Replies: 2 comments 10 replies
-
|
@mjudeikis totally agree that understanding whether the user can access a target is a key issue. for the discovery problem, I'm curious if you have experimented with this tool (and if so, why it wouldn't work for the discovery problem): kubernetes-mcp-server/pkg/toolsets/config/configuration.go Lines 40 to 58 in 5a60cee @matzew and I were discussing if there was a way to make the list returned here be user access aware |
Beta Was this translation helpful? Give feedback.
-
|
@mjudeikis would #843 allow you to implement the pattern that you want for kcp? Ideally we wouldn't want to force something like a separate API server onto users of every provider, just users of specific providers that would guarantee that is deployed as well. My thinking is this way you could use this approach in your kcp provider, but others (e.g. kubeconfig) would not need to |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We been experimenting with mcp server in multi-cluster context, and found biggest limitation being ClusterDiscovery + access.
Idea we been brewing is to support generic cluster discovery API - SelfClusterAccessReview (SCAR for short), like:
The idea is to have a standard api, MCP could call with user identity (bearer token or cert), especially when using an identity provider like Keycloak as a backing IDP and get a list of cluster user access and how to access them.
So one could implement a standard-looking API server, run it close to the MCP server, and integrate with any cluster provider.
Beta Was this translation helpful? Give feedback.
All reactions