
SENTRA MCP
A minimal FastAPI-based MCP server that provides basic utility tools like ping and time functions. Designed for easy deployment with Docker support, authentication, and extensible architecture for future tool additions.
README
sentra-mcp
Minimal MCP-ready service built with FastAPI. It exposes a health endpoint, a discovery endpoint for tools, and an execution endpoint wired to two simple tools (ping
, time
). The service is designed to run locally (uvicorn), inside Docker, or on an OVH VPS behind a TLS-enabled reverse proxy.
Features
- FastAPI server with optional Bearer authentication (
MCP_AUTH_TOKEN
). /health
,/tools
,/tools/execute
endpoints.- NDJSON request logging middleware for easy ingestion by log processors.
- Modular tool registry ready for future additions (git, files, n8n, RAG, RBAC, metrics).
- Dockerfile based on
python:3.12-slim
and Docker Compose profile exposing port8400
. .env
management withpython-dotenv
for local runs.
Repository Layout
mcp/
– application package (main.py
, config, middleware, tools).docker/
– container builds (Dockerfile
,Caddyfile
for TLS reverse proxy).requirements.txt
– Python dependencies..env.example
– template for sensitive configuration.docker-compose.yml
– brings up the API + optional Caddy reverse proxy..gitignore
– ignores Python caches, env files, and other generated assets.
Local Development
- Create and activate a virtualenv; install dependencies.
python -m venv .venv source .venv/bin/activate pip install -r requirements.txt
- Copy
.env.example
to.env
and adjust values. - Launch the API.
uvicorn mcp.main:app --host 0.0.0.0 --port 8400 --reload
- Test the endpoints (replace
TOKEN
ifMCP_AUTH_TOKEN
is set).curl -fsSL http://localhost:8400/health curl -fsSL -H "Authorization: Bearer TOKEN" http://localhost:8400/tools curl -fsSL -H "Authorization: Bearer TOKEN" \ -H "Content-Type: application/json" \ -d '{"name":"ping","payload":{"message":"hello"}}' \ http://localhost:8400/tools/execute
Docker & Compose
cp .env.example .env
# Build and launch the stack (API + optional Caddy proxy)
docker compose up --build
- The API is served on
http://localhost:8400
. - When the
reverse-proxy
service is enabled, the HTTPS endpoint ishttps://localhost:8443
with certificates generated by Caddy on first run.
Healthcheck & Restart
The Compose file defines a healthcheck hitting /health
every 30 seconds and uses restart: unless-stopped
to keep the service online.
VPS Preparation Checklist
Run these steps on the OVH VPS before deploying:
- Inspect resources.
lscpu | egrep 'Model name|CPU\(s\)' free -h df -h /
- Docker resource usage.
docker ps --format 'table {{.Names}}\t{{.Status}}\t{{.Ports}}' docker system df
- Prune unused artifacts. Review before confirming.
docker container prune docker image prune docker volume prune docker network prune docker system prune
- Remove conflicting services/ports.
sudo ss -tulpn | grep ':8400' sudo systemctl disable --now <legacy-service>
- Update packages + reboot if required.
sudo apt update && sudo apt upgrade -y sudo reboot
Reverse Proxy with TLS (Caddy)
docker/Caddyfile
configures Caddy as an HTTPS reverse proxy for the API.- Set the
DOMAIN
environment variable before running Compose to request real certificates via ACME (Caddy handles LetsEncrypt automatically). - For Cloudflare tunnel alternatives, swap the proxy container with your tunnel config and continue to terminate TLS at Cloudflare.
Firewall & OVH Network
- Configure the OVH control panel firewall to allow only the required IP ranges (your office, CI runners, ChatGPT connectors).
- On the VPS, restrict ports with UFW (example):
sudo ufw default deny incoming sudo ufw allow from <trusted-ip>/32 to any port 22 proto tcp sudo ufw allow from <trusted-ip>/32 to any port 80,443 proto tcp sudo ufw enable
- Document the allowed IP list to keep parity between the OVH panel and the VPS firewall.
Validation (Local or VPS)
docker compose up --build
(or deploy stack on VPS).- Check logs for NDJSON output (one entry per request).
- Validate endpoints:
curl -fsSL http://<host>:8400/health curl -fsSL -H "Authorization: Bearer TOKEN" http://<host>:8400/tools curl -fsSL -H "Authorization: Bearer TOKEN" \ -H "Content-Type: application/json" \ -d '{"name":"time"}' \ http://<host>:8400/tools/execute
- Run
docker ps
and ensure only the MCP stack services are exposed. - Monitor resource usage (
htop
,docker stats
) for stability.
ChatGPT Developer Mode Integration
- Expose the MCP HTTPS endpoint publicly (DNS record -> proxy -> VPS port 8400).
- Verify valid TLS certificate (LetsEncrypt or Cloudflare).
- In ChatGPT → Connectors → Developer Mode, add the new server URL.
- Confirm the
ping
andtime
tools show up and respond to execution tests.
Future Enhancements
- Implement rich tools:
git.commit_push
,files.write
,n8n.trigger
,doc.index
,doc.query
, ... - Add a lightweight vector store (Chroma/FAISS) and CPU embeddings for local RAG.
- Introduce RBAC, per-token quotas, and metrics exporters (Prometheus/OpenTelemetry).
- Harden reverse proxy (rate limiting, mTLS for internal hops, WAF in front of Caddy/NGINX).
- Automate VPS provisioning with Terraform + Ansible for repeatable deployments.
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.