fleet-inventory

Fleet Inventory Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "fleet-inventory" with this command: npx skills add rhecosystemappeng/agentic-collections/rhecosystemappeng-agentic-collections-fleet-inventory

Fleet Inventory Skill

This skill queries Red Hat Lightspeed to retrieve and display information about managed systems, registered hosts, and fleet inventory.

Prerequisites

Required MCP Servers: lightspeed-mcp (setup guide)

Required MCP Tools:

  • get_host_details (from lightspeed-mcp) - Retrieve system inventory

  • get_cve_systems (from lightspeed-mcp) - Find CVE-affected systems

Required Environment Variables:

  • LIGHTSPEED_CLIENT_ID

  • Red Hat Lightspeed service account client ID

  • LIGHTSPEED_CLIENT_SECRET

  • Red Hat Lightspeed service account secret

Prerequisite Validation

CRITICAL: Before executing any operations, execute the /mcp-lightspeed-validator skill to verify MCP server availability.

See Step 0 in the Workflow section below for implementation details.

Validation freshness: Can skip if already validated in this session. See Validation Freshness Policy.

When to Use This Skill

Use this skill directly when you need:

  • List all systems registered in Red Hat Lightspeed

  • Show systems affected by specific CVEs

  • Display system details (OS version, tags, last check-in)

  • Filter systems by environment, RHEL version, or tags

  • Count systems matching criteria

  • Verify system registration status

Use the /remediation skill when you need:

  • Remediate vulnerabilities on systems

  • Generate or execute playbooks

  • Perform infrastructure changes

  • End-to-end CVE remediation workflows

How they work together: Use this skill for discovery ("What systems are affected?"), then transition to the /remediation skill for action ("Remediate those systems").

Workflow

Step 0: Validate Lightspeed MCP Prerequisites

Action: Execute the /mcp-lightspeed-validator skill

Note: Can skip if validation was performed earlier in this session and succeeded. See Validation Freshness Policy.

How to invoke: Execute the /mcp-lightspeed-validator skill

Handle validation result:

  • If validation PASSED: Continue to Step 1

  • If validation PARTIAL (connectivity test unavailable):

  • Warn user: "Configuration appears correct but connectivity could not be tested"

  • Ask: "Do you want to proceed? (yes/no)"

  • If yes: Continue to Step 1

  • If no: Stop execution

  • If validation FAILED:

  • The validator provides error details and setup instructions

  • Wait for user decision (setup/skip/abort)

  • If user chooses "skip": Attempt Step 1 anyway (may fail)

  • If user chooses "setup" or "abort": Stop execution

Example:

Before retrieving fleet inventory, I'll validate the Lightspeed MCP server configuration.

[Invoke mcp-lightspeed-validator skill]

✓ Lightspeed MCP validation successful. Proceeding with fleet inventory query...

Step 1: Retrieve System Inventory

Document Consultation (REQUIRED - Execute FIRST):

  • Action: Read insights-api.md using the Read tool to understand the get_host_details response format and pagination handling

  • Output to user: "I consulted insights-api.md to understand the get_host_details response format and pagination handling."

MCP Tool: get_host_details (from lightspeed-mcp)

Purpose: Query Lightspeed for comprehensive system information

Parameters: See references/01-parameter-reference.md for get_host_details/get_cve_systems parameters and response fields.

Verification Checklist:

  • ✓ Systems list returned with metadata

  • ✓ Total count matches expectation

  • ✓ System details include RHEL version, tags, status

  • ✓ No authentication errors (401/403)

Key Fields to Extract:

  • id : Unique system identifier (use for remediation workflows)

  • display_name / fqdn : Human-readable hostname

  • rhel_version : OS version (critical for remediation compatibility)

  • tags : Environment labels (production, staging, dev)

  • stale : Whether system recently checked in (< 7 days)

  • last_seen : Last Lightspeed client run timestamp

Step 2: Filter and Organize Systems

Document Consultation (REQUIRED - Execute FIRST):

  • Action: Read fleet-management.md using the Read tool to understand fleet inventory reporting structure and best practices

  • Output to user: "I consulted fleet-management.md to structure this inventory report."

Apply user-requested filters and grouping. See references/01-parameter-reference.md for filtering and sorting patterns.

Step 3: Query CVE-Affected Systems

MCP Tool: get_cve_systems (from lightspeed-mcp)

Purpose: Find systems affected by specific CVEs

Parameters: cve_id (CVE-YYYY-NNNNN, uppercase). See references/01-parameter-reference.md.

Verification Checklist:

  • ✓ CVE ID matches request exactly

  • ✓ System list includes remediation status for each

  • ✓ Counts are accurate (affected, remediated, still vulnerable)

  • ✓ remediation_available flag is present

Status Interpretation:

Status: "Vulnerable" → CVE affects this system, patch not applied → Action: Suggest remediation via /remediation skill

Status: "Patched" → CVE previously affected, now remediated → Action: No action needed, informational only

Status: "Not Affected" → System not vulnerable to this CVE → Action: Exclude from affected count

Step 4: Generate Fleet Summary

Create organized output. Read references/03-output-templates.md for report format (Overview, RHEL/Environment breakdown, System Details, Stale Systems).

Step 5: Offer Remediation Transition

When appropriate, suggest transitioning to the /remediation skill:

Next Steps

For CVE Remediation: If you need to remediate vulnerabilities on any of these systems, I can help using the /remediation skill:

Examples:

  • "Remediate CVE-2024-1234 on web-server-01"
  • "Create playbook for all RHEL 8 production systems affected by CVE-2024-5678"
  • "Batch remediate critical CVEs on staging environment"

For System Investigation:

  • "Show CVEs affecting web-server-01" (use cve-impact skill)
  • "Analyze risk for production systems" (use cve-impact skill)
  • "List critical vulnerabilities across the fleet" (use cve-impact skill)

Dependencies

Required MCP Servers

  • lightspeed-mcp
  • Red Hat Lightspeed platform access for system inventory and CVE data

Required MCP Tools

get_host_details (from lightspeed-mcp) - Retrieve all registered systems with metadata

  • Parameters: Optional filters (system_id, hostname_pattern, tags, operating_system)

  • Returns: List of systems with id, display_name, fqdn, rhel_version, tags, stale status

get_cve_systems (from lightspeed-mcp) - Find systems affected by specific CVEs

  • Parameters: cve_id (string, format: CVE-YYYY-NNNNN)

  • Returns: List of affected systems with vulnerability and remediation status

Related Skills

mcp-lightspeed-validator

  • PREREQUISITE - Validates Lightspeed MCP server configuration and connectivity

  • Use before: ALL fleet-inventory operations (Step 0 in workflow)

  • Purpose: Ensures MCP server is available before attempting tool calls

  • Prevents errors from missing configuration or credentials

cve-impact

  • Analyze CVE severity and risk after identifying affected systems

  • Use after: "What systems are affected by CVE-X?" → "What's the risk of CVE-X?"

cve-validation

  • Validate CVE IDs before querying affected systems

  • Use before: If CVE ID format is unclear, validate first

system-context

  • Get detailed system configuration for specific hosts

  • Use after: Fleet discovery identifies systems needing deeper investigation

/remediation (skill) - Transition to remediation workflows after discovery

  • Use after: "Show affected systems" → "Remediate those systems"

Reference Documentation

  • insights-api.md - Red Hat Lightspeed API patterns and response formats

  • fleet-management.md - System inventory best practices and filtering strategies

Skill Orchestration Pattern

Information-First Workflow:

User Query: "Show the managed fleet" ↓ fleet-inventory skill (discovery) ↓ Systems identified: 42 total, 15 affected by CVE-2024-1234 ↓ User: "What's the risk of CVE-2024-1234?" ↓ cve-impact skill (analysis) ↓ CVSS 8.1, Critical severity, affects httpd package ↓ User: "Remediate CVE-2024-1234 on all production systems" ↓ /remediation skill (action) ↓ Playbook generated and executed

Key Principle: Always start with discovery before taking remediation actions. This ensures informed decisions based on actual fleet state.

Output, Examples, Error Handling

Read references/03-output-templates.md for report format. Read references/04-examples.md for fleet, CVE-affected, and environment-filter examples. Read references/05-error-handling.md for no-results, API errors, and stale system handling.

Best Practices

Start broad then filter; group by environment/RHEL/tier; highlight stale systems; offer /remediation transitions; use tables and percentages; declare document consultations; verify prerequisites first.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

cve-validation

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

playbook-generator

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

remediation

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

playbook-executor

No summary provided by upstream source.

Repository SourceNeeds Review