Skip to main content
Glama
TOOLS.mdβ€’26.1 kB
# ARC MCP Server Tools Catalog > **πŸš€ Complete reference for all ARC management tools with ARC 0.13.0 support** > > A comprehensive, discoverable catalog of all MCP tools for GitHub Actions Runner Controller operations. Includes support for container mode optimization, dual-stack networking, Azure Key Vault integration, and OpenShift deployment. ## πŸ†• ARC 0.13.0 Enhancements This MCP server now fully supports ARC 0.13.0 features: - **πŸ”₯ Container Mode**: `kubernetes-novolume` for RWX-free deployments - **🌐 Dual-Stack Networking**: IPv4/IPv6 support with automatic fallback - **πŸ” Azure Key Vault**: Secure secret management with CSI integration - **🏒 OpenShift Support**: Enterprise deployment with Security Context Constraints - **πŸ“Š Enhanced Metrics**: New `workflow_name` and `target` labels ## πŸ” Quick Discovery From any MCP client (Copilot, Claude, etc.), discover available tools: ```text πŸ§‘ "What ARC tools are available?" πŸ€– Running tool discovery... Tool: arc_list_tools Args: {} ``` Filter by category or functionality: ```text Tool: arc_list_tools Args: { "filter": "install" } ``` ## 🧰 Tool Categories | Category | Tools | Purpose | | -------------------------------- | ---------------------------------------- | ----------------------------------- | | **🎯 Core ARC Operations** | install, status, scale, manage, cleanup | Essential ARC lifecycle management | | **πŸ€– AI-Powered Features** | natural_language, troubleshoot, optimize | Intelligent automation and analysis | | **οΏ½ Hybrid Model (GitOps)** | deploy_hybrid, apply_config, detect_drift| Version-controlled deployments | | **οΏ½πŸ”’ Security & Compliance** | validate_policies, security_scan, audit | Policy enforcement and security | | **πŸ“Š Monitoring & Insights** | health_check, metrics, reports | Observability and analytics | | **πŸ› οΈ Infrastructure Management** | networking, secrets, backup, upgrade | Advanced cluster operations | | **🎭 Natural Language Interface** | process_natural_language | Human-friendly command processing | | **πŸ”₯ ARC 0.13.0 Features** | container_mode, dual_stack, key_vault | Latest ARC capabilities | --- ## πŸ“‹ Hybrid Model Tools (NEW!) ### `arc_deploy_runners_hybrid` **Deploy runners with GitOps workflow** Deploys GitHub Actions runners following DevOps best practices with version control. **Parameters:** - `organization` (string, optional): GitHub organization name (auto-detects from GITHUB_ORG) - `minRunners` (number, optional): Minimum number of runners (default: 5) - `maxRunners` (number, optional): Maximum number of runners (default: 20) - `runnerName` (string, optional): Custom name for the runner deployment - `namespace` (string, optional): Kubernetes namespace (default: arc-systems) - `mode` (enum, optional): Deployment mode - `hybrid` (default), `gitops`, or `direct` - `autoCommit` (boolean, optional): Automatically commit generated configs - `apply` (boolean, optional): Apply configuration immediately (default: true in hybrid mode) **Example:** ```text Tool: arc_deploy_runners_hybrid Args: { "organization": "my-org", "minRunners": 10, "maxRunners": 50, "mode": "hybrid", "autoCommit": false } ``` **Output:** - βœ… Config file generated in `configs/runner-sets/` - πŸ“Š Git status and commit information - πŸš€ Application status to cluster - πŸ’‘ Next steps for review and deployment --- ### `arc_apply_config` **Apply configuration from repository** Applies ARC configurations from your repository's config files to the Kubernetes cluster. **Parameters:** - `configType` (enum): Type of configuration - `controller` or `runnerSet` - `name` (string, optional): Name of the runner set (required for runnerSet type) **Example:** ```text Tool: arc_apply_config Args: { "configType": "runnerSet", "name": "my-org-runners" } ``` **Output:** - βœ… Application status - πŸ“Š Resource status in cluster - πŸ” Validation results --- ### `arc_list_configs` **List all configurations in repository** Lists all ARC configurations stored in your repository. **Parameters:** None **Example:** ```text Tool: arc_list_configs Args: {} ``` **Output:** - πŸŽ›οΈ Controller configuration - πŸƒβ€β™‚οΈ All runner set configurations - πŸ“ Paths and last modified dates - πŸ“Š Scaling ranges and organizations --- ### `arc_detect_drift` **Detect configuration drift** Compares configurations in your repository with what is actually deployed in the cluster. **Parameters:** - `runnerName` (string, optional): Specific runner set to check (checks all if omitted) **Example:** ```text Tool: arc_detect_drift Args: { "runnerName": "my-org-runners" } ``` **Output:** - βœ… Drift status (detected or not) - πŸ“‹ List of differences between repo and cluster - πŸ”§ Recommended actions to sync - πŸ’‘ Commands to apply fixes --- ## πŸ“¦ Detailed Tool Reference ### πŸ”₯ ARC 0.13.0 Enhanced Tools #### `arc_install_controller` (Enhanced) **Purpose**: Deploy ARC controller with 0.13.0 optimizations **Use Cases**: Container mode deployments, dual-stack networking, Azure Key Vault integration ```typescript interface InstallParams { namespace?: string; // Target namespace (default: arc-system) version?: string; // ARC version (default: 0.13.0) security_profile?: string; // Security level: basic|standard|strict container_mode?: string; // NEW: kubernetes-novolume|kubernetes-dind enable_dual_stack?: boolean; // NEW: Enable IPv4/IPv6 dual-stack azure_key_vault?: { // NEW: Azure Key Vault integration enabled: boolean; vault_name: string; tenant_id: string; }; openshift_mode?: boolean; // NEW: Enable OpenShift SCCs enhanced_metrics?: boolean; // NEW: Enable workflow_name labels auto_scaling?: boolean; // Enable auto-scaling (default: true) monitoring?: boolean; // Install monitoring stack (default: true) github_org?: string; // GitHub organization github_repo?: string; // Specific repository (optional) } ``` **Example Natural Language**: - *"Install ARC in my development cluster with basic security"* - *"Deploy ARC controller version 0.9.1 with strict security policies"* - *"Set up ARC for my organization with auto-scaling enabled"* #### `arc_get_status` **Purpose**: Comprehensive health check and status report for all ARC components **Use Cases**: Health monitoring, troubleshooting, compliance reporting ```typescript interface StatusParams { namespace?: string; // Check specific namespace include_runners?: boolean; // Include runner details (default: true) include_metrics?: boolean; // Include performance metrics detailed?: boolean; // Verbose output with diagnostics } ``` **Returns**: - Controller health and version - Active runner counts and status - Resource utilization metrics - Recent events and errors - Policy compliance status #### `arc_scale_runners` **Purpose**: Horizontal scaling of GitHub Actions runners with intelligent load balancing **Use Cases**: Peak load handling, cost optimization, maintenance periods ```typescript interface ScaleParams { runner_set: string; // Runner set name target_replicas: number; // Desired runner count min_replicas?: number; // Minimum runners (auto-scaling) max_replicas?: number; // Maximum runners (auto-scaling) scale_down_delay?: string; // Delay before scaling down (5m) force?: boolean; // Force immediate scaling } ``` **Example Operations**: - Scale to handle deployment pipeline load - Reduce costs during off-hours - Emergency scaling for critical builds #### `arc_manage_runners` **Purpose**: Complete runner lifecycle management including creation, updates, and deletion **Use Cases**: Runner configuration changes, environment setup, cleanup ```typescript interface ManageParams { operation: 'create' | 'update' | 'delete' | 'restart'; runner_set: string; config?: RunnerSetConfig; // Runner configuration labels?: string[]; // GitHub runner labels resources?: ResourceLimits; // CPU/memory limits } ``` #### `arc_cleanup_installation` **Purpose**: Comprehensive ARC cleanup and uninstallation with AI-guided safety checks **Use Cases**: Environment cleanup, cluster decommissioning, fresh installs ```typescript interface CleanupParams { cleanup?: boolean; // Enable cleanup (overrides CLEANUP_ARC env var) namespace?: string; // Target namespace (default: arc-systems) preserveData?: boolean; // Backup secrets before removal (default: false) dryRun?: boolean; // Preview mode without execution (default: false) force?: boolean; // Force cleanup of large installations (default: false) forceNamespaceRemoval?: boolean; // Force namespace removal (default: false) } ``` **πŸ›‘οΈ Safety Features**: - **Disabled by default**: Requires `CLEANUP_ARC=true` environment variable - **AI-guided validation**: Comprehensive pre-cleanup safety analysis - **Real-time progress**: Live updates with visual progress indicators - **Graceful shutdown**: Proper termination of running workflows - **Selective cleanup**: Choose which components to remove/preserve - **Dry run mode**: Preview all changes without execution **Example Operations**: - Complete ARC removal for cluster migration - Cleanup failed installations for fresh start - Selective component removal for upgrades - Safe environment decommissioning > **⚠️ Important**: This tool is disabled by default for safety. Enable with `CLEANUP_ARC=true` environment variable. See [Cleanup Documentation](docs/CLEANUP_FUNCTIONALITY.md) for full details. --- ## πŸ”’ Security & Compliance Tools ### `arc_validate_policies` **Validate ARC configurations against security, compliance, performance, and cost policies** Comprehensive policy validation engine with 20+ built-in rules covering security, compliance, performance, cost, and operational best practices. **Parameters:** ```typescript interface ValidatePoliciesParams { operation?: 'validate' | 'report' | 'list_rules' | 'list_violations' | 'auto_fix'; namespace?: string; // Target namespace (all if not specified) runnerScaleSetName?: string; // Specific RunnerScaleSet to validate category?: 'security' | 'compliance' | 'performance' | 'cost' | 'operations' | 'networking'; severity?: 'low' | 'medium' | 'high' | 'critical'; autoFix?: boolean; // Auto-remediate violations (default: false) configPath?: string; // Custom policy configuration file } ``` **Operations:** #### 1. `validate` - Validate Specific Resource Checks a single RunnerScaleSet against all policies. **Example:** ```text Tool: arc_validate_policies Args: { "operation": "validate", "namespace": "arc-systems", "runnerScaleSetName": "production-runners" } ``` **Output:** - βœ…/❌ Overall validation status - πŸ”΄ Critical violations with details - ⚠️ Warnings and recommendations - πŸ“Š Compliance summary by category and severity - πŸ”§ Auto-fix availability for each violation #### 2. `report` - Compliance Report Generates comprehensive compliance report for namespace or cluster. **Example:** ```text Tool: arc_validate_policies Args: { "operation": "report", "namespace": "arc-systems" } ``` **Output:** - πŸ“Š Overall compliance score (percentage) - πŸ“ˆ Violations by severity and category - 🎯 Critical issues requiring immediate attention - πŸ’‘ Remediation recommendations - πŸ“‹ SOC2/ISO27001 compliance mapping #### 3. `list_rules` - Available Policies Lists all policy rules with descriptions and configuration. **Example:** ```text Tool: arc_validate_policies Args: { "operation": "list_rules", "category": "security" } ``` **Output:** - πŸ“‹ All policy rules (or filtered by category) - πŸ”’ Rule IDs, names, and descriptions - πŸ“Š Severity levels and enforcement mode - βš™οΈ Scope (cluster, namespace, runnerscaleset) - βœ… Enabled/disabled status #### 4. `list_violations` - Current Violations Lists all current policy violations across deployments. **Example:** ```text Tool: arc_validate_policies Args: { "operation": "list_violations", "severity": "critical", "category": "security" } ``` **Output:** - πŸ”΄ Violations grouped by severity - πŸ“‚ Categorized by policy type - 🎯 Resource details (kind, name, namespace) - πŸ’‘ Suggested fixes for each violation - πŸ”§ Auto-fix availability status #### 5. `auto_fix` - Remediate Violations Automatically fixes violations where possible (preview mode). **Example:** ```text Tool: arc_validate_policies Args: { "operation": "auto_fix", "namespace": "arc-systems" } ``` **Output:** - πŸ”§ List of auto-fixable violations - βš™οΈ Remediation actions to be taken - πŸ“‹ Manual fixes still required - ⚠️ Preview mode notice (full auto-fix coming soon) **Built-in Policy Categories:** | Category | Rules | Focus Area | |----------|-------|------------| | πŸ”’ **Security** | 6 rules | Security contexts, privileged containers, secrets, hostPath mounts, capabilities | | πŸ“‹ **Compliance** | 3 rules | Repository scoping, runner groups, resource labeling | | πŸ“Š **Performance** | 3 rules | Resource limits, CPU/memory quotas | | πŸ’° **Cost** | 2 rules | Autoscaling, resource right-sizing | | βš™οΈ **Operations** | 2 rules | Runner images, operational labels | **Example Natural Language Commands:** - *"Validate my runners for security compliance"* - *"Check if our ARC setup meets SOC2 requirements"* - *"Show me all critical policy violations"* - *"Generate a compliance report for the production namespace"* - *"List all security policies and their status"* - *"Auto-fix performance policy violations"* **Key Features:** - βœ… 20+ built-in policy rules - 🎯 Custom policy configuration support - πŸ”§ Auto-fix capabilities (where safe) - πŸ“Š Compliance scoring and reporting - 🚨 Severity-based prioritization - 🏷️ Category-based filtering - πŸ“‹ SOC2/ISO27001 mapping > **πŸ“– Full Documentation**: See [Policy Validation Guide](docs/POLICY_VALIDATION.md) for comprehensive documentation, custom policy configuration, and best practices. --- ### πŸ€– AI-Powered Features #### `arc_process_natural_language` **Purpose**: Convert human language into structured ARC operations **Use Cases**: User-friendly command interface, automated operations, workflow integration ```typescript interface NLProcessParams { query: string; // Natural language command context?: string; // Additional context auto_execute?: boolean; // Execute the parsed command dry_run?: boolean; // Preview without execution } ``` **Supported Patterns**: - *"Install ARC with security settings for production"* - *"Scale my repo runners to handle the evening deployment rush"* - *"Check why my runners are failing and fix the issues"* - *"Cleanup ARC installation safely with backup"* - *"Uninstall ARC but preserve my configuration data"* - *"Remove ARC completely and clean up the namespace"* - *"Optimize costs by reducing unnecessary runner overhead"* - *"Show me a compliance report for SOC2 requirements"* #### `arc_troubleshoot_issues` **Purpose**: Automated diagnostics and problem resolution for ARC infrastructure **Use Cases**: Incident response, proactive monitoring, self-healing systems ```typescript interface TroubleshootParams { scope?: 'controller' | 'runners' | 'networking' | 'all'; auto_fix?: boolean; // Attempt automatic remediation include_suggestions?: boolean; // Provide manual fix suggestions severity_filter?: string; // Filter by issue severity } ``` **Diagnostic Capabilities**: - Resource constraint detection - Network connectivity issues - GitHub API rate limiting - Certificate and authentication problems - Runner startup failures #### `arc_optimize_costs` **Purpose**: AI-driven cost analysis and optimization recommendations **Use Cases**: Budget management, resource efficiency, cost forecasting ```typescript interface OptimizeParams { scope?: 'cluster' | 'namespace' | 'runner_set'; target?: string; // Specific target to optimize apply_recommendations?: boolean; // Auto-apply safe optimizations cost_threshold?: number; // Only show savings above threshold time_period?: string; // Analysis period (7d, 30d, 90d) } ``` ### πŸ”’ Security & Compliance #### `arc_validate_policies` **Purpose**: Comprehensive policy compliance validation against organizational standards **Use Cases**: Security audits, compliance reporting, policy enforcement ```typescript interface ValidateParams { policy_set?: string; // Specific policy set to validate severity_filter?: string; // critical|high|medium|low auto_remediate?: boolean; // Fix violations automatically report_format?: string; // json|yaml|markdown|pdf } ``` **Policy Categories**: - **Security**: Container security, RBAC, network policies - **Compliance**: SOC2, ISO27001, PCI-DSS requirements - **Performance**: Resource limits, scaling policies - **Cost**: Resource optimization, waste prevention - **Operations**: Monitoring, logging, backup procedures #### `arc_security_scan` **Purpose**: Deep security analysis of ARC infrastructure and configurations **Use Cases**: Security assessments, vulnerability management, threat detection ```typescript interface SecurityScanParams { scan_type?: 'vulnerability' | 'configuration' | 'runtime' | 'all'; include_containers?: boolean; // Scan runner container images include_secrets?: boolean; // Analyze secret management compliance_framework?: string; // Target compliance standard } ``` #### `arc_audit_trail` **Purpose**: Generate comprehensive audit logs and compliance reports **Use Cases**: Compliance reporting, incident investigation, change tracking ### πŸ“Š Monitoring & Insights #### `arc_health_check` **Purpose**: Proactive health monitoring with alerting and trend analysis **Use Cases**: SLA monitoring, capacity planning, proactive maintenance ```typescript interface HealthCheckParams { components?: string[]; // Specific components to check alert_threshold?: number; // Health score alert threshold trend_analysis?: boolean; // Include historical trends export_metrics?: boolean; // Export to monitoring system } ``` #### `arc_generate_reports` **Purpose**: Automated report generation for operations, security, and costs **Use Cases**: Executive reporting, operational reviews, compliance documentation ```typescript interface ReportParams { report_type: 'operational' | 'security' | 'cost' | 'compliance'; time_period: string; // Report timeframe format: 'pdf' | 'html' | 'json' | 'csv'; recipients?: string[]; // Email recipients schedule?: string; // Cron expression for automation } ``` ### πŸ› οΈ Infrastructure Management #### `arc_configure_networking` **Purpose**: Advanced network configuration and security policy management **Use Cases**: Network isolation, traffic management, security hardening #### `arc_manage_secrets` **Purpose**: Secure credential management including rotation and encryption **Use Cases**: GitHub token management, certificate rotation, secret lifecycle #### `arc_backup_config` **Purpose**: Configuration backup and disaster recovery preparation **Use Cases**: Change management, disaster recovery, environment replication #### `arc_upgrade_components` **Purpose**: Intelligent version management and upgrade orchestration **Use Cases**: Maintenance windows, security patches, feature updates --- ## πŸ—Ί Usage Patterns & Workflows ### πŸš€ Common Operational Sequences | Workflow | Tool Sequence | Purpose | | ----------------------- | ------------------------------------------------------------------------ | ------------------------------ | | **Fresh Installation** | `arc_install_controller` β†’ `arc_get_status` β†’ `arc_validate_policies` | Complete setup with validation | | **Performance Scaling** | `arc_get_status` β†’ `arc_scale_runners` β†’ `arc_health_check` | Load-based scaling | | **Issue Resolution** | `arc_troubleshoot_issues` β†’ `arc_health_check` β†’ `arc_get_status` | Problem diagnosis and fix | | **Security Audit** | `arc_security_scan` β†’ `arc_validate_policies` β†’ `arc_generate_reports` | Compliance assessment | | **Cost Optimization** | `arc_optimize_costs` β†’ `arc_scale_runners` β†’ `arc_generate_reports` | Resource efficiency | | **Version Upgrade** | `arc_backup_config` β†’ `arc_upgrade_components` β†’ `arc_validate_policies` | Safe upgrades | ### 🎯 Natural Language Workflow Examples #### Scenario: New Project Setup ```text πŸ§‘ "Set up ARC for our new microservices project with production-grade security" πŸ€– I'll configure ARC with enterprise security for your microservices: 1️⃣ Installing ARC controller... Tool: arc_install_controller Args: { namespace: "arc-production", security_profile: "strict", monitoring: true, auto_scaling: true } 2️⃣ Validating security compliance... Tool: arc_validate_policies Args: { policy_set: "production", severity_filter: "critical" } 3️⃣ Configuring monitoring... Tool: arc_health_check Args: { alert_threshold: 95, trend_analysis: true } βœ… Production-ready ARC setup complete! ``` #### Scenario: Performance Issue Investigation ```text πŸ§‘ "Our builds are taking forever, something's wrong with the runners" πŸ€– Let me diagnose the performance issues: 1️⃣ Analyzing current system health... Tool: arc_get_status Args: { detailed: true, include_metrics: true } 2️⃣ Running comprehensive troubleshooting... Tool: arc_troubleshoot_issues Args: { scope: "all", auto_fix: true, include_suggestions: true } 3️⃣ Checking resource optimization opportunities... Tool: arc_optimize_costs Args: { apply_recommendations: true } πŸ“Š Issues found and resolved: βœ… Scaled runners from 3 to 8 (load balancing) βœ… Fixed resource constraints (CPU limits) βœ… Optimized runner placement (node affinity) ``` --- ## πŸ’‘ Best Practices & Tips ### 🎯 Operational Excellence - **Always start with `arc_get_status`** to establish baseline health - **Use `arc_validate_policies`** before major changes - **Enable monitoring** with all installations for proactive management - **Schedule regular health checks** for early issue detection ### πŸ”’ Security Best Practices - **Implement strict security profiles** for production environments - **Regular security scans** to detect new vulnerabilities - **Automated policy validation** in CI/CD pipelines - **Audit trail generation** for compliance requirements ### πŸ’° Cost Management - **Regular cost optimization reviews** to prevent waste - **Auto-scaling configuration** to match workload patterns - **Resource limit enforcement** to prevent resource sprawl - **Scheduled scaling** for predictable workload patterns ### πŸš€ Performance Optimization - **Proactive monitoring** with trend analysis - **Intelligent scaling** based on queue depth and build times - **Resource right-sizing** for optimal price/performance - **Network optimization** for faster runner startup --- ## πŸ”„ Tool Evolution & Updates ### πŸ†• Latest Tool Additions (v1.5.x) - `arc_optimize_costs`: AI-powered cost analysis and recommendations - `arc_security_scan`: Deep security vulnerability analysis - `arc_generate_reports`: Automated operational and compliance reporting - Enhanced `arc_troubleshoot_issues` with ML-based diagnostics ### πŸ›£οΈ Upcoming Tools (v1.6.x) - `arc_multi_cluster`: Multi-cluster ARC management - `arc_webhook_processor`: Real-time GitHub event processing - `arc_custom_policies`: Policy-as-Code with custom DSL - `arc_integration_hub`: Pre-built DevOps tool integrations ### πŸ“Š Tool Usage Analytics Track tool effectiveness and adoption: - Most used: `arc_get_status` (daily health checks) - Highest value: `arc_troubleshoot_issues` (reduces MTTR by 70%) - Growing adoption: `arc_optimize_costs` (average 25% cost reduction) --- ## πŸ”„ Keeping This Catalog Current This document provides a comprehensive overview of available tools. For the most up-to-date runtime information: 1. **Use `arc_list_tools`** for real-time tool discovery 2. **Check release notes** for newly added tools 3. **Monitor tool deprecation warnings** in server logs 4. **Subscribe to updates** via GitHub repository watch --- ## πŸ“ž Tool Support & Feedback ### πŸ†˜ Getting Help - **Tool-specific issues**: Use `arc_troubleshoot_issues` for automated diagnosis - **Documentation**: Check `/docs` directory for detailed guides - **Community**: [GitHub Discussions](https://github.com/tsviz/arc-config-mcp/discussions) - **Enterprise Support**: Contact enterprise@tsviz.com ### πŸ“ Feedback & Requests We continuously improve our tool catalog based on user feedback: - **Feature requests**: [GitHub Issues](https://github.com/tsviz/arc-config-mcp/issues/new?template=feature-request.md) - **Tool usage analytics**: Help us prioritize development - **Integration suggestions**: Tell us about your workflows --- <div align="center"> **🧰 Ready to explore ARC automation?** [Quick Start Guide](./docs/QUICKSTART.md) β€’ [Tool Examples](./examples/) β€’ [API Reference](./docs/API.md) *From manual kubectl commands to conversational AI-powered ARC operations* ✨ </div>

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tsviz/arc-config-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server