OpenStack operations automation MCP server
Project description
MCP-OpenStack-Ops
MCP OpenStack Operations Server: A comprehensive MCP (Model Context Protocol) server providing OpenStack cluster management and monitoring capabilities. This server enables AI assistants to interact with OpenStack infrastructure through standardized tools for real-time monitoring, resource management, and operational tasks.
Features
- ✅ OpenStack Integration: Direct integration with OpenStack SDK for real-time cluster operations
- ✅ Large-Scale Environment Support: Pagination and limits for environments with thousands of instances
- ✅ Comprehensive Monitoring: Cluster status, service monitoring, resource utilization tracking with performance metrics
- ✅ Advanced Instance Management: Start, stop, restart, pause/unpause OpenStack instances with pagination support
- ✅ Intelligent Search: Flexible instance search with partial matching and case-sensitive options
- ✅ Volume Operations: Create, delete, list, and manage OpenStack volumes
- ✅ Network Analysis: Detailed network, subnet, router, and security group information
- ✅ Connection Optimization: Global connection caching and automatic retry mechanisms
- ✅ Flexible Transport: Support for both
stdioandstreamable-httptransports - ✅ Comprehensive Logging: Configurable logging levels with structured output and performance tracking
- ✅ Environment Configuration: Support for environment variables and CLI arguments
- ✅ Error Handling: Robust error handling and configuration validation with fallback data
- ✅ Docker Support: Containerized deployment with Docker Compose
MCP Tools Available
🔍 Monitoring Tools
get_cluster_status- Overall cluster status with instances, networks, and servicesget_service_status- OpenStack service health and API endpoint statusget_instance_details- Detailed information for specific instances with pagination support- Supports filtering by instance names or IDs
- Pagination parameters:
limit(default 50, max 200),offset(default 0) - Performance metrics and processing time tracking
- Safety limits for large-scale environments
search_instances- Advanced instance search with flexible criteria- Search fields: name, status, host, flavor, image, availability_zone, all
- Partial string matching with case-sensitive options
- Optimized 2-phase search for large environments
- Pagination support for search results
monitor_resources- Real-time resource usage and capacity monitoring
🌐 Network Tools
get_network_details- Network, subnet, router, and security group details
⚙️ Management Tools
manage_instance- Instance lifecycle operations (start/stop/restart/pause/unpause)manage_volume- Volume management operations (create/delete/list/extend)
Quick Start
1. Environment Setup
# Clone and navigate to project
cd MCP-OpenStack-Ops
# Install dependencies
uv sync
# Configure environment
cp .env.example .env
# Edit .env with your OpenStack credentials
2. OpenStack Configuration
Configure your .env file with OpenStack credentials:
# OpenStack Authentication
OS_AUTH_URL=https://your-openstack:5000/v3
OS_IDENTITY_API_VERSION=3
OS_USERNAME=your-username
OS_PASSWORD=your-password
OS_PROJECT_NAME=your-project
OS_PROJECT_DOMAIN_NAME=default
OS_USER_DOMAIN_NAME=default
OS_REGION_NAME=RegionOne
# MCP Server Configuration (optional)
MCP_LOG_LEVEL=INFO
FASTMCP_TYPE=stdio
FASTMCP_HOST=127.0.0.1
FASTMCP_PORT=8080
3. Run Server
For Development & Testing
# Local testing with MCP Inspector
./scripts/run-mcp-inspector-local.sh
# Direct execution for debugging
uv run python -m mcp_openstack_ops --log-level DEBUG
For Production (Docker)
# Build and run with Docker Compose
docker-compose up -d
# Check logs
docker-compose logs -f mcp-server
For Claude Desktop Integration
Add to your Claude Desktop configuration:
{
"mcpServers": {
"openstack-ops": {
"command": "uv",
"args": ["run", "python", "-m", "mcp_openstack_ops"],
"cwd": "/path/to/MCP-OpenStack-Ops"
}
}
}
Server Configuration
Command Line Options
uv run python -m mcp_openstack_ops --help
Options:
--log-level {DEBUG,INFO,WARNING,ERROR,CRITICAL}
Logging level
--type {stdio,streamable-http}
Transport type (default: stdio)
--host HOST Host address for HTTP transport (default: 127.0.0.1)
--port PORT Port number for HTTP transport (default: 8080)
--auth-enable Enable Bearer token authentication for streamable-http mode
--secret-key SECRET Secret key for Bearer token authentication
Environment Variables
| Variable | Description | Default | Usage |
|---|---|---|---|
| OpenStack Authentication | |||
OS_AUTH_URL |
OpenStack Identity service URL | Required | Authentication endpoint |
OS_USERNAME |
OpenStack username | Required | User credentials |
OS_PASSWORD |
OpenStack password | Required | User credentials |
OS_PROJECT_NAME |
OpenStack project name | Required | Project scope |
OS_IDENTITY_API_VERSION |
Identity API version | 3 |
API version |
OS_PROJECT_DOMAIN_NAME |
Project domain name | default |
Domain scope |
OS_USER_DOMAIN_NAME |
User domain name | default |
Domain scope |
OS_REGION_NAME |
OpenStack region | RegionOne |
Regional scope |
| MCP Server Configuration | |||
MCP_LOG_LEVEL |
Logging level | INFO |
Development debugging |
FASTMCP_TYPE |
Transport type | stdio |
Rarely needed to change |
FASTMCP_HOST |
HTTP host address | 127.0.0.1 |
For HTTP mode only |
FASTMCP_PORT |
HTTP port number | 8080 |
For HTTP mode only |
| Authentication (Optional) | |||
REMOTE_AUTH_ENABLE |
Enable Bearer token authentication for streamable-http mode | false |
Production security |
REMOTE_SECRET_KEY |
Secret key for Bearer token authentication | Required when auth enabled | Production security |
Note: MCP servers typically use stdio transport. HTTP mode is mainly for testing and development.
Example Queries
For comprehensive tool usage examples and query patterns, see: Example Queries in Prompt Template
Performance Optimization
Large-Scale Environment Support
The MCP server is optimized for large OpenStack environments with thousands of instances:
Pagination Features:
- Default limits prevent memory overflow (50 instances per request)
- Configurable safety limits (maximum 200 instances per request)
- Offset-based pagination for browsing large datasets
- Performance metrics tracking (processing time, instances per second)
Search Optimization:
- 2-phase search process (basic info filtering → detailed info retrieval)
- Intelligent caching with connection reuse
- Selective API calls to minimize overhead
- Case-sensitive search options for precise filtering
Connection Management:
- Global connection caching with validity testing
- Automatic retry mechanisms for transient failures
- Connection pooling for high-throughput scenarios
Usage Examples:
# Safe large environment browsing
get_instance_details(limit=50, offset=0) # First 50 instances
get_instance_details(limit=50, offset=50) # Next 50 instances
# Emergency override for small environments
get_instance_details(include_all=True) # All instances (use with caution)
# Optimized search for large datasets
search_instances("web", "name", limit=20) # Search with reasonable limit
Development
Adding New Tools
Edit src/mcp_openstack_ops/mcp_main.py to add new MCP tools:
@mcp.tool()
async def my_openstack_tool(param: str) -> str:
"""
Brief description of the tool's purpose.
Functions:
- List specific functions this tool performs
- Describe the operations it enables
- Mention when to use this tool
Use when user requests [specific scenarios].
Args:
param: Description of the parameter
Returns:
Description of return value format.
"""
try:
logger.info(f"Tool called with param: {param}")
# Implementation using functions.py helpers
result = my_helper_function(param)
response = {
"timestamp": datetime.now().isoformat(),
"result": result
}
return json.dumps(response, indent=2, ensure_ascii=False)
except Exception as e:
error_msg = f"Error: Failed to execute tool - {str(e)}"
logger.error(error_msg)
return error_msg
Helper Functions
Add utility functions to src/mcp_openstack_ops/functions.py:
def my_helper_function(param: str) -> dict:
"""Helper function for OpenStack operations"""
try:
conn = get_openstack_connection()
# OpenStack SDK operations
result = conn.some_service.some_operation(param)
logger.info(f"Operation completed successfully")
return {"success": True, "data": result}
except Exception as e:
logger.error(f"Helper function error: {e}")
raise
Testing & Validation
Local Testing
# Test with MCP Inspector (recommended)
./scripts/run-mcp-inspector-local.sh
# Test with debug logging
MCP_LOG_LEVEL=DEBUG uv run python -m mcp_openstack_ops
# Validate OpenStack connection
uv run python -c "from src.mcp_openstack_ops.functions import get_openstack_connection; print(get_openstack_connection())"
Docker Testing
# Build and test in container
docker-compose build
docker-compose up -d
# Check container logs
docker-compose logs -f mcp-server
# Test HTTP endpoint (if using HTTP transport)
curl -X POST http://localhost:18005/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/list"}'
🔐 Security & Authentication
Bearer Token Authentication
For streamable-http mode, this MCP server supports Bearer token authentication to secure remote access. This is especially important when running the server in production environments.
Configuration
Enable Authentication:
# In .env file
REMOTE_AUTH_ENABLE=true
REMOTE_SECRET_KEY=your-secure-secret-key-here
Or via CLI:
uv run python -m mcp_openstack_ops --type streamable-http --auth-enable --secret-key your-secure-secret-key-here
Security Levels
- stdio mode (Default): Local-only access, no authentication needed
- streamable-http + REMOTE_AUTH_ENABLE=false/undefined: Remote access without authentication ⚠️ NOT RECOMMENDED for production
- streamable-http + REMOTE_AUTH_ENABLE=true: Remote access with Bearer token authentication ✅ RECOMMENDED for production
🔒 Default Policy:
REMOTE_AUTH_ENABLEdefaults tofalseif undefined, empty, or null. This ensures the server starts even without explicit authentication configuration.
Client Configuration
When authentication is enabled, MCP clients must include the Bearer token in the Authorization header:
{
"mcpServers": {
"openstack-ops": {
"type": "streamable-http",
"url": "http://your-server:8080/mcp",
"headers": {
"Authorization": "Bearer your-secure-secret-key-here"
}
}
}
}
Security Best Practices
- Always enable authentication when using streamable-http mode in production
- Use strong, randomly generated secret keys (32+ characters recommended)
- Use HTTPS when possible (configure reverse proxy with SSL/TLS)
- Restrict network access using firewalls or network policies
- Rotate secret keys regularly for enhanced security
- Monitor access logs for unauthorized access attempts
Error Handling
When authentication fails, the server returns:
- 401 Unauthorized for missing or invalid tokens
- Detailed error messages in JSON format for debugging
Deployment
Local Development
# Test with MCP Inspector (recommended)
./scripts/run-mcp-inspector-local.sh
# Test with debug logging
MCP_LOG_LEVEL=DEBUG uv run python -m mcp_openstack_ops
# Validate OpenStack connection
uv run python -c "from src.mcp_openstack_ops.functions import get_openstack_connection; print(get_openstack_connection())"
Docker Testing
# Build and test in container
docker-compose build
docker-compose up -d
# Check container logs
docker-compose logs -f mcp-server
# Test HTTP endpoint (if using HTTP transport)
curl -X POST http://localhost:18005/mcp \
-H "Content-Type: application/json" \
-d '{"method": "tools/list"}'
Claude Desktop Integration
Add to your Claude Desktop configuration (claude_desktop_config.json):
Method 1: Local MCP (transport="stdio")
{
"mcpServers": {
"openstack-ops": {
"command": "uv",
"args": ["run", "python", "-m", "mcp_openstack_ops"],
"cwd": "/path/to/MCP-OpenStack-Ops",
"env": {
"OS_AUTH_URL": "https://your-openstack:5000/v3",
"OS_USERNAME": "your-username",
"OS_PASSWORD": "your-password",
"OS_PROJECT_NAME": "your-project",
"MCP_LOG_LEVEL": "INFO"
}
}
}
}
Method 2: Remote MCP (transport="streamable-http")
Without Authentication:
{
"mcpServers": {
"openstack-ops": {
"type": "streamable-http",
"url": "http://localhost:18005/mcp"
}
}
}
With Bearer Token Authentication (Recommended for production):
{
"mcpServers": {
"openstack-ops": {
"type": "streamable-http",
"url": "http://localhost:18005/mcp",
"headers": {
"Authorization": "Bearer your-secure-secret-key-here"
}
}
}
}
Production Deployment
# Using Docker Compose (recommended)
docker-compose up -d
# Manual Docker run
docker build -f Dockerfile.MCP-Server -t mcp-openstack-ops .
docker run -d --name mcp-openstack-ops \
--env-file .env \
-p 18005:8000 \
mcp-openstack-ops
Troubleshooting
Common Issues
-
Authentication Errors
- Verify OpenStack credentials in
.env - Check network connectivity to OpenStack API endpoints
- Validate user permissions and project access
- Verify OpenStack credentials in
-
Tool Execution Failures
- Review logs with
MCP_LOG_LEVEL=DEBUG - Ensure OpenStack services are accessible
- Verify instance/volume/network names exist
- Review logs with
-
Transport Issues
- Use
stdiofor Claude Desktop integration - Use
streamable-httpfor testing and development - Check port availability for HTTP transport
- Use
-
Authentication Issues (streamable-http mode)
- Verify
REMOTE_SECRET_KEYmatches between server and client - Ensure Bearer token is included in client Authorization header
- Check server logs for authentication error details
- Confirm
REMOTE_AUTH_ENABLE=trueis set when using authentication
- Verify
Getting Help
- Check logs for detailed error messages
- Validate OpenStack connectivity independently
- Test individual tools with MCP Inspector
- Review OpenStack SDK documentation for API requirements
License
This project is licensed under the MIT License - see the LICENSE file for details.
Contributing
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add some amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
HTTP Mode (Advanced)
For special testing scenarios only:
# Run HTTP server for testing
python -m src.mcp_openstack_ops.mcp_main \
--type streamable-http \
--host 127.0.0.1 \
--port 8080 \
--log-level DEBUG
Testing & Development
# Test with MCP Inspector
./scripts/run-mcp-inspector-local.sh
# Direct execution for debugging
python -m src.mcp_openstack_ops.mcp_main --log-level DEBUG
# Run tests (if you add any)
uv run pytest
Logging
The server provides structured logging with configurable levels:
2024-08-19 10:30:15 - mcp_main - INFO - Starting MCP server with stdio transport
2024-08-19 10:30:15 - mcp_main - INFO - Log level set via CLI to INFO
2024-08-19 10:30:16 - functions - DEBUG - Fetching data from source: example.com
Notes
- The script replaces mcp_openstack_ops (underscore), mcp-openstack-ops (hyphen), and mcp-openstack-ops (display name)
- Configuration validation ensures proper setup before server start
- If you need to rename again, revert changes or re-clone and re-run
- A backup
pyproject.toml.bakis created when overwriting pyproject
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mcp_openstack_ops-0.0.5.tar.gz.
File metadata
- Download URL: mcp_openstack_ops-0.0.5.tar.gz
- Upload date:
- Size: 29.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bc975853167978395d18f9bed39ff5899ae261b1221f4a04c616d02e3ead676d
|
|
| MD5 |
bc6635aff7ffe3ed06164a9fa99ce3cb
|
|
| BLAKE2b-256 |
9ba0ce5607880eed41b7ddf052ccbd441b39f2ca55bbc083965229bf04a69338
|
Provenance
The following attestation bundles were made for mcp_openstack_ops-0.0.5.tar.gz:
Publisher:
pypi-publish.yml on call518/MCP-OpenStack-Ops
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_openstack_ops-0.0.5.tar.gz -
Subject digest:
bc975853167978395d18f9bed39ff5899ae261b1221f4a04c616d02e3ead676d - Sigstore transparency entry: 524147696
- Sigstore integration time:
-
Permalink:
call518/MCP-OpenStack-Ops@c1aa93809a8bc5be57c9cd5a9031ead5266ac92b -
Branch / Tag:
refs/tags/0.0.5 - Owner: https://github.com/call518
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi-publish.yml@c1aa93809a8bc5be57c9cd5a9031ead5266ac92b -
Trigger Event:
push
-
Statement type:
File details
Details for the file mcp_openstack_ops-0.0.5-py3-none-any.whl.
File metadata
- Download URL: mcp_openstack_ops-0.0.5-py3-none-any.whl
- Upload date:
- Size: 25.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7f3cae1790a151a60737678b7d6a115ba79e672b8261d0559b95745e193d4030
|
|
| MD5 |
17d549f9a5920cd620e57d5de23906cf
|
|
| BLAKE2b-256 |
aec8b9ee07271a306f16c59d7b16955c394075752e206319448d2bf251c1dee9
|
Provenance
The following attestation bundles were made for mcp_openstack_ops-0.0.5-py3-none-any.whl:
Publisher:
pypi-publish.yml on call518/MCP-OpenStack-Ops
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_openstack_ops-0.0.5-py3-none-any.whl -
Subject digest:
7f3cae1790a151a60737678b7d6a115ba79e672b8261d0559b95745e193d4030 - Sigstore transparency entry: 524147699
- Sigstore integration time:
-
Permalink:
call518/MCP-OpenStack-Ops@c1aa93809a8bc5be57c9cd5a9031ead5266ac92b -
Branch / Tag:
refs/tags/0.0.5 - Owner: https://github.com/call518
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi-publish.yml@c1aa93809a8bc5be57c9cd5a9031ead5266ac92b -
Trigger Event:
push
-
Statement type: