Helm MCP
MCP server to work with Helm charts
MCP Helm Server
An MCP (Model Context Protocol) server that provides tools for interacting with Helm repositories and charts. This server enables AI assistants to query Helm repositories, retrieve chart information, and access chart values without requiring local Helm installation.
The purpose of using MCP for Helm is to avoid making up format of values.yaml and contents of the charts when working
with LLMs.
Instead, the server provides a standardized way to access this information, making it easier for AI assistants to
interact with Helm charts and repositories.
This MCP server is and will be providing tools for working with Helm repositories only. If you need to work with other Kubernetes resources, consider using a separate MCP server that provides tools for Kubernetes resources.
Features
The MCP Helm server provides the following tools:
- list_repository_charts - Lists all charts available in a Helm repository (or chart name for OCI registries)
- list_chart_versions - Lists all available versions/tags for a chart
- get_latest_version_of_chart - Retrieves the latest version of a specific chart
- get_chart_values - Retrieves the values file for a chart (latest version or specific version)
- get_chart_contents - Retrieves the contents of a chart (including templates, values, and metadata)
- get_chart_dependencies - Retrieves the dependencies of a chart as defined in its
Chart.yamlfile - get_chart_images - Extracts container images used in a Helm chart by rendering templates and parsing Kubernetes manifests
Repository Types
All tools support both traditional HTTP Helm repositories and OCI registries:
| Repository Type | Example URL |
|---|---|
| HTTP Repository | https://charts.example.com |
| OCI Registry | oci://ghcr.io/org/charts/mychart |
| OCI (Docker Hub) | oci://docker.io/library/mysql |
OCI Registry Support
OCI (Open Container Initiative) registries store Helm charts as OCI artifacts. Unlike HTTP repositories where multiple charts share an index, OCI registries typically contain one chart per repository with multiple version tags.
Example usage with OCI:
repository_url: oci://ghcr.io/nginxinc/charts/nginx-ingress
chart_name: (empty - chart name is in the URL)
Try without installation
There is a publicly available instance of the MCP Helm server that you can use to test the features without installing it: https://mcp-helm.zekker.dev/mcp
Installation
Run with docker
You can run the MCP Helm server using Docker. This is the easiest way to get started without needing to install Go or build from source.
docker run -d --name mcp-helm -p 8012:8012 ghcr.io/zekker6/mcp-helm:v1.3.0 -mode=sse
Note that the --mode=sse flag is used to enable Server-Sent Events mode, which used by MCP clients to connect.
Alternatively, you can use -mode=http to enable Streamable HTTP mode.
Via pre-build binary
Download binary from the releases page.
Example for Linux x86_64 (note that other architectures and platforms are also available):
latest=$(curl -s https://api.github.com/repos/zekker6/mcp-helm/releases/latest | grep 'tag_name' | cut -d\" -f4)
wget https://github.com/zekker6/mcp-helm/releases/download/$latest/mcp-helm_Linux_x86_64.tar.gz
tar axvf mcp-helm_Linux_x86_64.tar.gz
Via Mise
Mise (mise-en-place) is a development environment setup tool.
mise i ubi:zekker6/mcp-helm@latest
Install with Go
Note: Go 1.24.3 is required.
go install github.com/zekker6/mcp-helm/cmd/mcp-helm@latest
Build from Source
Note: Go 1.24.3 is required.
-
Clone the repository:
git clone https://github.com/zekker6/mcp-helm.git cd mcp-helm -
Build the binary:
go build -o mcp-helm ./cmd/mcp-helm -
Run the server:
./mcp-helm
Configuration
Configure your MCP client to connect to this server. The server implements the standard MCP protocol for tool discovery and execution.
Authentication
The server supports authentication for both OCI registries and HTTP Helm repositories.
Command-Line Flags
| Flag | Description |
|---|---|
-username | Username for authentication (works for both OCI and HTTP repos) |
-password-file | Path to file containing password) |
-registry-credentials | Path to Docker-style credentials file (e.g., ~/.docker/config.json) |
-registry-plain-http | Use plain HTTP for OCI registries (insecure, for development only) |
-tls-cert | Path to TLS client certificate file for HTTP repositories |
-tls-key | Path to TLS client key file for HTTP repositories |
-tls-ca | Path to CA certificate file for verifying server certificates |
-tls-insecure-skip-verify | Skip TLS certificate verification (insecure) |
-pass-credentials-all | Pass credentials to all domains when following redirects |
Basic Authentication
For repositories requiring username/password authentication:
# Create a password file (recommended for security)
echo "your-password" > /path/to/password.txt
chmod 600 /path/to/password.txt
# Run with basic auth
./mcp-helm -username myuser -password-file /path/to/password.txt
OCI Registry Authentication
For private OCI registries, authentication can be configured via:
- Docker credentials - The server automatically uses credentials from
~/.docker/config.json - Explicit credentials file - Use
-registry-credentialsflag
# Using Docker login (credentials stored in ~/.docker/config.json)
docker login ghcr.io
echo $GITHUB_TOKEN | docker login ghcr.io -u USERNAME --password-stdin
# Using explicit credentials file
./mcp-helm -registry-credentials /path/to/docker/config.json
# Using basic auth for OCI registry
./mcp-helm -username myuser -password-file /path/to/password.txt
TLS/mTLS Configuration
For repositories with custom TLS requirements:
# Custom CA certificate (for self-signed or internal CAs)
./mcp-helm -tls-ca /path/to/ca.crt
# Client certificate authentication (mTLS)
./mcp-helm -tls-cert /path/to/client.crt -tls-key /path/to/client.key
# Combined: mTLS with custom CA
./mcp-helm -tls-cert client.crt -tls-key client.key -tls-ca ca.crt
# Skip TLS verification (development only, not recommended for production)
./mcp-helm -tls-insecure-skip-verify
Docker Configuration
Example with Docker, passing authentication:
# With basic auth
docker run -d --name mcp-helm -p 8012:8012 \
-v /path/to/password.txt:/secrets/password.txt:ro \
ghcr.io/zekker6/mcp-helm:v1.3.0 \
-mode=sse -username myuser -password-file /secrets/password.txt
# With Docker credentials
docker run -d --name mcp-helm -p 8012:8012 \
-v ~/.docker/config.json:/root/.docker/config.json:ro \
ghcr.io/zekker6/mcp-helm:v1.3.0 \
-mode=sse
Roadmap
- Add more tools
- List all charts in a repository
- List all versions of a chart
- Get latest version of the chart
- Get values for chart
- Get values for the latest version of the chart
- Extract full chart content
- Extract dependant charts from Charts.yaml
- Extract images used in chart
- Support OCI registries
- Pull charts from OCI registries
- List tags/versions from OCI registries
- Support authentication via Docker credentials
- Support using private HTTP repositories
- Add a way to provide credentials for HTTP basic auth
Related Servers
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
mcp-server-tibet
TIBET provenance tracking for AI decisions. Cryptographic audit trails with ERIN/ERAAN/EROMHEEN/ERACHTER intent logging for compliance and transparency.
Simple Loki MCP Server
An MCP server for querying Loki logs via logcli.
Rakit UI AI
An intelligent tool for AI assistants to present multiple UI component designs for user selection.
Auto API - YApi
A tool to retrieve API interface information from YApi, with authentication configurable via environment variables.
Agentic Tools MCP Companion
A VS Code extension with a GUI for the agentic-tools-mcp server, enhancing task and memory management.
Unreal-Blender MCP
A unified server to control Blender and Unreal Engine via AI agents.
MCP SysOperator
Manages Infrastructure as Code (IaC) operations using Ansible and Terraform. Requires external tools and manual setup.
Figma
Integrate Figma design data with AI coding tools using a local MCP server.
Gemsuite
The ultimate open-source server for advanced Gemini API interaction with MCP, intelligently selects models.
d2-mcp
Create, validate, and render diagrams from D2 (Declarative Diagramming) code into SVG and PNG formats.