Skip to main content

AVI (NSX Advanced Load Balancer) management and AKO Kubernetes operations tool

Project description

VMware AVI

Author: Wei Zhou, VMware by Broadcom — wei-wz.zhou@broadcom.com This is a community-driven project by a VMware engineer, not an official VMware product. For official VMware developer tools see developer.broadcom.com.

English | 中文

AVI (NSX Advanced Load Balancer) management and AKO Kubernetes operations tool — 29 tools across 10 categories.

Dual mode: Traditional AVI Controller management + AKO K8s operations in one skill.

Companion skills handle everything else:

Skill Scope Install
vmware-aiops VM lifecycle, deployment, guest ops, cluster uv tool install vmware-aiops
vmware-monitor Read-only: inventory, health, alarms, events uv tool install vmware-monitor
vmware-storage Datastores, iSCSI, vSAN management uv tool install vmware-storage
vmware-vks Tanzu Namespaces, TKC cluster lifecycle uv tool install vmware-vks
vmware-nsx NSX networking: segments, gateways, NAT uv tool install vmware-nsx-mgmt
vmware-nsx-security DFW firewall rules, security groups uv tool install vmware-nsx-security
vmware-aria Aria Ops: metrics, alerts, capacity uv tool install vmware-aria

PyPI Python License: MIT ClawHub


Quick Install

# Via uv (recommended)
uv tool install vmware-avi

# Or via pip
pip install vmware-avi

# China mainland mirror
pip install vmware-avi -i https://pypi.tuna.tsinghua.edu.cn/simple

# Verify installation
vmware-avi doctor

Capabilities Overview

What This Skill Does

Category Tools Count
Virtual Service list, status, enable/disable 3
Pool Member list, enable/disable member (drain/restore traffic) 3
SSL Certificate list, expiry check 2
Analytics VS metrics overview, request error logs 2
Service Engine list, health check 2
AKO Pod Ops status, logs, restart, version info 4
AKO Config values.yaml view, Helm diff, Helm upgrade 3
Ingress Diagnostics annotation validation, VS mapping, error diagnosis, fix recommendation 4
Sync Diagnostics K8s-Controller comparison, inconsistency list, force resync 3
Multi-cluster cluster list, cross-cluster AKO overview, AMKO status 3

CLI vs MCP: Which Mode to Use

Scenario Recommended Why
Local/small models (Ollama, Qwen) CLI ~2K tokens vs ~8K for MCP
Cloud models (Claude, GPT-4o) Either MCP gives structured JSON I/O
Automated pipelines MCP Type-safe parameters, structured output
AKO troubleshooting CLI Interactive log tailing, Helm diff output

Rule of thumb: Use CLI for cost efficiency and small models. Use MCP for structured automation with large models.

Architecture

User (Natural Language)
  |
AI CLI Tool (Claude Code / Gemini / Codex / Cursor / Trae)
  | reads SKILL.md
  |
vmware-avi CLI
  |--- avisdk (AVI REST API) ---> AVI Controller ---> Virtual Services / Pools / SEs
  |--- kubectl / kubernetes ---> K8s Cluster ---> AKO Pods / Ingress / Services

Configuration

Step 1: Create Config Directory

mkdir -p ~/.vmware-avi
vmware-avi init          # generates config.yaml and .env templates
chmod 600 ~/.vmware-avi/.env

Step 2: Edit config.yaml

controllers:
  - name: prod-avi
    host: avi-controller.example.com
    username: admin
    api_version: "22.1.4"
    tenant: admin
    port: 443
    verify_ssl: true

default_controller: prod-avi

ako:
  kubeconfig: ~/.kube/config
  default_context: ""
  namespace: avi-system

Step 3: Set Passwords

Create ~/.vmware-avi/.env:

# AVI Controller passwords
# Format: VMWARE_AVI_{CONTROLLER_NAME_UPPER}_PASSWORD
VMWARE_AVI_PROD_AVI_PASSWORD=your-password-here

Password environment variable naming convention:

VMWARE_AVI_{CONTROLLER_NAME_UPPER}_PASSWORD
# Replace hyphens with underscores, UPPERCASE
# Example: controller "prod-avi" -> VMWARE_AVI_PROD_AVI_PASSWORD
# Example: controller "staging-alb" -> VMWARE_AVI_STAGING_ALB_PASSWORD

Step 4: Verify

vmware-avi doctor    # checks Controller connectivity + kubeconfig + avisdk

CLI Usage

Virtual Service Management

# List all virtual services
vmware-avi vs list [--controller prod-avi]

# Check status of a specific VS
vmware-avi vs status my-webapp-vs

# Enable / disable a VS (disable requires double confirmation)
vmware-avi vs enable my-webapp-vs
vmware-avi vs disable my-webapp-vs

Pool Member Drain / Restore

# List pool members and health status
vmware-avi pool members my-pool

# Graceful drain (disable) — double confirmation required
vmware-avi pool disable my-pool 10.1.1.5

# Restore traffic (enable)
vmware-avi pool enable my-pool 10.1.1.5

SSL Certificate Expiry Check

# List all certificates
vmware-avi ssl list

# Check certificates expiring within 30 days
vmware-avi ssl expiry --days 30

Analytics and Error Logs

# VS analytics: throughput, latency, error rates
vmware-avi analytics my-webapp-vs

# Request error logs
vmware-avi logs my-webapp-vs --since 1h

Service Engine Health

vmware-avi se list
vmware-avi se health

AKO Troubleshooting

# Check AKO pod status
vmware-avi ako status [--context my-k8s-context]

# View AKO logs
vmware-avi ako logs [--tail 100] [--since 30m]

# Restart AKO pod (double confirmation)
vmware-avi ako restart

# Show AKO version
vmware-avi ako version

AKO Helm Config Management

# View current AKO Helm values
vmware-avi ako config show

# Show pending changes (diff)
vmware-avi ako config diff

# Helm upgrade (double confirmation + --dry-run default)
vmware-avi ako config upgrade

Ingress Diagnostics

# Validate Ingress annotations
vmware-avi ako ingress check <namespace>

# Show Ingress-to-VS mapping
vmware-avi ako ingress map

# Diagnose why an Ingress has no VS
vmware-avi ako ingress diagnose <ingress-name>

Sync Diagnostics

# Check K8s-Controller sync status
vmware-avi ako sync status

# Show inconsistencies between K8s and Controller
vmware-avi ako sync diff

# Force AKO resync (double confirmation)
vmware-avi ako sync force

Multi-cluster AKO

# List clusters with AKO deployed
vmware-avi ako clusters

# Cross-cluster AKO status overview
vmware-avi ako cluster-overview

# AMKO GSLB status
vmware-avi ako amko status

MCP Server

The MCP server exposes all 29 tools via the Model Context Protocol. Works with any MCP-compatible client.

# Run via uvx (recommended)
uvx --from vmware-avi vmware-avi-mcp

# With custom config path
VMWARE_AVI_CONFIG=/path/to/config.yaml uvx --from vmware-avi vmware-avi-mcp

Claude Desktop Config

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "vmware-avi": {
      "command": "uvx",
      "args": ["--from", "vmware-avi", "vmware-avi-mcp"],
      "env": {
        "VMWARE_AVI_CONFIG": "~/.vmware-avi/config.yaml"
      }
    }
  }
}

MCP Tools (29)

Category Tools
Virtual Service (3) vs_list, vs_status, vs_toggle
Pool Member (3) pool_members, pool_member_enable, pool_member_disable
SSL Certificate (2) ssl_list, ssl_expiry_check
Analytics (2) vs_analytics, vs_error_logs
Service Engine (2) se_list, se_health
AKO Pod (4) ako_status, ako_logs, ako_restart, ako_version
AKO Config (3) ako_config_show, ako_config_diff, ako_config_upgrade
Ingress Diagnostics (4) ako_ingress_check, ako_ingress_map, ako_ingress_diagnose, ako_ingress_fix_suggest
Sync Diagnostics (3) ako_sync_status, ako_sync_diff, ako_sync_force
Multi-cluster (3) ako_clusters, ako_cluster_overview, ako_amko_status

Common Workflows

1. Maintenance Window -- Drain a Pool Member

When taking a backend server offline for patching:

  1. List pool members and health status
    vmware-avi pool members my-pool
    
  2. Disable the target server (graceful drain)
    vmware-avi pool disable my-pool 10.1.1.5
    
  3. Monitor analytics to confirm active connections are draining
    vmware-avi analytics my-vs
    
  4. Perform maintenance on the server
  5. Re-enable the server
    vmware-avi pool enable my-pool 10.1.1.5
    
  6. Verify health status is green
    vmware-avi pool members my-pool
    

2. AKO Ingress Not Creating VS

When a developer reports their Ingress is not producing a Virtual Service:

  1. Verify AKO is running
    vmware-avi ako status
    
  2. Validate Ingress annotations
    vmware-avi ako ingress check <namespace>
    
  3. Check sync status between K8s and Controller
    vmware-avi ako sync status
    
  4. If annotations are wrong, diagnose the specific Ingress
    vmware-avi ako ingress diagnose <ingress-name>
    
  5. If sync drift is detected, review the diff and force resync if needed
    vmware-avi ako sync diff
    vmware-avi ako sync force
    

3. SSL Certificate Expiry Audit

Expired certificates cause outages. Run periodic checks:

  1. Check all certificates expiring within 30 days
    vmware-avi ssl expiry --days 30
    
  2. Review which VS uses each expiring certificate (output includes VS mapping)
  3. Plan renewal with the certificate team
  4. After renewal, verify the new certificate is in place
    vmware-avi ssl list
    

Troubleshooting

"Controller unreachable" error

  1. Run vmware-avi doctor to verify connectivity
  2. Check if the controller address and port are correct in ~/.vmware-avi/config.yaml
  3. For self-signed certs: set verify_ssl: false in config.yaml (lab environments only)

AKO Pod in CrashLoopBackOff

  1. Check logs: vmware-avi ako logs --tail 50
  2. Common causes: wrong controller IP in values.yaml, network policy blocking AKO to Controller, expired credentials
  3. Fix config: vmware-avi ako config show to inspect, then Helm upgrade with corrected values

Ingress created but no VS on Controller

  1. Validate annotations: vmware-avi ako ingress check <namespace>
  2. Check AKO logs for rejection reason: vmware-avi ako logs --since 5m
  3. Run sync diff: vmware-avi ako sync diff to see if the object is stuck

Pool member shows "down" after enable

Health monitor may still be failing. The member is enabled but unhealthy. Check the actual health status on the Controller side. Fix the backend service first, then the health status will auto-recover.

SSL expiry check shows 0 certificates

Verify the controller connection has tenant-level access. Certificates are tenant-scoped in AVI. The configured user may only see certs in their tenant.

AKO sync force has no effect

Force resync triggers AKO to re-reconcile all K8s objects. If the drift persists, the issue is likely in the K8s resource definition itself (bad annotation, missing secret). Use vmware-avi ako ingress diagnose to pinpoint the root cause.


Safety Features

Feature Details
Double Confirmation Destructive ops (VS disable, pool member disable, AKO restart, Helm upgrade, force resync) require 2 sequential confirmations
Dry-Run Default ako config upgrade defaults to --dry-run mode -- user must explicitly confirm to apply
Audit Trail All operations logged to ~/.vmware/audit.db via vmware-policy (@vmware_tool decorator)
Password Protection .env file loading with permission check; never in shell history
SSL Support verify_ssl: false for self-signed certs in isolated lab environments only
Prompt Injection Protection All API-sourced text truncated (500 chars max) and C0/C1 control characters stripped
Input Validation Pool names, VS names, IP addresses, and namespace names validated before API calls

Security Details

  • Source Code: github.com/zw008/VMware-AVI
  • Config File Contents: config.yaml stores controller addresses, usernames, and AKO settings. No passwords or tokens. All secrets stored exclusively in .env
  • Webhook Data Scope: Disabled by default. No third-party data transmission
  • TLS Verification: Enabled by default. Disable only for self-signed certificate environments
  • Prompt Injection Protection: _sanitize() truncation + control character cleanup on all AVI API responses
  • Least Privilege: Use a dedicated AVI service account with minimal permissions. AKO operations require only namespace-scoped kubeconfig access

Companion Skills

Skill Scope Tools Install
vmware-avi AVI load balancer, AKO K8s operations 29 uv tool install vmware-avi
vmware-aiops VM lifecycle, deployment, guest ops, cluster 34 uv tool install vmware-aiops
vmware-monitor Read-only monitoring, alarms, events 7 uv tool install vmware-monitor
vmware-storage Datastores, iSCSI, vSAN 11 uv tool install vmware-storage
vmware-vks Tanzu Namespaces, TKC cluster lifecycle 20 uv tool install vmware-vks
vmware-nsx NSX segments, gateways, NAT, routing 32 uv tool install vmware-nsx-mgmt
vmware-nsx-security DFW firewall, security groups, IDS/IPS 20 uv tool install vmware-nsx-security
vmware-aria Aria Ops: metrics, alerts, capacity 27 uv tool install vmware-aria

Troubleshooting & Contributing

If you encounter any errors or issues, please send the error message, logs, or screenshots to zhouwei008@gmail.com. Contributions are welcome -- feel free to join us in maintaining and improving this project!

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vmware_avi-1.5.8.tar.gz (138.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vmware_avi-1.5.8-py3-none-any.whl (37.0 kB view details)

Uploaded Python 3

File details

Details for the file vmware_avi-1.5.8.tar.gz.

File metadata

  • Download URL: vmware_avi-1.5.8.tar.gz
  • Upload date:
  • Size: 138.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"macOS","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for vmware_avi-1.5.8.tar.gz
Algorithm Hash digest
SHA256 b3f2689cc5955759f307f6397214c095a5399685aec2fee9837c4a0edc14dcb7
MD5 a4947990682cc48b24a18497265f0e58
BLAKE2b-256 2788feb7ad76e8dd07acb41b8fe7d638424d5a332ca02d18287cfc06b241ff54

See more details on using hashes here.

File details

Details for the file vmware_avi-1.5.8-py3-none-any.whl.

File metadata

  • Download URL: vmware_avi-1.5.8-py3-none-any.whl
  • Upload date:
  • Size: 37.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"macOS","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for vmware_avi-1.5.8-py3-none-any.whl
Algorithm Hash digest
SHA256 8b8592659799bbfe7eda10969136faad355ebd1125af18565cf025dc106c49aa
MD5 213c33712cf9456378945bcecd64a9ae
BLAKE2b-256 f2df0b1a3ab2068ebbb75487a865294e3b3266d4a68d4ef44e25cc595b0cc5d3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page