Skip to main content
Glama
135,512 tools. Last updated 2026-05-22 17:59

"How to execute EKS (Elastic Kubernetes Service) commands" matching MCP tools:

Matching MCP Servers

  • F
    license
    -
    quality
    C
    maintenance
    A Model Context Protocol server that provides programmatic access to Amazon EKS clusters, allowing AI assistants to manage and interact with Kubernetes resources. It exposes cluster operations like listing pods as callable tools through a standardized interface.
    Last updated

Matching MCP Connectors

  • Intent execution engine for autonomous agent task routing

  • AI-to-AI petrol station. 56 pay-per-call endpoints covering market signals, crypto/DeFi, geopolitics, earnings, insider trades, SEC filings, sanctions screening, ArXiv research, whale tracking, and more. Micropayments in USDC on Base Mainnet via x402 protocol.

  • Remove a Kubernetes Service from a specified namespace to manage cluster resources and maintain clean infrastructure.
    Apache 2.0
  • Manage Kubernetes services by listing services, retrieving service details, or accessing service endpoints to monitor and control network connectivity in your cluster.
    MIT
  • Retrieve detailed information about a specific Kubernetes Service, including configuration and status, to monitor and manage cluster networking resources.
    Apache 2.0
  • Execute commands with security restrictions to prevent unauthorized operations, allowing only approved commands to run safely within the development environment.
    Apache 2.0
  • Retrieve detailed information about a specific Kubernetes service, including its configuration, endpoints, and current status, to monitor and troubleshoot cluster networking.
  • Lists Kubernetes service accounts in a specified namespace to manage cluster access and permissions. Use this tool to view and audit service accounts for security and operational purposes.
  • Manage and execute AWS CLI commands for VPC Lattice, including creating, updating, and deleting service networks, services, listeners, rules, and target groups, using specified AWS profiles and regions.
  • Execute shell commands in an isolated Debian Linux sandbox to run code safely without affecting the host system. Use stdin for data input and set timeouts for long operations.
    MIT
  • Retrieve accurate Kubernetes documentation for kubectl commands, API objects, manifests, and version-specific features using a trusted, version-aware index to reduce hallucinations.
    MIT
  • Execute malware analysis commands on REMnux to extract strings, analyze files, and investigate suspicious samples using tools like pestr and strings.
    GPL 3.0