qovery-skills
Health Warn
- No license — Repository has no license file
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Fail
- rm -rf — Recursive force deletion command in install.sh
Permissions Pass
- Permissions — No dangerous permissions requested
This tool provides AI agent skills for deploying and troubleshooting applications on Kubernetes via the Qovery platform. It integrates with AI coding assistants like Claude Code and Cursor to automate infrastructure management.
Security Assessment
The tool operates by piping a remote shell script directly into bash (`curl | bash`), which inherently executes arbitrary code on your machine. The installation script contains a recursive force deletion command (`rm -rf`), which is a double-edged sword: useful for clean uninstalls, but capable of causing severe file system damage if the script behaves unexpectedly or is compromised. Because it is designed to deploy applications and provision databases, it will necessarily handle sensitive deployment credentials, API tokens, and make active network requests to Qovery's servers. No hardcoded secrets were found in the repository itself, and it does not request overly broad OS permissions. However, piping remote scripts as root or sudo poses a significant supply chain risk. Overall risk is rated as High.
Quality Assessment
The project is highly active, with its last code push occurring just today. However, it suffers from low community visibility and trust, currently sitting at only 5 GitHub stars. There is a discrepancy in its documentation: the README displays an MIT license badge, but the automated health scan failed to find an actual license file in the repository. This creates legal ambiguity regarding how the code can be used or modified.
Verdict
Use with caution — while actively maintained, the combination of low community trust, unverified licensing, and the execution of remote shell scripts containing destructive `rm -rf` commands requires you to thoroughly inspect the installer script before running it.
AI agent skills for deploying applications to Kubernetes with Qovery. Works with OpenCode, Claude Code, and any agent supporting SKILL.md.
Qovery Skills
AI agent skills for deploying and troubleshooting applications on Kubernetes using Qovery. Compatible with 30+ AI coding tools that support the Agent Skills open standard.
| Skill | What it does |
|---|---|
| qovery-onboard | Guided onboarding — acts as a personal cloud architect, understands your role/experience/constraints, recommends and sets up the optimal Qovery config (cloud provider, cluster, environments, RBAC, security, cost defaults), handles BYOK and platform migrations |
| qovery-deploy | Deploy any application to Kubernetes — analyzes codebases, creates Dockerfiles, provisions databases, deploys via CLI+API or Terraform |
| qovery-troubleshoot | Diagnose and fix deployment failures, crashes, connectivity issues, performance problems — with MCP Server integration and runbook generation |
| qovery-optimize | Optimize costs and right-size resources — analyzes historical consumption, understands business context (seasonal, growth), estimates cloud costs, generates detailed reports with CSV export |
| qovery-speedup | Speed up deployments — measures pipeline timeline, identifies bottlenecks (build, startup, health check, scheduling), classifies user vs Qovery responsibility, proposes Dockerfile and config fixes |
| qovery-preview | Create preview environments from PRs — detects/creates blueprint environments, clones for each PR, switches branches, configures auto-shutdown (stop/delete/recycle), provides cleanup. Includes /qovery-preview slash command |
Quick Install
One command — installs both skills globally for all your projects:
curl -fsSL https://skill.qovery.com/install.sh | bash
Install in the current project only:
curl -fsSL https://skill.qovery.com/install.sh | bash -s -- --project
Uninstall:
curl -fsSL https://skill.qovery.com/install.sh | bash -s -- --uninstall
That's it. The installer automatically places both skills in all the right directories so they're discovered by any compatible tool.
Update to the latest version — just run the install command again. It overwrites the previous versions:
curl -fsSL https://skill.qovery.com/install.sh | bash
Compatible Tools
This skill follows the Agent Skills open standard and works with:
| Tool | Status |
|---|---|
| Claude Code | Supported |
| OpenCode | Supported |
| Cursor | Supported |
| VS Code Copilot | Supported |
| Gemini CLI | Supported |
| Roo Code | Supported |
| Goose | Supported |
| Amp | Supported |
| Junie (JetBrains) | Supported |
| Kiro | Supported |
| OpenHands | Supported |
| OpenAI Codex | Supported |
| Mistral Vibe | Supported |
| TRAE | Supported |
And any other tool that discovers skills from .claude/skills/ or .agents/skills/ directories.
What it does
qovery-onboard
When you tell your AI agent "I'm new to Qovery, help me get started":
- Understands who you are — asks about your role (developer, DevOps, CTO, founder, non-technical), experience level with cloud infrastructure, and whether you know what Kubernetes is
- Understands what you have — existing cloud provider account, existing K8s cluster (BYOK path), applications to deploy, migration from another platform
- Understands what you need — primary goal, industry compliance (HIPAA, PCI-DSS, SOC2, GDPR), constraints (region, budget, private networking), team size
- Recommends the optimal setup — cloud provider + region, cluster type (managed or BYOK), environment structure (dev/staging/prod), security defaults, cost defaults, RBAC roles
- Executes the full setup with Console links at every step — cloud credentials, cluster creation (with progress updates while waiting), project/environments, deployment rules, git provider connection
- Invites team members with appropriate RBAC roles (Admin, DevOps, Viewer, or custom roles for enterprise)
- Handles BYOK (Bring Your Own Kubernetes) — guides through
qovery cluster installfor existing clusters - Handles migrations — detailed guides for Heroku (env var import via
qovery env parse --heroku-json, concept mapping, FAQ), Vercel/Netlify, Render/Railway, and manual Kubernetes - Encodes best practices by default — private databases, internal networking, secrets encryption, deployment stages, deployment rules for cost savings — NOT optional recommendations, but the default setup
qovery-deploy
When you tell your AI agent "deploy my application with Qovery":
- Analyzes your codebase — detects language, framework, ports, database needs, environment variables
- Creates a Dockerfile if one is missing — production-ready templates for 12+ frameworks
- Asks the right questions — dev vs production, database type, deployment method
- Sets up infrastructure — cluster creation from scratch if needed (AWS, GCP, Azure, Scaleway)
- Deploys via CLI + API (quick path) or Terraform provider (recommended for production)
- Provisions databases — container mode for dev/test, managed mode (e.g. AWS RDS) for production, or Terraform services for advanced setups like RDS Aurora
- Sets up environment variables, secrets, service interconnection, health checks, deployment stages
- Handles Helm charts, Terraform modules, lifecycle jobs, and cron jobs
- Watches deployments and auto-fixes failures — diagnoses build errors, port mismatches, health check failures, missing env vars, and OOM issues
qovery-troubleshoot
When you tell your AI agent "my Qovery deployment is failing, can you help?":
- Integrates with the Qovery MCP Server for fast, structured diagnostics (falls back to CLI/API if MCP is not configured)
- Runs an 8-layer systematic diagnosis — deployment status, build logs, runtime logs, health checks, environment variables, network/connectivity, resources/performance, cluster infrastructure
- Matches 20+ error patterns — OOM kills, crash loops, connection refused, missing env vars, port mismatches, DNS failures, auth errors, database issues, and more
- Includes 10 pre-built playbooks — App Won't Start, App Is Slow, Database Connection Fails, Deployment Stuck, Custom Domain Not Working, Terraform/Helm Errors, High Costs, OOM/Resource Exhaustion, Build Failing
- Auto-fixes Qovery configuration (ports, health checks, memory, CPU, env vars, deployment stages) without permission; asks before modifying user code
- Generates runbooks in
.qovery/runbooks/to document what happened and how it was fixed — builds institutional knowledge over time - Provides prevention recommendations tailored to the specific issue that was fixed
qovery-optimize
When you tell your AI agent "optimize my Qovery costs":
- Gathers business context first — asks about application type, traffic patterns (seasonal spikes, business-hours, steady), growth expectations, and reliability requirements before touching any metrics
- Analyzes historical resource consumption — compares allocated CPU/memory vs actual peak usage over 7-day and 30-day windows, with safety buffers adjusted by environment type
- Analyzes 7 optimization dimensions — service right-sizing, autoscaling, database mode, environment scheduling, cluster optimization (spot instances, instance types), build optimization, external resource costs
- Estimates external cloud resource costs — calculates costs for RDS, ElastiCache, NAT Gateways, load balancers, and other infrastructure from configuration parameters and public cloud pricing, with clear methodology disclaimers
- Generates detailed cost reports — markdown report with executive summary, per-cluster/environment/service breakdown, external resource estimates, and sorted recommendations with expected savings and risks. Also generates CSV for spreadsheet analysis
- Applies changes via the right tool — uses Qovery API for immediate changes or generates Terraform diffs if the user manages infrastructure as code. Asks the user which tool they prefer
- Accounts for seasonal patterns — never right-sizes below seasonal peaks, recommends pre-scaling before known peaks, suggests post-peak review
- Offers Kubecost deployment for ongoing real-time cost visibility, and suggests sharing the report with Qovery support for professional review
qovery-speedup
When you tell your AI agent "my deployments are slow, can you speed them up?":
- Measures the full deployment pipeline using the V2 deployment history API — total time, per-stage, per-service, with structured durations
- Breaks down sub-step timing by parsing deployment logs: git clone, Docker build, image push, pod scheduling, app startup, health check pass
- Generates build runner usage reports (Grafana snapshots showing CPU, memory, network I/O during builds) using the deployment build usage API
- Classifies each bottleneck as user-controllable or Qovery infrastructure — clear ownership for every slow step
- Proposes Dockerfile optimizations — layer ordering,
.dockerignore, multi-stage builds, build cache mounts, alpine base images, dev dependency removal (10+ patterns with before/after diffs) - Tunes health check configuration — right-sizes
initial_delay_seconds,period_seconds, andfailure_thresholdbased on actual measured startup time - Optimizes deployment stage parallelism — identifies independent services in serial stages that can run in parallel
- Optimizes container image pull time — image size reduction, layer sharing between services, registry proximity
- Generates diagnostic reports for Qovery support when the bottleneck is infrastructure-side (queue time, build runner capacity, registry push, Karpenter scheduling)
Usage
Just ask your AI agent:
I'm new to Qovery, help me get started
Deploy my application with Qovery
My Qovery deployment is failing, can you help?
The onboard skill acts as your personal cloud architect. The deploy skill handles application deployment. The troubleshoot skill diagnoses and fixes issues.
Prompts that trigger qovery-onboard:
- "I'm new to Qovery, help me get started"
- "Set up Qovery for my organization"
- "Help me onboard onto Qovery"
- "I have an existing Kubernetes cluster, can I use Qovery?"
- "I'm migrating from Heroku to Qovery"
- "Configure Qovery for my company"
Prompts that trigger qovery-deploy:
- "Deploy my application with Qovery"
- "Set up Qovery for my project"
- "Deploy this to Kubernetes with Qovery"
- "Create a Qovery Terraform configuration for my app"
Prompts that trigger qovery-troubleshoot:
- "My deployment is failing"
- "My app is crashing on Qovery"
- "Why is my application not working?"
- "My database connection is failing"
- "My app is slow / out of memory"
- "My cluster is not responding"
Prompts that trigger qovery-optimize:
- "Optimize my Qovery costs"
- "My cloud bill is too high"
- "Right-size my applications"
- "Are my services over-provisioned?"
- "How much is my infrastructure costing me?"
- "Generate a cost report"
Prompts that trigger qovery-speedup:
- "My deployments are slow"
- "Speed up my Qovery deployment"
- "Why does my deployment take so long?"
- "Optimize my build time"
- "My Docker build is slow"
- "My app takes too long to start"
Prompts that trigger qovery-preview:
- "Create a preview environment for the current branch"
- "Create a PR environment for PR-123"
- "Set up preview environments for my project"
- "I want to test my PR in isolation"
- "Preview this branch on Qovery"
/qovery-preview(slash command)
Prerequisites
Before deploying, you need:
- A Qovery account — sign up at console.qovery.com
- A Qovery API token — generate at Organization Settings > API Tokens (or let the skill generate one via the CLI)
- A Kubernetes cluster — AWS EKS, GCP GKE, Azure AKS, or Scaleway Kapsule
- A git repository connected to Qovery (GitHub, GitLab, or Bitbucket)
New account? The skill handles cluster creation from scratch — including cloud provider credential setup (AWS CloudFormation, GCP Cloud Shell, Azure Cloud Shell), cluster provisioning via the Qovery Console, API, or Terraform, and waiting for the cluster to be ready. It supports all four cloud providers.
Supported Frameworks
The skill includes production-ready Dockerfile templates for:
| Language | Frameworks |
|---|---|
| Node.js | Express, Fastify, NestJS |
| Next.js | SSR with standalone output |
| React / Vite | SPA served via nginx |
| Python | Flask, Django, FastAPI |
| Go | Any (net/http, Gin, Echo, Fiber, etc.) |
| Java | Spring Boot (Maven & Gradle) |
| Ruby | Rails |
| PHP | Laravel |
| .NET | ASP.NET Core |
If your framework is not listed, the agent will create a custom Dockerfile based on your project structure.
What the Skills Cover
qovery-onboard
| Phase | Description |
|---|---|
| 1. Understand the User | Role, experience level, K8s knowledge, existing cloud/cluster, apps to deploy, migration source, goal, compliance, constraints, team size |
| 2. Recommend Setup | Cloud provider + region, cluster type (managed/BYOK), environment structure, security defaults (baked in), cost defaults (baked in), RBAC roles |
| 3. Execute Setup | Cloud credentials, cluster creation (with Console links and progress), project/environments, deployment rules, git provider, team invitations |
| 4. BYOK Path | Prerequisites check, CLI install, qovery cluster install, verification, seamless continuation to project setup |
| 5. Migration | Heroku (detailed: concept mapping, Dockerfile, env var import, DB migration, FAQ), Vercel/Netlify, Render/Railway, manual K8s |
| 6. Next Steps | Persona-adapted next steps (bootstrapper vs platform team vs enterprise), reference all other skills, enterprise recommendations (RBAC, private networking, SSO) |
qovery-deploy
| Phase | Description |
|---|---|
| 1. Discovery | Asks questions to understand your project and deployment needs |
| 2. Prerequisites | CLI install, authentication, API token generation |
| 2B. Cluster Setup | Cloud provider credentials + cluster creation (AWS/GCP/Azure/Scaleway) — skipped if a cluster already exists |
| 3. Dockerfile | Creates missing Dockerfiles and .dockerignore files |
| 4. CLI + API | Quick deployment path using qovery CLI and curl API calls |
| 5. Terraform | Production path with complete .tf manifests (applications, databases, Helm, jobs, terraform services, deployment stages) |
| 6. Environment Variables | Scopes, aliases, interpolation, overrides — avoiding duplication |
| 7. Full-Stack Example | Copy-pasteable qovery.tf for a typical frontend + backend + database stack |
| 8. Advanced | Custom domains, autoscaling, storage, port-forwarding, Terraform exporter, monorepos |
| 9. Deployment Watch | Active deployment monitoring, log fetching, success verification |
| 10. Auto-Fix | Error classification, automatic Qovery config fixes, user-code changes only with permission |
qovery-troubleshoot
| Phase | Description |
|---|---|
| 1. Context Gathering | Authenticate, list services, identify the failing service, understand the problem |
| 2. 8-Layer Diagnosis | Systematic diagnostic workflow: deployment status, build logs, runtime logs, health checks, env vars, network, resources, cluster |
| 3. Playbooks | 10 pre-built diagnostic sequences for common issues (crashes, slow apps, DB connection, stuck deployments, custom domains, Terraform/Helm errors, high costs, OOM, build failures) |
| 4. Fix & Redeploy | Apply fixes (auto-fix for Qovery config, ask for user code), redeploy, and verify |
| 5. Verification | Confirm the fix worked — check status, logs, health, and endpoints |
| 6. Runbook Generation | Create .qovery/runbooks/ documentation for the issue and resolution |
| 7. Prevention | Tailored recommendations to prevent recurrence |
qovery-optimize
| Phase | Description |
|---|---|
| 1. Context & Business | Authenticate, inventory all resources, understand business context (app type, traffic patterns, seasonal peaks, growth, reliability needs, IaC tool) |
| 2. Analysis Engine | 7 optimization dimensions: service right-sizing, autoscaling, database mode, environment scheduling, cluster optimization, build optimization, external resource cost estimation |
| 3. Cost Report | Detailed markdown report with executive summary, per-cluster/environment/service breakdown, external resource estimates with pricing methodology disclaimer, sorted recommendations. CSV export for spreadsheets |
| 4. Apply Changes | User-approved changes via Qovery API (immediate) or Terraform diffs (IaC). Includes deployment rule setup for scheduling |
| 5. Ongoing Monitoring | Kubecost deployment offer, cloud provider billing dashboard links, Qovery support review offer, report saved to .qovery/reports/ with follow-up schedule |
| 6. Seasonal | Specific guidance per business type: e-commerce pre-scaling, SaaS right-sizing, startup growth buffers, B2B scheduling, ML/AI GPU optimization |
qovery-speedup
| Phase | Description |
|---|---|
| 1. Measure | V2 deployment history API for structured stage/service timing, build runner Grafana snapshot, deployment log parsing for sub-step timing, trend analysis across 5-10 deployments |
| 2. Classify | Each bottleneck classified as user-controllable, Qovery infrastructure, or mixed — with clear decision tree |
| 3. Diagnose | Deep analysis: Dockerfile optimization (10+ patterns), build runner resources, app startup, health check tuning, pod scheduling, container image pull, deployment stage parallelism |
| 4. Fix & Verify | Apply fixes, trigger new deployment, re-measure, present before/after comparison with percentage improvement |
| 5. Qovery Support | For infrastructure bottlenecks: generate diagnostic report with timeline, Grafana snapshot, and applied optimizations — offer to share with support |
| 6. Targets & Monitoring | Deployment time targets by framework, benchmark report, maintenance checklist, re-analysis triggers |
qovery-preview
| Phase | Description |
|---|---|
| 1. Context | Authenticate, detect PR/branch (git, GitHub CLI, user input), resolve org/cluster, check for existing blueprint environment |
| 2. Blueprint | Find deployed source environment, clone to create blueprint, configure base branches + auto_preview, validate (deploy, health check), stop to save resources |
| 3. Clone | Clone blueprint as preview environment with PREVIEW mode, switch git branches on services matching the PR's repository |
| 4. Auto-Shutdown | Ask lifecycle strategy (auto-stop, auto-delete, recycle, manual, PR-merge), create cron job with raw Dockerfile (curlimages/curl) + Qovery API token, or generate CI/CD workflow |
| 5. Summary | Present full deployment plan (org, cluster, blueprint, services, branch changes, auto-shutdown config, warnings), get explicit user confirmation |
| 6. Deploy | Deploy preview environment, active watch loop, fetch logs on failure, verify health, present preview URLs and console link |
| 7. Cleanup | Delete preview environment, clean up shutdown tokens, blueprint maintenance guidance, bulk cleanup for sprint resets |
Deployment Methods
The skill supports two deployment paths — the user chooses which one:
CLI + API (Quick Start)
Best for development and staging. Uses the Qovery CLI for monitoring and the REST API (https://api.qovery.com) for creating resources. Fast to set up, no files to commit.
Terraform Provider (Recommended for Production)
Creates a qovery.tf file that defines your entire infrastructure as code. Reproducible, version-controlled, CI/CD-friendly. Uses the Qovery Terraform Provider (qovery/qovery v0.54+).
Manual Installation
If you prefer not to use the install script, copy the skill folders manually:
git clone https://github.com/Qovery/qovery-skills.git
cd qovery-skills
# Global install (pick the paths for your tools)
mkdir -p ~/.claude/skills && cp -r qovery-onboard qovery-deploy qovery-troubleshoot qovery-optimize qovery-speedup qovery-preview ~/.claude/skills/
mkdir -p ~/.config/opencode/skills && cp -r qovery-onboard qovery-deploy qovery-troubleshoot qovery-optimize qovery-speedup qovery-preview ~/.config/opencode/skills/
mkdir -p ~/.agents/skills && cp -r qovery-onboard qovery-deploy qovery-troubleshoot qovery-optimize qovery-speedup qovery-preview ~/.agents/skills/
# Install the /qovery-preview slash command (OpenCode)
mkdir -p ~/.config/opencode/commands && cp qovery-preview/commands/qovery-preview.md ~/.config/opencode/commands/
# Or project-local install
mkdir -p .claude/skills && cp -r qovery-onboard qovery-deploy qovery-troubleshoot qovery-optimize qovery-speedup qovery-preview .claude/skills/
Verify the skills are discovered by checking if your tool lists all six Qovery skills.
Links
- Qovery Documentation
- Qovery Console
- Qovery CLI Reference
- Qovery API Reference
- Qovery Terraform Provider
- Real-World Example (Doktolib)
- Agent Skills Standard
License
MIT
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found