Back to Home
talkops-ai icon

talkops-mcp

Verified Safe

by talkops-ai

Overview

A Model Context Protocol (MCP) server for AI assistants to manage Kubernetes applications via ArgoCD using GitOps principles, enabling secure, production-grade operations.

Installation

Run Command
docker run --rm -it -p 8765:8765 -v ~/.ssh/id_ed25519:/app/.ssh/id_rsa:ro -e ARGOCD_SERVER_URL="https://host.docker.internal:8080" -e ARGOCD_AUTH_TOKEN="your-token-here" -e ARGOCD_INSECURE="true" -e SSH_PRIVATE_KEY_PATH=/app/.ssh/id_rsa -e MCP_ALLOW_WRITE="true" sandeep2014/talkops-mcp:argocd-mcp-server-latest

Environment Variables

  • MCP_SERVER_NAME
  • MCP_SERVER_VERSION
  • MCP_TRANSPORT
  • MCP_HOST
  • MCP_PORT
  • MCP_PATH
  • MCP_ALLOW_WRITE
  • MCP_HTTP_TIMEOUT
  • MCP_HTTP_KEEPALIVE_TIMEOUT
  • MCP_HTTP_CONNECT_TIMEOUT
  • MCP_LOG_LEVEL
  • MCP_LOG_FORMAT
  • ARGOCD_SERVER_URL
  • ARGOCD_AUTH_TOKEN
  • ARGOCD_INSECURE
  • ARGOCD_TIMEOUT
  • GIT_USERNAME
  • GIT_PASSWORD
  • SSH_PRIVATE_KEY_PATH

Security Notes

The ArgoCD MCP server implements robust security. It defaults to a read-only mode (`MCP_ALLOW_WRITE=false`), preventing all mutating operations unless explicitly enabled. Sensitive credentials (ArgoCD API tokens, Git passwords/SSH keys) are read from environment variables or secure file paths, ensuring they are never exposed to LLM models. It supports TLS verification for secure connections to ArgoCD. The codebase appears to follow good practices for input validation and avoids dangerous patterns like `eval` for command execution, leveraging explicit whitelisting and validation mechanisms. Network security is good by design (HTTP/SSE endpoint with configurable host/port).

Similar Servers

Stats

Interest Score32
Security Score9
Cost ClassLow
Stars2
Forks2
Last Update2026-01-19

Tags

ArgoCDGitOpsKubernetesAI AutomationDevOps