Agentic collections to automate interaction with Red Hat platforms and products for various marketplaces.
| Agentic Pack | Persona/Role | Marketplaces |
|---|---|---|
| Red Hat SRE | SRE | Claude code, Cursor |
| Red Hat Developer | Developer | Claude code, Cursor |
| OpenShift Administration | OpenShift Administration | Claude code, Cursor |
| Red Hat Support Engineer | Support Engineer | Claude code, Cursor, ChatGPT |
| Red Hat Virtualization | Virt Admin | Claude code, Cursor |
View the interactive documentation at: https://rhecosystemappeng.github.io/agentic-collections
The site provides:
- Agentic Collections: Browse all available collections, skills, and agents with detailed descriptions
- MCP Servers: Explore MCP server configurations and integration details
- Search: Find collection, skills, agents, and servers by keyword across all content
The documentation tools use uv for fast, isolated Python environment management:
# Install uv (one-time setup)
curl -LsSf https://astral.sh/uv/install.sh | sh
# Or on macOS with Homebrew
brew install uvGenerate and view documentation locally:
# Install dependencies (first time only)
make install
# Validate pack structure
make validate
# Generate docs/data.json
make generate
# Start local server at http://localhost:8000
make serve
# Or run full test suite with auto-open
make test-fullUpdates are automatically deployed to GitHub Pages when changes are pushed to main.
For more details, see docs/README.md.
This repository uses gitleaks to prevent accidental commits of sensitive data.
# Install gitleaks and pre-commit hook (one-time setup)
scripts/install-hooks.sh- API keys: OpenAI, GitHub, AWS, Google Cloud
- Private keys: SSH, SSL/TLS certificates
- Hardcoded credentials in
.mcp.jsonfiles - Database connection strings with passwords
- JWT tokens and authentication secrets
✅ CORRECT - Use environment variable references:
{
"env": {
"LIGHTSPEED_CLIENT_ID": "${LIGHTSPEED_CLIENT_ID}",
"LIGHTSPEED_CLIENT_SECRET": "${LIGHTSPEED_CLIENT_SECRET}"
}
}❌ BLOCKED - Hardcoded values:
{
"env": {
"LIGHTSPEED_CLIENT_SECRET": "sk-proj-abc123..."
}
}# Scan entire repository history
gitleaks detect --source . --verbose
# Scan only staged changes
gitleaks protect --stagedSee SECURITY.md for details.
To add a new MCP server to an agentic pack and display it on the documentation site:
Add the server configuration to <pack>/.mcp.json:
{
"mcpServers": {
"your-server-name": {
"command": "podman|docker|npx",
"args": ["run", "--rm", "-i", "..."],
"env": {
"VAR_NAME": "${VAR_NAME}" // Always use env var references
},
"description": "Brief description of the MCP server",
"security": {
"isolation": "container",
"network": "local",
"credentials": "env-only|none"
}
}
}
}Security Requirements:
- ✅ Always use
${ENV_VAR}references for credentials - ❌ Never hardcode API keys, tokens, or secrets
- ✅ Set appropriate security isolation level
To display repository links and tool descriptions on the documentation site, add an entry to docs/mcp.json:
{
"your-server-name": {
"repository": "https://github.com/org/repo",
"tools": [
{
"name": "tool_name",
"description": "What this tool does and when to use it"
}
]
}
}Fields:
repository: GitHub repository URL (appears as README badge on server card)tools: Array of tool objects with name and description (displayed in server details modal)
Regenerate the documentation site data:
make generateThis will:
- Parse the
.mcp.jsonfile from your pack - Merge it with custom data from
docs/mcp.json - Update
docs/data.jsonwith the new server
Test the changes locally:
make serveVisit http://localhost:8000 and verify:
- Server appears in MCP Servers section
- Server card shows correct information
- README badge appears (if repository URL provided)
- Tools count displays (if tools provided)
- Details modal shows all configuration
git add <pack>/.mcp.json docs/mcp.json docs/data.json
git commit -m "feat: add <server-name> MCP server to <pack>"
git pushThe documentation site will automatically update via GitHub Actions.
File: rh-sre/.mcp.json
{
"mcpServers": {
"lightspeed-mcp": {
"command": "podman",
"args": ["run", "--rm", "-i",
"--env", "LIGHTSPEED_CLIENT_ID",
"--env", "LIGHTSPEED_CLIENT_SECRET",
"quay.io/redhat-services-prod/insights-mcp:latest"],
"env": {
"LIGHTSPEED_CLIENT_ID": "${LIGHTSPEED_CLIENT_ID}",
"LIGHTSPEED_CLIENT_SECRET": "${LIGHTSPEED_CLIENT_SECRET}"
},
"description": "Red Hat Lightspeed MCP server for CVE data and remediation",
"security": {
"isolation": "container",
"network": "local",
"credentials": "env-only"
}
}
}
}File: docs/mcp.json
{
"lightspeed-mcp": {
"repository": "https://github.com/RedHatInsights/insights-mcp",
"tools": [
{
"name": "vulnerability__get_cves",
"description": "Get list of CVEs affecting the account"
},
{
"name": "vulnerability__get_cve",
"description": "Get details about specific CVE"
}
]
}
}Server not appearing:
- Run
make validateto check for JSON syntax errors - Verify
.mcp.jsonfile is in the pack directory - Check that pack directory is listed in
scripts/generate_pack_data.pyPACK_DIRS
Tools not showing:
- Ensure
docs/mcp.jsonhas entry for your server - Verify tool objects have both
nameanddescriptionfields - Regenerate with
make generate
Security errors:
- Check for hardcoded credentials with
gitleaks protect --staged - Ensure all env values use
${VAR}format - Review security isolation settings