Skip to main content

An MCP server exposing EKS infrastructure details

Project description

MCP EKS Infrastructure Tools

This document describes the Model Context Protocol (MCP) tools available for EKS cluster auditing and infrastructure analysis.

Overview

The EKS Infrastructure MCP Server provides tools to retrieve and analyze Amazon EKS cluster information for auditing and reporting purposes.

Tools

1. getListOfCluster

Description: Retrieves all EKS clusters in the AWS account.

Use Cases:

  • Generate audit summaries or reports when cluster information is not available
  • List all EKS clusters in the account
  • Initial discovery for cluster analysis

Parameters: None

Returns: JSON string containing list of EKS clusters

Example Response:

[
  "cluster-1",
  "cluster-2",
  "production-cluster"
]

2. getEksInfra

Description: Fetches comprehensive EKS cluster infrastructure details including API endpoint, logging configuration, version, encryption settings, and node group information.

Use Cases:

  • Generate detailed audit reports for specific clusters
  • Analyze cluster infrastructure configuration
  • Security and compliance assessments

Parameters:

  • cluster_name (string, required): Name of the EKS cluster to analyze

Returns: Structured JSON with complete cluster information

Example Response:

{
  "cluster_name": "my-cluster",
  "status": "ACTIVE",
  "version": "1.28",
  "endpoint": "https://xxx.eks.region.amazonaws.com",
  "roleArn": "arn:aws:iam::account:role/eks-service-role",
  "vpc_config": {
    "subnetIds": ["subnet-xxx", "subnet-yyy"],
    "securityGroupIds": ["sg-xxx"]
  },
  "logging": {
    "clusterLogging": [
      {
        "types": ["api", "audit"],
        "enabled": true
      }
    ]
  },
  "encryptionConfig": [],
  "node_groups": {
    "nodegroup-1": {
      "version": "1.28",
      "status": "ACTIVE",
      "capacityType": "ON_DEMAND",
      "scalingConfig": {
        "minSize": 1,
        "maxSize": 3,
        "desiredSize": 2
      },
      "instanceTypes": ["t3.medium"],
      "subnets": ["subnet-xxx"],
      "remoteAccess": null,
      "amiType": "AL2_x86_64"
    }
  }
}

Setup

  1. Set the AWS_PROFILE environment variable to specify the AWS profile to use
  2. Ensure proper AWS credentials and permissions for EKS access
  3. Run the MCP server: python mpc_eks_infra.py

Usage Workflow

  1. Discovery: Use getListOfCluster to identify available clusters
  2. Analysis: Use getEksInfra with specific cluster names for detailed information
  3. Reporting: Process the returned JSON data for audit reports and compliance checks

Error Handling

Both tools return error information in JSON format when exceptions occur:

{
  "error": "Error description"
}

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

eks_infra_mcp-0.1.0.tar.gz (3.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

eks_infra_mcp-0.1.0-py3-none-any.whl (4.2 kB view details)

Uploaded Python 3

File details

Details for the file eks_infra_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: eks_infra_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 3.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for eks_infra_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 2ae5b30d573bbd82663d2b9baf5ef0ce3a284b653bc053c55bb5b27353b44c6f
MD5 b21a802cb1d1b91832a17ab56893f751
BLAKE2b-256 318f5c826192647fb0d5ee4911b86d449eef769aefa0f3563c6a99e96099004e

See more details on using hashes here.

File details

Details for the file eks_infra_mcp-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: eks_infra_mcp-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 4.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for eks_infra_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 f55d403801fc406eda2ef0bbc89eeeec500c5136b9980f6cd6a65ada9646698f
MD5 94b12fe03f2bc107a680380a72641d08
BLAKE2b-256 b9c2f24d7711601a01ab4e107340e0f53846f2db8d7606b45a00f40b3fb626c4

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page