MCP Runtime documentation
Architecture, CLI workflows, request-path governance, and API reference for operating MCP services on Kubernetes. Start with runtime for the model, then use the CLI, sentinel, and API guides for the exact operational surface.
Bring up the platform and deploy one server.
The shortest path from repo checkout to a working runtime flow.
make deps && make build-runtime
./bin/mcp-runtime setup
./bin/mcp-runtime status
./bin/mcp-runtime registry push --image my-server:v1.0.0
./bin/mcp-runtime pipeline generate --dir .mcp --output manifests/
./bin/mcp-runtime pipeline deploy --dir manifests/
Pick the page that matches your job.
You do not need to read the whole docs set in order.
Control-plane responsibilities, core resources, delivery model, and traffic handoff.
Concrete command flows for setup, cluster, registry, server, access, sentinel, pipeline, and status.
Policy enforcement, audit flow, analytics services, UI surfaces, and observability components.
CRDs, trust semantics, headers, rollout fields, analytics settings, and YAML examples.
Understand the split quickly.
The platform becomes easier to reason about once each surface has a clear job.
Owns lifecycle and cluster state.
- Cluster bootstrap, ingress, registry, and operator setup
- MCPServer rollout and reconciliation into Kubernetes objects
- Access grants and agent sessions beside each service
Owns the governed request path.
- Policy evaluation at tool-call time
- Audit decisions, query surfaces, and analytics flow
- Gateway, UI, metrics, tracing, and log surfaces
Expose the operator surface.
- CLI for install, delivery, access, and operational workflows
- API reference for manifests, headers, trust, and rollout settings
- One platform story instead of separate tooling islands
Know the boundaries before you dive in.
Not a generic mesh control plane
MCP Runtime sits above lower-level ingress, gateway, and service-mesh layers. It models MCP-specific delivery, access, policy, and audit rather than becoming the network control plane for every workload in the cluster.
Broad enough to evaluate today
Deployment, routing, grants, sessions, gateway policy, audit flow, and observability are implemented in the repo today. A full OAuth 2.1 authorization server and Dynamic Client Registration flow are still out of scope.
Need the repo workflows too?
Use these helpers when you are changing the platform codebase, not only operating a cluster.
Use the development scripts when you are working inside the repo and need local generation, manifests, or test helpers alongside the docs.
./hack/dev-setup.sh
make test
make operator-manifests operator-generate