUTPUT) |
fluentbit-validator |
Validate Fluent Bit config quality and safety |
logql-generator |
Build LogQL queries and alert expressions |
loki-config-generator |
Generate Loki server configs for common deployment modes |
promql-generator |
Generate PromQL queries, recording rules, and alerts |
promql-validator |
Validate and optimize PromQL queries/alerts |
| Skill | Primary use |
|---|---|
bash-script-generator |
Create shell scripts and CLI helpers |
bash-script-validator |
Validate shell scripts with ShellCheck-oriented checks |
makefile-generator |
Generate Makefiles with reusable targets |
makefile-validator |
Validate Makefile correctness and anti-patterns |
These are real execution patterns inside the skill instructions and scripts:
| Skill | Validation pattern |
|---|---|
terraform-validator |
terraform fmt -> tflint -> terraform validate -> Checkov -> optional terraform plan |
k8s-yaml-validator |
CRD detection -> kubeconform schema checks -> kubectl --dry-run flow |
helm-validator |
helm lint -> helm template -> kubeconform -> optional cluster dry-run |
github-actions-validator |
actionlint static checks + act runtime workflow tests |
gitlab-ci-validator |
syntax + best-practice + security checks with strict/test-only modes |
ansible-validator |
syntax/lint/check-mode + role tests + security checks |
dockerfile-validator |
scripted lint/security path with fallback scanning modes |
You do not need every tool for every skill. Install the tools for the domains you use.
bashpython3 (3.8+ recommended; 3.9+ for some security tooling)| Domain | Common tools |
|---|---|
| Terraform/Terragrunt | terraform, tflint, terragrunt, checkov |
| Kubernetes/Helm | kubectl, kubeconform, helm, yamllint |
| Docker | hadolint |
| GitHub Actions | actionlint, act |
| Shell scripting | shellcheck |
| Prometheus | promtool |
brew install terraform tflint terragrunt helm kubeconform kubectl hadolint
brew install actionlint act shellcheck prometheus yq fluent-bit
pipx install ansible ansible-lint checkov yamllint molecule
helm plugin install https://github.com/databus23/helm-diff
cc-devops-skills/
├── action.yml
├── README.md
├── LICENSE
├── docs/
│ └── drop-in-wrapper.md
├── examples/
│ └── github-actions/
│ └── iac-pr-review.yml
├── scripts/
│ └── check_upstream_action_surface.sh
├── .github/workflows/
│ └── compat-check.yml
└── devops-skills-plugin/
├── .claude-plugin/plugin.json
├── .codex-plugin/plugin.json
└── skills/
└── <skill-name>/
├── SKILL.md
├── scripts/
├── references/
├── assets/
├── examples/
└── tests/ (or test/)
Contributions are welcome for:
Apache-2.0