Helm MCP
MCP server to work with Helm charts
MCP Helm Server
An MCP (Model Context Protocol) server that provides tools for interacting with Helm repositories and charts. This server enables AI assistants to query Helm repositories, retrieve chart information, and access chart values without requiring local Helm installation.
The purpose of using MCP for Helm is to avoid making up format of values.yaml and contents of the charts when working
with LLMs.
Instead, the server provides a standardized way to access this information, making it easier for AI assistants to
interact with Helm charts and repositories.
This MCP server is and will be providing tools for working with Helm repositories only. If you need to work with other Kubernetes resources, consider using a separate MCP server that provides tools for Kubernetes resources.
Features
The MCP Helm server provides the following tools:
- list_repository_charts - Lists all charts available in a Helm repository (or chart name for OCI registries)
- list_chart_versions - Lists all available versions/tags for a chart
- get_latest_version_of_chart - Retrieves the latest version of a specific chart
- get_chart_values - Retrieves the values file for a chart (latest version or specific version)
- get_chart_contents - Retrieves the contents of a chart (including templates, values, and metadata)
- get_chart_dependencies - Retrieves the dependencies of a chart as defined in its
Chart.yamlfile - get_chart_images - Extracts container images used in a Helm chart by rendering templates and parsing Kubernetes manifests
Repository Types
All tools support both traditional HTTP Helm repositories and OCI registries:
| Repository Type | Example URL |
|---|---|
| HTTP Repository | https://charts.example.com |
| OCI Registry | oci://ghcr.io/org/charts/mychart |
| OCI (Docker Hub) | oci://docker.io/library/mysql |
OCI Registry Support
OCI (Open Container Initiative) registries store Helm charts as OCI artifacts. Unlike HTTP repositories where multiple charts share an index, OCI registries typically contain one chart per repository with multiple version tags.
Example usage with OCI:
repository_url: oci://ghcr.io/nginxinc/charts/nginx-ingress
chart_name: (empty - chart name is in the URL)
Try without installation
There is a publicly available instance of the MCP Helm server that you can use to test the features without installing it: https://mcp-helm.zekker.dev/mcp
Installation
Run with docker
You can run the MCP Helm server using Docker. This is the easiest way to get started without needing to install Go or build from source.
docker run -d --name mcp-helm -p 8012:8012 ghcr.io/zekker6/mcp-helm:v1.3.0 -mode=sse
Note that the --mode=sse flag is used to enable Server-Sent Events mode, which used by MCP clients to connect.
Alternatively, you can use -mode=http to enable Streamable HTTP mode.
Via pre-build binary
Download binary from the releases page.
Example for Linux x86_64 (note that other architectures and platforms are also available):
latest=$(curl -s https://api.github.com/repos/zekker6/mcp-helm/releases/latest | grep 'tag_name' | cut -d\" -f4)
wget https://github.com/zekker6/mcp-helm/releases/download/$latest/mcp-helm_Linux_x86_64.tar.gz
tar axvf mcp-helm_Linux_x86_64.tar.gz
Via Mise
Mise (mise-en-place) is a development environment setup tool.
mise i ubi:zekker6/mcp-helm@latest
Install with Go
Note: Go 1.24.3 is required.
go install github.com/zekker6/mcp-helm/cmd/mcp-helm@latest
Build from Source
Note: Go 1.24.3 is required.
-
Clone the repository:
git clone https://github.com/zekker6/mcp-helm.git cd mcp-helm -
Build the binary:
go build -o mcp-helm ./cmd/mcp-helm -
Run the server:
./mcp-helm
Configuration
Configure your MCP client to connect to this server. The server implements the standard MCP protocol for tool discovery and execution.
Authentication
The server supports authentication for both OCI registries and HTTP Helm repositories.
Command-Line Flags
| Flag | Description |
|---|---|
-username | Username for authentication (works for both OCI and HTTP repos) |
-password-file | Path to file containing password) |
-registry-credentials | Path to Docker-style credentials file (e.g., ~/.docker/config.json) |
-registry-plain-http | Use plain HTTP for OCI registries (insecure, for development only) |
-tls-cert | Path to TLS client certificate file for HTTP repositories |
-tls-key | Path to TLS client key file for HTTP repositories |
-tls-ca | Path to CA certificate file for verifying server certificates |
-tls-insecure-skip-verify | Skip TLS certificate verification (insecure) |
-pass-credentials-all | Pass credentials to all domains when following redirects |
Basic Authentication
For repositories requiring username/password authentication:
# Create a password file (recommended for security)
echo "your-password" > /path/to/password.txt
chmod 600 /path/to/password.txt
# Run with basic auth
./mcp-helm -username myuser -password-file /path/to/password.txt
OCI Registry Authentication
For private OCI registries, authentication can be configured via:
- Docker credentials - The server automatically uses credentials from
~/.docker/config.json - Explicit credentials file - Use
-registry-credentialsflag
# Using Docker login (credentials stored in ~/.docker/config.json)
docker login ghcr.io
echo $GITHUB_TOKEN | docker login ghcr.io -u USERNAME --password-stdin
# Using explicit credentials file
./mcp-helm -registry-credentials /path/to/docker/config.json
# Using basic auth for OCI registry
./mcp-helm -username myuser -password-file /path/to/password.txt
TLS/mTLS Configuration
For repositories with custom TLS requirements:
# Custom CA certificate (for self-signed or internal CAs)
./mcp-helm -tls-ca /path/to/ca.crt
# Client certificate authentication (mTLS)
./mcp-helm -tls-cert /path/to/client.crt -tls-key /path/to/client.key
# Combined: mTLS with custom CA
./mcp-helm -tls-cert client.crt -tls-key client.key -tls-ca ca.crt
# Skip TLS verification (development only, not recommended for production)
./mcp-helm -tls-insecure-skip-verify
Docker Configuration
Example with Docker, passing authentication:
# With basic auth
docker run -d --name mcp-helm -p 8012:8012 \
-v /path/to/password.txt:/secrets/password.txt:ro \
ghcr.io/zekker6/mcp-helm:v1.3.0 \
-mode=sse -username myuser -password-file /secrets/password.txt
# With Docker credentials
docker run -d --name mcp-helm -p 8012:8012 \
-v ~/.docker/config.json:/root/.docker/config.json:ro \
ghcr.io/zekker6/mcp-helm:v1.3.0 \
-mode=sse
Roadmap
- Add more tools
- List all charts in a repository
- List all versions of a chart
- Get latest version of the chart
- Get values for chart
- Get values for the latest version of the chart
- Extract full chart content
- Extract dependant charts from Charts.yaml
- Extract images used in chart
- Support OCI registries
- Pull charts from OCI registries
- List tags/versions from OCI registries
- Support authentication via Docker credentials
- Support using private HTTP repositories
- Add a way to provide credentials for HTTP basic auth
Related Servers
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
Ansible & OpenShift Automation
Provides tools to interact with the Ansible Automation Platform API for automation tasks.
GitHub Workflow Debugger MCP
Diagnose and fix GitHub Actions workflow failures using the GitHub API.
Model Context Protocol (MCP)
Interact with Gibson projects to create/update projects, explain database/API interactions, and write code within your IDE.
MCP Proxy Server
A proxy server for aggregating and serving multiple MCP resource servers through a single endpoint.
Ruby MCP Client
A Ruby client for the Model Context Protocol (MCP), enabling integration with external tools and services via a standardized protocol.
YetiBrowser MCP
YetiBrowser MCP is a fully open-source solution to allow AI assistants to easily interact with your existing browser
CIE - Code Intelligence Engine
Local code analysis MCP server with 25+ tools: semantic search, call graph tracing, dependency analysis, and symbol navigation. Built with Tree-sitter and CozoDB. Supports Go, Python, JS, TS.
Terminal MCP Server
Execute commands on local or remote hosts via SSH. Supports session persistence and environment variables.
ComfyUI MCP Server
Integrates ComfyUI with MCP, allowing the use of custom workflows. Requires a running ComfyUI server.
MCP API Bridge
A server that bridges Google Sheets, Azure AI, and MQTT APIs.