133,407 tools. Last updated 2026-05-12 22:37
"kubernetes" matching MCP tools:
- List or retrieve details of container orchestration clusters, node pools, flavors, and versions in Magalu Cloud.
- Retrieves live status of Kubernetes resources for a specified project and environment. Optionally filters by tenant for multi-tenant deployments.Mozilla Public 2.0
- Retrieve Kubernetes pod events to diagnose issues and monitor pod lifecycle changes in your cluster.Apache 2.0
- Check pod status for the AVI Kubernetes Operator—running, restarts, age, and ready state. First step for troubleshooting Ingress or LoadBalancer issues in Tanzu or Kubernetes.MIT
- Retrieve node summaries for a Kubernetes cluster, including status, roles, IP addresses, and system details to monitor cluster health and configuration.Apache 2.0
- Execute a command in a Kubernetes pod or container and receive the output. Uses an array format for secure, shell-free execution.MIT
Matching MCP Servers
- Alicense-qualityCmaintenanceAn MCP server that enables interaction with Kubernetes resources through natural language interfaces like Goose CLI, allowing users to get, read, and patch Kubernetes resources.Last updatedApache 2.0
- Alicense-qualityBmaintenanceA Model Context Protocol (MCP) server that provides safe, read-only access to Kubernetes resources for debugging and inspection. Built with security in mind, it offers comprehensive cluster visibility without modification capabilities.Last updated45MIT
Matching MCP Connectors
The Google GKE MCP server is a managed Model Context Protocol server that provides AI applications with tools to manage Google Kubernetes Engine (GKE) clusters and Kubernetes resources. It exposes a structured, discoverable interface that allows AI agents to interact with GKE and Kubernetes APIs, enabling them to inspect cluster configurations, retrieve Kubernetes resource YAMLs, monitor operations like cluster upgrades, diagnose issues, and optimize costs—all without needing to parse text output or use complex kubectl commands.
Provides read access to your GKE and Kubernetes resources.
- Recreates all API clients to reconnect to the Kubernetes API server after cluster upgrades, forcing fresh DNS resolution and new TCP connections.MIT
- Retrieve a list of all Kubernetes namespaces in your cluster, showing name, status, and age for each namespace.Apache 2.0
- Create Kubernetes credentials for container registry access with configurable expiration and permissions. Generates YAML secret configuration for secure registry authentication.MIT
- Retrieve all Kubernetes namespace names in alphabetical order for cluster management and access verification.Apache 2.0
- Retrieve available Kubernetes versions from Civo for cluster provisioning and upgrades.MIT
- Manage Kubernetes namespaces to list, view, create, or delete them within your cluster using the Kube MCP server.MIT
- Retrieve detailed pod information including status, IP addresses, and node placement within a specified Kubernetes namespace for monitoring and troubleshooting.Apache 2.0
- Retrieve a complete list of all Kubernetes clusters monitored by Karma to quickly identify cluster scope for alert analysis and filtering.MIT
- List Kubernetes clusters along with their agent versions, node counts, and enabled products to assess fleet status.MIT
- Retrieve or list Kubernetes resources by specifying resource type, name, namespace, and optional filters like label or field selectors.MIT
- Mark a Kubernetes node as unschedulable to prevent new pods from being scheduled on it, useful for maintenance or troubleshooting operations.Apache 2.0
- Create artifact signing and verification configuration using Sigstore, Notary v2, or DoD PKI. Returns pipeline integration code, Kubernetes admission webhook config, and verification commands.MIT
- Retrieve all Kubernetes clusters from your Vultr account, displaying details like ID, label, version, region, status, node pools, and network configuration.MIT
- Remove a Kubernetes Secret from a specified namespace to manage sensitive data securely. This tool helps delete secrets when they are no longer needed or to maintain cluster security.Apache 2.0