Installation Guide¶
Complete installation instructions for the MCP Gateway & Registry on various platforms.
Prerequisites¶
- Node.js 16+: Required for building the React frontend (not needed with
--prebuiltflag) - Container Runtime: Choose one:
- Docker & Docker Compose: Standard container runtime
- Podman & Podman Compose: Rootless alternative (recommended for macOS)
- Amazon Cognito or Keycloak: Identity provider for authentication (see Cognito Setup Guide or Keycloak Integration)
- SSL Certificate: Optional for HTTPS deployment in production
Quick Start¶
Docker Installation (Default)¶
# 1. Clone and setup
git clone https://github.com/agentic-community/mcp-gateway-registry.git
cd mcp-gateway-registry
cp .env.example .env
# 2. Setup Python virtual environment
uv sync
source .venv/bin/activate
# 3. Download embeddings model
uv pip install -U huggingface_hub
hf download sentence-transformers/all-MiniLM-L6-v2 --local-dir ${HOME}/mcp-gateway/models/all-MiniLM-L6-v2
# 4. Configure environment - edit .env with your passwords
nano .env
# Set: KEYCLOAK_ADMIN_PASSWORD, INITIAL_ADMIN_PASSWORD (must match), KEYCLOAK_DB_PASSWORD
# Set: SESSION_COOKIE_SECURE=false (for HTTP localhost)
# Generate SECRET_KEY
SECRET_KEY=$(python3 -c "import secrets; print(secrets.token_urlsafe(64))")
sed -i "s/^#*\s*SECRET_KEY=.*/SECRET_KEY=$SECRET_KEY/" .env
# 5. Deploy with pre-built images
export DOCKERHUB_ORG=mcpgateway
source .env
export KEYCLOAK_ADMIN="${KEYCLOAK_ADMIN:-admin}"
./build_and_run.sh --prebuilt
# Press Ctrl+C when logs are streaming - containers continue running
# 6. Initialize MongoDB
docker compose up mongodb-init
docker compose restart auth-server
# 7. Initialize Keycloak (wait for Keycloak to start first)
# Disable SSL for master realm
ADMIN_TOKEN=$(curl -s -X POST "http://localhost:8080/realms/master/protocol/openid-connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "username=${KEYCLOAK_ADMIN}" \
-d "password=${KEYCLOAK_ADMIN_PASSWORD}" \
-d "grant_type=password" \
-d "client_id=admin-cli" | jq -r '.access_token') && \
curl -X PUT "http://localhost:8080/admin/realms/master" \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-H "Content-Type: application/json" \
-d '{"sslRequired": "none"}'
# Initialize realm and clients
chmod +x keycloak/setup/init-keycloak.sh
./keycloak/setup/init-keycloak.sh
# Disable SSL for application realm
ADMIN_TOKEN=$(curl -s -X POST "http://localhost:8080/realms/master/protocol/openid-connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "username=${KEYCLOAK_ADMIN}" \
-d "password=${KEYCLOAK_ADMIN_PASSWORD}" \
-d "grant_type=password" \
-d "client_id=admin-cli" | jq -r '.access_token') && \
curl -X PUT "http://localhost:8080/admin/realms/mcp-gateway" \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-H "Content-Type: application/json" \
-d '{"sslRequired": "none"}'
# Get client credentials
chmod +x keycloak/setup/get-all-client-credentials.sh
./keycloak/setup/get-all-client-credentials.sh
# Update .env with client secrets from .oauth-tokens/keycloak-client-secrets.txt
cat .oauth-tokens/keycloak-client-secrets.txt
nano .env # Update KEYCLOAK_CLIENT_SECRET and KEYCLOAK_M2M_CLIENT_SECRET
# Recreate containers with new credentials
./build_and_run.sh --prebuilt
# 8. Setup users and service accounts
chmod +x ./cli/bootstrap_user_and_m2m_setup.sh
./cli/bootstrap_user_and_m2m_setup.sh
# 9. Access registry
open http://localhost:7860 # macOS
# xdg-open http://localhost:7860 # Linux
# Login: admin / <KEYCLOAK_ADMIN_PASSWORD>
For the complete step-by-step guide with detailed explanations, see the Quick Start Guide.
Podman Installation (Rootless Alternative)¶
Recommended for macOS and rootless Linux environments
# 1. Clone and setup
git clone https://github.com/agentic-community/mcp-gateway-registry.git
cd mcp-gateway-registry
cp .env.example .env
# 2. Install Podman (macOS)
brew install podman-desktop
# OR download from: https://podman-desktop.io/
# 3. Initialize Podman machine (macOS)
podman machine init --cpus 4 --memory 8192 --disk-size 50
podman machine start
# 4. Setup Python virtual environment
uv sync
source .venv/bin/activate
# 5. Download embeddings model
uv pip install -U huggingface_hub
hf download sentence-transformers/all-MiniLM-L6-v2 --local-dir ${HOME}/mcp-gateway/models/all-MiniLM-L6-v2
# 6. Configure environment - edit .env with your passwords
nano .env
# Set: KEYCLOAK_ADMIN_PASSWORD, INITIAL_ADMIN_PASSWORD (must match), KEYCLOAK_DB_PASSWORD
# Set: SESSION_COOKIE_SECURE=false (for HTTP localhost)
# For Podman: Set KEYCLOAK_URL=http://localhost:18080
# Generate SECRET_KEY
SECRET_KEY=$(python3 -c "import secrets; print(secrets.token_urlsafe(64))")
sed -i "s/^#*\s*SECRET_KEY=.*/SECRET_KEY=$SECRET_KEY/" .env
# 7. Deploy with Podman
export DOCKERHUB_ORG=mcpgateway
source .env
export KEYCLOAK_ADMIN="${KEYCLOAK_ADMIN:-admin}"
./build_and_run.sh --prebuilt --podman
# Apple Silicon: Use ./build_and_run.sh --podman (without --prebuilt)
# Press Ctrl+C when logs are streaming - containers continue running
# 8. Initialize MongoDB
podman compose up mongodb-init
podman compose restart auth-server
# 9. Initialize Keycloak (wait for Keycloak to start first)
# Note: Podman uses port 18080 for Keycloak
ADMIN_TOKEN=$(curl -s -X POST "http://localhost:18080/realms/master/protocol/openid-connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "username=${KEYCLOAK_ADMIN}" \
-d "password=${KEYCLOAK_ADMIN_PASSWORD}" \
-d "grant_type=password" \
-d "client_id=admin-cli" | jq -r '.access_token') && \
curl -X PUT "http://localhost:18080/admin/realms/master" \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-H "Content-Type: application/json" \
-d '{"sslRequired": "none"}'
# Initialize realm and clients
chmod +x keycloak/setup/init-keycloak.sh
KEYCLOAK_URL=http://localhost:18080 ./keycloak/setup/init-keycloak.sh
# Disable SSL for application realm
ADMIN_TOKEN=$(curl -s -X POST "http://localhost:18080/realms/master/protocol/openid-connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "username=${KEYCLOAK_ADMIN}" \
-d "password=${KEYCLOAK_ADMIN_PASSWORD}" \
-d "grant_type=password" \
-d "client_id=admin-cli" | jq -r '.access_token') && \
curl -X PUT "http://localhost:18080/admin/realms/mcp-gateway" \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-H "Content-Type: application/json" \
-d '{"sslRequired": "none"}'
# Get client credentials
chmod +x keycloak/setup/get-all-client-credentials.sh
KEYCLOAK_URL=http://localhost:18080 ./keycloak/setup/get-all-client-credentials.sh
# Update .env with client secrets
cat .oauth-tokens/keycloak-client-secrets.txt
nano .env # Update KEYCLOAK_CLIENT_SECRET and KEYCLOAK_M2M_CLIENT_SECRET
# Recreate containers with new credentials
./build_and_run.sh --prebuilt --podman
# 10. Setup users and service accounts
chmod +x ./cli/bootstrap_user_and_m2m_setup.sh
KEYCLOAK_URL=http://localhost:18080 ./cli/bootstrap_user_and_m2m_setup.sh
# 11. Access registry (note the different port for Podman)
open http://localhost:8080 # macOS
# xdg-open http://localhost:8080 # Linux
# Login: admin / <KEYCLOAK_ADMIN_PASSWORD>
Note for Apple Silicon: Don't use
--prebuiltwith Podman on ARM64. Use./build_and_run.sh --podmaninstead. See Podman on Apple Silicon Guide.
Podman Port Mapping: - Main interface: http://localhost:8080 (HTTP) or https://localhost:8443 (HTTPS) - Registry API: http://localhost:7860 (unchanged) - Keycloak: http://localhost:18080 (instead of 8080) - All other internal services: unchanged ports
Installation on Amazon EC2¶
System Requirements¶
Minimum (Development): - EC2 Instance: t3.large (2 vCPU, 8GB RAM) - Storage: 20GB SSD - Network: Ports 80, 443, 7860, 8080 accessible
Recommended (Production): - EC2 Instance: t3.2xlarge (8 vCPU, 32GB RAM)
- Storage: 50GB+ SSD - Network: Multi-AZ with load balancer
Detailed Setup Steps¶
-
Create Local Directories
-
Configure Environment Variables
Required Configuration: - ADMIN_PASSWORD: Secure admin password - COGNITO_USER_POOL_ID: Amazon Cognito User Pool ID - COGNITO_CLIENT_ID: Cognito App Client ID - COGNITO_CLIENT_SECRET: Cognito App Client Secret - AWS_REGION: AWS region for Cognito
-
Generate Authentication Credentials
-
Install Dependencies
# Install uv (Python package manager) curl -LsSf https://astral.sh/uv/install.sh | sh source $HOME/.local/bin/env uv venv --python 3.12 && source .venv/bin/activate # Install Docker sudo apt-get update sudo apt-get install --reinstall docker.io -y sudo apt-get install -y docker-compose sudo usermod -a -G docker $USER newgrp docker -
Deploy Services
Podman Installation (Rootless Containers)¶
Podman is a daemonless container engine that provides rootless container execution, making it ideal for macOS and environments where Docker requires privileged access.
Benefits of Podman¶
- ✅ Rootless Execution: No sudo or privileged ports required
- ✅ macOS Native: Works seamlessly with Podman Desktop on macOS
- ✅ Security: Enhanced container isolation without root privileges
- ✅ Compatibility: Drop-in replacement for Docker with similar CLI commands
Installation on macOS¶
Option 1: Podman Desktop (Recommended)
# Install via Homebrew
brew install podman-desktop
# Or download directly from:
# https://podman-desktop.io/
Option 2: Podman CLI Only
# Install Podman
brew install podman
# Initialize Podman machine
podman machine init --cpus 4 --memory 8192 --disk-size 50
podman machine start
# Verify installation
podman --version
podman compose version
Installation on Linux¶
# Ubuntu/Debian
sudo apt-get update
sudo apt-get install -y podman podman-compose
# Fedora/RHEL
sudo dnf install -y podman podman-compose
# Arch Linux
sudo pacman -S podman podman-compose
# Verify installation
podman --version
podman compose version
Deploying with Podman¶
# Navigate to repository
cd mcp-gateway-registry
# Configure environment
cp .env.example .env
nano .env # Configure required values
# Important: Set KEYCLOAK_URL=http://localhost:18080 for Podman
# Deploy with Podman (explicit)
./build_and_run.sh --prebuilt --podman
# Apple Silicon: Use without --prebuilt
# ./build_and_run.sh --podman
# Or let the script auto-detect (will use Podman if Docker not available)
./build_and_run.sh --prebuilt
After initial deployment, you must complete the MongoDB and Keycloak initialization steps. See the Podman Installation Quick Start above for the complete sequence including: - MongoDB initialization (podman compose up mongodb-init) - Keycloak realm setup (using port 18080) - Client credential retrieval and .env update - Container recreation to apply credentials - User and service account setup
Apple Silicon Warning: Don't use
--prebuiltwith Podman on Apple Silicon Macs. Use./build_and_run.sh --podmaninstead. See Podman on Apple Silicon Guide.
Accessing Services with Podman¶
Important Port Differences:
Podman uses non-privileged host ports to avoid requiring root access:
| Service | Docker Port | Podman Port | Description |
|---|---|---|---|
| Main UI (HTTP) | http://localhost | http://localhost:8080 | Web interface |
| Main UI (HTTPS) | https://localhost | https://localhost:8443 | Secure web interface |
| Registry API | http://localhost:7860 | http://localhost:7860 | API endpoint (unchanged) |
| Auth Server | http://localhost:8888 | http://localhost:8888 | Auth service (unchanged) |
| Keycloak | http://localhost:8080 | http://localhost:18080 | IdP (Podman uses 18080 because 8080 is used by the Registry UI) |
| Prometheus | http://localhost:9090 | http://localhost:9090 | Metrics (unchanged) |
| Grafana | http://localhost:3000 | http://localhost:3000 | Dashboards (unchanged) |
Access the registry:
Podman-Specific Configuration¶
The deployment uses docker-compose.podman.yml when using Podman, which:
- Remaps privileged ports: Maps container ports 80→8080 and 443→8443 on the host
- Adds SELinux labels: Adds
:zmount options for SELinux compatibility (Linux) - Maintains compatibility: All internal service-to-service communication unchanged
Troubleshooting Podman¶
Issue: Permission denied on volume mounts
# Ensure directories exist with proper permissions
mkdir -p ${HOME}/mcp-gateway/{servers,agents,models,logs,security_scans,auth_server,ssl}
chmod -R 755 ${HOME}/mcp-gateway
Issue: Podman machine not starting (macOS)
# Reset Podman machine
podman machine stop
podman machine rm
podman machine init --cpus 4 --memory 8192 --disk-size 50
podman machine start
Issue: Port conflicts
# Check what's using ports 8080 or 8443
lsof -i :8080
lsof -i :8443
# Stop conflicting services or use different ports by editing docker-compose.podman.yml
Issue: Podman compose command not found
# Install podman-compose separately
pip install podman-compose
# Or use podman-compose wrapper
brew install podman-compose
HTTPS Configuration¶
By default, MCP Gateway runs on HTTP (port 80). To enable HTTPS for production deployments:
1. Obtain SSL Certificates¶
Option A: Let's Encrypt (Recommended)
# Install certbot
sudo apt-get update
sudo apt-get install -y certbot
# Get certificate (requires domain and port 80 accessible)
sudo certbot certonly --standalone -d your-domain.com
Option B: Commercial CA Purchase SSL certificate from a trusted Certificate Authority.
2. Copy Certificates to Expected Location¶
MCP Gateway expects SSL certificates at ${HOME}/mcp-gateway/ssl/. The build_and_run.sh script will automatically set up the proper directory structure.
# Create the ssl directory structure
mkdir -p ${HOME}/mcp-gateway/ssl/certs
mkdir -p ${HOME}/mcp-gateway/ssl/private
# Copy your certificates to the expected location
# Replace paths below with your actual certificate locations
cp /etc/letsencrypt/live/your-domain/fullchain.pem ${HOME}/mcp-gateway/ssl/certs/fullchain.pem
cp /etc/letsencrypt/live/your-domain/privkey.pem ${HOME}/mcp-gateway/ssl/private/privkey.pem
# Set proper permissions
chmod 644 ${HOME}/mcp-gateway/ssl/certs/fullchain.pem
chmod 600 ${HOME}/mcp-gateway/ssl/private/privkey.pem
Note: If SSL certificates are not present at ${HOME}/mcp-gateway/ssl/certs/fullchain.pem and ${HOME}/mcp-gateway/ssl/private/privkey.pem, the MCP Gateway will automatically run in HTTP-only mode.
3. Configure Security Group¶
- Enable TCP port 443 for HTTPS access
- Restrict access to authorized IP ranges
- Keep port 80 open for HTTP and Let's Encrypt renewals
4. Deploy and Verify¶
# Start/restart the services
./build_and_run.sh
# Check logs for SSL certificate detection
docker compose logs registry | grep -i ssl
# Expected output:
# "SSL certificates found - HTTPS enabled"
# "HTTPS server will be available on port 443"
# Test HTTPS access
curl https://your-domain.com
Certificate Renewal (Let's Encrypt)¶
Let's Encrypt certificates expire after 90 days. Set up automatic renewal:
# Add to crontab
sudo crontab -e
# Add this line (checks twice daily, renews if needed)
0 0,12 * * * certbot renew --quiet && cp /etc/letsencrypt/live/your-domain/fullchain.pem ${HOME}/mcp-gateway/ssl/certs/fullchain.pem && cp /etc/letsencrypt/live/your-domain/privkey.pem ${HOME}/mcp-gateway/ssl/private/privkey.pem && docker compose restart registry
Troubleshooting¶
HTTPS not working? - Check certificate files exist: ls -la ${HOME}/mcp-gateway/ssl/certs/ ${HOME}/mcp-gateway/ssl/private/ - Verify certificates are present: ${HOME}/mcp-gateway/ssl/certs/fullchain.pem and ${HOME}/mcp-gateway/ssl/private/privkey.pem - Check container logs: docker compose logs registry | grep -i ssl - Verify port 443 is accessible: sudo netstat -tlnp | grep 443 - Ensure certificates are from a trusted CA
Installation on Amazon EKS¶
For production Kubernetes deployments, see the EKS deployment guide.
Architecture Overview¶
graph TB
subgraph "EKS Cluster"
subgraph "Ingress"
ALB[Application Load Balancer]
IC[Ingress Controller]
end
subgraph "Application Pods"
RP[Registry Pod]
AS[Auth Server Pod]
NG[Nginx Pod]
end
subgraph "MCP Servers"
MS1[MCP Server 1]
MS2[MCP Server 2]
MSN[MCP Server N]
end
end
subgraph "AWS Services"
COG[Amazon Cognito]
CW[CloudWatch]
ECR[Amazon ECR]
end
ALB --> IC
IC --> RP
IC --> AS
IC --> NG
NG --> MS1
NG --> MS2
NG --> MSN
AS --> COG
RP --> CW Key Benefits of EKS Deployment¶
- High Availability: Multi-AZ pod distribution
- Auto Scaling: Horizontal pod autoscaling based on metrics
- Service Mesh: Istio integration for advanced traffic management
- Observability: Native integration with CloudWatch and Prometheus
- Security: Pod security policies and network policies
Post-Installation¶
Verify Installation¶
-
Check Service Status
-
Test Web Interface
- Navigate to
http://localhost:7860 - Login with admin credentials
-
Verify MCP server health status
-
Test Authentication
Configure AI Coding Assistants¶
-
Generate Client Configurations
-
Setup VS Code
-
Setup Roo Code
For detailed AI assistant setup, see AI Coding Assistants Setup Guide.
Troubleshooting¶
Common Issues¶
Services won't start:
# Check Docker daemon
sudo systemctl status docker
# Check environment variables
cat .env | grep -v SECRET
# View detailed logs
docker-compose logs --tail=50
Authentication failures:
# Verify Cognito configuration
aws cognito-idp describe-user-pool --user-pool-id YOUR_POOL_ID
# Test credential generation
cd credentials-provider && ./generate_creds.sh --verbose
Network connectivity issues:
# Check port availability
sudo netstat -tlnp | grep -E ':(80|443|7860|8080)'
# Test internal services
curl -v http://localhost:7860/health
For more troubleshooting help, see Troubleshooting Guide.
Next Steps¶
- Authentication Setup - Configure identity providers
- AI Assistant Integration - Setup development tools
- Production Deployment - High availability configuration
- API Reference - Programmatic management