Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Kubernetes certificate management with cert-manager. Use when managing TLS certificates, configuring issuers, or troubleshooting certificate issues.
Kubernetes certificate management with cert-manager. Use when managing TLS certificates, configuring issuers, or troubleshooting certificate issues.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Manage TLS certificates using kubectl-mcp-server's cert-manager tools.
certmanager_detect_tool()
# List all certificates certmanager_certificates_list_tool(namespace="default") # Check certificate status # - True: Certificate ready # - False: Certificate not ready (check events)
certmanager_certificate_get_tool( name="my-tls", namespace="default" ) # Shows: # - Issuer reference # - Secret name # - DNS names # - Expiry date # - Renewal time
kubectl_apply(manifest=""" apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: my-tls namespace: default spec: secretName: my-tls-secret issuerRef: name: letsencrypt-prod kind: ClusterIssuer dnsNames: - app.example.com - www.example.com """)
# Namespace issuers certmanager_issuers_list_tool(namespace="default") # Cluster-wide issuers certmanager_clusterissuers_list_tool()
certmanager_issuer_get_tool(name="my-issuer", namespace="default") certmanager_clusterissuer_get_tool(name="letsencrypt-prod")
# Staging (for testing) kubectl_apply(manifest=""" apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: letsencrypt-staging spec: acme: server: https://acme-staging-v02.api.letsencrypt.org/directory email: admin@example.com privateKeySecretRef: name: letsencrypt-staging-key solvers: - http01: ingress: class: nginx """) # Production kubectl_apply(manifest=""" apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: letsencrypt-prod spec: acme: server: https://acme-v02.api.letsencrypt.org/directory email: admin@example.com privateKeySecretRef: name: letsencrypt-prod-key solvers: - http01: ingress: class: nginx """)
kubectl_apply(manifest=""" apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: selfsigned spec: selfSigned: {} """)
# List certificate requests certmanager_certificaterequests_list_tool(namespace="default") # Get request details (for debugging) certmanager_certificaterequest_get_tool( name="my-tls-xxxxx", namespace="default" )
1. certmanager_certificate_get_tool(name, namespace) # Check status 2. certmanager_certificaterequests_list_tool(namespace) # Check request 3. get_events(namespace) # Check events 4. # Common issues: # - Issuer not ready # - DNS challenge failed # - Rate limited by Let's Encrypt
1. certmanager_clusterissuer_get_tool(name) # Check status 2. get_events(namespace="cert-manager") # Check events 3. # Common issues: # - Invalid credentials # - Network issues # - Invalid configuration
# Automatic certificate via ingress annotation kubectl_apply(manifest=""" apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: my-ingress annotations: cert-manager.io/cluster-issuer: letsencrypt-prod spec: tls: - hosts: - app.example.com secretName: app-tls rules: - host: app.example.com http: paths: - path: / pathType: Prefix backend: service: name: my-service port: number: 80 """)
k8s-networking - Ingress configuration k8s-security - Security best practices
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.