vmware-avi

Use this skill whenever the user mentions load balancing, ingress, virtual services, pool members, AVI, NSX ALB, AKO, or application delivery. Also trigger when the user mentions AKO ingress troubleshooting in a Tanzu/vSphere environment. Do NOT trigger when the user explicitly asks to set up or configure nginx/HAProxy/Traefik from scratch — those are not AVI tasks. Directly handles: virtual service listing and enable/disable, pool member management (drain/enable traffic), SSL certificate expiry checks, analytics and error logs, service engine health, AKO pod troubleshooting, AKO Helm config management, Ingress annotation validation, K8s-to-Controller sync diagnostics, and multi-cluster AKO overview. Always use this skill for any "virtual service", "pool member", "AKO status", "AKO logs", "ingress diagnose", "ssl expiry", "load balancer", "NSX ALB", "AVI controller", "AKO sync", "ingress", or "负载均衡" task. For VM lifecycle use vmware-aiops, for NSX networking use vmware-nsx, for K8s cluster lifecycle (Supervisor/TKC) use vmware-vks.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "vmware-avi" with this command: npx skills add zw008/vmware-avi

VMware AVI

Disclaimer: This is a community-maintained open-source project and is not affiliated with, endorsed by, or sponsored by VMware, Inc. or Broadcom Inc. "VMware", "NSX", and "AVI" are trademarks of Broadcom. Source code is publicly auditable at github.com/zw008/VMware-AVI under the MIT license.

AVI (NSX Advanced Load Balancer) application delivery and AKO Kubernetes operations — 29 MCP tools.

Dual mode: Traditional AVI Controller management + AKO K8s operations in one skill. Family: vmware-aiops (VM lifecycle), vmware-monitor (inventory/health), vmware-storage (iSCSI/vSAN), vmware-vks (Tanzu Kubernetes), vmware-nsx (NSX networking), vmware-nsx-security (DFW/firewall), vmware-aria (metrics/alerts/capacity). | vmware-pilot (workflow orchestration) | vmware-policy (audit/policy)

What This Skill Does

CategoryToolsCount
Virtual Servicelist, status, enable/disable3
Pool Memberlist, enable/disable member (drain/restore traffic)3
SSL Certificatelist, expiry check2
AnalyticsVS metrics overview, request error logs2
Service Enginelist, health check2
AKO Pod Opsstatus, logs, restart, version info4
AKO Configvalues.yaml view, Helm diff, Helm upgrade3
Ingress Diagnosticsannotation validation, VS mapping, error diagnosis, fix recommendation4
Sync DiagnosticsK8s-Controller comparison, inconsistency list, force resync3
Multi-clustercluster list, cross-cluster AKO overview, AMKO status3

Quick Install

uv tool install vmware-avi
vmware-avi doctor            # checks Controller connectivity + kubeconfig + avisdk

When to Use This Skill

  • List, enable, or disable virtual services on AVI Controller
  • Add, remove, drain, or restore pool members (maintenance windows, rolling deployments)
  • Check SSL certificate expiry across all virtual services
  • View VS analytics — throughput, latency, error rates, request logs
  • Check service engine health and resource usage
  • Troubleshoot AKO pods — status, logs, restarts
  • Manage AKO Helm configuration — view, diff, upgrade values.yaml
  • Validate Ingress annotations and diagnose why a VS wasn't created as expected
  • Detect sync drift between K8s resources and AVI Controller objects
  • Get a cross-cluster view of AKO deployments and AMKO status

Use companion skills for:

  • VM lifecycle, deployment, guest ops → vmware-aiops
  • NSX segments, gateways, NAT → vmware-nsx
  • DFW firewall rules, security groups → vmware-nsx-security
  • K8s cluster lifecycle (Supervisor, TKC) → vmware-vks
  • Read-only vSphere monitoring → vmware-monitor

Related Skills — Skill Routing

User IntentRecommended Skill
Load balancer, VS, pool, AVI, ALB, AKOvmware-avi ← this skill
VM lifecycle, deployment, guest opsvmware-aiops (uv tool install vmware-aiops)
Read-only vSphere monitoringvmware-monitor (uv tool install vmware-monitor)
Storage: iSCSI, vSAN, datastoresvmware-storage (uv tool install vmware-storage)
NSX networking: segments, gateways, NATvmware-nsx (uv tool install vmware-nsx-mgmt)
NSX security: DFW rules, security groupsvmware-nsx-security (uv tool install vmware-nsx-security)
Tanzu Kubernetes (Supervisor/TKC)vmware-vks (uv tool install vmware-vks)
Aria Ops: metrics, alerts, capacityvmware-aria (uv tool install vmware-aria)
Multi-step workflows with approvalvmware-pilot
Audit log queryvmware-policy (vmware-audit CLI)

Common Workflows

Maintenance Window — Drain a Pool Member

When taking a backend server offline for patching, you need to drain traffic gracefully before maintenance and restore it after:

  1. List pool members and health → vmware-avi pool members my-pool
  2. Disable the target server (graceful drain) → vmware-avi pool disable my-pool <server-ip>
  3. Wait for active connections to drain (monitor analytics) → vmware-avi analytics my-vs
  4. Perform maintenance on the server
  5. Re-enable the server → vmware-avi pool enable my-pool <server-ip>
  6. Verify health status is green → vmware-avi pool members my-pool

AKO Ingress Not Creating VS

When a developer reports their Ingress isn't producing a Virtual Service, the typical debugging path is:

  1. Check AKO is running → vmware-avi ako status
  2. Validate Ingress annotations → vmware-avi ako ingress check <namespace>
  3. Check sync status → vmware-avi ako sync status
  4. If annotations are wrong → vmware-avi ako ingress diagnose <ingress-name> (shows what's wrong and suggests fix)
  5. If sync is drifted → review diff vmware-avi ako sync diff and force resync if needed

SSL Certificate Expiry Audit

Expired certificates cause outages. Run periodic checks across all controllers:

  1. Check all certificates → vmware-avi ssl expiry --days 30
  2. Review which VS uses each expiring cert → output includes VS mapping
  3. Plan renewal with the certificate team

Usage Mode

ScenarioRecommendedWhy
Local/small models (Ollama, Qwen)CLI~2K tokens vs ~8K for MCP
Cloud models (Claude, GPT-4o)EitherMCP gives structured JSON I/O
Automated pipelinesMCPType-safe parameters, structured output
AKO troubleshootingCLIInteractive log tailing, Helm diff output

MCP Tools (29 — 15 read, 14 write)

CategoryToolsR/W
Virtual Service (3)vs_list, vs_statusRead
vs_toggleWrite
Pool Member (3)pool_membersRead
pool_member_enable, pool_member_disableWrite
SSL Certificate (2)ssl_list, ssl_expiry_checkRead
Analytics (2)vs_analytics, vs_error_logsRead
Service Engine (2)se_list, se_healthRead
AKO Pod (4)ako_status, ako_logs, ako_versionRead
ako_restartWrite
AKO Config (3)ako_config_show, ako_config_diffRead
ako_config_upgradeWrite
Ingress Diagnostics (4)ako_ingress_check, ako_ingress_map, ako_ingress_diagnose, ako_ingress_fix_suggestRead
Sync Diagnostics (3)ako_sync_status, ako_sync_diffRead
ako_sync_forceWrite
Multi-cluster (3)ako_clusters, ako_cluster_overview, ako_amko_statusRead

Read/write split: 15 tools are read-only, 14 modify state. Write tools require double confirmation and are audit-logged.

CLI Quick Reference

# === Traditional Mode (AVI Controller) ===
vmware-avi vs list [--controller <name>]
vmware-avi vs status <vs-name>
vmware-avi vs enable <vs-name>
vmware-avi vs disable <vs-name>           # double-confirm

vmware-avi pool members <pool-name>
vmware-avi pool enable <pool> <server-ip>
vmware-avi pool disable <pool> <server-ip>  # double-confirm (graceful drain)

vmware-avi ssl list
vmware-avi ssl expiry [--days 30]

vmware-avi analytics <vs-name>
vmware-avi logs <vs-name> [--since 1h]

vmware-avi se list
vmware-avi se health

# === AKO Mode (K8s) ===
vmware-avi ako status [--context <k8s-context>]
vmware-avi ako logs [--tail 100] [--since 30m]
vmware-avi ako restart                    # double-confirm

vmware-avi ako config show
vmware-avi ako config diff
vmware-avi ako config upgrade             # double-confirm + --dry-run default

vmware-avi ako ingress check <namespace>
vmware-avi ako ingress map
vmware-avi ako ingress diagnose <ingress-name>

vmware-avi ako sync status
vmware-avi ako sync diff
vmware-avi ako sync force                 # double-confirm

vmware-avi ako clusters
vmware-avi ako amko status

Full CLI reference: see references/cli-reference.md

Troubleshooting

"Controller unreachable" error

  1. Run vmware-avi doctor to verify connectivity
  2. Check if the controller address and port are correct in ~/.vmware-avi/config.yaml
  3. For self-signed certs: set verify_ssl: false in config.yaml (lab environments only)

AKO Pod in CrashLoopBackOff

  1. Check logs → vmware-avi ako logs --tail 50
  2. Common causes: wrong controller IP in values.yaml, network policy blocking AKO→Controller, expired credentials
  3. Fix config → vmware-avi ako config show to inspect, then Helm upgrade with corrected values

Ingress created but no VS on Controller

  1. Validate annotations → vmware-avi ako ingress check <namespace>
  2. Check AKO logs for rejection reason → vmware-avi ako logs --since 5m
  3. Run sync diff → vmware-avi ako sync diff to see if the object is stuck

Pool member shows "down" after enable

Health monitor may still be failing. Check the actual health status on the Controller side — the member is enabled but unhealthy. Fix the backend service first, then the health status will auto-recover.

SSL expiry check shows 0 certificates

Verify the controller connection has tenant-level access. Certificates are tenant-scoped in AVI — the configured user may only see certs in their tenant.

AKO sync force has no effect

Force resync triggers AKO to re-reconcile all K8s objects. If the drift persists, the issue is likely in the K8s resource definition itself (bad annotation, missing secret). Use vmware-avi ako ingress diagnose to pinpoint the root cause.

Setup

uv tool install vmware-avi
mkdir -p ~/.vmware-avi
vmware-avi init              # generates config.yaml and .env templates
chmod 600 ~/.vmware-avi/.env
vmware-avi doctor            # verify Controller + K8s connectivity

All tools are automatically audited via vmware-policy. Audit logs: vmware-audit log --last 20

Full setup guide, security details, and AI platform compatibility: see references/setup-guide.md

Audit & Safety

All operations are automatically audited via vmware-policy (@vmware_tool decorator):

  • Every tool call logged to ~/.vmware/audit.db (SQLite, framework-agnostic)
  • Policy rules enforced via ~/.vmware/rules.yaml (deny rules, maintenance windows, risk levels)
  • Destructive operations (vs_toggle disable, pool_member_disable, ako_restart, ako_config_upgrade, ako_sync_force) require double confirmation
  • ako_config_upgrade defaults to --dry-run mode — user must explicitly confirm to apply
  • View recent operations: vmware-audit log --last 20

License

MIT — github.com/zw008/VMware-AVI

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

GigaChat (Sber AI) Proxy

Integrate GigaChat (Sber AI) with OpenClaw via gpt2giga proxy

Registry SourceRecently Updated
3600smvlx
General

TencentCloud Video Face Fusion

通过提取两张人脸核心特征并实现自然融合,支持多种风格适配,提升创意互动性和内容传播力,广泛应用于创意营销、娱乐互动和社交分享场景。

Registry SourceRecently Updated
General

TencentCloud Image Face Fusion

图片人脸融合(专业版)为同步接口,支持自定义美颜、人脸增强、牙齿增强、拉脸等参数,最高支持8K分辨率,有多个模型类型供选择。

Registry SourceRecently Updated
General

YoudaoNote News

有道云笔记资讯推送:基于收藏笔记分析关注话题,推送最新相关资讯。支持对话触发与每日定时推送(如早上9点)。触发词:资讯推送、设置资讯推送、生成资讯推送。

Registry SourceRecently Updated
1.5K1lephix