mcp-deployment
Verified Safeby Daniel-Warner-X
Overview
Deployment and management of Model Context Protocol (MCP) servers on OpenShift Local for integrating tools like ToolHive and Google Workspace.
Installation
No command providedEnvironment Variables
- GOOGLE_CLIENT_ID
- GOOGLE_CLIENT_SECRET
- MCP_EXTERNAL_URL
Security Notes
The deployment guide explicitly advises `.gitignore`ing sensitive files like Google OAuth credentials (`client_secret_*.json`) and Kubernetes secrets/values files, which is a strong security practice. The deployment is targeted at OpenShift Local, limiting external exposure. The primary security consideration outside of this documentation lies in the trustworthiness of the referenced third-party GitHub repositories for ToolHive and Google Workspace MCP, which are not analyzed here.
Similar Servers
toolhive
ToolHive simplifies and secures the deployment, management, and orchestration of Model Context Protocol (MCP) servers, integrating them with AI clients and providing features like authentication, authorization, and observability.
kubernetes-mcp-server
Facilitates AI agent interaction with Kubernetes and OpenShift clusters by exposing management and observability tools via the Model Context Protocol.
mcp
This repository provides a collection of Model Context Protocol (MCP) servers to enable AI agents to interact with and manage various Oracle Cloud Infrastructure (OCI) services, Oracle Database, and MySQL databases through natural language.
mcp-servers
A curated collection of Model Context Protocol (MCP) server configurations to integrate various developer tools and services with AI agents.