Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Aws Serverless Mcp

    MCP Server implementation with AWS Serverless services.

    1 stars
    JavaScript
    Updated May 30, 2025
    aws
    aws-apigateway
    aws-lambda
    mcp-server
    nodejs
    sam

    Table of Contents

    • Created resources
    • Installation
    • Parameters
    • Outputs
    • Development
    • Tool Inspector
    • Claude Desktop
    • Deploy
    • Usage
    • Resources
    • Prompts
    • Tools
    • Credits

    Table of Contents

    • Created resources
    • Installation
    • Parameters
    • Outputs
    • Development
    • Tool Inspector
    • Claude Desktop
    • Deploy
    • Usage
    • Resources
    • Prompts
    • Tools
    • Credits

    Documentation

    Serverless MCP Framework

    CloudFormation

    Lambda

    API Gateway

    MCP Server implementation with AWS Serverless services.

    Created resources

    A set of Lambda function connected to EventBridge rules that handle start, stop and task start. Create StepFunction state machine to wait until a specific date and send events.

    Infrastructure Schema

    Installation

    Using the SAM CLI:

    bash
    sam build
    sam deploy --guided

    Parameters

    This application need some parameters when you deploy it:

    • EventBusName: The event bus name to connect the integration to
    • Project: Project identifier
    • Environment: Environment identifier
    • ServerName: The MCP server name
    • ServerVersion: The MCP server version
    • Instructions: The MCP server instructions
    • DomainName: The domain name of the endpoint
    • AcmCertificateArn: The certificate arn for the domain name provided
    • AuthenticationType: Authentication type for the MCP server
    • AuthenticationToken: The authentication token for the MCP server
    • OAuthIssuerUrl: The issuer URL for OAuth authentication
    • OAuthAuthorizationUrl: The authorization URL for OAuth authentication
    • OAuthTokenUrl: The token URL for OAuth authentication
    • OAuthRevocationUrl: The revocation URL for OAuth authentication
    • OAuthRedirectUris: The redirect URIs for OAuth authentication

    Outputs

    • ServerEndpoint: The MCP server endpoint

    Development

    Requirements:

    • NodeJS >= 22.x

    Install NPM modules

    bash
    npm install

    Configure the .env file with MCP server specifications:

    code
    SERVER_NAME=local
    SERVER_VERSION=1.0.0
    INSTRUCTIONS=""

    Configure the .env file with AWS environment configuration:

    code
    AWS_PROFILE=
    AWS_REGION=
    
    SSM_PREFIX=
    TOOLS_SSM_PREFIX=
    RESOURCES_SSM_PREFIX=
    PROMPTS_SSM_PREFIX=
    TOOL_LAMBDA_PREFIX=

    Run local MCP server

    bash
    npm run dev

    The MCP server is running on http://localhost:3000/mcp.

    Tool Inspector

    Run the MCP Inspector

    bash
    npm run inspector

    Configure the inspector with:

    • Transport Type: Streamable HTTP
    • URL: http://localhost:3000/mcp

    Connect to the MCP server with "Connect" button.

    Claude Desktop

    Use mcp-remote to proxy HTTP to STDIO:

    json
    {
      "mcpServers": {
        "example": {
          "command": "npx",
          "args": [
            "-y",
            "mcp-remote",
            "https://xxxxxxxxxx.execute-api.eu-west-1.amazonaws.com/dev/mcp",
            "--transport",
            "http-only"
          ]
        }
      }
    }

    Deploy

    Requirements:

    • SAM
    • NodeJS >= 22.x

    Build project

    bash
    sam build

    Deploy the stack

    bash
    sam deploy --profile  --guided

    Usage

    Once the solution is installed, you can extend the MCP server with resources, prompts or tools using SSM parameters and Lambda functions.

    The SSM parameters must begin with the prefix ///, for example /mcp/dev/tools/echo.

    As an example of integration you can take inspiration from the template: template.integration.yaml.

    Resources

    The SSM parameters must begin with prefix ///resources/, for example /mcp/dev/resources/example.

    The content must be in valid JSON format and have the properties:

    • name: Resource name
    • uri: Resource URI, for example "config://example"
    • content: Resource text content

    It can be declared in a SAM template as:

    yaml
    ExampleResourceParameter:
      Type: AWS::SSM::Parameter
      Properties:
        Name: !Sub "/${Project}/${Environment}/resources/example"
        Type: String
        Value: |
          {
            "name": "example",
            "uri": "config://example",
            "content": "Just an example resource"
          }

    Prompts

    The SSM parameters must begin with prefix ///prompts/, for example /mcp/dev/prompts/echo.

    The content must be in valid JSON format and have the properties:

    • name: Prompt name
    • description: Prompt description
    • inputSchema.json: JSON schema
    • content: Prompt template content

    The content template will be elaborate with ejs with input data interpolation.

    It can be declared in a SAM template as:

    yaml
    EchoPromptParameter:
      Type: AWS::SSM::Parameter
      Properties:
        Name: !Sub "/${Project}/${Environment}/prompts/echo"
        Type: String
        Value: |
          {
            "name": "echo",
            "description": "Execute the example tool",
            "inputSchema": {
              "json": {
                "type": "object",
                "properties": {
                  "message": {
                    "type": "string"
                  }
                },
                "required": ["message"]
              }
            },
            "content": "Execute the tool 'echo' with the message ''"
          }

    Tools

    The SSM parameters must begin with prefix ///tools/, for example /mcp/dev/tools/echo.

    The content must be in valid JSON format and have the properties:

    • name: Prompt name
    • description: Prompt description
    • inputSchema.json: JSON schema

    The related Lambda function that will be executed must be name as --tools-, for example mcp-dev-tools-echo.

    The function input and output must respect the Converse API pattern.

    The parameter can be declared in a SAM template as:

    yaml
    EchoToolParameter:
      Type: AWS::SSM::Parameter
      Properties:
        Name: !Sub "/${Project}/${Environment}/tools/echo"
        Type: String
        Value: |
          {
            "name": "echo",
            "description": "Print the message provided in input",
            "inputSchema": {
              "json": {
                "type": "object",
                "properties": {
                  "message": {
                    "type": "string"
                  }
                },
                "required": ["message"]
              }
            }
          }

    The Lambda function implementation could be:

    js
    exports.handler = async ({ toolUseId, name, input }, context) => {
      return {
        name,
        toolUseId,
        status: 'success',
        content: [{
          text: input.message
        }]
      }
    }

    declared inline in a SAM template:

    yaml
    EchoToolFunction:
      Type: AWS::Serverless::Function
      Properties:
        FunctionName: !Sub "${Project}-${Environment}-tools-echo"
        Handler: index.handler
        InlineCode: |
          exports.handler = async ({ toolUseId, name, input }, context) => {
            return {
              name,
              toolUseId,
              status: 'success',
              content: [{
                text: input.message
              }]
            }
          }

    Credits

    • Repository badges by Shields.io
    • Infrastructure schema by Cloudcraft

    Similar MCP

    Based on tags & features

    • AW

      Aws Mcp Server

      Python·
      165
    • WA

      Waha Mcp

      JavaScript00
    • WI

      Wizzy Mcp Tmdb

      JavaScript00
    • RI

      Rijksmuseum Mcp

      JavaScript·
      59

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • AW

      Aws Mcp Server

      Python·
      165
    • WA

      Waha Mcp

      JavaScript00
    • WI

      Wizzy Mcp Tmdb

      JavaScript00
    • RI

      Rijksmuseum Mcp

      JavaScript·
      59

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k