Skip to main content
Capabilities define what agents can do (skills), which AI models they use, and what security/compliance rules they must follow (policies). These resources work together to control agent behavior and ensure safe, compliant automation.

Quick Start

# List skills
kubiya skill list
Output:
🛠️  Skills (15)

NAME                TYPE    DESCRIPTION
kubernetes-cli     cli     Kubernetes cluster management
terraform          cli     Infrastructure as code
aws-sdk            sdk     AWS cloud operations
github-api         api     GitHub repository management
docker-cli         cli     Container management
slack-api          api     Slack notifications and messaging
# Create skill
kubiya skill create --file skill.yaml

# List models
kubiya model list
Output:
🤖 Available Models (8)

NAME                 PROVIDER      CONTEXT     DEFAULT
gpt-4               openai        8K          ✓
gpt-4-32k           openai        32K
claude-3-opus       anthropic     200K
claude-3-sonnet     anthropic     200K
claude-3-haiku      anthropic     200K
gpt-3.5-turbo       openai        4K
# Set default model
kubiya model set-default gpt-4

# Create policy
kubiya policy create --name "Production Policy" --file policy.rego
Output:
🛠️  Creating policy...

✅ Policy created successfully!

ID:          abc123def456
Name:        Production Policy
Status:      Enabled

Skills

Agent capabilities including APIs, CLIs, cloud SDKs, and custom functions. Skills replace the V1 concepts of “sources” and “tools” with a unified system.

List Skills

# List all skills
kubiya skill list

# JSON output
kubiya skill list --output json

Get Skill Details

# View skill configuration
kubiya skill get <skill-id>

Create Skill

# Create from file
kubiya skill create --file skill.yaml
# skill.yaml
name: kubernetes
description: Kubernetes cluster management
type: cli
commands:
  - kubectl
  - helm
Skill Types:
name: docker-cli
description: Docker container management
type: cli
commands:
  - docker
  - docker-compose

Update Skill

# Update skill configuration
kubiya skill update <skill-id> --file skill.yaml

Delete Skill

# Delete skill
kubiya skill delete <skill-id>

Validate Skill

# Validate skill definition
kubiya skill validate skill.yaml

Models

LLM models available to agents for task execution.

List Models

# List all available models
kubiya model list

# JSON output
kubiya model list --output json
Available Models:
ModelProviderUse CaseContext Window
gpt-4OpenAIComplex tasks, reasoning8K tokens
gpt-4-32kOpenAILong context tasks32K tokens
gpt-3.5-turboOpenAIFast, efficient tasks4K tokens
claude-3-opusAnthropicAdvanced reasoning200K tokens
claude-3-sonnetAnthropicBalanced performance200K tokens
claude-3-haikuAnthropicFast responses200K tokens

Get Model Details

# View model configuration
kubiya model get <model-id>

Set Default Model

# Set organization default model
kubiya model set-default <model-id>
The default model is used when agents don’t specify a particular model. You can override this per-agent in the agent configuration.

Policies

Security and compliance policies using Open Policy Agent (OPA).

List Policies

# List all policies
kubiya policy list

# JSON output
kubiya policy list --output json

Get Policy Details

# View policy configuration
kubiya policy get <policy-id>

Create Policy

# Create from Rego file
kubiya policy create --file policy.rego
# policy.rego
package kubiya.production

# Deny deployments outside business hours
deny["Production deployments only allowed during business hours"] {
    input.environment == "production"
    not is_business_hours
}

is_business_hours {
    hour := time.now_ns() / 1000000000 / 3600 % 24
    hour >= 9
    hour < 17
}
Common Policy Examples:
package kubiya.environment

# Require approval for production
deny["Production requires approval"] {
    input.environment == "production"
    not input.approved
}

Update Policy

# Update policy
kubiya policy update <policy-id> --file policy.rego

Delete Policy

# Delete policy
kubiya policy delete <policy-id>

Validate Policy

# Validate Rego syntax
kubiya policy validate policy.rego

Best Practices

  • Organize skills by domain (aws-, kubernetes-, github-*)
  • Reuse shared skills instead of duplicating
  • Add clear descriptions and examples to all skills
  • Version control skill and policy definitions
  • Test skills and policies before production use
  • Use GPT-4 for complex reasoning, GPT-3.5 for simple tasks
  • Monitor model usage and costs per agent
  • Start with permissive policies, enforce gradually
  • Document policy intent with clear comments
  • Only grant skills agents actually need
  • Rotate credentials regularly

Command Reference

# Skills
kubiya skill list
kubiya skill get <id>
kubiya skill create --file skill.yaml
kubiya skill update <id> --file skill.yaml
kubiya skill delete <id>
kubiya skill validate skill.yaml

# Models
kubiya model list
kubiya model get <id>
kubiya model set-default <id>

# Policies
kubiya policy list
kubiya policy get <id>
kubiya policy create --file policy.rego
kubiya policy update <id> --file policy.rego
kubiya policy delete <id>
kubiya policy validate policy.rego

Next Steps