kubernetes-mcp-server
MCP ServerFreeModel Context Protocol (MCP) server for Kubernetes and OpenShift
Capabilities11 decomposed
kubernetes cluster introspection via mcp protocol
Medium confidenceExposes Kubernetes API resources (pods, deployments, services, configmaps, secrets, etc.) as MCP tools that LLM agents can invoke. Uses the Kubernetes client library to authenticate against kubeconfig and translate kubectl-equivalent queries into structured resource listings with full metadata, enabling agents to inspect cluster state without direct kubectl access.
Bridges Kubernetes API directly into MCP protocol, allowing LLM agents to query cluster state through standardized tool-calling interface rather than shelling out to kubectl or managing raw API calls
Simpler than building custom Kubernetes API clients in agent code; more structured than kubectl JSON parsing; integrates natively with Claude and other MCP-compatible LLMs without wrapper scripts
namespace-scoped resource filtering and listing
Medium confidenceImplements namespace-aware filtering for Kubernetes resources, allowing agents to query resources within specific namespaces or across all namespaces. Uses the Kubernetes client's namespace parameter to scope API calls and returns filtered lists with namespace context preserved in metadata, enabling multi-tenant cluster operations.
Implements namespace-scoped queries as first-class MCP tools rather than requiring agents to manually construct namespace filters, with RBAC enforcement built into the query layer
More granular than kubectl's default namespace switching; enforces RBAC at query time rather than relying on client-side filtering; integrates namespace context directly into MCP tool signatures
openshift-specific resource querying
Medium confidenceExtends Kubernetes resource querying to support OpenShift-specific resources (Routes, Projects, DeploymentConfigs, ImageStreams, etc.) using the same MCP tool interface. Detects OpenShift cluster and exposes OpenShift API groups alongside standard Kubernetes resources, enabling agents to manage OpenShift deployments with the same tool set.
Detects OpenShift cluster and automatically exposes OpenShift-specific resources (Routes, Projects, DeploymentConfigs) through the same MCP tool interface as Kubernetes resources, enabling unified agent tooling across both platforms
Single tool set for Kubernetes and OpenShift; automatic platform detection; no separate OpenShift-specific agent configuration required; cleaner than maintaining separate Kubernetes and OpenShift tool implementations
pod and container status inspection
Medium confidenceProvides detailed pod status including container states, restart counts, resource requests/limits, and node assignments. Queries the Kubernetes API for pod metadata and status subresources, returning structured data about container readiness, phase transitions, and resource allocation to help agents diagnose pod health and performance issues.
Exposes Kubernetes pod status subresource through MCP, giving agents structured access to container state machines (Waiting, Running, Terminated) and condition arrays rather than requiring log parsing or raw API calls
More reliable than parsing kubectl output; includes structured condition data that kubectl hides; integrates pod status directly into agent decision-making without intermediate parsing layers
deployment and replicaset configuration retrieval
Medium confidenceQueries deployment and ReplicaSet resources to return pod templates, replica counts, update strategies, and selector labels. Uses the Kubernetes API to fetch spec and status fields, enabling agents to understand scaling configuration, image versions, and rollout state without inspecting individual pods.
Exposes deployment and ReplicaSet specs as MCP tools with structured access to pod templates and scaling configuration, allowing agents to reason about deployment intent without kubectl templating or manual YAML parsing
Cleaner than kubectl get -o json piped through jq; includes ReplicaSet history context; integrates deployment configuration directly into agent reasoning about scaling and updates
service and endpoint discovery
Medium confidenceRetrieves Service resources and their associated Endpoints, exposing cluster DNS names, port mappings, and backend pod addresses. Queries the Kubernetes API for Service specs and Endpoint subresources, enabling agents to understand network topology and service routing without manual DNS lookups or port-forwarding.
Combines Service and Endpoint queries into a single MCP tool, giving agents unified visibility into cluster DNS and routing without separate API calls or manual endpoint enumeration
More direct than kubectl service discovery commands; includes endpoint data in single query; integrates network topology directly into agent reasoning about service connectivity
configmap and secret metadata inspection
Medium confidenceRetrieves ConfigMap and Secret resource metadata including keys, data size, and creation timestamps, without exposing sensitive values. Uses the Kubernetes API to fetch resource metadata and key lists, enabling agents to audit configuration and secret usage without accessing plaintext credentials or large data payloads.
Implements metadata-only inspection of Secrets and ConfigMaps through MCP, preventing accidental exposure of sensitive data while still allowing agents to audit configuration and secret usage patterns
Safer than kubectl get secrets -o json which exposes base64-encoded values; provides structured metadata for auditing without requiring custom RBAC policies; integrates security-conscious inspection into agent workflows
container log streaming and retrieval
Medium confidenceFetches container logs from pods using the Kubernetes API logs endpoint, supporting tail limits, timestamp filtering, and multi-container selection. Streams or buffers log data and returns structured output with container context, enabling agents to diagnose application issues without kubectl access or log aggregation systems.
Exposes Kubernetes pod logs API through MCP with structured container context and filtering options, allowing agents to retrieve and analyze logs without kubectl or log aggregation platform access
More direct than kubectl logs with piping; supports multi-container context; integrates log retrieval into agent decision-making without external log platform dependencies
node and cluster resource inspection
Medium confidenceQueries Node resources to retrieve capacity, allocatable resources, and node conditions (Ready, MemoryPressure, DiskPressure, etc.). Uses the Kubernetes API to fetch node metadata and status, enabling agents to understand cluster capacity and node health without metrics-server or custom monitoring.
Exposes Kubernetes Node API through MCP with structured access to capacity, conditions, and taints, enabling agents to reason about cluster infrastructure without metrics-server or custom monitoring tools
Simpler than querying metrics-server; includes node conditions and taint data; integrates infrastructure context directly into agent capacity planning and scheduling analysis
custom resource definition (crd) querying
Medium confidenceSupports querying custom resources defined via CustomResourceDefinitions (CRDs), allowing agents to inspect application-specific Kubernetes objects beyond built-in resource types. Uses the Kubernetes API's dynamic client to handle arbitrary CRD schemas, returning structured data for custom resources with full metadata and spec access.
Uses Kubernetes dynamic client to support arbitrary CRDs without hardcoding resource types, enabling agents to query application-specific resources (service mesh, operators, etc.) through a unified MCP interface
More flexible than hardcoded resource types; supports any CRD without code changes; integrates custom resource querying into agent workflows without requiring separate API clients per CRD
mcp tool registration and schema exposure
Medium confidenceImplements the Model Context Protocol by registering Kubernetes query capabilities as MCP tools with JSON Schema definitions, enabling LLM clients to discover and invoke Kubernetes operations through standardized tool-calling interfaces. Uses MCP server SDK to define tool schemas, handle tool invocations, and return structured results compatible with Claude and other MCP-aware LLMs.
Implements full MCP server specification for Kubernetes, exposing cluster operations as discoverable tools with JSON Schema definitions rather than requiring agents to construct raw API calls or kubectl commands
Standardized MCP protocol enables interoperability with multiple LLM clients; structured schemas enable LLMs to understand tool parameters without documentation; cleaner than custom function-calling implementations
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with kubernetes-mcp-server, ranked by overlap. Discovered automatically through the match graph.
mcp-k8s-go
** - Golang-based Kubernetes MCP Server. Built to be extensible.
mcp-server-kubernetes
MCP server for interacting with Kubernetes clusters via kubectl
kubernetes-mcp-server
Model Context Protocol (MCP) server for Kubernetes and OpenShift
Metoro
** - Query and interact with kubernetes environments monitored by Metoro
Kubernetes MCP Server
Manage Kubernetes clusters, pods, and deployments via MCP.
Kubernetes
** - Connect to Kubernetes cluster and manage pods, deployments, services.
Best For
- ✓DevOps teams building AI-assisted cluster management agents
- ✓Platform engineers integrating Kubernetes observability into LLM workflows
- ✓SREs automating incident response with context-aware AI assistants
- ✓Multi-tenant Kubernetes clusters with namespace isolation
- ✓Teams managing separate environments (dev, staging, prod) via namespaces
- ✓Agents requiring namespace-scoped RBAC enforcement
- ✓Teams managing OpenShift clusters with AI agents
- ✓Hybrid Kubernetes/OpenShift environments requiring unified tooling
Known Limitations
- ⚠Requires valid kubeconfig with appropriate RBAC permissions — cannot escalate privileges beyond authenticated user
- ⚠Returns metadata only; does not stream real-time events or watch resources for changes
- ⚠No built-in caching — each query hits the Kubernetes API directly, adding latency for large clusters
- ⚠Limited to single cluster per MCP server instance — multi-cluster requires multiple server instances
- ⚠Respects RBAC — agent can only list namespaces and resources the authenticated user has permission to access
- ⚠No namespace creation/deletion — read-only for namespace enumeration
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Package Details
About
Model Context Protocol (MCP) server for Kubernetes and OpenShift
Categories
Alternatives to kubernetes-mcp-server
Are you the builder of kubernetes-mcp-server?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →