Skip to content

Manifest & Deployment Tools

Tools for generating Kubernetes manifests, preparing clusters, and verifying deployments.

generate-k8s-manifests — Manifest Generation

Gathers insights and returns a structured plan with requirements for Kubernetes, Helm, ACA, or Kustomize manifest creation. The AI uses this plan to write the actual manifest files. Policies are evaluated during generation. Supports two modes: repository analysis (generate from source) and ACA conversion (convert Azure Container Apps YAML to Kubernetes).

InputRequiredDescription
repositoryPathOne requiredAbsolute path to the repository root (for generation from source)
acaManifestOne requiredAzure Container Apps manifest content to convert (YAML or JSON)
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
modulePathConditionalAbsolute path to module root — required when using repositoryPath
nameNoModule name (defaults to directory basename)
manifestTypeNoOutput format: kubernetes, helm, aca, or kustomize (default: kubernetes)
languageNoPrimary language (e.g., "java", "python")
languageVersionNoLanguage version
frameworkNoFramework (e.g., "spring", "django")
frameworksNoArray of { name, version } framework objects
buildSystemNoBuild system info: { type, configFile }
environmentNoTarget environment (production, development, etc.)
detectedDependenciesNoLibraries/features from analysis (e.g., ["redis", "health-checks"])
namespaceNoTarget Kubernetes namespace
portsNoPorts to expose
entryPointNoApplication entry point
targetPlatformNoDocker platform (e.g., linux/amd64). Defaults to linux/amd64
includeCommentsNoAdd comments in output (default: true, primarily for ACA conversions)
trafficLevelNoExpected traffic: high, medium, or low
criticalityTierNoCriticality: tier-1 to tier-3

Provide either repositoryPath + modulePath (generate from source) or acaManifest (convert ACA manifest), not both.

Output: Manifest plan with repository info, security considerations, resource management, best practices, knowledge matches, and policy validation results.


prepare-cluster — Cluster Setup

Prepares a Kubernetes cluster for deployment. For Kind clusters, creates a local cluster with a Docker registry. For generic clusters (AKS, EKS, GKE, minikube), validates connectivity and namespace readiness.

InputRequiredDescription
clusterTypeNokind (local cluster + registry) or generic (existing cluster). Inferred from environment if omitted
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
environmentNoTarget environment for knowledge filtering and policy context
namespaceNoKubernetes namespace to prepare
targetPlatformNoPlatform for cluster validation (e.g., linux/amd64). Defaults to linux/amd64
strictPlatformValidationNoFail if cluster architecture doesn't match target platform (default: true)

Output: Cluster status, namespace readiness, and for Kind clusters: localRegistryUrl for pushing images.


verify-deploy — Deployment Verification

Verifies a Kubernetes deployment is healthy after applying manifests. Checks pod status, service endpoints, ingress configuration, and health probe responses.

InputRequiredDescription
deploymentNameYesDeployment name to verify
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
namespaceNoKubernetes namespace (defaults to default)
checksNoChecks to run: pods, services, ingress, health (defaults to all)

Output: Status of each check — pod readiness, service endpoints, ingress rules, and health probe results.

Released under the MIT License.