MCP Gateway
Spin up your own Model Context Protocol (MCP) Gateway to federate any number of MCP tool servers into a single MCP endpoint. An MCP Gateway allows you to centrally manage discovery, security, observability, traffic management, and governance of MCP tools, while seamlessly multiplexing requests from MCP clients to upstream MCP tool servers.
About the Model Context Protocol (MCP)
Model Context Protocol (MCP) is an open protocol that standardizes how Large Language Model (LLM) applications connect to various external data sources and tools. Without MCP, you need to implement custom integrations for each tool that your LLM application needs to access. However, this approach is hard to maintain and can cause issues when you want to scale your environment. With MCP, you can significantly speed up, simplify, and standardize these types of integrations.
How can kgateway help?
While MCP provides an excellent foundation for interoperability between agents and tools, there are still challenges to address when integrating MCP clients and MCP tool server implementations. Kgateway addresses common friction points in securing, scaling, and integrating MCP clients with tool servers, including:
- Simplifying tool onboarding with automated discovery and registration of MCP tool servers.
- Providing developers with a centralized registry of MCP tools across heterogeneous tool servers regardless of their location.
- Enabling access to any MCP tool by using a single endpoint with innovative MCP multiplexing that turns an entire ecosystem of thousands of tools into a virtualized MCP tool server.
- Instantly securing MCP tool server implementations by providing consistent authentication and authorization controls for multi-tenant consumption.
- Providing deep insights and observability into AI agent and tool integrations with centralized metrics, logging, and tracing for all tool calls.
MCP server security
An MCP server exposes external data sources and tools so that LLM applications can access them. Typically, you want to deploy these servers remotely and have authorization mechanisms in place so that LLM applications can safely access the data.
MCP recently introduced the MCP Authorization spec that is based on OAuth 2.1. While this spec describes how MCP servers should handle authorization requests to MCP tools, it now requires the MCP server to serve as both a resource server and an authorization server. This requirement can cause a burden on enterprises that implement their own MCP servers, especially if the server must be integrated into an existing security infrastructure or when other authorization mechanisms are already in place.
About this guide
In this guide, you explore how to configure kgateway as an MCP Gateway to protect access to a sample MCP tool, convert_to_markdown
. You use a sample MCP server deployment that is exposed on the MCP Gateway. However, you can easily plug in your own MCP server image if you want to.
Before you begin
-
Install the MCP Gateway custom resources.
helm upgrade -i --create-namespace --namespace kgateway-system --version v2.0.0-mcpdemo kgateway-crds oci://us-docker.pkg.dev/developers-369321/gloo-platform-dev/charts/kgateway-crds
-
Install or upgrade your kgateway installation to add the MCP Gateway capabilities.
helm upgrade -i --namespace kgateway-system --version v2.0.0-mcpdemo kgateway oci://us-docker.pkg.dev/developers-369321/gloo-platform-dev/charts/kgateway --set controller.image.registry=us-docker.pkg.dev/developers-369321/gloo-platform-dev --set controller.image.tag=2.0.0-mcpdemo --set image.tag=v2.0.0
Set up an MCP Gateway
Use a sample MCP server image to deploy your own MCP Gateway.
-
Create a GatewayParameters resource that allows you to set up self-managed Gateways. The GatewayParameters resource instructs kgateway to not automatically spin up a gateway proxy, but instead wait for your custom gateway proxy deployment.
kubectl apply -f- <<EOF kind: GatewayParameters apiVersion: gateway.kgateway.dev/v1alpha1 metadata: name: kgateway spec: selfManaged: {} EOF
-
Create a GatewayClass for your MCP Gateway and bind it to the custom GatewayParameters that you created earlier.
kubectl apply -f- <<EOF kind: GatewayClass apiVersion: gateway.networking.k8s.io/v1 metadata: name: mcp spec: controllerName: kgateway.dev/kgateway parametersRef: group: gateway.kgateway.dev kind: GatewayParameters name: kgateway namespace: default EOF
-
Create a Gateway with the custom GatewayClass. The custom GatewayClass instructs kgateway to not automatically spin up a gateway proxy deployment and to wait for your custom deployment. In this example, you open up an MCP listener on port 8080.
kubectl apply -f- <<EOF kind: Gateway apiVersion: gateway.networking.k8s.io/v1 metadata: name: mcp-gateway spec: gatewayClassName: mcp listeners: - protocol: kgateway.dev/mcp port: 8080 name: http allowedRoutes: namespaces: from: All EOF
-
Create your MCP server that serves as your custom gateway proxy deployment. This server is exposed on port 8080, which is the port the Gateway listens on.
kubectl apply -f- <<EOF apiVersion: apps/v1 kind: Deployment metadata: name: mcp-gateway spec: selector: matchLabels: app: mcp-gateway template: metadata: labels: app: mcp-gateway spec: terminationGracePeriodSeconds: 1 containers: - name: mcp-gateway image: ghcr.io/mcp-proxy/mcp-proxy:0.0.3 args: - --file=/config/config.json env: - name: NODE_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: GW_NAME value: mcp-gateway - name: RUST_BACKTRACE value: "1" - name: RUST_LOG value: debug volumeMounts: - name: config-volume mountPath: /config volumes: - name: config-volume configMap: name: mcp-gateway-config --- apiVersion: v1 kind: Service metadata: name: mcp-gateway spec: selector: app: mcp-gateway ports: - protocol: TCP port: 8080 targetPort: 8080 type: ClusterIP --- apiVersion: v1 kind: ConfigMap metadata: name: mcp-gateway-config data: config.json: | { "type": "xds", "xds_address": "http://kgateway.kgateway-system.svc.cluster.local:9977", "metadata": {}, "alt_xds_hostname": "mcp-gateway.default.svc.cluster.local", "listener": { "type": "sse", "host": "0.0.0.0", "port": 8080, "authn": { "type":"jwt", "issuer": ["me"], "audience": ["me.com"], "jwks": { "type": "local", "source": { "type": "file", "data": "/config/jwks.json" } } } } } jwks.json: | { "use": "sig", "kty": "EC", "kid": "XhO06x8JjWH1wwkWkyeEUxsooGEWoEdidEpwyd_hmuI", "crv": "P-256", "alg": "ES256", "x": "XZHF8Em5LbpqfgewAalpSEH4Ka2I2xjcxxUt2j6-lCo", "y": "g3DFz45A7EOUMgmsNXatrXw1t-PG5xsbkxUs851RxSE" } EOF
-
Create the
convert_to_markdown
MCP tool and expose it on your MCP server. The tool takes human-readable text as an input and converts this input to markdown.kubectl apply -f- <<EOF apiVersion: apps/v1 kind: Deployment metadata: name: mcp-tool spec: selector: matchLabels: app: mcp-tool template: metadata: labels: app: mcp-tool spec: containers: - name: mcp-tool image: us-docker.pkg.dev/developers-369321/gloo-platform-dev/markitdown-mcp:2.0.0-mcpdemo args: - "--sse" - "--host=0.0.0.0" - "--port=8080" ports: - containerPort: 8080 --- apiVersion: v1 kind: Service metadata: name: mcp-tool spec: selector: app: mcp-tool type: ClusterIP ports: - protocol: TCP port: 8080 targetPort: 8080 appProtocol: kgateway.dev/mcp EOF
-
Verify that the MCP server and tool are up and running.
kubectl get pods
Example output:
NAME READY STATUS RESTARTS AGE mcp-gateway-57cc679d99-gvnpp 1/1 Running 0 89s mcp-tool-866f878885-qqp2r 1/1 Running 0 89s
Access the MCP tool
With your MCP Gateway in place, you can now test access to the MCP tool.
-
Port-forward the MCP Gateway on port 8080.
kubectl port-forward svc/mcp-gateway 8080
-
Install the MCP model inspector tool.
npx @modelcontextprotocol/inspector
-
Connect to the MCP Gateway.
- Switch the Transport Type to SSE.
- Change the URL to
http://localhost:8080/sse
. - Expand the Authentication section.
- In the Bearer Token field, add a JWT to access the MCP Gateway. You can use the following JWT to try out access to the MCP Gateway.
eyJhbGciOiJFUzI1NiIsImtpZCI6IlhoTzA2eDhKaldIMXd3a1dreWVFVXhzb29HRVdvRWRpZEVwd3lkX2htdUkiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOiJtZS5jb20iLCJleHAiOjE5MDA2NTAyOTQsImlhdCI6MTc0MzYyNDc4NywiaXNzIjoibWUiLCJqdGkiOiJlM2MzNjhkYzBmNGUyODdiYzhkYmM2OTIyOTU5ZTA3M2YzMThkNTliYTlhZjdhY2Q0N2ViMWUzZGIyOTZlYTQwIiwibmJmIjoxNzQzNjI0Nzg3LCJzdWIiOiJtZSJ9.IshAKo62yWHwfnt62vR1nfa4SQmpSB-4ceAMXWs1P_rREl2gYj6nJ7HwLM5avv_eyOFbI-3rRZzCMCuNVLAF5w
- Click Connect to connect to the MCP Gateway.
-
List the MCP tools that are exposed on the MCP Gateway.
- In the MCP model inspector, go to Tools.
- Click List Tools.
- Verify that you can see the
convert_to_markdown
tool.
-
Try out the convert_to_markdown MCP tool that you deployed earlier.
- Click the convert_to_markdown tool.
- In the uri field, provide a sample file that you want to convert to markdown. For example, you can download a PDF version of the Git cheat sheet.
- Click Run Tool.
-
Verify that the request fails, because the MCP Gateway requires an MCPAuthPolicy to be in place to allow access to the tool.
-
Create an MCPAuthPolicy that allows JWTs with the
sub: me
claim to access the MCP tool. The policy is applied to theconvert_to_markdown
tool.kubectl apply -f- <<EOF apiVersion: gateway.kgateway.dev/v1alpha1 kind: MCPAuthPolicy metadata: name: mcp-jq-auth spec: targetRefs: - name: mcp-gateway group: gateway.networking.k8s.io kind: Gateway rules: - matches: - type: JWT jwt: claim: sub value: me resource: kind: tool name: default/mcp-tool:convert_to_markdown EOF
-
Try to use the tool again. Note that this time, the request succeeds, because the MCP Gateway successfully authorized the request.
Cleanup
You can remove the resources that you created in this guide.kubectl delete mcpauthpolicy mcp-jq-auth
kubectl delete deployment mcp-tool
kubectl delete service mcp-tool
kubectl delete deployment mcp-gateway
kubectl delete service mcp-gateway
kubectl delete configmap mcp-gateway-config
kubectl delete gateway mcp-gateway
kubectl delete gatewayclass mcp
kubectl delete gatewayparameters kgateway