Talos Linux MCP Server

Talos Linux MCP Server

MCP server for Talos Linux cluster management via the native gRPC API

Category
Visit Server

README

talos-mcp

CI Release Go Reference codecov Go Report Card OpenSSF Scorecard License

An MCP server that exposes Talos Linux cluster management to AI agents (Claude Code, OpenAI Codex, and any MCP-compatible client). Instead of pasting talosctl output into chat, the agent calls structured tools that return machine-readable JSON directly from the Talos gRPC API — zero token cost for intermediate output.

Connects to your cluster via the native Talos gRPC API using the same mTLS credentials as talosctl (~/.talos/config).

Installation

Via npm (no Go required, Linux/macOS, amd64/arm64):

npx talos-mcp

Download binary (Linux/macOS, amd64/arm64):

Download the latest release from GitHub Releases, extract, and place the binary in your $PATH.

Build from source (requires Go 1.21+):

git clone https://github.com/Nosmoht/talos-mcp-server
cd talos-mcp
go build -o talos-mcp .

Configuration

Reads ~/.talos/config by default (the same file talosctl uses). Override via environment variables:

Variable Default Description
TALOSCONFIG ~/.talos/config Path to talosconfig file
TALOS_CONTEXT active context Context name to use
TALOS_ENDPOINTS from config Comma-separated endpoint overrides
TALOS_MCP_READ_ONLY false Set to true to disable all mutating tools at startup
TALOS_MCP_ALLOWED_PATHS (all) Comma-separated path prefixes allowed for talos_read_file and talos_list_files (e.g. /etc,/proc)
TALOS_MCP_SKIP_VERSION_CHECK false Set to true to bypass upgrade path validation (e.g. for factory images or custom tags)

Compatibility

This server is tested against Talos Linux v1.9.x through v1.12.x.

talos-mcp Talos Linux machinery SDK
v0.x (current) v1.9.0 – v1.12.x v1.12.6

The server logs a startup warning if the connected cluster's Talos version is outside the tested range. All 19 gRPC methods used have been stable since Talos v1.9.

Upgrade path validation

The talos_upgrade tool validates that the target version follows Talos's supported upgrade path — at most one minor version at a time (e.g. v1.11.x → v1.12.x). Upgrades that skip minor versions are rejected with an error.

If your image uses a custom or factory tag (e.g. factory.talos.dev/... or :latest) the tag cannot be parsed and validation is skipped automatically. To bypass validation explicitly, set TALOS_MCP_SKIP_VERSION_CHECK=true.

Client Setup

Claude Code

Add to your project's .mcp.json:

{
  "mcpServers": {
    "talos": {
      "command": "npx",
      "args": ["-y", "talos-mcp"]
    }
  }
}

Or globally in ~/.claude.json under "mcpServers". If you prefer a local binary, replace "command": "npx" with the path to the binary.

Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "talos": {
      "command": "npx",
      "args": ["-y", "talos-mcp"]
    }
  }
}

OpenAI Codex

Add to .codex/config.toml (project) or ~/.codex/config.toml (global):

[mcp_servers.talos]
command = "npx"
args = ["-y", "talos-mcp"]

[mcp_servers.talos.env]
TALOSCONFIG = "/path/to/talosconfig"

Generic MCP client

The server speaks the MCP protocol over stdio:

./talos-mcp

Tools

Read-only

Tool Description
talos_resource_definitions List all available resource types and their aliases. Call this first to discover what can be queried.
talos_get Get or list any COSI resource by type (e.g. MachineStatus, Member, NodeAddress, Service).
talos_version Get Talos version info from target nodes.
talos_services List all Talos services and their current state (running, stopped, health).
talos_containers List containers in a namespace (default: k8s.io for Kubernetes containers).
talos_processes List running processes on target nodes.
talos_health Check cluster health (etcd, Kubernetes API, node readiness). Supports control_plane_nodes / worker_nodes override.
talos_logs Fetch recent service logs (last N lines, no follow).
talos_dmesg Read kernel ring buffer messages.
talos_events Fetch recent Talos runtime events (service changes, config changes).
talos_etcd Query etcd cluster: members (default) or status.
talos_list_files List files and directories on a node filesystem.
talos_read_file Read file contents from a node filesystem.

Mutating

These tools modify cluster state and have explicit safety guards.

Tool Description Guards
talos_service_action Start, stop, or restart a Talos service (note: restarting etcd is not supported by the Talos API).
talos_reboot Reboot target nodes. Supports mode: default, powercycle, force. confirm=true required; nodes must be explicit
talos_upgrade Upgrade Talos on target nodes. Supports preserve (default true), stage, force, reboot_mode. confirm=true required; nodes and image required
talos_rollback Roll back the last upgrade on target nodes. confirm=true required; nodes must be explicit
talos_patch_config Apply a machine config patch (JSON or YAML strategic merge). dry_run defaults to true; confirm=true required when dry_run=false

All tools accept an optional nodes field (list of node IPs or hostnames). When omitted, the active context from talosconfig is used.

Security Model

Trust Boundaries

MCP Client (Claude Code / Codex)
        │  stdio / JSON-RPC
        ▼
   talos-mcp  ◄── reads TALOSCONFIG (~/.talos/config)
        │  gRPC + mTLS
        ▼
  Talos API (each node)
        │
        ▼
    Node OS

Data flow warning: Tool responses flow directly into the LLM's context window and are sent to the LLM provider. Anything a tool returns — node IPs, hostnames, service configurations, kernel logs, file contents — becomes part of the prompt sent over the network. Do not use this server with clusters containing data you would not be comfortable sending to your LLM provider.

Talos RBAC is server-side enforced. The credentials in your talosconfig determine what operations are permitted on each node. talos-mcp cannot bypass Talos RBAC — a request that the API rejects will fail with an error, not silently succeed.

Tool Classification and Minimum Required RBAC Role

Tool RBAC minimum
talos_resource_definitions, talos_get, talos_version, talos_services, talos_containers, talos_processes, talos_health, talos_logs, talos_dmesg, talos_events, talos_list_files, talos_read_file os:reader
talos_etcd, talos_service_action, talos_reboot, talos_upgrade, talos_rollback os:operator
talos_patch_config os:admin

Safety Mechanisms

Mechanism How it works
Read-only mode TALOS_MCP_READ_ONLY=true registers only read-only tools at startup; mutating tools are never exposed to the LLM
Path allowlist TALOS_MCP_ALLOWED_PATHS=/etc,/proc restricts talos_read_file and talos_list_files to specified prefixes
Confirm gates talos_reboot, talos_upgrade, talos_rollback, and talos_patch_config (when dry_run=false) require confirm=true; enforced server-side
Preserve default talos_upgrade defaults preserve to true (keep EPHEMERAL partition) — differs from talosctl default of false
Dry-run default talos_patch_config defaults to dry_run=true; applying requires both dry_run=false and confirm=true
Audit logging All mutating tool calls (talos_service_action, talos_reboot, talos_upgrade, talos_rollback, talos_patch_config) emit a structured log line to stderr: AUDIT timestamp=<RFC3339> tool=<name> nodes=<list> args=<json> (patch content is redacted)

What Is Not in the Threat Model

  • The LLM itself — prompt injection, hallucinated tool arguments, and LLM provider data retention are outside the scope of this server
  • The MCP client — security of Claude Code, Codex, or other MCP clients is the responsibility of those projects
  • Network path between talos-mcp and Talos nodes — protected by mutual TLS using the credentials in your talosconfig

Least-Privilege Credential Setup

Create a dedicated talosconfig with minimal permissions for use with this server:

Read-only access (recommended for most use cases):

# Generate a reader-only talosconfig
talosctl config new --roles=os:reader talosconfig-readonly

Then set TALOSCONFIG=/path/to/talosconfig-readonly and TALOS_MCP_READ_ONLY=true for maximum restriction. With this setup, the server exposes only read-only tools and the credentials cannot perform any mutating operations even if a tool were somehow bypassed.

Operator access (for service management, reboot, upgrade):

talosctl config new --roles=os:operator talosconfig-operator

This covers all tools except talos_patch_config (which requires os:admin).

Full access (required for config patching):

Use your default talosconfig or generate one with os:admin. Reserve this for setups where config patch capability is explicitly needed.

Verifying Downloads

Checksums (integrity)

Each release includes a talos-mcp_<version>_checksums.txt file with SHA-256 hashes of all archives. Verify the binary after downloading:

# Download archive and checksums
curl -LO https://github.com/Nosmoht/talos-mcp-server/releases/download/v<version>/talos-mcp_<version>_linux_amd64.tar.gz
curl -LO https://github.com/Nosmoht/talos-mcp-server/releases/download/v<version>/talos-mcp_<version>_checksums.txt

# Verify
sha256sum --check --ignore-missing talos-mcp_<version>_checksums.txt

This detects corruption or truncated downloads. It does not protect against a compromised release pipeline.

GitHub Artifact Attestations (SLSA L2 provenance)

Each release includes a GitHub-native build provenance attestation that cryptographically links the binary to the specific commit and workflow run that produced it:

gh attestation verify talos-mcp_<version>_linux_amd64.tar.gz \
  --repo Nosmoht/talos-mcp-server

This requires the GitHub CLI. A passing verification means the artifact was produced by the official release workflow in this repository, not a third-party build.

npm Package Provenance

The npm package is published with provenance attestation:

npm audit signatures

A passing result means the package was published by the official GitHub Actions release workflow via OIDC trusted publishing.

Development

# Build
go build -o talos-mcp .

# Test
go test -race ./...

# Lint (requires golangci-lint v2)
golangci-lint run

# Format check
gofmt -l .

License

MIT

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
E2B

E2B

Using MCP to run code via e2b.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured