Skip to content

Proposal for strimzi-mcp server#2

Open
kornys wants to merge 2 commits intomainfrom
mcp-server
Open

Proposal for strimzi-mcp server#2
kornys wants to merge 2 commits intomainfrom
mcp-server

Conversation

@kornys
Copy link
Member

@kornys kornys commented Feb 25, 2026

No description provided.

@kornys kornys requested a review from a team February 25, 2026 08:01
@kornys kornys self-assigned this Feb 25, 2026
@kornys kornys requested review from a team and Frawless February 25, 2026 12:34
Copy link

@ppatierno ppatierno left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like the idea. This MCP server has been on my radar for too long but time is always not enough and I am happy to see something "official" starting here. I left several comments ... sorry! But I would be really happy to help if needed :-)

Copy link
Member

@MikeEdgar MikeEdgar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My main question is around scope of the project. If it is ever only to be Strimzi-focused, why not propose having it hosted in the Strimzi organization?

@kornys
Copy link
Member Author

kornys commented Feb 26, 2026

I like the idea. This MCP server has been on my radar for too long but time is always not enough and I am happy to see something "official" starting here. I left several comments ... sorry! But I would be really happy to help if needed :-)

I'm happy to get any feedback

Copy link
Contributor

@tomncooper tomncooper left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is a good idea and solid start but I have a few concerns, most of which are commented directly on the doc. I'll summarise my main points below:

  • I agree with other commenters that a StreamsHub MCP mono-repo with this as the first sub-module is probably the best way to go. If we create a Kafka, Kroxy, Console etc MCPs there will undoubtably be a lot of shared logic.
  • I think it would be a good idea to step back and think about what questions a DevOps users would want to ask an LLM about Strimzi. From that list you can then figure out what tools we would need to fulfil them.
  • As well as MCP Tools, I think it would be worth exploring what MCP Resources and MCP Prompts could offer. I actually think MCP resource change subscriptions could be really intesting for incident monitoring. MCP Prompt templates could allow us to guide the LLMs on what aspects of the Stimzi deployment to look at when diagnosing issues etc. However, if you don't think they offer anything useful then you should add a section on why.
  • If you do have a list of typical user questions you could see how an LLM agent with kubctl gets on currently. What issues does it hit, where could an MCP smooth the process. This is where I think MCP Resources and MCP prompts could really help.
  • I think we need to target the smallest possible set of permissions not the Strimzi SA.
  • I think we need to cover how AuthZ will work. What if there is a PII Kafka cluster or namespace and only certain users should be able to see details about it.
  • For the MCP tool outputs I have some specific concerns around security and limiting context overload/pollution.
  • You are going to need to have a way to validate/sanitize input. Prompt injection protection will need to be considered. Also JSON Schemas will be needed for the tool inputs.

@kornys
Copy link
Member Author

kornys commented Feb 27, 2026

@ppatierno @tomncooper @Frawless @MikeEdgar
Thank you all for very valuable feedback, I really appreciate it!
Im going to propose changes based on your comments and feedback.

@Frawless
Copy link

I think we need to cover how AuthZ will work. What if there is a PII Kafka cluster or namespace and only certain users should be able to see details about it.

@tomncooper I think we could use integration for external OIDC services and get identity verification via it. Fabric8 then could use user impersonation with data from OIDC (user's name an groups). Kube admin will configure RBAC access to a specific user/groups and MCP will have basically same access as all Kube API calls will uses user's impersonation data. Keycloak for example also allows offline access tokens or PATs that could be used to long-live tokens for AI assistants, but I am not sure how it will work if we will use GitHub OIDC for example, guess there will be some similar way? Anyway I will dig it more into it and maybe we could discuss it on slack or on a call to avoid to much pollution here as I expect it will need quite a long discussion. Maybe there we could also learn form Console folks how they do Authz and if there will be something we can do in similar way in our use case.

Frawless
Frawless previously approved these changes Mar 10, 2026
Copy link

@Frawless Frawless left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just few nits, otherwise it looks good to me with all know limitations mentioned in the proposal. +1 from me.

Frawless
Frawless previously approved these changes Mar 10, 2026
Copy link
Contributor

@tomncooper tomncooper left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for addressing many of my previous concerns, this is a much more comprehensive proposal. I had a few more comments.

Frawless
Frawless previously approved these changes Mar 11, 2026
Signed-off-by: David Kornel <kornys@outlook.com>
Frawless
Frawless previously approved these changes Mar 12, 2026
Copy link
Contributor

@tomncooper tomncooper left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for addressing my previous comments, I think this is nearly there, I just had a few questions around the MCP Prompt templates and permissions granted to the MCP Server Service Account.

Signed-off-by: David Kornel <kornys@outlook.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants