Loading...

MCP server for Kubernetes, built in Go, enabling resource browsing, management, and interaction with tools like Claude via command-line or Docker.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
MCP server for Kubernetes, built in Go, enabling resource browsing, management, and interaction with tools like Claude via command-line or Docker.
This MCP server offers configurable safety through read-only mode and context restrictions. However, improper configuration or running in write mode without proper RBAC controls can pose security risks. Exercise caution when granting access to modify resources or execute commands.
Performance depends on the size and complexity of the Kubernetes cluster. Listing large numbers of resources can be slow.
Cost is primarily related to the resources consumed by the MCP server itself. There may be costs associated with API calls to the Kubernetes API server, depending on the frequency of use.
npx @modelcontextprotocol/inspector{
"mcpServers": {
"mcp_k8s": {
"command": "mcp-k8s",
"args": []
}
}
}List Kubernetes contextsLists available Kubernetes contexts.
Read-only operation, no side effects.
List Kubernetes namespacesLists available Kubernetes namespaces.
Read-only operation, no side effects.
List, get, create and modify any Kubernetes resourcesLists, retrieves, creates, and modifies Kubernetes resources.
Can modify cluster state, potentially causing disruption.
List Kubernetes nodesLists available Kubernetes nodes.
Read-only operation, no side effects.
List Kubernetes podsLists available Kubernetes pods.
Read-only operation, no side effects.
Get Kubernetes eventsRetrieves Kubernetes events.
Read-only operation, no side effects.
Get Kubernetes pod logsRetrieves logs from Kubernetes pods.
Read-only operation, no side effects.
Run command in Kubernetes podExecutes a command inside a Kubernetes pod.
Can execute arbitrary commands with the pod's privileges.
Environment Variable
This MCP server offers configurable safety through read-only mode and context restrictions. However, improper configuration or running in write mode without proper RBAC controls can pose security risks. Exercise caution when granting access to modify resources or execute commands.
Autonomy depends on the configured permissions and the use of read-only mode. Without restrictions, the tool can perform destructive actions.
Production Tip
Use `--allowed-contexts` and `--readonly` flags in production to restrict access and prevent accidental modifications.
Use the `--allowed-contexts` command-line option with a comma-separated list of allowed contexts.
Run the server in read-only mode using the `--readonly` command-line option.
Follow the instructions in the README, choosing an installation method and adding the appropriate configuration to the `claude_desktop_config.json` file.
The server requires permissions to list, get, create, and modify Kubernetes resources, depending on the intended use case. Use RBAC to grant the necessary permissions to the service account used by the server.
Yes, as long as the server has access to the Kubernetes API server and the necessary credentials are configured in the KUBECONFIG file.
The update process depends on the installation method used. For example, if installed via npm, use `npm update -g @strowk/mcp-k8s`.
No, it connects to a single cluster defined by the KUBECONFIG environment variable. However, you can switch between clusters by modifying the KUBECONFIG variable or using contexts.