kubevirt-mcp-server
Provides a Model Context Protocol (MCP) server that exposes KubeVirt operations (VM lifecycle actions and read-only status/config data) as MCP tools, prompts, and structured resources/URIs. It uses KUBECONFIG to talk to a KubeVirt-enabled Kubernetes cluster.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Strength: uses Kubernetes RBAC via kubeconfig and README recommends least-privilege service account usage. Weaknesses/unknowns: no described MCP transport/authentication beyond kubeconfig; TLS enforcement and any in-process secret logging protections are not stated; dependency vulnerability status is not provided; scope granularity is constrained by Kubernetes RBAC rather than per-tool/per-call authorization.
⚡ Reliability
Best When
You want an LLM/agent to perform controlled KubeVirt management and inspection in a Kubernetes environment where you can supply a least-privilege kubeconfig to the MCP server process.
Avoid When
You need strict auditability, fine-grained per-request authorization, or you cannot provide least-privilege credentials; also avoid when you require explicit, documented rate limiting or idempotency guarantees.
Use Cases
- • Let an AI agent manage KubeVirt VMs (start/stop/restart/pause/unpause/create/delete) via MCP
- • Fetch VM/VMI/DataVolume/instance type/preference information using structured MCP resources
- • Provide LLM-friendly troubleshooting and health-check prompts for KubeVirt workloads
- • Integrate KubeVirt management into developer workflows (e.g., Claude CLI MCP integration)
Not For
- • Production-grade remote multi-tenant deployment without careful security hardening
- • Use cases requiring an HTTP/REST API or SDKs instead of MCP
- • Environments without an available KubeVirt cluster and valid kubeconfig credentials
Interface
Authentication
The server relies on Kubernetes RBAC via the kubeconfig supplied to the MCP server process. No additional MCP/API authentication mechanism is described in the provided README.
Pricing
Open-source tooling (license not specified in provided metadata). Pricing is not applicable from the provided information.
Agent Metadata
Known Gotchas
- ⚠ Actions require appropriate Kubernetes/KubeVirt RBAC; the MCP server will fail if kubeconfig lacks permissions.
- ⚠ Some tools may have side effects and are not guaranteed idempotent (e.g., create/delete/patch/restart).
- ⚠ Correct namespace scoping is essential; resources are namespaced (unless using cluster-wide URIs).
- ⚠ URIs must match the expected kubevirt:// formats; invalid URIs should error.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for kubevirt-mcp-server.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-04-04.