k8s-certsKubernetes certificate management with cert-manager. Use when managing TLS certificates, configuring issuers, or troubleshooting certificate issues.
Install via ClawdBot CLI:
clawdbot install rohitg00/k8s-certsManage TLS certificates using kubectl-mcp-server's cert-manager tools.
certmanager_detect_tool()
# List all certificates
certmanager_certificates_list_tool(namespace="default")
# Check certificate status
# - True: Certificate ready
# - False: Certificate not ready (check events)
certmanager_certificate_get_tool(
name="my-tls",
namespace="default"
)
# Shows:
# - Issuer reference
# - Secret name
# - DNS names
# - Expiry date
# - Renewal time
kubectl_apply(manifest="""
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: my-tls
namespace: default
spec:
secretName: my-tls-secret
issuerRef:
name: letsencrypt-prod
kind: ClusterIssuer
dnsNames:
- app.example.com
- www.example.com
""")
# Namespace issuers
certmanager_issuers_list_tool(namespace="default")
# Cluster-wide issuers
certmanager_clusterissuers_list_tool()
certmanager_issuer_get_tool(name="my-issuer", namespace="default")
certmanager_clusterissuer_get_tool(name="letsencrypt-prod")
# Staging (for testing)
kubectl_apply(manifest="""
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-staging
spec:
acme:
server: https://acme-staging-v02.api.letsencrypt.org/directory
email: admin@example.com
privateKeySecretRef:
name: letsencrypt-staging-key
solvers:
- http01:
ingress:
class: nginx
""")
# Production
kubectl_apply(manifest="""
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-prod
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: admin@example.com
privateKeySecretRef:
name: letsencrypt-prod-key
solvers:
- http01:
ingress:
class: nginx
""")
kubectl_apply(manifest="""
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: selfsigned
spec:
selfSigned: {}
""")
# List certificate requests
certmanager_certificaterequests_list_tool(namespace="default")
# Get request details (for debugging)
certmanager_certificaterequest_get_tool(
name="my-tls-xxxxx",
namespace="default"
)
1. certmanager_certificate_get_tool(name, namespace) # Check status
2. certmanager_certificaterequests_list_tool(namespace) # Check request
3. get_events(namespace) # Check events
4. # Common issues:
# - Issuer not ready
# - DNS challenge failed
# - Rate limited by Let's Encrypt
1. certmanager_clusterissuer_get_tool(name) # Check status
2. get_events(namespace="cert-manager") # Check events
3. # Common issues:
# - Invalid credentials
# - Network issues
# - Invalid configuration
# Automatic certificate via ingress annotation
kubectl_apply(manifest="""
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: my-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
spec:
tls:
- hosts:
- app.example.com
secretName: app-tls
rules:
- host: app.example.com
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: my-service
port:
number: 80
""")
Generated Mar 1, 2026
An e-commerce company uses this skill to automatically provision and renew TLS certificates for their online storefronts using Let's Encrypt. It ensures secure HTTPS connections for customer transactions and integrates with Kubernetes Ingress for seamless deployment, reducing manual certificate handling and preventing downtime due to expired certificates.
A Software-as-a-Service provider leverages this skill to manage TLS certificates for multiple customer domains hosted on a shared Kubernetes cluster. It automates certificate creation and renewal via cert-manager issuers, ensuring each tenant's application has valid SSL/TLS certificates without manual intervention, enhancing security and scalability.
A financial institution implements this skill to set up a self-signed issuer for internal applications, managing TLS certificates for secure communication between microservices. It includes troubleshooting tools to monitor certificate status and events, ensuring compliance with internal security policies and maintaining high availability for critical financial systems.
A healthcare provider uses this skill to configure Kubernetes Ingress with automatic TLS certificate provisioning for patient portals. It integrates cert-manager with Let's Encrypt issuers to secure sensitive health data transmission, with tools to debug certificate readiness and issuer issues, ensuring HIPAA-compliant encryption and reliable access.
A media streaming company employs this skill to automate the renewal of TLS certificates for their content delivery endpoints. It uses cert-manager to handle large-scale certificate management across multiple clusters, with monitoring tools to check expiry dates and troubleshoot challenges, minimizing service interruptions during high-traffic events.
Cloud providers or DevOps consultancies offer managed Kubernetes services that include automated certificate management as a value-added feature. They use this skill to streamline TLS provisioning for clients, reducing operational overhead and ensuring security compliance, often charging a premium for enhanced support and reliability.
A company develops a DevOps platform that integrates this skill for certificate lifecycle management. They monetize by selling the platform to enterprises, providing tools for automated issuance, renewal, and troubleshooting, which reduces manual errors and improves security posture in CI/CD pipelines.
A security firm offers compliance-focused services that leverage this skill to manage TLS certificates for clients in regulated industries. They ensure certificates are properly configured and renewed, helping clients meet standards like PCI DSS or GDPR, and generate revenue through consulting and ongoing management contracts.
💬 Integration Tip
Integrate this skill with monitoring tools to alert on certificate expiry and use it alongside ingress controllers for automatic TLS setup in Kubernetes deployments.
Automatically update Clawdbot and all installed skills once daily. Runs via cron, checks for updates, applies them, and messages the user with a summary of what changed.
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Essential Docker commands and workflows for container management, image operations, and debugging.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Deploy applications and manage projects with complete CLI reference. Commands for deployments, projects, domains, environment variables, and live documentation access.
Monitor topics of interest and proactively alert when important developments occur. Use when user wants automated monitoring of specific subjects (e.g., product releases, price changes, news topics, technology updates). Supports scheduled web searches, AI-powered importance scoring, smart alerts vs weekly digests, and memory-aware contextual summaries.