Talos Linux MCP Server
talos-mcp
An MCP server that exposes Talos Linux cluster management to AI agents (Claude Code, OpenAI Codex, and any MCP-compatible client). Instead of pasting talosctl output into chat, the agent calls structured tools that return machine-readable JSON directly from the Talos gRPC API — zero token cost for intermediate output.
Connects to your cluster via the native Talos gRPC API using the same mTLS credentials as talosctl (~/.talos/config).
Installation
Via npm (no Go required, Linux/macOS, amd64/arm64):
npx talos-mcpDownload binary (Linux/macOS, amd64/arm64):
Download the latest release from GitHub Releases, extract, and place the binary in your $PATH.
Build from source (requires Go 1.21+):
git clone https://github.com/Nosmoht/talos-mcp-server
cd talos-mcp
go build -o talos-mcp .Configuration
Reads ~/.talos/config by default (the same file talosctl uses). Override via environment variables:
Variable | Default | Description |
|
| Path to talosconfig file |
| active context | Context name to use |
| from config | Comma-separated endpoint overrides |
|
| Set to |
| (all) | Comma-separated path prefixes allowed for |
|
| Set to |
Compatibility
This server is tested against Talos Linux v1.9.x through v1.12.x.
talos-mcp | Talos Linux | machinery SDK |
v0.x (current) | v1.9.0 – v1.12.x | v1.12.6 |
The server logs a startup warning if the connected cluster's Talos version is outside the tested range. All 19 gRPC methods used have been stable since Talos v1.9.
Upgrade path validation
The talos_upgrade tool validates that the target version follows Talos's supported upgrade path — at most one minor version at a time (e.g. v1.11.x → v1.12.x). Upgrades that skip minor versions are rejected with an error.
If your image uses a custom or factory tag (e.g. factory.talos.dev/... or :latest) the tag cannot be parsed and validation is skipped automatically. To bypass validation explicitly, set TALOS_MCP_SKIP_VERSION_CHECK=true.
Client Setup
Claude Code
Add to your project's .mcp.json:
{
"mcpServers": {
"talos": {
"command": "npx",
"args": ["-y", "talos-mcp"]
}
}
}Or globally in ~/.claude.json under "mcpServers". If you prefer a local binary, replace "command": "npx" with the path to the binary.
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"talos": {
"command": "npx",
"args": ["-y", "talos-mcp"]
}
}
}OpenAI Codex
Add to .codex/config.toml (project) or ~/.codex/config.toml (global):
[mcp_servers.talos]
command = "npx"
args = ["-y", "talos-mcp"]
[mcp_servers.talos.env]
TALOSCONFIG = "/path/to/talosconfig"Generic MCP client
The server speaks the MCP protocol over stdio:
./talos-mcpTools
Read-only
Tool | Description |
| List all available resource types and their aliases. Call this first to discover what can be queried. |
| Get or list any COSI resource by type (e.g. |
| Get Talos version info from target nodes. |
| List all Talos services and their current state (running, stopped, health). |
| List containers in a namespace (default: |
| List running processes on target nodes. |
| Check cluster health (etcd, Kubernetes API, node readiness). Supports |
| Fetch recent service logs (last N lines, no follow). |
| Read kernel ring buffer messages. |
| Fetch recent Talos runtime events (service changes, config changes). |
| Query etcd cluster: |
| List files and directories on a node filesystem. |
| Read file contents from a node filesystem. |
Mutating
These tools modify cluster state and have explicit safety guards.
Tool | Description | Guards |
| Start, stop, or restart a Talos service (note: restarting | — |
| Reboot target nodes. Supports |
|
| Upgrade Talos on target nodes. Supports |
|
| Roll back the last upgrade on target nodes. |
|
| Apply a machine config patch (JSON or YAML strategic merge). |
|
All tools accept an optional nodes field (list of node IPs or hostnames). When omitted, the active context from talosconfig is used.
Security Model
Trust Boundaries
MCP Client (Claude Code / Codex)
│ stdio / JSON-RPC
▼
talos-mcp ◄── reads TALOSCONFIG (~/.talos/config)
│ gRPC + mTLS
▼
Talos API (each node)
│
▼
Node OSData flow warning: Tool responses flow directly into the LLM's context window and are sent to the LLM provider. Anything a tool returns — node IPs, hostnames, service configurations, kernel logs, file contents — becomes part of the prompt sent over the network. Do not use this server with clusters containing data you would not be comfortable sending to your LLM provider.
Talos RBAC is server-side enforced. The credentials in your talosconfig determine what operations are permitted on each node. talos-mcp cannot bypass Talos RBAC — a request that the API rejects will fail with an error, not silently succeed.
Tool Classification and Minimum Required RBAC Role
Tool | RBAC minimum |
|
|
|
|
|
|
Safety Mechanisms
Mechanism | How it works |
Read-only mode |
|
Path allowlist |
|
Confirm gates |
|
Preserve default |
|
Dry-run default |
|
Audit logging | All mutating tool calls ( |
What Is Not in the Threat Model
The LLM itself — prompt injection, hallucinated tool arguments, and LLM provider data retention are outside the scope of this server
The MCP client — security of Claude Code, Codex, or other MCP clients is the responsibility of those projects
Network path between talos-mcp and Talos nodes — protected by mutual TLS using the credentials in your talosconfig
Least-Privilege Credential Setup
Create a dedicated talosconfig with minimal permissions for use with this server:
Read-only access (recommended for most use cases):
# Generate a reader-only talosconfig
talosctl config new --roles=os:reader talosconfig-readonlyThen set TALOSCONFIG=/path/to/talosconfig-readonly and TALOS_MCP_READ_ONLY=true for maximum restriction. With this setup, the server exposes only read-only tools and the credentials cannot perform any mutating operations even if a tool were somehow bypassed.
Operator access (for service management, reboot, upgrade):
talosctl config new --roles=os:operator talosconfig-operatorThis covers all tools except talos_patch_config (which requires os:admin).
Full access (required for config patching):
Use your default talosconfig or generate one with os:admin. Reserve this for setups where config patch capability is explicitly needed.
Verifying Downloads
Checksums (integrity)
Each release includes a talos-mcp_<version>_checksums.txt file with SHA-256 hashes of all archives. Verify the binary after downloading:
# Download archive and checksums
curl -LO https://github.com/Nosmoht/talos-mcp-server/releases/download/v<version>/talos-mcp_<version>_linux_amd64.tar.gz
curl -LO https://github.com/Nosmoht/talos-mcp-server/releases/download/v<version>/talos-mcp_<version>_checksums.txt
# Verify
sha256sum --check --ignore-missing talos-mcp_<version>_checksums.txtThis detects corruption or truncated downloads. It does not protect against a compromised release pipeline.
GitHub Artifact Attestations (SLSA L2 provenance)
Each release includes a GitHub-native build provenance attestation that cryptographically links the binary to the specific commit and workflow run that produced it:
gh attestation verify talos-mcp_<version>_linux_amd64.tar.gz \
--repo Nosmoht/talos-mcp-serverThis requires the GitHub CLI. A passing verification means the artifact was produced by the official release workflow in this repository, not a third-party build.
npm Package Provenance
The npm package is published with provenance attestation:
npm audit signaturesA passing result means the package was published by the official GitHub Actions release workflow via OIDC trusted publishing.
Development
# Build
go build -o talos-mcp .
# Test
go test -race ./...
# Lint (requires golangci-lint v2)
golangci-lint run
# Format check
gofmt -l .License
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Nosmoht/talos-mcp-server'
If you have feedback or need assistance with the MCP directory API, please join our Discord server