Skip to main content
Agents are configurable AI services that plan and execute tasks. Each agent runs a selected LLM model, a set of Skills (and optional MCP servers), and the configuration it inherits from attached Environments. Agents execute deterministic step-by-step plans, using Skills for system operations and MCP integrations for external APIs. Kubiya Platform Overview Examples:
  • A DevOps Assistant that checks system health and deploys updates
  • A Cost Auditor that reviews cloud spending and raises alerts
  • A SRE Helper that diagnoses incidents using logs, metrics, and runbooks
Agents are reusable, can be shared across teams and workflows, and automatically inherit configuration from the Environments they run in.

When to use an Agent

Create an agent when you need a reusable operational capability that:
  • Runs tasks repeatedly (deployments, audits, checks)
  • Automates domain workflows (SRE, DevOps, ops, finance, support)
  • Can be invoked by users, Teams, or tasks and workflows

Prerequisites

Before creating an agent, ensure:
  • At least one Environment is in Ready state
  • A Worker Queue with at least one connected worker is attached to that Environment
  • Any required secrets or integration credentials exist (prefer storing them at the Environment level)

Key concepts & defaults

  • Model The LLM the agent uses (Sonnet, Opus, GPT-4o). Higher tiers are more capable but costlier.
  • Skills Capabilities for local/system operations (shell, file operations, Docker, Python). Agents inherit Skills from their Environments.
  • MCP Servers External services and platform APIs the agent can call.
  • Environments Provide runtime configuration, env vars, secrets, credentials, and policies.
  • Policies (OPA) Attach after creation to restrict actions or access.
  • System Prompt Defines AI instructions. The default covers tool usage, planning, and safety. Edit only when needed.

Create an agent

Agents Creation

1. Basic Info

  • Agent Name Clear and specific: “DevOps Assistant”, “SRE Helper”, “Cost Auditor”.
  • Description Helps users understand the use case.
  • AI Model Select capability tier appropriate for the tasks.
  • Capabilities (tags) Optional filters such as: devops, monitoring, cost, security.

2. Deployment

  • Runtime Default recommended unless you have a specific need.
  • Environments Add one or more Environments (e.g., staging, prod). The agent inherits configuration and can run where capacity exists.
Tip: If the agent should operate in multiple environments, attach both and keep environment-specific secrets and URLs at the Environment level, not the agent.

3. Execution Environment

  • Environment Variables Non-secret configuration values.
  • Secrets Add only when agent-specific. Prefer keeping shared secrets on the Environment.
  • Integration Credentials Add credentials for external systems the agent needs to access.

4. Tools (Skills & MCP)

MCP Servers

  • Leave Enable Kubiya Platform APIs ON unless restricted by policy.
  • Add custom MCP servers as needed (name, command, arguments).

Skills

  • Add only the minimum Skills required.
  • Remember: Skills from Environments also apply.

5. Policies

After saving the agent, return to associate OPA policies that limit scope (e.g., allowed paths, allowed commands, allowed resources).

6. Advanced

  • System Prompt A sensible default is provided. Adjust only to add specific constraints or operational guidance. Keep it short, testable, and easy to maintain.

Verify & troubleshoot

After creation, open the agent’s Chat and run a safe read-only test such as:
List running services.
If a task remains Pending:
  • Ensure the target Environment is Ready
  • Check the Environment’s Worker Queue has at least one connected worker
  • Verify required Skills or credentials are attached
  • Review OPA policies for restrictions blocking execution

CLI Usage

Below is the improved, structured, easy-to-understand CLI reference.

1. List Agents

Lists all agents in your workspace with optional filtering and sorting.

Commands

kubiya agent list
kubiya agent list --active
kubiya agent list --all
kubiya agent list --filter "devops"
kubiya agent list --output json

Flags

FlagDescription
--activeShow only active agents
--allShow full details including capabilities
--filterFilter by name/description/tags
--sortSort by name, created, or updated
--outputOutput as text or json

2. Get Agent Details

Shows complete configuration of a specific agent.

Commands

kubiya agent get <agent-uuid>
kubiya agent get <agent-uuid> --output json

Flags

FlagDescription
--outputOutput format (text or json)

3. Create Agents

Creates a new agent with the model, Skills, integrations, and configuration you specify.

Commands

Parameter-based
kubiya agent create --name "DevOps Assistant" \
  --desc "Performs health checks" \
  --llm claude-4-sonnet \
  --env LOG_LEVEL=info \
  --secret DB_PASSWORD \
  --integration github
Interactive
kubiya agent create --interactive
From file
kubiya agent create --file agent.yaml --format yaml
Webhook-enabled
kubiya agent create --name "Alert Bot" \
  --webhook-method slack \
  --webhook-dest "#alerts" \
  --webhook-prompt "Analyze this alert"

Flags

FlagDescription
--nameAgent name
--descDescription
--llmModel to use
--envAdd environment variable(s)
--secretAttach secrets
--integrationAdd integrations
--sourceAttach source UUIDs
--knowledge-fileUpload docs as knowledge items
--webhook-methodslack / teams / http
--webhook-destChannel/URL (except http)

4. Edit Agents

Updates agent metadata, Skills, integrations, credentials, environment variables, or system prompts.

Commands

kubiya agent edit <agent-uuid> --interactive
kubiya agent edit <agent-uuid> --name "New Name"
kubiya agent edit <agent-uuid> --llm gpt-4o

Common update flags

FlagDescription
--add-env / --remove-envManage environment variables
--add-secret / --remove-secretManage secrets
--add-integration / --remove-integrationManage integrations
--add-source / --remove-sourceManage source/tools
--instructions-fileReplace system prompt
--editorEdit raw JSON

5. Manage Access Control

Controls which users and groups can use the agent.

Commands

kubiya agent access show <agent-uuid>
kubiya agent access add-user <agent-uuid> user-id
kubiya agent access add-group <agent-uuid> group-id
kubiya agent access clear <agent-uuid>

Flags

FlagDescription
add-user / remove-userManage allowed users
add-group / remove-groupManage allowed groups
clearMakes agent publicly accessible

6. Manage Environment Variables

Sets or removes non-secret configuration values.

Commands

kubiya agent env list <agent-uuid>
kubiya agent env set <agent-uuid> KEY=value
kubiya agent env unset <agent-uuid> KEY

7. Manage Secrets

Adds or removes agent-specific secrets.

Commands

kubiya agent secrets add <agent-uuid> API_KEY
kubiya agent secrets list <agent-uuid>
kubiya agent secrets remove <agent-uuid> API_KEY

8. Manage Skills

Controls which system-level capabilities the agent has access to.

Commands

kubiya agent tools list <agent-uuid>
kubiya agent tools add <agent-uuid> <skill-uuid>
kubiya agent tools describe <agent-uuid> <skill-uuid>
kubiya agent tools remove <agent-uuid> <skill-uuid>

9. Set Model

Updates the LLM used by the agent.

Commands

kubiya agent model <agent-uuid> claude-4-sonnet
kubiya agent model <agent-uuid> claude-4-opus
kubiya agent model <agent-uuid> gpt-4o

10. Manage System Prompt

Reads, edits, replaces, or appends to the system prompt.

Commands

kubiya agent prompt get <agent-uuid>
kubiya agent prompt set <agent-uuid> --file system.txt
kubiya agent prompt append <agent-uuid> --text "Validate inputs."
kubiya agent prompt edit <agent-uuid>
kubiya agent prompt clear <agent-uuid>

11. Set Runner

Defines where the agent executes (Kubernetes cluster, local runner, self-hosted worker).

Commands

kubiya agent runner <agent-uuid> gke-poc-kubiya
kubiya agent runner <agent-uuid> kubiya-hosted

12. Delete Agents

Permanently removes an agent.

Commands

kubiya agent delete <agent-uuid>
kubiya agent delete <agent-uuid> --force

Best Practices

  • Start with least privilege, add Skills gradually
  • Store common secrets/config at the Environment level
  • Use one agent across multiple Environments instead of cloning
  • Test with simple read-only commands first
  • Apply OPA policies after verifying correct behavior

Next Steps

  • Attach more Skills or MCP integrations
  • Ensure Worker Queues have active workers
  • Build tasks or workflows that use this agent
  • Configure policies for safe multi-environment operation