Centralize 10+ MCP servers behind one gateway
Когда использовать: Different teams run different MCPs. You need one URL for clients, one audit log, one auth story.
Предварительные требования
- Docker/Kubernetes environment — Official images at ghcr.io; Helm chart available
- An auth provider (or use built-in JWT) — Existing SSO / OIDC / static JWT signer
Поток
-
Deploy the gatewayDeploy mcp-contextforge-gateway via Helm with Redis for federation state. Point it at our OIDC provider.✓ Скопировано→ Admin UI loads, auth works
-
Register backendsRegister 3 backend MCPs (github, postgres, our-custom) in the admin UI. Apply rate limits: github=100/min, postgres=30/min.✓ Скопировано→ Backends appear as healthy in registry
-
Repoint clientsUpdate teammate Claude Desktop configs to use a single
mcp-remote https://mcp-gw.company.com/mcpwith their JWT.✓ Скопировано→ All backend tools available through one connection
Итог: One place to manage MCP access across the org — centralized like any other API gateway.
Подводные камни
- Rate limits applied globally but teams have different needs — Use per-user or per-JWT-claim rate limits via the policy engine — don't apply one limit to all
- Gateway becomes single point of failure — Run at least 2 replicas with Redis-backed session state; health-check the /health endpoint