Enables interaction with GitHub's API, providing tools for AI agents to manage repositories, issues, pull requests, and file contents programmatically.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@GitHub MCP Server on Amazon Bedrock AgentCorelist my open pull requests in the terraform repository"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
GitHub MCP Server on Amazon Bedrock AgentCore
Private GitHub MCP Server hosted on Amazon Bedrock AgentCore Runtime, accessible via AWS Client VPN with Okta OAuth authentication.
Overview
The official GitHub MCP Server runs as a managed container on AgentCore Runtime. AgentCore handles TLS termination, JWT authorization, and container lifecycle. Developers connect from any MCP-compatible IDE (Kiro, VS Code, Cursor) using mcp-remote, which handles OAuth login via Okta.
What AgentCore Replaces
ECS Cluster, Service, Task Definition
Application Load Balancer + self-signed certificate
NAT Gateway + Internet Gateway + Public Subnet
Custom JWT Proxy (Node.js sidecar)
Prerequisites
AWS CLI v2 configured with credentials
Terraform >= 1.0
Docker with Buildx (for ARM64 builds)
AWS Client VPN connected to the target VPC
Okta Native application (Authorization Code + PKCE) with client ID
GitHub Personal Access Token with appropriate scopes
Deployment
1. Bootstrap Terraform State
Create the S3 bucket and DynamoDB table for remote state (one-time setup):
2. Configure Variables
Store the GitHub PAT separately (this file is gitignored):
3. Deploy Infrastructure
4. Build and Push Container
On subsequent pushes, the GitHub Actions workflow (.github/workflows/docker-build.yml) handles builds automatically when docker/ files change on the main branch.
Client Configuration
See docs/client-config.md for IDE-specific setup instructions (Kiro, VS Code, Cursor).
Quick example — add to your MCP config and connect to VPN:
No NODE_TLS_REJECT_UNAUTHORIZED=0 needed — AgentCore uses AWS-managed TLS.
Operations
Logs
Application logs are delivered to CloudWatch via vended log delivery:
Health Check
From a machine connected to the VPN:
X-Ray Traces
Traces are delivered to X-Ray automatically. View them in the AWS Console under CloudWatch > X-Ray traces.
CI/CD
Two GitHub Actions workflows handle automation:
terraform.yml— Runsterraform fmt,validate, andplanon PRs. Applies on merge to main with environment protection rules.docker-build.yml— Builds ARM64 Docker image and pushes to ECR on changes todocker/on main.
Both workflows use OIDC federation for AWS authentication (no stored credentials).