MCP platform control plane
Bootstrap, reconciliation, rollout, ingress, and lifecycle.
MCP Runtime gives platform teams a higher-level control plane for MCP delivery, access, policy, audit, and observability.
The runtime owns rollout and routing from this service definition. Sentinel governs the live request path with policy, audit, and observability.
Bootstrap, reconciliation, rollout, ingress, and lifecycle.
Consent, trust ceilings, expiry, and revocation stay first-class.
Policy, audit, and observability on live MCP requests.
apiVersion: mcpruntime.org/v1alpha1
kind: MCPServer
metadata:
name: payments
spec:
image: registry.example.com/payments-mcp:v1.0.0
port: 8088
ingressHost: mcp.example.com
ingressPath: /payments/mcp
gateway:
enabled: true
analytics:
enabled: true
Runtime, access, and the governed request path already work end to end. The architecture is stable enough to evaluate. The API and UX are still evolving.
Documentation is the fastest way to understand the platform boundary and the operator workflow.
See cluster bootstrap, reconciliation, rollout, ingress, and delivery state.
Start with setup, cluster, server, registry, pipeline, and status workflows.
Review proxy enforcement, audit events, query APIs, and observability.
Use the API reference for YAML examples, field semantics, headers, and status.
Keep lifecycle, grants, and request governance distinct without splitting them across unrelated tools.
Own setup, registry, ingress, reconciliation, and rollout from one Kubernetes-native surface.
Put enforcement, audit, and telemetry on live MCP requests instead of rebuilding them inside every service.
Keep entitlement, consent, trust, and revocation in dedicated resources instead of app-specific conventions.
Follow the path from definition to rollout, enforcement, and audit without leaving the platform model.
Describe image, route, gateway, analytics, and access expectations in one runtime definition.
Use the CLI and operator to prepare cluster state and expose the MCP service through a stable path.
Route requests through the proxy path when gateway mode is enabled so identity, policy, audit, and telemetry happen in one place.
Use grants, sessions, and sentinel surfaces to review behavior and tighten policy as the service evolves.
Move from architecture to day-two operations without switching mental models.
Prepare clusters and keep MCP services reconciled.
Keep entitlement, consent, and revocation explicit.
Handle live request governance, audit, and observability.
Move from architecture to exact fields and commands quickly.
Read the runtime first for lifecycle and delivery, then Sentinel for policy, audit, and observability on live MCP requests.