CtrlK
BlogDocsLog inGet started
Tessl Logo

import-from-cluster

Use when the user has live Kubernetes resources already running in a cluster — applied by `kubectl apply`, installed via a different workflow, or inherited from a previous operator — and wants to bring them under ConfigHub management without a GitOps tool or a Helm chart in hand. Phrases like "adopt these existing resources into ConfigHub", "I have stuff in the cluster, how do I get it into cub?", "reverse engineer my namespace into Units", "import from the cluster", "cub unit import", "we kubectl-apply'd everything and want to migrate", or "bring the running state into ConfigHub". Creates Units pre-bound to a cluster Target, runs `cub unit import` with `--where-resource` filters to pull live manifests, then hands off to `config-as-data` doctrine for ongoing management. Do not load for Helm-installed charts (use `import-from-helm`), ArgoCD Applications (use `import-from-argocd`), Flux HelmReleases / Kustomizations (use `import-from-flux`), or new YAML being authored from scratch (use `config-as-data`).

89

Quality

88%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that excels across all dimensions. It provides rich, natural trigger phrases, clearly states what the skill does with specific CLI commands and workflows, explicitly defines when to use it and when not to, and carefully distinguishes itself from four related skills. The negative boundary conditions ('Do not load for...') are particularly valuable for avoiding conflicts in a large skill library.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: creates Units pre-bound to a cluster Target, runs `cub unit import` with `--where-resource` filters to pull live manifests, then hands off to `config-as-data` doctrine for ongoing management.

3 / 3

Completeness

Clearly answers both 'what' (creates Units, runs cub unit import with filters, pulls live manifests) and 'when' (explicit 'Use when' clause at the start with detailed trigger scenarios). Also includes explicit 'Do not load for' exclusions which further clarify when to use it.

3 / 3

Trigger Term Quality

Excellent coverage of natural phrases users would say: 'adopt these existing resources into ConfigHub', 'reverse engineer my namespace into Units', 'import from the cluster', 'cub unit import', 'bring the running state into ConfigHub', 'we kubectl-apply'd everything and want to migrate'. These are realistic, varied phrasings.

3 / 3

Distinctiveness Conflict Risk

Exceptionally distinctive — explicitly delineates boundaries by listing four specific skills to use instead for Helm charts, ArgoCD, Flux, and new YAML authoring. The niche of importing already-running Kubernetes resources without a GitOps tool is very clearly carved out.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a strong, well-structured skill that provides a clear end-to-end workflow for importing live Kubernetes resources into ConfigHub. Its greatest strengths are the concrete CLI examples, the explicit dry-run validation loop, comprehensive stop conditions, and the verify chain. Minor weaknesses include some redundancy with the frontmatter description in the positioning/routing sections, and the inability to verify that referenced companion files actually exist in the bundle.

Suggestions

Trim the 'Positioning' and 'Do not load for' sections which largely duplicate the frontmatter description — a single sentence noting this is the last-resort import path would suffice.

Consider extracting the detailed `--where-resource` scoping examples and the granularity decision (one Unit per workload vs per kind) into a referenced file to keep the main skill leaner.

DimensionReasoningScore

Conciseness

The skill is reasonably efficient but includes some unnecessary framing (e.g., the 'Positioning: this is an onboarding tool' section restates what the description already conveys, and some explanatory prose like 'This skill targets users with existing cluster state' could be trimmed). The 'Do not load for' section partially duplicates the frontmatter description. However, most content earns its place — the scoping examples, workflow steps, and stop conditions are all valuable.

2 / 3

Actionability

The skill provides fully executable CLI commands throughout — `cub unit create`, `cub unit import --dry-run`, `cub unit import --wait`, `cub unit get -o yaml`, and concrete `--where-resource` filter expressions with multiple realistic examples. Every step in the workflow has a copy-paste-ready command with placeholder patterns that are clear and consistent.

3 / 3

Workflow Clarity

The 6-step loop is clearly sequenced with explicit validation checkpoints: preflight gates before starting, a mandatory dry-run step (step 2) with specific things to check, a review step (step 4) with concrete items to scan for, and a verify chain at the end with 5 numbered verification commands. The stop conditions section provides clear feedback loops for error recovery, and the dry-run-then-tighten pattern is an explicit iterate-until-correct loop.

3 / 3

Progressive Disclosure

The skill references many companion skills and reference files (e.g., `references/functions-catalog.md`, `references/yaml-patterns.md`, `import-unit-granularity`, `worker-bootstrap`) which is good navigation, but no bundle files are provided to verify these exist. The main content is fairly long (~180 lines of substantive content) and some sections like the detailed scoping examples or the granularity decision could potentially be split out. The references section at the end is well-organized.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
confighub/confighub-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.