{"id":"homayoonalimohammadi-k8s-mcp-server","name":"k8s-mcp-server","homepage":null,"repo_url":"https://github.com/HomayoonAlimohammadi/k8s-mcp-server","category":"infrastructure","subcategories":[],"tags":["kubernetes","mcp","go","ai-agent","cloud-infrastructure","devtools","observability"],"what_it_does":"An MCP server that exposes Kubernetes read-only style tools to AI assistants: getting a specific Kubernetes resource and listing resources by kind with optional namespace and labelSelector filtering. It supports both in-cluster configuration and external kubeconfig.","use_cases":["AI-assisted debugging of Kubernetes workloads (e.g., inspect Pods/Deployments)","Generating context-aware summaries from Kubernetes resources","Automated inventorying of cluster resources by kind/namespace/labels","Building agent workflows that query Kubernetes state via MCP tools"],"not_for":["Performing write/scale/delete operations (not documented as supported)","Multi-tenant production deployments without strong RBAC and auditing","Handling sensitive cluster data in untrusted agent environments"],"best_when":"You have an MCP-capable client and appropriate Kubernetes RBAC, and you want an agent to query cluster state (read operations) reliably.","avoid_when":"You cannot control the Kubernetes credentials/RBAC used by the server, or you need strong guarantees around output sanitization and auditability for sensitive environments.","alternatives":["Using the Kubernetes API directly with a tool wrapper (REST client)","Open-source Kubernetes agent/tooling frameworks that provide read APIs","Building a custom MCP server around the Kubernetes Go client with tighter RBAC and specific resource schemas"],"af_score":47.5,"security_score":50.0,"reliability_score":13.8,"package_type":"mcp_server","discovery_source":["github"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:20:08.581225+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Kubeconfig (external cluster access)","In-cluster service account (Kubernetes in-cluster config)"],"oauth":false,"scopes":false,"notes":"Authentication is delegated to Kubernetes credentials (kubeconfig or service account). No agent-facing OAuth scopes described; Kubernetes RBAC controls effective permissions."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":null},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":47.5,"security_score":50.0,"reliability_score":13.8,"mcp_server_quality":55.0,"documentation_accuracy":60.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":70.0,"rate_limit_clarity":0.0,"tls_enforcement":40.0,"auth_strength":60.0,"scope_granularity":45.0,"dependency_hygiene":40.0,"secret_handling":60.0,"security_notes":"Relies on Kubernetes auth (kubeconfig/service account) rather than custom auth. TLS requirements for the MCP transport are not specified in the provided README. Effective authorization depends on Kubernetes RBAC; without explicit mention of RBAC constraints, least-privilege cannot be assumed. Secret handling details (e.g., whether kubeconfig contents are logged) are not documented. Rate limiting/audit logging controls are not described.","uptime_documented":0.0,"version_stability":20.0,"breaking_changes_history":10.0,"error_recovery":25.0,"idempotency_support":"true","idempotency_notes":"Operations described are reads (get/list), which are naturally idempotent; exact MCP semantics for retries/error responses are not documented.","pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Listing resources may return large results; without pagination/limits documented, agents could time out or overwhelm context windows.","Kubernetes RBAC strongly affects what the server can return; permission errors may occur depending on the service account/kubeconfig used.","Because tool schemas are generic (kind/name/namespace/labelSelector), agents may request kinds that are not supported/registered, leading to errors."]}}