msk-mcp-server

yhyyz/msk-mcp-server

3.2

If you are the rightful owner of msk-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

A comprehensive Model Context Protocol server for managing Amazon MSK infrastructure, including MirrorMaker2 connectors, custom domain creation, and disaster recovery operations.

Tools
5
Resources
0
Prompts
0

MSK MCP Server

A comprehensive Model Context Protocol server that provides management capabilities for Amazon MSK (Managed Streaming for Apache Kafka) including MirrorMaker2 connectors, custom domain creation, and disaster recovery operations. This server enables LLMs to create, configure, and manage complete MSK infrastructure with advanced DNS management and DR switching capabilities.

[!CAUTION] This server requires AWS credentials with permissions to access MSK Connect, S3, Route53, and related AWS services. Exercise caution when using this MCP server to ensure proper AWS security practices.

The server provides two main modules:

  1. MirrorMaker2 Module (mm2) - Complete MM2 pipeline orchestration with custom plugin creation, connector configuration, and status monitoring
  2. Custom Domain Module (dr) - MSK custom domain creation with Route53 integration and disaster recovery switching capabilities

Custom Domain Module only support PLAINTEXT, MSK MM2 support multiple authentication methods (IAM, PLAINTEXT, SCRAM-SHA-512) and handle long-running operations with proper timeouts and retries.

Features

MSK Custom Domain & Disaster Recovery (dr module)

  • Custom Domain Creation - Creates custom DNS domains for MSK clusters using Route53
  • Disaster Recovery Switching - Automated DR failover between primary and secondary MSK clusters
  • Route53 Integration - Manages DNS records and VPC associations for seamless switching
  • Cluster Information - Retrieves detailed MSK cluster and broker information
  • VPC Management - Automatic VPC discovery and association for cross-region deployments

msk-dr

Core MirrorMaker2 Management

  • Complete MM2 Pipeline Setup - Orchestrates full MirrorMaker2 replication setup with three connector types (Heartbeat, Checkpoint, Source)
  • Custom Plugin Management - Creates and manages MSK Connect custom plugins with automatic S3 integration
  • Authentication Support - Configures IAM, PLAINTEXT, and SCRAM-SHA-512 authentication for source and target clusters
  • Status Monitoring - Real-time monitoring of connector and plugin states with automated waiting functions

Available Tools

MSK Custom Domain & Disaster Recovery
  • get_msk_cluster_info - Retrieves detailed information about an MSK cluster
  • get_msk_broker_info - Gets broker information and bootstrap addresses for MSK clusters
  • get_vpc_for_msk_cluster - Discovers VPC information for MSK cluster networking
  • get_route53_hosted_zone_info - Retrieves Route53 hosted zone details
  • create_msk_custom_domain - Creates custom DNS domains for MSK clusters with Route53 integration
  • list_route53_resource_record_sets - Lists all DNS records in a Route53 hosted zone
  • perform_dr_switch - Performs disaster recovery switching between primary and DR clusters
Plugin Management
  • create_empty_plugin_zip - Creates an empty MirrorMaker2 plugin ZIP file and uploads to S3
  • create_custom_plugin - Creates MSK Connect custom plugin from S3-stored ZIP file
  • check_plugin_status - Checks the current status of a custom plugin
  • wait_for_plugin_ready - Waits for plugin to reach ACTIVE state with timeout handling
Connector Management
  • create_mirror_heartbeat_connector - Creates MirrorHeartbeatConnector for cluster monitoring
  • create_mirror_checkpoint_connector - Creates MirrorCheckpointConnector for offset tracking
  • create_mirror_source_connector - Creates MirrorSourceConnector for data replication
  • check_connector_status - Monitors connector operational status
  • wait_for_connector_ready - Waits for connector to reach RUNNING state
Worker Configuration
  • create_worker_configuration - Creates MSK Connect worker configurations
  • describe_worker_configuration - Retrieves worker configuration details
  • delete_worker_configuration - Removes worker configurations
High-Level Operations
  • create_complete_mm2_setup - End-to-end MirrorMaker2 setup orchestration
  • update_connector - Updates existing connector configurations
  • delete_connector - Safely removes connectors
  • list_connectors - Lists all MSK Connect connectors
  • describe_connector - Detailed connector information

Available Resources

  • msk://clusters - Lists all MSK clusters with detailed information
  • msk://clusters/{cluster_name} - Detailed information about specific MSK clusters
  • msk://route53/zones - Lists all Route53 hosted zones
  • msk://route53/zones/{zone_name}/records - DNS records for specific hosted zones
  • msk://connectors - Lists all MSK Connect connectors
  • msk://plugins - Lists all custom plugins
  • msk://worker-configs - Lists all worker configurations
  • msk://connector-status/{connector_name} - Real-time connector status information

Available Prompts

  • setup_msk_custom_domain - Guidance for creating custom domains for MSK clusters with Route53
  • configure_msk_disaster_recovery - Step-by-step DR setup between primary and secondary clusters
  • perform_msk_dr_failover - Instructions for executing disaster recovery failover operations
  • setup_complete_mm2_replication - Guidance for setting up complete MirrorMaker2 replication between clusters
  • troubleshoot_connector - Troubleshooting guidance for connector issues
  • optimize_mm2_performance - Performance optimization recommendations for different scales

Prerequisites

  1. AWS Account Setup

    • AWS account with appropriate permissions
    • MSK clusters (source and target) properly configured
    • VPC subnets and security groups configured for MSK Connect
    • IAM service execution role for MSK Connect
  2. Required AWS Permissions

    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Action": [
            "kafkaconnect:*",
            "kafka:*",
            "s3:GetObject",
            "s3:PutObject",
            "s3:ListBucket",
            "route53:*",
            "ec2:DescribeSubnets",
            "ec2:DescribeVpcs"
          ],
          "Resource": "*"
        }
      ]
    }
    
  3. S3 Bucket

    • S3 bucket for storing MirrorMaker2 plugin files
    • Proper IAM permissions for MSK Connect to access the bucket
  4. Route53 Hosted Zone (for custom domain functionality)

    • Route53 hosted zone for custom domain creation
    • Proper IAM permissions for Route53 record management
    • VPC associations configured for private hosted zones
  5. Network Configuration

    • VPC subnets accessible to both source and target MSK clusters
    • Security groups allowing MSK Connect to communicate with clusters

Installation

Using uv (recommended)

When using uv no specific installation is needed. We will use uvx to directly run msk-mcp-server.

Using PIP

Alternatively you can install msk-mcp-server via pip:

pip install msk-mcp-server

After installation, you can run it as a script using:

python -m mcp_server_msk_mm2

Configuration

Configure for Claude.app

Add to your Claude settings:

Using uvx with latest version

{
  "mcpServers": {
    "msk-mcp-server": {
      "command": "uvx",
      "args": ["msk-mcp-server@latest"],
      "env": {
        "AWS_REGION": "us-east-1",
        "AWS_PROFILE": "your-aws-profile",
        "FASTMCP_LOG_LEVEL": "ERROR"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

Using uvx (simple)

{
  "mcpServers": {
    "msk-mm2": {
      "command": "uvx",
      "args": ["msk-mcp-server"],
      "env": {
        "AWS_REGION": "us-east-1",
        "AWS_PROFILE": "your-aws-profile"
      }
    }
  }
}

Using pip installation

{
  "mcpServers": {
    "msk-mm2": {
      "command": "python",
      "args": ["-m", "mcp_server_msk_mm2"],
      "env": {
        "AWS_REGION": "us-east-1",
        "AWS_PROFILE": "your-aws-profile"
      }
    }
  }
}

Configure for VS Code

For manual installation, add the following JSON block to your User Settings (JSON) file in VS Code. You can do this by pressing Ctrl + Shift + P and typing Preferences: Open User Settings (JSON).

Optionally, you can add it to a file called .vscode/mcp.json in your workspace. This will allow you to share the configuration with others.

Note that the mcp key is needed when using the mcp.json file.

Using uvx with latest version

{
  "mcp": {
    "servers": {
      "msk-mcp-server": {
        "command": "uvx",
        "args": ["msk-mcp-server@latest"],
        "env": {
          "AWS_REGION": "us-east-1",
          "AWS_PROFILE": "your-aws-profile",
          "FASTMCP_LOG_LEVEL": "ERROR"
        },
        "disabled": false,
        "autoApprove": []
      }
    }
  }
}

Using uvx (simple)

{
  "mcp": {
    "servers": {
      "msk-mm2": {
        "command": "uvx",
        "args": ["msk-mcp-server"],
        "env": {
          "AWS_REGION": "us-east-1",
          "AWS_PROFILE": "your-aws-profile"
        }
      }
    }
  }
}

Environment Variables

AWS Configuration

  • AWS_REGION - AWS region for MSK Connect operations (default: uses AWS SDK default)
  • AWS_PROFILE - AWS profile to use for authentication
  • AWS_ACCESS_KEY_ID - AWS access key (if not using profiles)
  • AWS_SECRET_ACCESS_KEY - AWS secret key (if not using profiles)

Timeout Configuration

  • AWS_READ_TIMEOUT - Read timeout for AWS operations in seconds (default: 300)
  • AWS_CONNECT_TIMEOUT - Connection timeout for AWS operations in seconds (default: 60)

Usage Examples

MSK Custom Domain Creation

Create custom DNS domains for your MSK clusters:

{
  "tool": "create_msk_custom_domain",
  "arguments": {
    "region": "us-east-1",
    "cluster_name": "my-msk-cluster", 
    "zone_name": "kafka.example.com.",
    "vpc_id": "vpc-12345678"
  }
}

Disaster Recovery Switching

Perform DR failover between primary and secondary clusters:

{
  "tool": "perform_dr_switch",
  "arguments": {
    "primary_region": "us-east-1",
    "primary_cluster_name": "primary-cluster",
    "dr_region": "us-west-2", 
    "dr_cluster_name": "dr-cluster",
    "zone_name": "kafka.example.com.",
    "activate_dr": true
  }
}

Get MSK Cluster Information

Retrieve detailed cluster and broker information:

{
  "tool": "get_msk_cluster_info",
  "arguments": {
    "region": "us-east-1",
    "cluster_name": "my-msk-cluster"
  }
}

Complete MirrorMaker2 Setup

The server provides a high-level orchestration tool for complete setup:

{
  "tool": "create_complete_mm2_setup",
  "arguments": {
    "plugin_name": "my-mm2-plugin",
    "s3_bucket": "my-kafka-plugins",
    "s3_key": "mm2/mirrormaker2.zip",
    "source_bootstrap_servers": "source-cluster.kafka.us-east-1.amazonaws.com:9092",
    "target_bootstrap_servers": "target-cluster.kafka.us-east-1.amazonaws.com:9092",
    "service_execution_role_arn": "arn:aws:iam::123456789012:role/MSKConnectRole",
    "vpc_subnets": ["subnet-12345", "subnet-67890"],
    "vpc_security_groups": ["sg-abcdef"],
    "source_auth_type": "iam",
    "target_auth_type": "iam"
  }
}

Monitor Connector Status

{
  "tool": "check_connector_status",
  "arguments": {
    "connector_arn": "arn:aws:kafkaconnect:us-east-1:123456789012:connector/my-connector/abc-123"
  }
}

Authentication Methods

IAM Authentication

{
  "source_auth_type": "iam",
  "source_role_arn": "arn:aws:iam::123456789012:role/MSKSourceRole"
}

SCRAM-SHA-512 Authentication

{
  "source_auth_type": "scram-sha-512",
  "source_username": "kafka-user",
  "source_password": "kafka-password"
}

PLAINTEXT Authentication

{
  "source_auth_type": "plaintext",
  "source_username": "kafka-user",
  "source_password": "kafka-password"
}

Debugging

You can use the MCP inspector to debug the server:

For uvx installations:

npx @modelcontextprotocol/inspector uvx msk-mcp-server

Or if you've installed the package in a specific directory or are developing on it:

cd path/to/msk-mcp-server
npx @modelcontextprotocol/inspector python -m mcp_server_msk_mm2

Architecture

The server is built with a modular architecture:

Core Framework:

  • FastMCP Framework - Modern MCP server implementation with dependency management
  • Modular Design - Separate modules for different MSK management capabilities
  • Unified Interface - Single server instance with mounted submodules

Module Structure:

  • mm2 Module - Complete MirrorMaker2 connector management
  • dr Module - Custom domain creation and disaster recovery operations

Technical Features:

  • Sync Operations - All operations are synchronous for better reliability
  • Comprehensive Error Handling - Detailed error messages with AWS error codes
  • Status Monitoring - Built-in polling for long-running operations
  • Retry Logic - Exponential backoff for transient failures
  • Resource Validation - Parameter validation and state checking

Contributing

We encourage contributions to help expand and improve msk-mcp-server. Whether you want to add new tools, enhance existing functionality, or improve documentation, your input is valuable.

For examples of other MCP servers and implementation patterns, see: https://github.com/modelcontextprotocol/servers

Pull requests are welcome! Feel free to contribute new ideas, bug fixes, or enhancements to make msk-mcp-server even more powerful and useful.

License

msk-mcp-server is licensed under the MIT License. This means you are free to use, modify, and distribute the software, subject to the terms and conditions of the MIT License. For more details, please see the LICENSE file in the project repository.