Back to Home
Azure icon

aks-mcp

Verified Safe

by Azure

Overview

The AKS-MCP server acts as a bridge, enabling AI assistants to interact with and manage Azure Kubernetes Service (AKS) clusters and related Azure resources.

Installation

Run Command
npx @modelcontextprotocol/inspector ./aks-mcp --access-level=readwrite

Environment Variables

  • AZURE_TENANT_ID
  • AZURE_CLIENT_ID
  • AZURE_CLIENT_SECRET
  • AZURE_FEDERATED_TOKEN_FILE
  • AZURE_SUBSCRIPTION_ID
  • AZURE_MANAGED_IDENTITY
  • USE_LEGACY_TOOLS
  • AKS_MCP_COLLECT_TELEMETRY
  • APPLICATIONINSIGHTS_INSTRUMENTATION_KEY
  • DISABLE_CACHE

Security Notes

The server implements a three-tier access control (readonly, readwrite, admin) for operations, enforced via command validation and Kubernetes RBAC in Helm deployments. It uses `shlex.Split` to mitigate shell injection risks during CLI command execution. OAuth 2.1 authentication with Azure AD is supported for HTTP transports, including JWT validation and dynamic client registration. Azure credentials are sourced from environment variables or Kubernetes secrets, avoiding hardcoding. Telemetry uses a default Microsoft instrumentation key unless overridden, which is a privacy consideration but not a direct security vulnerability. Strict path validation for federated tokens (`/var/run/secrets/azure/tokens/azure-identity-token`) prevents arbitrary file access. Overall, the project demonstrates a strong focus on security best practices, but improper configuration of 'admin' access can expose sensitive cluster operations.

Similar Servers

Stats

Interest Score53
Security Score8
Cost ClassMedium
Avg Tokens500
Stars105
Forks27
Last Update2026-01-16

Tags

AzureKubernetesAI AssistantsModel Context ProtocolCLICloud ManagementObservabilityDiagnostics