Available Charts
ChatCLI Server
Multi-provider LLM gRPC gateway with agent mode, K8s watcher, MCP, and AIOps.
OCI Registry:
oci://ghcr.io/diillson/charts/chatcliChatCLI Operator
Kubernetes operator for autonomous incident detection, AI analysis, and automated remediation.
OCI Registry:
oci://ghcr.io/diillson/charts/chatcli-operatorHow the Integration Works
The ArtifactHub integration is fully automated and based on three pillars:1. Repository File (artifacthub-repo.yml)
At the project root there is an artifacthub-repo.yml file that registers the repositories on ArtifactHub. It uses multi-document YAML format to declare two independent repositories:
Each chart has a unique
repositoryID. ArtifactHub reads this file to automatically sync repository metadata.2. Chart Annotations (Chart.yaml)
Each chart’s Chart.yaml contains ArtifactHub-specific annotations that enrich the package page in the catalog:
Available Annotations
| Annotation | Description | Server | Operator |
|---|---|---|---|
artifacthub.io/license | Chart license | Apache-2.0 | Apache-2.0 |
artifacthub.io/operator | Whether it is a Kubernetes operator | false | true |
artifacthub.io/operatorCapabilities | Operator maturity level | — | Seamless Upgrades |
artifacthub.io/containsSecurityUpdates | Flags security updates | false | false |
artifacthub.io/prerelease | Marks as pre-release version | false | false |
artifacthub.io/crds | CRDs installed by the chart | 17 CRDs | 17 CRDs |
artifacthub.io/crdsExamples | CRD usage examples | 3 examples | 4 examples |
artifacthub.io/links | Links to documentation and source code | 2 links | 2 links |
artifacthub.io/maintainers | Chart maintainers | 1 | 1 |
3. Publishing Pipeline (GitHub Actions)
Publishing is fully automated via GitHub Actions in the3-publish-release.yml workflow. On each release:
Documented CRDs
Both charts declare 17 Custom Resource Definitions in the annotations, which are automatically displayed on the ArtifactHub page:| CRD | Version | Description |
|---|---|---|
AIInsight | v1alpha1 | AI-generated analysis and recommendations for detected issues |
Anomaly | v1alpha1 | Raw signal from watchers before correlation into issues |
ApprovalPolicy | v1alpha1 | Approval requirements for remediation actions (auto/manual/quorum) |
ApprovalRequest | v1alpha1 | Pending approval with blast radius assessment |
AuditEvent | v1alpha1 | Immutable record of actions on the AIOps platform |
ChaosExperiment | v1alpha1 | Chaos engineering experiment targeting Kubernetes resources |
ClusterRegistration | v1alpha1 | Registered cluster for multi-cluster federation |
EscalationPolicy | v1alpha1 | Escalation chains for incident management |
IncidentSLA | v1alpha1 | SLA targets for response and resolution by severity |
Instance | v1alpha1 | ChatCLI instance configuration |
Issue | v1alpha1 | Correlated operational problem detected in the cluster |
NotificationPolicy | v1alpha1 | Multi-channel notification delivery rules |
PostMortem | v1alpha1 | Full incident lifecycle report after resolution |
RemediationPlan | v1alpha1 | Remediation plan with 54+ action types |
Runbook | v1alpha1 | Operational procedures linked to issue types |
ServiceLevelObjective | v1alpha1 | SLO with burn rate alerting and error budgets |
SourceRepository | v1alpha1 | Links workloads to source code for code-aware analysis |
CRDs are shared between the server and operator charts. If both are installed in the same cluster, the CRDs from whichever chart was installed first will be used.
Installation via ArtifactHub
ChatCLI Server
ChatCLI Operator
From Source
Using an Existing Secret
Upgrade and Removal
Upgrade to Latest Version
Uninstall
Chart Structure
Helm charts are located indeploy/helm/ in the repository:
Differences Between Charts
| Aspect | ChatCLI Server | ChatCLI Operator |
|---|---|---|
| Purpose | LLM gRPC gateway with agents and watcher | Autonomous incident detection and remediation |
| ArtifactHub Type | Application | Operator |
artifacthub.io/operator | false | true |
| Capabilities | — | Seamless Upgrades |
| CRD Examples | Issue, ApprovalPolicy, SLO | Issue, ApprovalPolicy, ChaosExperiment, SLO |
| Keywords | chatcli, llm, grpc, ai, mcp, aiops | operator, aiops, remediation, sre, chaos-engineering |
| OCI Registry | oci://ghcr.io/diillson/charts/chatcli | oci://ghcr.io/diillson/charts/chatcli-operator |
Chart Security
Both charts follow Kubernetes security best practices:Non-Root
Containers run as non-root user (UID 1000) with
runAsNonRoot: true.Read-Only Filesystem
readOnlyRootFilesystem: true — only mounted volumes are writable.Capabilities Dropped
All Linux capabilities are dropped with
drop: ["ALL"].Seccomp
RuntimeDefault seccomp profile enabled by default.Requirements
- Kubernetes: 1.30+
- Helm: 3.10+ (OCI registry support)
- LLM Provider: At least one API key configured (OpenAI, Anthropic, Google, xAI, StackSpot, GitHub Copilot, or Ollama)
Next Steps
Docker & K8s Deploy
Complete deployment guide with Docker, Compose, and Helm.
K8s Operator
AIOps operator details with 17 CRDs.
AIOps Platform
Overview of the intelligent operations platform.