Introduction
Wanaku aims to provide unified access, routing and resource management capabilities for your organization and your AI Agents.
Understanding What Is Wanaku
The Wanaku MCP Router is an integration service designed to securely connect AI agents with various enterprise systems and cloud services. It acts as a central hub that manages and governs how agents access specific resources and tools, effectively proxying and filtering capabilities exposed to Large Language Models (LLMs).
The Wanaku MCP Router itself does not directly host tools or resources; instead, it acts as an integration service that connects AI agents with external resources and tools, including enterprise systems and cloud services. It manages and governs access between agent types and specific resources, proxying and filtering available capabilities to agents and their LLM

Wanaku provides specialized services, referred to as "capabilities" that offer specific functionalities to the Wanaku MCP Router.
These capabilities enable communication with various systems, such as Kafka services, message brokers, cloud services (AWS, Azure, Google, etc.), databases and a wide range of enterprise systems, including Workday and Salesforce, without directly containing the tools or resources.
Furthermore, Wanaku features an MCP-to-MCP bridge, which allows it to act as a centralized gateway or proxy for other MCP servers that use HTTP as the transport mechanism. This capability enables Wanaku to aggregate and effectively "hide" multiple external MCP servers, simplifying management and increasing the overall functionality of a Wanaku instance. Wanaku is an open-source project and is licensed under Apache 2.0.
Meet Wanaku
If you haven't seen it already, we recommend watching the Getting Started with Wanaku video that introduces the project, and introduces how it works.
NOTE
Also check the Getting Started from the demos repository.
Using Wanaku
Using Wanaku MCP Router involves three key actions:
- Adding tools or resources to the MCP router
- Forwarding other MCP servers via the MCP forwarder
- Adding new capabilities via downstream services
Adding tools or resources that use those capabilities
Adding tools and resources to the Wanaku MCP Router expands the functionality available to agents using Wanaku.
- MCP tools equip an agent with capabilities not inherently present in its native models.
- MCP resources, on the other hand, allow an AI agent to consume data—such as files or records—and inject additional information into its context.
Both tools and resources depend on capabilities that can be dynamically added to or removed from the Wanaku MCP Router. Once these capabilities are integrated, either through downstream services or by connecting to other MCP servers, users can then incorporate new tools and resources into Wanaku. These additions can then leverage the newly integrated capabilities to interact with enterprise systems and cloud services.
Forwarding other MCP servers via the MCP forwarder
Wanaku can act as a central gateway or proxy to other MCP servers that use HTTP as the transport mechanism. This feature allows for a centralized endpoint to aggregate tools and resources provided by other MCP servers, making them accessible as if they were local to the Wanaku instance.
Adding new capabilities via downstream services
This refers to extending the router's functionality by integrating with various external systems.
Wanaku leverages Quarkus and Apache Camel to provide connectivity to a vast range of services and platforms. This allows users to create custom services to solve particular needs. These services can be implemented in any language that supports gRPC for communication with the Wanaku MCP Router.
NOTE
It is also possible to create and run services in Java and other languages, such as Go or Python, although the process is not entirely documented at the moment.
Preparing the System for Running Wanaku
Security in Wanaku involves controlling access to the management APIs and web interface while ensuring that only authorized users can modify tools, resources, and configurations. Wanaku also ensures secure access to the MCP tools and resources.
Wanaku uses Keycloak for authentication and authorization. As such, a Keycloak instance needs to be up and running for Wanaku to work. This section covers the basics of getting Keycloak ready for Wanaku for development and production purposes.
Keycloak Setup for Wanaku
Choose the setup that matches your environment.
- Local Development: Use Podman for a quick, local instance.
- OpenShift Deployment: Follow these steps for a cluster environment.
Option 1: Local Setup with Podman
This method is ideal for development and testing on your local machine.
Starting the Keycloak Container
First, run the following command in your terminal to start a Keycloak container. This command also sets the initial admin credentials and maps a local volume for data persistence.
podman run -d \
-p 127.0.0.1:8543:8080 \
-e KC_BOOTSTRAP_ADMIN_USERNAME=admin \
-e KC_BOOTSTRAP_ADMIN_PASSWORD=admin \
-v keycloak-dev:/opt/keycloak/data \
quay.io/keycloak/keycloak:26.3.5 start-dev-p 127.0.0.1:8543:8080: Maps port8543on your local machine to the container's port8080. By default, Wanaku expects Keycloak on port8543.-e ...: Sets the default admin username and password. Change the password for any non-trivial use case.-v keycloak-dev...: Creates a persistent volume namedkeycloak-devto store Keycloak data.
Option 2: Deploying to OpenShift or Kubernetes
If you are deploying Wanaku in OpenShift or Kubernetes, you can follow these steps to get an entirely new Keycloak setup up and running. If you already have a Keycloak instance, you may skip the deployment section and jump to importing the realm.
Deploying Keycloak
Apply the pre-defined Kubernetes configurations located in the deploy/auth directory. This will create all the necessary resources for Keycloak to run.
IMPORTANT
Before applying, review the files and be sure to change the default admin password for security.
oc apply -f deploy/authImporting the Wanaku Realm Configuration (via CLI)
Next, you'll use Keycloak's Admin API to automatically configure the wanaku realm. Wanaku comes with a script that simplifies importing the realm configuration into keycloak.
To run that script:
- set the
WANAKU_KEYCLOAK_PASSvariable to the admin password of your Keycloak instance - set
WANAKU_KEYCLOAK_HOSTto the address of your Keycloak instance (i.e.;localhostif using Podman or the result ofoc get routes keycloak -o json | jq -r .spec.hostif using OpenShift)
Importing the Wanaku Realm Configuration (via Keycloak UI)
Alternatively, you may also import the configuration using Keycloak's UI, and then proceed to regenerate the capabilities' client secret.
Regenerating the Capabilities' Client Secret
Finally, for security, you must regenerate the client secret for the wanaku-service client.
- Navigate to the Keycloak Admin Console at
http://localhost:8543. - Log in with your admin credentials (admin/admin).
- Select the wanaku realm from the dropdown in the top-left corner.
- Go to Clients in the side menu and click on wanaku-service.
- Go to the Credentials tab.
- Click the Regenerate secret button and confirm. Copy the new secret to use in your application's configuration.

Installing Wanaku
To run Wanaku, you need to first download and install the router and the command line client.
Installing the Command Line Interface (CLI)
Although the router comes with a UI, the CLI is the primary method used to manage the router. As such, it's recommended to have it installed.
Installing the CLI by downloading binary
The most recommended method for installing the Wanaku CLI is to download the latest version directly from the release page on GitHub
Installing the CLI via JBang
To simplify using the Wanaku Command Line Interface (CLI), you can install it via JBang.
First, ensure JBang is installed on your system. You can find detailed download and installation instructions on the official JBang website.
After installing JBang, verify it's working correctly by opening your command shell and running:
jbang versionThis command should display the installed version of JBang.
Next, to access the Wanaku CLI, install it using JBang with the following command:
jbang app install wanaku@wanaku-ai/wanakuThis will install Wanaku CLI as the wanaku command within JBang, meaning that you can run Wanaku from the command line by just executing wanaku.
NOTE
It requires access to the internet, in case of using a proxy, please ensure that the proxy is configured for your system. If Wanaku JBang is not working with your current configuration, please look to Proxy configuration in JBang documentation.
Installing and Running the Router
There are three ways to run the router. They work similarly, with the distinction that some of them may come with more capabilities by default — continue reading the documentation below for details.
IMPORTANT
Before the router can be executed, it still needs to be configured for secure access and control of its resources. Make sure you read the section [Securing the Wanaku MCP Router](# Securing the Wanaku MCP Router) before running or deploying the router.
Installing and Running Wanaku Locally Using "Wanaku Start Local"
You can use the Wanaku CLI to start a small/simplified local instance. To do so, you need to run and configure a local Keycloak instance and then use the wanaku start local command to run Wanaku pointing to that instance. Make sure you follow the steps described in [Option 1: Local Setup with Podman](## Option 1: Local Setup with Podman) the [Keycloak Setup For Wanaku](#Keycloak Setup for Wanaku).
After downloading the CLI, simply run wanaku start local and the CLI should download, deploy and start Wanaku with the main server, a file provider and an HTTP provider. You will need to pass the client secret configured so that the capabilities can connect to the router.
wanaku start local start local --capabilities-client-secret=aBqsU3EzUPCHumf9sTK5sanxXkB0yFtv
If that is successful, open your browser at http://localhost:8080, and you should have access to the UI.
NOTE
You can use the command line to enable more services by using the --services option. Use the --help to see the details.
Installing and Running Wanaku on OpenShift or Kubernetes Using the Wanaku Operator
The Wanaku Operator simplifies the deployment and management of Wanaku instances on Kubernetes and OpenShift clusters. It automates the creation and configuration of all necessary resources, making it the recommended approach for production deployments.
Prerequisites
Before deploying the Wanaku Operator, ensure you have:
- Access to a Kubernetes or OpenShift cluster
kubectlorocCLI tools installed and configuredhelmCLI tool installed (version 3.x or later)- A running Keycloak instance (see Keycloak Setup for Wanaku)
- Sufficient permissions to create namespaces, deployments, and custom resources
Installing the Wanaku Operator with Helm
The Wanaku Operator can be deployed using Helm charts. First, ensure you're in the correct namespace or create a new one:
kubectl create namespace wanakuThen, install the operator using the Helm chart from the repository:
helm install wanaku-operator ./wanaku-operator/deploy/helm/wanaku-operator \
--namespace wanaku \
--set operatorNamespace=wanakuBy default, the operator will be deployed in the namespace specified by the operatorNamespace value.
You can customize this during installation:
helm install wanaku-operator ./wanaku-operator/deploy/helm/wanaku-operator \
--namespace my-custom-namespace \
--set operatorNamespace=my-custom-namespaceTo verify the operator is running:
kubectl get pods -n wanakuYou should see the operator pod in a Running state.
Defining a Wanaku Router Instance
Once the operator is installed, you can create Wanaku router instances by defining a custom resource. The operator watches for these custom resources and automatically creates all necessary Kubernetes objects.
Create a file named wanaku-instance.yaml with the following content:
apiVersion: "wanaku.ai/v1alpha1"
kind: Wanaku
metadata:
name: wanaku-dev
spec:
auth:
# This is the address of the authorization server (in the format: http://address)
authServer: http://keycloak:8080
# Address of the proxy (in the format: http://address).
# It could be the same as the auth server (default) or "auto"
# (for using Wanaku as the proxy via OIDC proxy)
# authProxy: ""
secrets:
# This is the OIDC credentials secret for the services
oidcCredentialsSecret: your-keycloak-client-secret
# Router settings are optional
router:
# You can set a custom image for the router
# image: quay.io/wanaku/wanaku-router-backend:latest
env:
# It is possible to set environment variables for the router
# - name: ENVIRONMENT_VARIABLE_1
# value: value1
# - name: ENVIRONMENT_VARIABLE_2
# value: value2
# Define the capabilities you want to enable
capabilities:
# HTTP capability for HTTP-based tools
- name: wanaku-http
image: quay.io/wanaku/wanaku-tool-service-http:latest
# Camel Integration Capability example
- name: employee-system
type: camel-integration-capability
image: quay.io/wanaku/camel-integration-capability:latest
env:
# The path to the routes file, should be within /data
- name: ROUTES_PATH
value: "/data/employee-routes.camel.yaml"
# The path to the rules file, should be within /data
- name: ROUTES_RULES
value: "/data/employee-rules.yaml"Apply the custom resource to create your Wanaku instance:
kubectl apply -f wanaku-instance.yamlThe operator will automatically create:
- Deployment for the Wanaku router
- Deployments for each enabled capability
- Services to expose the router and capabilities
- ConfigMaps for configuration
- Secrets for sensitive data
- Routes/Ingress (if configured)
- ServiceAccounts and RBAC resources
NOTE
When using the Camel Integration Capability, you can copy your route and rules files to the capability pods using:
kubectl cp your-routes.camel.yaml <pod-name>:/data/employee-routes.camel.yamlTIP
You can find more complete examples in the wanaku-operator/samples directory.
Checking the Deployment Status
To check the status of your Wanaku instance:
kubectl get wanaku -n wanakuTo view detailed information:
kubectl describe wanaku my-wanaku-router -n wanakuTo access the logs:
kubectl logs -n wanaku deployment/my-wanaku-routerAccessing the Wanaku Router
Once deployed, you can access the Wanaku router through its service. To get the service details:
kubectl get svc -n wanakuTo get the route URL:
oc get route my-wanaku-router -n wanaku -o jsonpath='{.spec.host}'Updating the Wanaku Instance
To update your Wanaku instance, simply edit the custom resource and apply the changes:
kubectl edit wanaku my-wanaku-router -n wanakuOr update your YAML file and reapply:
kubectl apply -f wanaku-instance.yamlThe operator will automatically handle the update and roll out the changes.
Removing the Wanaku Instance
To remove a Wanaku instance:
kubectl delete wanaku my-wanaku-router -n wanakuTo uninstall the operator:
helm uninstall wanaku-operator -n wanakuNOTE
The operator manages the entire lifecycle of Wanaku instances. Manual modifications to operator-managed resources may be overwritten by the operator's reconciliation process.
Installing and Running Wanaku on OpenShift or Kubernetes (Manually - Deprecated)
It is also possible to manually run Wanaku on Kubernetes distributions, such as OpenShift. The deployment is configured using Kustomize for environment-specific customization.
The basic steps to install and run Wanaku on OpenShift are:
- Download the kustomize template files in the
deploydirectory making sure to use the branch that matches your Wanaku version - Copy the files from the
devdirectory and use them to create a new overlay (i.e.:prod) - Adjust the kustomize files according to your environment.
TIP
You may also consult developer-specific documentation if you need special customizations to your deployment.
Configuring the Wanaku MCP Router
You can find a comprehensive list of configuration options for Wanaku in the Configuration Guide.
Accessing the Administration Web User Interface
Wanaku also comes with a web user interface that you can access to manage the router. By default it runs on port 8080 of the host running the router.
NOTE
At this moment, some features are only available on the CLI.
When accessing the Web UI for the first time, you will be redirected to the Keycloak instance for login. Create a user and define a password.
IMPORTANT
Wanaku does not yet support fine-grained control over its exposed resources. All users have admin access to the tools and resources exposed. Expect this to change in future versions.
Installing and Running Capabilities
Capabilities are standalone services that connect to the Wanaku router to provide new functionalities. They can be downloaded from the release page, deployed to OpenShift using containers or built from source.
To run a capability, you need to configure it to connect to your Wanaku router instance and authenticate with it. This is done by setting a few essential properties.
Configuring Capabilities
You can configure capabilities using environment variables or by passing system properties directly on the command line.
Here are the key properties you need to set:
Router URI: Each capability needs to know where the Wanaku router is located to register itself.
propertieswanaku.service.registration.uri=http://localhost:8080OIDC Client Credentials: Capabilities authenticate with the router using OIDC. You must provide the client secret that you previously regenerated in Keycloak.
propertiesquarkus.oidc-client.credentials.secret=your-client-secret-from-keycloakAnnounce Address (Optional): If the capability is running in an environment where its address is not directly accessible by the router (e.g., behind a NAT or in a container), you need to specify the address that the router should use to communicate back to it.
propertieswanaku.service.registration.announce-address=your-public-address
TIP
You can check the full set of configuration available.
Running a Capability
Once configured, you can run the capability from the command line. The following example shows how to run a capability while overriding the configuration properties:
java -Dwanaku.service.registration.uri=http://<wanaku-router-host>:8080 \
-Dquarkus.oidc-client.credentials.secret=<your-client-secret> \
-Dwanaku.service.registration.announce-address=<your-public-address> \
-jar <capability-jar-file>.jarNOTE
Each capability may have its own specific set of configurations. For example, the Camel Integration Capability for Wanaku requires additional properties to connect to different systems. Always consult the specific documentation for the capability you are using for more details.
Prerequisites
Before deploying Wanaku on OpenShift, ensure you have:
- Access to an OpenShift or Kubernetes cluster
ocorkubectlCLI tools configured- Sufficient permissions to create deployments, services, and routes
Initial Setup Steps
Deployment
You can deploy Wanaku in OpenShift or Kubernetes using Kustomize.
After having deployed Keycloak, then run the following command to get its route:
oc get route keycloak -o jsonpath='{.spec.host}'Lastly, copy the regenerated client secret and add it to the respective overlay:
oc apply -k deploy/openshift/kustomize/overlays/my-overlay/This updates the OIDC server URLs in the environment variable patch files to point to your Keycloak instance.
Environment Configuration
When running Wanaku on OpenShift or Kubernetes, capabilities cannot automatically discover the router address. You must configure the router location using environment variables in your deployment:
- Set
WANAKU_SERVICE_REGISTRATION_URIto point to the actual location of the router - Configure OIDC authentication URLs to point to your Keycloak instance
The Kustomize overlays handle these configurations automatically for different environments.
IMPORTANT
This configuration is also required when running the router and the services on different hosts.
Securing the Wanaku MCP Router
Security in Wanaku involves controlling access to the management APIs and web interface while ensuring that only authorized users can modify tools, resources, and configurations.
This section covers how to configure Wanaku for secure access.
NOTE
Authentication and authorization currently apply only to the management APIs and UI, not to the MCP endpoints themselves. This feature is experimental and under active development.
Understanding Wanaku Security Model
Wanaku's security model focuses on:
- API Protection: Securing management operations for tools, resources, and configuration
- UI Access Control: Restricting access to the web console
- Service Authentication: Ensuring capability services can authenticate with the router
- MCP Authentication: Ensuring MCP calls are authenticated
MCP Authentication
Currently, Wanaku supports:
- OAuth authentication with code grant
- Automatic client registration
IMPORTANT
When using the Automatic client registration, the access is granted per-namespace. As such, applications need to request a new client id and grant if they change the namespace in use.
For these to work, Keycloak needs to be configured so that the authentication is properly supported.
Wanaku comes with a template configuration that can be imported into Keycloak to set up the realm, clients and everything else needed for Wanaku to work.
IMPORTANT
After importing this, make sure to adjust the secrets used by the services and any other potential sensitive configuration.
Configuring Wanaku Components for Secure Access
Each Wanaku component requires a specific set of configurations for secure access. You can find the full set of configuration options in the Configuration Guide.
The configuration varies depending on the component's role in the system.
Wanaku Router Backend Security Configurations
The backend service handles API operations and requires OIDC configuration with service credentials. Some of the configurations you may need to change are:
# Address of the Keycloak authentication server - adjust to your Keycloak instance
auth.server=http://localhost:8543
# Address used by the OIDC proxy -
auth.proxy=http://localhost:${quarkus.http.port}
# Client identifier configured in Keycloak for the backend service
quarkus.oidc.client-id=wanaku-mcp-router
# Avoid forcing HTTPS
quarkus.oidc.resource-metadata.force-https-scheme=falseReferences
As a reference for understanding what is going on under the hood, the following guides may be helpful:
Capability Services Security Configurations
Wanaku also requires for the capabilities services to be authenticated in order to register themselves. Capability services act as OIDC clients and authenticate with the router using client credentials. Some of the settings you may need to adjust are:
# Address of the Keycloak authentication server - adjust to your Keycloak instance
auth.server=http://localhost:8543
# Address of the KeyCloak authentication server
quarkus.oidc-client.auth-server-url=${auth.server}/realms/wanaku
# Client secret from Keycloak for service authentication - replace with your actual secret
quarkus.oidc-client.credentials.secret=aBqsU3EzUPCHumf9sTK5sanxXkB0yFtvIMPORTANT
- Capability services use the OIDC client component (
quarkus.oidc-client.*), which differs from the main router configuration - The client secret values shown here are examples from the default configuration - replace them with your actual Keycloak client secrets
- Ensure the auth-server-url points to your actual Keycloak instance
Encrypting Secrets at Rest
Wanaku supports AES-256 encryption for secrets stored in files. When enabled, all secrets provisioned by tools and resources are encrypted before being written to disk and automatically decrypted when read.
To enable secret encryption, set both environment variables:
export WANAKU_SECRETS_ENCRYPTION_PASSWORD="your-strong-password"
export WANAKU_SECRETS_ENCRYPTION_SALT="unique-salt-value"IMPORTANT
- Both password and salt must be set for encryption to work
- All services that handle secrets must use the same password and salt values
- Store credentials securely (e.g., Kubernetes Secrets, HashiCorp Vault)
WARNING
If the encryption password or salt is lost, encrypted secrets cannot be recovered. Ensure these values are backed up securely.
For more details, see the Configuration Guide.
Using the Wanaku MCP Router
Protocol Support
Wanaku supports MCP via SSE (deprecated) or via Streamable HTTP.
the MCP endpoint exposed by Wanaku can be accessed on the path /mcp/sse of the host you are using (for instance, if running locally, that would mean http://localhost:8080/mcp/sse).
The Streamable HTTP endpoint can be accessed on the path /mcp/.
IMPORTANT
Also make sure to check the details about namespaces, as Wanaku offers different namespaces where MCP Tools and MCP Resources can be registered. This is documented further ahead in this guide.
CLI Authentication
The Wanaku CLI supports authentication to securely interact with the Wanaku MCP Router API. Authentication credentials are stored locally and automatically included in API requests.
Authentication Modes
The CLI currently supports the following authentication modes:
- token (default): Use an API token for authentication via Bearer token
- username and password
Authentication Commands
Login
Store authentication credentials for use with subsequent CLI commands:
wanaku auth login --api-token <your-api-token>Options:
--api-token <token>: API token for authentication (required)--auth-server <url>: Authentication server URL (optional)--mode <mode>: Authentication mode -tokenoroauth2(default:token)
Example:
wanaku auth login --api-token eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...With custom authentication server:
wanaku auth login \
--api-token eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9... \
--auth-server https://keycloak.example.com \
--mode tokenStatus
Check the current authentication status and view stored credentials:
wanaku auth statusThis command displays:
- Current authentication mode
- Masked API token (showing first and last 4 characters)
- Authentication server URL (if configured)
- Masked refresh token (if available)
- Credentials file location
- Whether credentials are currently stored
Example output:
Authentication Status:
=====================
Mode: token
API Token: eyJh***VCJ9
Auth Server: https://keycloak.example.com
Credentials File: /Users/username/.wanaku/credentials
Has Credentials: trueLogout
Clear all stored authentication credentials:
wanaku auth logoutThis command removes all authentication data from the local credentials file.
Token Management
Display the raw authentication token (useful for debugging or using with other tools):
wanaku auth tokenThis outputs the raw API token without masking.
Using Authentication with Commands
Once authenticated via wanaku auth login, all subsequent CLI commands will automatically include the authentication token in their requests.
Per-Command Token Override
You can override the stored authentication token for a single command:
wanaku tools list --token <temporary-token>Disabling Authentication
To explicitly disable authentication for a command:
wanaku tools list --no-authCredential Storage
Authentication credentials are stored in:
~/.wanaku/credentialsThis file is a Java properties file containing:
api.token: The API bearer tokenrefresh.token: OAuth2 refresh token (when applicable)auth.mode: The authentication mode (token, oauth2, etc.)auth.server.url: The authentication server URL
CAUTION
The credentials file contains sensitive authentication tokens. Ensure proper file permissions are set to prevent unauthorized access. On Unix-like systems, you should restrict access: chmod 600 ~/.wanaku/credentials
Authentication Flow
The CLI authentication process works as follows:
- Login: User provides API token via
wanaku auth login --api-token <token> - Storage: Token is stored in
~/.wanaku/credentials - Auto-Injection: The CLI automatically reads the token and adds it as a Bearer token to the
Authorizationheader for all API requests - Validation: The Wanaku Router validates the token on each request
- Logout: User can clear credentials via
wanaku auth logout
Troubleshooting Authentication
Token Not Working
If you receive authentication errors:
Check token validity:
shellwanaku auth statusVerify the token hasn't expired
Ensure you're using the correct authentication server URL
Try logging in again with a fresh token
Clear and Reset
To completely reset authentication:
wanaku auth logout
wanaku auth login --api-token <new-token>Manual Credential Management
You can manually edit or remove the credentials file if needed:
# View credentials
cat ~/.wanaku/credentials
# Remove credentials manually
rm ~/.wanaku/credentialsSecurity Best Practices
- Token Protection: Never share your API tokens or commit them to version control
- Regular Rotation: Rotate tokens periodically for enhanced security
- Use Environment Variables: For CI/CD, consider using
--tokenflag with environment variables instead of storing tokens - File Permissions: Ensure credentials file has restricted permissions (600)
- Logout When Done: Use
wanaku auth logoutwhen finished working on shared systems
Example Workflows
Basic Authentication Workflow
# Login with API token
wanaku auth login --api-token eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
# Verify authentication
wanaku auth status
# Use authenticated commands
wanaku tools list
wanaku resources list
wanaku data-store list
# Logout when done
wanaku auth logoutCI/CD Usage
For automated scripts, use token override instead of storing credentials:
# Use token from environment variable
wanaku tools list --token $WANAKU_API_TOKEN
# Or disable authentication for public endpoints
wanaku tools list --no-authUnderstanding Capabilities
Wanaku itself does not have any builtin MCP tool, resource or functionality itself. The router itself is just a blank MCP server.
To actually perform its work, Wanaku relies on specialized services that offer the connectivity bridge that enables Wanaku to talk to any kind of service. At its core, Wanaku is powered by Quarkus and Apache Camel, which provide the ability to connect to more than 300 different types of systems and services.
The power of Wanaku relies on its ability to plug in different types of systems, regardless of them being new microservices or legacy enterprise systems. For instance, consider the scenario of an enterprise organization, which is running hundreds of systems. With Wanaku, it is possible to create a specific capability for each of them (i.e.: a capability for the finance systems, another for human resources, another for billing, and so on).
The granularity on which these capabilities can operate is a decision left to the administrator of the system. For some organizations, having a "Kafka" capability to Wanaku capable of talking to any of its systems may be enough. Others, may want to have system-specific ones (i.e.: a billing capability, an employee system capability, etc).
The recommended way to create those capabilities is to use the Camel Integration Capability for Wanaku. This is a subcomponent of Wanaku that leverages Apache Camel to exchange data with any system that Camel is capable of talking to.

NOTE
Capabilities were, at some point, also called "Downstream services" or "targets". You may still see that terminology used in some places, especially in older documentation.
You should see a list of capabilities available in the UI, in the Capabilities page. Something similar to this:

On the CLI, running wanaku capabilities list lists the capabilities available for MCP tools:
service serviceType host port status lastSeen
exec tool-invoker 127.0.0.1 9009 active Sat, Oct 18, 2025 at 18:47:22
http tool-invoker 127.0.0.1 9000 active Sat, Oct 18, 2025 at 18:47:23
tavily tool-invoker 127.0.0.1 9006 active Sat, Oct 18, 2025 at 18:47:23Capabilities determine what type of tools you may add to the router. As such, in the output from the CLI above, it means that this server can add tools of the following types: exec, tavily, and http.
Wanaku accepts the following capability service types:
tool-invoker: these capabilities can be used to create MCP tools.resource-provider: these capabilities can be used to create MCP resources.multi-capability: these capabilities can be used to create either MCP tools or MCP resources.
Managing MCP Tools
An MCP (Model Context Protocol) tool enables Large Language Models (LLMs) to execute tasks beyond their inherent capabilities by using external functions. Each tool is uniquely identified by a name and defined with an input schema that outlines the expected parameters. Essentially, MCP tools act as a standardized interface through which an AI agent can request information or execute specific tasks from external systems, like APIs or databases.
When adding a tool to Wanaku, there are two key considerations:
- Capability: determine which capability will handle the request and process the input data.
- Tool/Service Arguments: Identify any arguments (also known as properties) that the tool and/or service accept.
A capability service is required to be available at the moment when a new tool is being added to Wanaku MCP Router.
Adding Tools Using the CLI
To add a new tool to a Wanaku MCP Router Backend instance running locally on http://localhost:8080, use the following command:
wanaku tools add -n "meow-facts" --description "Retrieve random facts about cats" --uri "https://meowfacts.herokuapp.com?count={parameter.valueOrElse('count', 1)}" --type http --property "count:int,The count of facts to retrieve" --required countThe command wanaku tools add is used to register a new tool with the Wanaku MCP Router. Let's break down each part of the command:
-n "meow-facts": This flag sets the name of the tool to "meow-facts". This is a unique, human-readable identifier for the tool.--description "Retrieve random facts about cats": This provides a description of what the tool does, making it clear for users and LLMs.--uri "https://meowfacts.herokuapp.com?count={parameter.valueOrElse('count', 1)}": This specifies the URI (Uniform Resource Identifier) that the tool will interact with. In this case, it's an HTTP endpoint that provides cat facts. The {parameter.valueOrElse('count', 1)} part indicates that the count parameter from the tool's input will be used in the URI. If count is not provided, it will default to 1. This demonstrates how Wanaku can dynamically build URIs with parameters.--type http: This defines the type of the tool's underlying service, which in this case ishttp. This tells Wanaku that it should use its HTTP service handling capabilities for this tool.--property "count:int,The count of facts to retrieve": This defines an input property for the tool named count. It specifies that count is an integer (int) and provides a description of what it represents:"The count of facts to retrieve".--required count: This flag indicates that the count property is a required input for this tool.
Adding Labels to Tools
You can organize and categorize your tools using labels. Labels are key-value pairs that help you filter and manage tools more effectively:
wanaku tools add -n "weather-api" --description "Get weather forecast" --uri "https://api.weather.com/forecast" --type http --label category=weather --label environment=production --label region=us-eastLabels can be used for:
- Categorization: Group tools by function (e.g.,
category=weather,category=finance) - Environment tracking: Identify deployment environments (e.g.,
environment=production,environment=staging) - Access control: Tag tools by team or department (e.g.,
team=engineering,team=sales) - Lifecycle management: Mark tools for deprecation or testing (e.g.,
status=deprecated,status=beta)
You can add multiple labels by repeating the --label flag, using the format --label key=value.
Managing Labels on Existing Tools
After creating tools, you can add or remove labels without modifying the tool definition:
Adding labels to an existing tool:
# Add labels to a specific tool
wanaku tools label add --name "weather-api" --label priority=high --label reviewed=true
# Add labels to multiple tools using label expressions (-e is short for --label-expression)
wanaku tools label add -e 'category=weather' --label migrated=trueRemoving labels from an existing tool:
# Remove labels from a specific tool
wanaku tools label remove --name "weather-api" --label temporary --label draft
# Remove labels from multiple tools using label expressions (-e is short for --label-expression)
wanaku tools label remove -e 'status=deprecated' --label legacyNote: When adding a label with a key that already exists, the value will be updated. When removing a non-existent label, it will be silently ignored.
NOTE
For remote instances, you can use the parameter --host to point to the location of the instance.
IMPORTANT
The meaning of the uri and how to actually compose it, depends on the type of capability being used. Each capability describes exactly the meaning of the URI, so make sure to check the capability service for details. Additionally, this is covered in more details in the Creating URIs section below.
Configuring the Capabilities
Sometimes, specific configurations are required for the downstream services (capabilities) that a tool uses. This might include setting timeouts for operations or providing credentials to access a particular resource.
In such scenarios, you can associate configuration and secret files directly with a tool. These files will be automatically used by the underlying capabilities each time the tool is invoked.
Here's an example of how to add a tool and link it to configuration and secret files:
wanaku tools add --host http://localhost:8080 -n "meow-facts" --description "Retrieve random facts about cats" --uri "https://meowfacts.herokuapp.com?count={count or 1}" --type http --property "count:int,The count of facts to retrieve" --required count --configuration-from-file capabilities.properties --secrets-from-file secret.propertiesIn this command:
--configuration-from-file capabilities.properties: This flag specifies a file namedcapabilities.propertiesthat contains configuration settings to be passed to the underlying capability whenever the"meow-facts"tool is used.--secrets-from-file secret.properties: This flag points to a file namedsecret.propertiesthat holds sensitive information (like API keys or passwords) needed by the capability to access resources, ensuring secure handling of credentials.
Some capabilities within Wanaku are designed to interpret these configuration settings to dynamically adjust how they interact with external systems. For instance, Camel-based capabilities leverage these settings, particularly those prefixed with query., to modify the Camel URI used for the endpoint.
Consider the following example in a configuration file:
key=value
query.addKey=addedValueIn this scenario, a Camel-based capability would automatically append addKey=addValue to the URI passed to the underlying Camel producer. This allows for flexible and dynamic adjustment of endpoint parameters based on the provided configuration.
Secrets behave just as similarly, but are adapted by the capabilities for secure handling of the data.
Adding Tools Using the UI
It is also possible to add new tools using the UI, by accessing the Tools page and filling the form.
Importing a ToolSet
Wanaku ToolSets are collections of tools that can be easily shared and imported into your Wanaku router. This feature allows for convenient distribution of pre-configured tools among users.
Wanaku provides a selection of ready-to-use ToolSets that you can import to quickly get started and explore its functionalities.
To import a ToolSet directly into your router from a URL, use the following command:
wanaku tools import https://raw.githubusercontent.com/wanaku-ai/wanaku-toolsets/refs/heads/main/toolsets/currency.jsonIf you have a ToolSet definition file already stored on your local machine, you can import it using its file path:
wanaku tools import /path/to/the/toolsets/currency.jsonViewing Tools
You can check what tools are available in a Wanaku MCP Router instance by running:
wanaku tools listEditing Tools
The wanaku tools edit command enables you to modify the existing definition of a tool that is registered with your Wanaku MCP Router. This command provides a convenient way to update a tool's JSON definition directly within your terminal using the nano text editor.
wanaku tools edit [options] [toolName]In this command:
toolName: (Optional) Specifies the exact name of the tool you wish to modify. If this argument is omitted, the command will present you with an interactive, scrollable list of all currently registered tools, allowing for easy selection.
If you know the precise name of the tool you want to edit, you can specify it directly.
For example, to edit a tool named "my-custom-tool":
wanaku tools edit my-custom-toolUpon executing this command, Wanaku will fetch the JSON definition of "my-custom-tool" and open it in the nano editor within your terminal. After making your desired changes, save them (usually by pressing Ctrl+S) and then exit nano (Ctrl+X). Wanaku will then ask for your confirmation before applying the updates to the tool's definition.
When you're unsure of the exact tool name or want to browse available tools, run the edit command without specifying a toolName:
wanaku tools editThis will present an interactive, scrollable list of all your registered tools.
Use your keyboard's arrow keys to navigate and highlight the tool you wish to edit, then press Enter.
The selected tool's JSON definition will then open in nano for you to make your modifications.
Listing Tools
Any available tool is listed by default when you access the UI.
When using the CLI, the wanaku tools list command allows you to view all available tools on your Wanaku MCP Router instance.
Running this command will display a comprehensive list of tools, including their names and descriptions.
wanaku tools listFor example, you should receive an output similar to this.
Name Type URI
meow-facts => http => https://meowfacts.herokuapp.com?count={parameter.valueOrElse('count', 1)}
dog-facts => http => https://dogapi.dog/api/v2/facts?limit={parameter.valueOrElse('count', 1)}Showing Tool Details
The wanaku tools show command displays detailed information about a specific tool registered in the Wanaku MCP Router.
wanaku tools show <tool-name>This command retrieves comprehensive details including the tool's name, namespace, type, description, URI, labels, and input schema properties.
Example:
wanaku tools show meow-factsSample Output:
Tool Details:
name meow-facts
namespace default
type http
description Retrieve random facts about cats
uri https://meowfacts.herokuapp.com?count={parameter.valueOrElse('count', 1)}
labels category=animals
Input Schema Properties:
name type description required
count int The count of facts to retrieve yesOptions:
--host <url>: The API host URL (default:http://localhost:8080)
Example with remote host:
wanaku tools show --host http://api.example.com:8080 meow-factsRemoving Tools
Tools can be removed from the UI by clicking on the Trash icon, or via the CLI using the wanaku tools remove command.
Removing a Single Tool by Name
To remove a specific tool by name:
wanaku tools remove --name "meow-facts"Batch Removal Using Label Expressions
You can remove multiple tools at once using label expressions. This is particularly useful for cleaning up tools by category, environment, or other criteria:
wanaku tools remove -e 'category=weather'This command will:
- Find all tools with the label
category=weather - Display a preview table showing which tools will be removed
- Prompt for confirmation before removal
- Report the number of tools removed
Advanced Label Expression Examples:
Remove all non-production tools:
wanaku tools remove -e 'environment!=production'Remove deprecated weather tools:
wanaku tools remove -e 'category=weather & status=deprecated'Remove tools from either development or staging environments:
wanaku tools remove -e 'environment=development | environment=staging'Remove deprecated tools in multiple categories:
wanaku tools remove -e '(category=weather | category=news) & status=deprecated'Label Expression Syntax:
key=value- Equalskey!=value- Not equalsexpr1 & expr2- Logical ANDexpr1 | expr2- Logical OR!expr- Logical NOT(expr)- Grouping
Skipping Confirmation:
For automated scripts, you can skip the confirmation prompt using the --assume-yes or -y flag:
wanaku tools remove -e 'status=deprecated' -yWARNING
Batch removal operations cannot be undone. Always review the preview table carefully before confirming removal.
For detailed information about label expression syntax, see:
wanaku man label-expressionGenerating Tools
The wanaku tools generate command converts an OpenAPI specification into a collection of tool references that can be used by an AI agent.
It parses and resolves OpenAPI paths and operations, transforming them into a standardized tool reference format for HTTP services.
This command accepts an OpenAPI specification file (either as a local path or URL) and produces a JSON output containing tool references.
Each operation in the API is converted to a tool reference with appropriate metadata, including the operation's name, description, URI template, and input schema.
The command handles server variable substitution, proper formatting of path parameters according to the tool reference specification.
By default, the command uses the first server defined in the OpenAPI specification, but you can override this behavior by specifying a different server URL or selecting a different server from the specification by index.
The generated output can be directed to standard output or saved to a file.
If the process completes successfully, the command returns exit code 0. It returns exit code 3 if no paths are found in the specification and exit code 2 if an error occurs during processing.
NOTE
The command support both json and yaml definition:
For example:
wanaku tools generate http://petstore3.swagger.io/api/v3/openapi.yamlIf the spec defines a server url that contains variables
servers:
- url: 'https://{env}.domain.com/foo/{v1}/{v2}/{v3}'
variables:
env:
description: Environment - staging or production
default: stage-api
enum:
- stage-api
- api
# other variables
# ...Then, you can specify values as command parameters:
wanaku tools generate --server-variable env=prod --server-variable v1=first http://petstore3.swagger.io/api/v3/openapi.jsonIf not specified for a variable in the server URL template, the default value defined in the OpenAPI specification will be used.
It only applies when using servers from the OpenAPI specification (not when using --server-url).
Variables must be defined in the server object of the OpenAPI specification.
Empty or null values for either key or value will be ignored.
OpenAPI specifications can define multiple server URLs:
{
"servers": [
{
"url": "https://api.example.com/v1",
"description": "Production server"
},
{
"url": "https://staging-api.example.com/v1",
"description": "Staging server"
},
{
"url": "http://localhost:8080/v1",
"description": "Local development server"
}
]
}The --server-index (or -i) option allows you to specify which server definition from the OpenAPI specification should be used as the base URL for tool references.
wanaku tools generate -i 1 ./openapi-spec.yamlThis option is ignored if --server-url is specified, as an explicit URL overrides any server definitions in the specification.
If neither --server-index nor --server-url is specified, the command will default to using the first server (index 0) from the specification.
The --server-index option can be used together with --server-variable when the selected server has variable templates:
servers:
- url: https://{environment}.api.example.com/{version}
variables:
environment:
default: dev
version:
default: v1
- url: https://{environment}.api2.example.com/{version}
variables:
environment:
default: dev
version:
default: v1
- url: https://{environment}.api3.example.com/{version}
variables:
environment:
default: dev
version:
default: v1You could select this server and override its variables:
wanaku tools generate -i 0 -v environment=prod -v version=v2 ./openapi-spec.yamlThe --output-file (or -o) option specifies the file path where the generated tool references should be written.
It determines where the output JSON containing all the tool references will be saved.
wanaku tools generate -o ./toolsets/api-tools.json http://petstore3.swagger.io/api/v3/openapi.jsonIf --output-file is specified, the command will write the JSON toolset to the specified file path.
If --output-file is not specified, the command will write the JSON toolset to standard output (STDOUT).
If the specified path is a directory, the command will write to a file named out.json within that directory and provide a warning message.
If the specified file already exists, the command will return an error without overwriting the file. The parent directory of the specified file must exist and be writable by the current user.
If the --import (or -I) option is set, the generated toolset is automatically imported into the router, equivalent to running the generate command followed by the import command.
Managing MCP Resources
Exposing Resource
The wanaku resources expose command allows you to make an existing resource available via your Wanaku MCP Router instance.
Just like tools, it also requires a capability that can access the system storing and providing access to the resource (i.e.: FTP, AWS S3, NFS, etc.).
For example, suppose you have a file named test-mcp-2.txt on your home directory on host that has the file capability running, and you want to expose it.
This is how you can do it:
wanaku resources expose --location=$HOME/test-mcp-2.txt --mimeType=text/plain --description="Sample resource added via CLI" --name="test mcp via CLI" --type=fileIn this example:
--location=$HOME/test-mcp-2.txt: Specifies the local path to the resource you want to expose.--mimeType=text/plain: Defines the MIME type of the resource, indicating its content format.--description="Sample resource added via CLI": Provides a descriptive text for the resource.--name="test mcp via CLI": Assigns a human-readable name to the exposed resource.--type=file: Indicates that the exposed resource is a file.
Adding Labels to Resources
Just like tools, you can organize resources using labels:
wanaku resources expose --location=$HOME/documents/report.pdf --mimeType=application/pdf --description="Q4 Financial Report" --name="q4-report" --type=file --label category=finance --label year=2024 --label department=accountingLabels help you:
- Organize resources by category, department, or project
- Track resource lifecycles and versions
- Filter and manage resources more effectively
- Implement batch operations on groups of resources
IMPORTANT
It's important to note that this location refers to a location that the capability (downstream service) is able to access. The exact meaning of "location" depends on the type of the capability. For example:
- For a
filetype, it means the capability needs direct access to the file, implying it's likely running on a host with direct physical access to the file. - For an
ftptype, it means the capability needs access to the FTP server storing the file.
Always check the documentation for the capability provider that you are using for additional details about the location specifier.
Managing Labels on Existing Resources
After creating resources, you can add or remove labels without modifying the resource definition:
Adding labels to an existing resource:
# Add labels to a specific resource
wanaku resources label add --name "q4-report" --label archived=true --label reviewed=yes
# Add labels to multiple resources using label expressions (-e is short for --label-expression)
wanaku resources label add -e 'category=finance' --label migrated=trueRemoving labels from an existing resource:
# Remove labels from a specific resource
wanaku resources label remove --name "q4-report" --label temporary --label draft
# Remove labels from multiple resources using label expressions (-e is short for --label-expression)
wanaku resources label remove -e 'status=archived' --label legacyNote: When adding a label with a key that already exists, the value will be updated. When removing a non-existent label, it will be silently ignored.
Listing Resources
The wanaku resources list command allows you to view all resources currently exposed by your Wanaku MCP Router instance.
Executing this command will display a list of available resources, including their names and descriptions.
wanaku resources listShowing Resource Details
The wanaku resources show command displays detailed information about a specific resource registered in the Wanaku MCP Router.
wanaku resources show <resource-name>This command retrieves comprehensive details including the resource's name, type, description, location, MIME type, namespace, labels, and parameters.
Example:
wanaku resources show q4-reportSample Output:
Resource Details:
name q4-report
type file
description Q4 Financial Report
location /home/user/documents/report.pdf
mimeType application/pdf
namespace default
labels category=finance, year=2024
Parameters:
name value
key1 value1
key2 value2Options:
--host <url>: The API host URL (default:http://localhost:8080)
Example with remote host:
wanaku resources show --host http://api.example.com:8080 q4-reportManaging MCP Prompts
Prompts are reusable templates that can leverage multiple tools and provide example interactions for LLMs. They are part of the MCP (Model Context Protocol) specification and enable:
- Creating standardized message templates with variable substitution
- Defining argument schemas for dynamic prompt generation
- Referencing tools that the prompt can utilize
- Supporting multiple content types (text, images, audio, embedded resources)
- Providing example interactions to guide LLM behavior
Adding Prompts Using CLI
The wanaku prompts add command allows you to create new prompts in your Wanaku MCP Router instance.
Basic Example
wanaku prompts add \
--name "code-review" \
--description "Review code for quality and security issues" \
--message "user:text:Please review the following code: {{code}}" \
--message "assistant:text:I'll analyze this code for potential issues." \
--argument "code:The code to review:true"In this example:
--name "code-review": Assigns a unique identifier for the prompt--description: Provides a human-readable description--message: Defines messages in the prompt (can be specified multiple times)--argument: Defines template arguments (format:name:description:required)
Message Format
The --message option supports multiple content types:
Text Messages (default):
--message "user:text:Your message here"
--message "user:Your message here" # Backward compatible shorthandImage Messages:
--message "user:image:iVBORw0KGgoAAAANSUhEUgAAAAUA...:image/png"Audio Messages:
--message "user:audio:UklGRiQAAABXQVZFZm10IBAAAA...:audio/wav"Embedded Resource Messages:
--message "user:resource:file:///path/to/file.txt:File content:text/plain"Template Variable Substitution
Prompts support Mustache-style variable substitution using syntax:
wanaku prompts add \
--name "translate" \
--description "Translate text between languages" \
--message "user:text:Translate the following text from {{source_lang}} to {{target_lang}}: {{text}}" \
--argument "source_lang:Source language:true" \
--argument "target_lang:Target language:true" \
--argument "text:Text to translate:true"Tool References
Prompts can reference specific tools they may utilize:
wanaku prompts add \
--name "api-test" \
--description "Test API endpoints" \
--message "user:text:Test the API endpoint {{endpoint}}" \
--tool-reference "http-get" \
--tool-reference "http-post" \
--argument "endpoint:API endpoint URL:true"Namespace Support
Prompts can be organized into namespaces for isolation:
wanaku prompts add \
--name "review" \
--description "Code review prompt" \
--namespace "ns-0" \
--message "user:text:Review this code: {{code}}" \
--argument "code:Code to review:true"Supported namespaces: ns-0 through ns-9, default, and public.
Adding Prompts Using the UI
You can also manage prompts through the Wanaku Web UI:
- Navigate to the Prompts page in the Web UI
- Click "Add Prompt"
- Fill in the form:
- Name: Unique identifier for the prompt
- Description: Human-readable description
- Messages (JSON): Array of message objects
- Arguments (JSON): Array of argument objects (optional)
- Tool References (JSON): Array of tool names (optional)
- Namespace: Namespace for isolation (optional)
Example message JSON formats:
Text Message:
{
"role": "user",
"content": {
"type": "text",
"text": "Review {{code}}"
}
}Image Message:
{
"role": "user",
"content": {
"type": "image",
"data": "iVBORw0KGgoAAAANSUhEUgAAAAUA...",
"mimeType": "image/png"
}
}Audio Message:
{
"role": "user",
"content": {
"type": "audio",
"data": "UklGRiQAAABXQVZFZm10IBAAAA...",
"mimeType": "audio/wav"
}
}Embedded Resource Message:
{
"role": "user",
"content": {
"type": "resource",
"resource": {
"location": "file:///path/to/file.txt",
"description": "File content",
"mimeType": "text/plain"
}
}
}Listing Prompts
View all prompts currently available in your Wanaku MCP Router instance:
wanaku prompts listThis displays all prompts with their names, descriptions, and namespaces.
Editing Prompts
You can edit an existing prompt using the CLI.
The wanaku prompts edit command allows you to modify an existing prompt. Only the fields you specify will be updated:
wanaku prompts edit \
--name "code-review" \
--description "Updated description for code review" \
--message "user:text:Please review this code: {{code}}"All options except --name are optional:
- If
--descriptionis provided, it replaces the existing description - If
--messageis provided, it replaces all existing messages - If
--argumentis provided, it replaces all existing arguments - If
--tool-referencesis provided, it replaces all existing tool references - If
--namespaceis provided, it replaces the existing namespace
Example of updating only the description:
wanaku prompts edit --name "code-review" --description "New description"Example of updating messages:
wanaku prompts edit \
--name "code-review" \
--message "user:text:Review the following code for security issues: {{code}}" \
--message "assistant:text:I'll perform a security audit."Removing Prompts
Remove a prompt by name:
wanaku prompts remove --name "code-review"Removing Resources
Resources can be removed from the UI or via the CLI using the wanaku resources remove command.
Removing a Single Resource by Name
To remove a specific resource by name:
wanaku resources remove --name "q4-report"Batch Removal Using Label Expressions
Similar to tools, you can remove multiple resources at once using label expressions:
wanaku resources remove -e 'year=2023'This command will:
- Find all resources with the label
year=2023 - Display a preview table showing which resources will be removed
- Prompt for confirmation before removal
- Report the number of resources removed
Examples:
Remove all draft documents:
wanaku resources remove -e 'status=draft'Remove archived resources from a specific department:
wanaku resources remove -e 'department=sales & status=archived'Remove resources that are not marked as important:
wanaku resources remove -e '!priority=high'For automated scripts, skip the confirmation prompt:
wanaku resources remove -e 'year=2022' -yWARNING
Resource removal operations cannot be undone. Always review the preview table before confirming removal.
Managing Shared Data
Wanaku provides a data store feature that allows you to share static data between Wanaku and its capabilities.
This is particularly useful for storing configuration files, route definitions, and other static resources that capabilities need to access at runtime.
A primary use case for the data store is storing Apache Camel routes and associated files for the Camel Integration Capability.
By storing route definitions in the data store, you can dynamically configure integrations without rebuilding or redeploying capabilities.
IMPORTANT
Authentication is required to access the data store API. Make sure you're logged in using wanaku auth login before using data store commands.
Adding Data to the Data Store
The wanaku data-store add command allows you to upload files to the data store. Files are automatically Base64 encoded when stored.
wanaku data-store add --read-from-file /path/to/file.yamlBy default, the data store entry will be named after the filename. You can specify a custom name using the --name option:
wanaku data-store add --read-from-file /path/to/employee-routes.camel.yaml --name employee-routesIn this example:
--read-from-file: Specifies the local file path to upload--name: (Optional) Assigns a custom name to the stored data
The file contents are automatically Base64 encoded before being sent to the server, ensuring binary-safe storage.
Listing Stored Data
View all data currently stored in the data store:
wanaku data-store listThis displays a table showing:
- ID: Unique identifier for each stored item
- Name: The name of the stored data
- Data: A preview of the stored content (truncated to 50 characters)
- Labels: Labels associated with the data store entry
You can filter the list using label expressions:
# Filter by label expression
wanaku data-store list -e 'category=routes'See the label expression guide (wanaku man label-expression) for detailed syntax information.
Managing Labels on Data Stores
Data stores support labels for organization and filtering, similar to tools and resources.
Adding labels to a data store:
# Add labels to a specific data store by ID
wanaku data-store label add --id <data-store-id> --label category=routes --label env=production
# Add labels to multiple data stores using label expressions
wanaku data-store label add -e 'category=config' --label migrated=trueRemoving labels from a data store:
# Remove labels from a specific data store by ID
wanaku data-store label remove --id <data-store-id> --label temporary --label draft
# Remove labels from multiple data stores using label expressions
wanaku data-store label remove -e 'status=deprecated' --label legacyWhen adding a label with a key that already exists, the value will be updated. When removing a non-existent label, it will be silently ignored.
Removing Data from the Data Store
Remove stored data using either the ID or name:
# Remove by ID
wanaku data-store remove --id <data-store-id>
# Remove by name
wanaku data-store remove --name employee-routesNOTE
The data store is also accessible via the REST API at /api/v1/data-store and through the Wanaku web interface under the Data Stores page, where you can upload, download, and manage stored data using a graphical interface.
Managing Capabilities
Configurations in Wanaku have two distinct scopes:
- Capability service configurations
- Tool definition configurations
Capability Service Configurations
These configurations are essential for setting up the capability provider itself.
This includes details required for the transport mechanism used to access the capability, such as usernames and passwords for authenticating with the underlying system that provides the capability.
Each capability service may have its own specific set of configurations. As such, check the capability service documentation for details.
Tool Definition Configurations
These configurations are specific to individual tools that leverage a particular capability. They include:
- Names and identifiers that differentiate tools using the same capability, like specific Kafka topics or the names of database tables.
- Operational properties that dictate how the tool behaves, such as the type of HTTP method (
GET,POST,PUT), or operational settings like timeout configurations and idempotence flags.
These configurations are handled when adding a new tool to Wanaku MCP Router.
NOTE
Check the "Configuring the Capabilities" section for additional details about this.
Listing Capabilities
The wanaku capabilities list command provides a comprehensive view of all service capabilities available in the Wanaku Router. It discovers and displays both management tools and resource providers, along with their current operational status and activity information.
The command combines data from multiple API endpoints to present a unified view of the system's capabilities in an easy-to-read table format.
The command displays the results in a table with the following columns:
| Column | Description |
|---|---|
| service | Name of the service |
| serviceType | Type/category of the service |
| host | Hostname or IP address where the service runs |
| port | Port number the service listens on |
| status | Current operational status (active, inactive, or -) |
| lastSeen | Formatted timestamp of last activity |
For instance, running the command, should present you with an output similar to this:
Sample Output

Displaying Service Capability Details
The wanaku capabilities show command lets you view detailed information for a specific service capability within the Wanaku MCP Router.
This includes its configuration parameters, current status, and connection information.
wanaku capabilities show <service> [--host <url>]<service>: The service name to show details for (e.g., http, sqs, file)--host <url>: The API host URL (default: http://localhost:8080)
When you execute the command, Wanaku displays comprehensive details about the chosen service type. If multiple instances of the same service exist, an interactive menu will appear, allowing you to select the specific instance you wish to view.
For example, to show the details for the HTTP service:
wanaku capabilities show httpOr, show details for SQS service linked with to a specific Wanaku MCP router running at http://api.example.com:8080:
wanaku capabilities show sqs --host http://api.example.com:8080The command displays two main sections:
- Capability Summary: Basic service information in table format:
- Service name and type
- Host and port
- Current status
- Last seen timestamp
- Configurations: Detailed configuration parameters:
- Parameter names
- Parameter descriptions

Interactive Selection
When multiple instances of the same service are found, you'll see:
- A warning message indicating multiple matches
- An interactive selection prompt with service details
- Choose your desired instance using arrow keys and Enter

NOTE
The Wanaku CLI provides clear exit codes to indicate the outcome of a command:
0: The command executed successfully.1: An error occurred (e.g., no capabilities were found, or there were issues connecting to the API).
Accessing Other MCP servers (MCP Forwards)
The MCP bridge in Wanaku allows it to act as a central gateway or proxy to other MCP servers that use HTTP as the transport mechanism.
This feature enables a centralized endpoint for aggregating tools and resources provided by other MCP servers.
Listing Forwards
To view a list of currently configured forwards, use the wanaku forwards list command:
wanaku forwards listThis command displays information about each forward, including its name, service URL, and any other relevant details.
This can be useful for managing and troubleshooting MCP server integrations.
Adding Forwards
To add an external MCP server to the Wanaku instance, use the wanaku forwards add command:
wanaku forwards add --service="http://your-mcp-server.com:8080/mcp/sse" --name my-mcp-server--service: The URL of the external MCP server's SSE (Server-Sent Events) endpoint.--name: A unique human-readable name for the forward, used for identification and management purposes.
Once a forward is added, all tools and resources provided by the external MCP server will be mapped in the Wanaku instance.
These tools and resources can then be accessed as if they were local to the server.
Removing Forwards
To remove a specific external MCP server from the Wanaku instance, use the wanaku forwards remove command:
wanaku forwards remove --name my-mcp-server--name: The human-readable name for the forward to be removed.
WARNING
Forward removal operations cannot be undone. Once removed, the tools and resources from those MCP servers will no longer be accessible.
NOTE
Attempting to remove a non-existent forward will result in an error message.
Example Use Case
Suppose you have two MCP servers: http://mcp-server1.com:8080/mcp/sse and http://mcp-server2.com:8080/mcp/sse.
To integrate these external MCP servers into your Wanaku instance, follow these steps:
- Add the first forward using the
wanaku forwards addcommand:
wanaku forwards add --service="http://mcp-server1.com:8080/mcp/sse" --name mcp-server-1- Use the
wanaku forwards listcommand to confirm that the forward has been successfully added:
wanaku forwards list- Verify that all tools and resources from
mcp-server1are now accessible within your Wanaku instance usingwanaku tools list
Name Type URI
tavily-search-local => tavily => tavily://search?maxResults={parameter.value('maxResults')}
meow-facts => mcp-remote-tool => <remote>
dog-facts => mcp-remote-tool => <remote>
camel-rider-quote-generator => mcp-remote-tool => <remote>
tavily-search => mcp-remote-tool => <remote>
laptop-order => mcp-remote-tool => <remote>- Add the second forward using the same command:
wanaku forwards add --service="http://mcp-server2.com:8080/mcp/sse" --name mcp-server-2- Confirm that tools and resources from both external MCP servers are now integrated into your Wanaku instance (use
wanaku tools list) - Use the
wanaku forwards listcommand to view the updated list of forwards:
wanaku forwards listBy leveraging the MCP bridge feature, you can create a centralized endpoint for aggregating tools and resources from multiple external MCP servers, simplifying management and increasing the overall functionality of your Wanaku instance.
Managing Namespaces
Wanaku introduces the concept of namespaces to help users organize and isolate tools and resources, effectively managing the Large Language Model (LLM) context. This prevents context bloat and improves the efficiency of your Wanaku deployments.
What Are Namespaces
Namespaces provide a mechanism to group related tools and resources.
Each namespace acts as a separate logical container, ensuring that the LLM context for tools within one namespace does not interfere with tools in another. This is particularly useful when you have a large number of tools or when different sets of tools are used for distinct purposes.
Wanaku provides a fixed set of 10 available slots for namespaces, named from ns-0 to ns-9. It also provides a default namespace, which is used if none is specified and a special public namespace that can be accessed without any authentication.
Using Namespaces
To associate a tool or resource with a specific namespace, use the --namespace option when adding it:
wanaku tools add -n "meow-facts-3" --description "Retrieve random facts about cats" --uri "https://meowfacts.herokuapp.com?count={count or 1}" --type http --property "count:int,The count of facts to retrieve" --namespace test --required countIn the example above, the meow-facts-3 tool will be associated with the first freely available namespace.
When you provide a namespace name like test, Wanaku automatically associates it with an available numerical slot from ns-0 to ns-9.
Checking Namespace Assignments
You can verify which namespace a tool or resource has been assigned to by using the wanaku namespaces list command.
This command will display a list of all active namespaces, their unique IDs, and their corresponding paths.
The output will look similar to this:
id name path
28560e66-d94c-44a2-b032-779b5542132a http://localhost:8080/ns-4/mcp/sse
43b5d7a7-4e7d-4109-960b-ac7695b6f2d3 public http://localhost:8080/public/mcp/sse
93c5bfdf-0e09-4da5-82fa-4eec3bf6b1b4 http://localhost:8080/ns-3/mcp/sse
bfd112d2-32cb-475a-9f55-63301519152b http://localhost:8080/ns-7/mcp/sse
f5915650-4daa-4616-95c6-5aafceffb026 http://localhost:8080/ns-1/mcp/sse
db89fedd-ffe6-4dee-b051-bcd5285bb9c9 http://localhost:8080/ns-2/mcp/sse
d4249e11-9368-4c5b-bb66-981d2d2e69c7 http://localhost:8080/ns-0/mcp/sse
8898fab6-3774-427f-8400-8c6f6fd9a97e http://localhost:8080/ns-6/mcp/sse
fe8cc1f2-2355-4009-ba68-4faeefe937f7 http://localhost:8080/ns-5/mcp/sse
a3dfaaf6-3655-4bcc-8c48-3d183b6d675b http://localhost:8080/ns-8/mcp/sse
8832e2c7-3bd9-4f9b-88ba-982cc20a43de http://localhost:8080/ns-9/mcp/sse
<default> http://localhost:8080//mcp/sseIn this output, you can see the mapping of internal namespace IDs to their corresponding ns-X paths.
IMPORTANT
For Streamable HTTP, remove the /sse from the path (i.e.: http://localhost:8080/ns-1/mcp/).
The Default Namespace
If you do not specify a namespace when adding a tool or resource, it will automatically be added to the default namespace.
The default namespace acts as a general container for tools that don't require specific isolation.
You can identify the default namespace in the wanaku namespaces list output by its <default> name.
Managing Labels on Namespaces
Labels provide a flexible way to organize and filter namespaces. You can add metadata to namespaces in the form of key-value pairs, making it easier to manage and query them.
Adding Labels to Namespaces
You can add labels to an existing namespace using the wanaku namespaces label add command.
To specify which namespace to add labels to, you need the namespace ID from the wanaku namespaces list output (the first column):
# Add a single label to a namespace
wanaku namespaces label add --id 28560e66-d94c-44a2-b032-779b5542132a --label env=production
# Add multiple labels at once
wanaku namespaces label add --id 28560e66-d94c-44a2-b032-779b5542132a -l env=production -l tier=backend -l version=2.0If a label key already exists, its value will be updated to the new value.
Adding Labels to Multiple Namespaces
You can add labels to multiple namespaces at once using label expressions:
# Add a label to all namespaces matching a label expression
wanaku namespaces label add --label-expression 'category=internal' --label migrated=true
# Add multiple labels to namespaces matching complex expressions
wanaku namespaces label add -e 'env=staging & tier=backend' -l reviewed=true -l compliant=yesRemoving Labels from Namespaces
To remove labels from a namespace, use the wanaku namespaces label remove command:
# Remove a single label from a namespace
wanaku namespaces label remove --id 28560e66-d94c-44a2-b032-779b5542132a --label env
# Remove multiple labels at once
wanaku namespaces label remove --id 28560e66-d94c-44a2-b032-779b5542132a -l env -l tier -l versionRemoving Labels from Multiple Namespaces
Similar to adding labels, you can remove labels from multiple namespaces using label expressions:
# Remove labels from all namespaces matching an expression
wanaku namespaces label remove --label-expression 'category=temp' --label temp
# Remove multiple labels from matching namespaces
wanaku namespaces label remove -e 'migrated=true' -l temp -l draftListing Namespaces with Label Filters
You can filter namespaces by their labels when listing them:
# List all namespaces with a specific label
wanaku namespaces list --label-filter 'env=production'
# List namespaces matching complex expressions
wanaku namespaces list --label-filter 'env=production & tier=backend'See the Label Expressions Guide for detailed information on the label expression syntax and advanced filtering options.
Shell Completion
Wanaku provides shell completion support for bash and zsh, enabling tab-completion for all commands, subcommands, and their options. This significantly improves the command-line experience by reducing typing and helping discover available commands and options.
Generating Completion Scripts
To generate a completion script, use the wanaku completion generate command:
# Generate completion script and output to stdout
wanaku completion generate
# Save completion script to a file
wanaku completion generate --output ~/.wanaku_completionThe generated script includes completion support for:
- All parent commands (namespaces, tools, resources, forwards, capabilities, etc.)
- All subcommands (namespaces label add, tools list, etc.)
- All command options (--help, --verbose, command-specific options)
- Automatic detection of bash vs zsh shell
Quick Setup for Current Session Only
If you want to enable completion for just your current terminal session without making permanent changes:
# One-liner for bash or zsh (works on both Linux and macOS)
source <(wanaku completion generate)
# Alternative using eval (also works on both bash and zsh)
eval "$(wanaku completion generate)"This generates and immediately sources the completion script in your current shell. Completion will be active until you close the terminal, without creating any files or modifying your shell configuration files.
This is useful for:
- Testing completion before permanent installation
- Temporary/one-time use
- Environments where you don't want to modify shell configuration
Installing Completion on Linux
For Bash
- Generate the completion script to a standard location:
wanaku completion generate --output /etc/bash_completion.d/wanaku_completion- Add the following line to your
~/.bashrc:
source /etc/bash_completion.d/wanaku_completion- Reload your shell:
source ~/.bashrcAlternatively, for user-specific installation:
wanaku completion generate --output ~/.wanaku_completion
echo "source ~/.wanaku_completion" >> ~/.bashrc
source ~/.bashrcFor Zsh
- Generate the completion script:
mkdir -p ~/.zsh/completions
wanaku completion generate --output ~/.zsh/completions/_wanaku- Add the following lines to your
~/.zshrc:
autoload -U +X bashcompinit && bashcompinit
source ~/.zsh/completions/_wanaku- Reload your shell:
source ~/.zshrcInstalling Completion on macOS
For Zsh (Default on macOS Catalina and later)
- Generate the completion script:
mkdir -p ~/.zsh/completions
wanaku completion generate --output ~/.zsh/completions/_wanaku- Add the following lines to your
~/.zshrc:
autoload -U +X bashcompinit && bashcompinit
source ~/.zsh/completions/_wanaku- Reload your shell:
source ~/.zshrcFor Bash (If using bash on macOS)
- Generate the completion script:
wanaku completion generate --output /usr/local/etc/bash_completion.d/wanaku- Add the following line to your
~/.bash_profile:
source /usr/local/etc/bash_completion.d/wanaku- Reload your shell:
source ~/.bash_profileUsing Shell Completion
Once installed, you can use tab-completion with the Wanaku CLI:
# Tab-complete commands
wanaku <TAB>
# Shows: capabilities, completion, forwards, man, namespaces, resources, start, tools, toolset
# Tab-complete subcommands
wanaku namespaces <TAB>
# Shows: label, list
# Tab-complete options
wanaku tools add --<TAB>
# Shows: --description, --help, --name, --namespace, --property, --required, --type, --uri, --verbose
# Tab-complete after partial input
wanaku name<TAB>
# Completes to: wanaku namespacesTroubleshooting
If completion doesn't work after installation:
Verify the script was sourced: Check that your shell configuration file (
.bashrc,.zshrc, or.bash_profile) contains the source command and was reloaded.Check shell detection: The completion script automatically detects whether you're using bash or zsh. Verify you're using a supported shell:
shellecho $BASH_VERSION # For bash echo $ZSH_VERSION # For zshManually source the script: Try sourcing the completion script directly:
shellsource ~/.wanaku_completionRegenerate the script: If you've updated Wanaku and new commands aren't appearing, regenerate the completion script:
shellwanaku completion generate --output ~/.wanaku_completion source ~/.wanaku_completion
Limitations
- PowerShell: Shell completion is not currently supported for PowerShell on Windows. Users on Windows should use WSL (Windows Subsystem for Linux) with bash or zsh for completion support.
- Fish shell: Fish shell is not supported by picocli 4.7.7. Only bash and zsh are supported.
Understanding URIs
Universal Resource Identifiers (URI) are central to Wanaku.
They are used to define the location of resources, the tool invocation request that Wanaku will receive from the Agent/LLM and the location of configuration and secret properties.
Understanding URIs is critical to leverage Wanaku and create flexible definitions of tools and resources.
Flexible Input Data
Some services may require a more flexible definition of input data.
For instance, consider HTTP endpoints with dynamic parameters:
http://my-host/api/{someId}http://my-host/api/{someId}/createhttp://my-host/api/{someId}/link/to/{anotherId}
In cases where the service cannot predetermine the actual tool addresses, users must define them when creating the tool.
Creating URIs
Building the URIs is not always as simple as defining their address. Sometimes, optional parameters need to be filtered out or query parameters need to be built. To help with that, Wanaku comes with a couple of expressions to build them.
To access the values, ou can use the expression {parameter.value('name')}. For instance, to get the value of the parameter id you would use the expression {parameter.value('id')}. You can also provide default values if none are provided, such as http://my-host/{parameter.valueOrElse('id', 1)}/data (this would provide the value 1 if the parameter id is not set).
It is also possible to build the query part of URIs with the query method. For instance, to create a URI such as http://my-host/data?id=456 you could use http://my-host/data{parameter.query('id')}. If the id parameter is not provided, this would generate a URI such as http://my-host/data. This can take multiple parameters, so it is possible to pass extra variables such as {parameter.query('id', 'name', 'location', ...)}.
IMPORTANT
Do not provide the ? character. It is added automatically the parsing code if necessary.
Building the query part of URIs can be quite complex if there are too many. To avoid that, you can use {parameter.query} to build a query composed of all query parameters.
The values for the queries will be automatically encoded, so a URI defined as http://my-host/{parameter.query('id', 'name')} would generate http://my-host/?id=456&name=My+Name+With+Spaces if provided with a name value of "My Name With Spaces".
Dealing with Request Bodies
The wanaku_body property is a special argument used to indicate that the associated property or argument should be included in the body of the data exchange, rather than as a parameter.
For instance, in an HTTP call, wanaku_body specifies that the property should be part of the HTTP body, not the HTTP URI.
The handling of such parameters may vary depending on the service being used.
Currently special arguments:
wanaku_body
Extending Wanaku: Adding Your Own Capabilities
Wanaku leverages Quarkus and Apache Camel to provide connectivity to a vast range of services and platforms.
Although we aim to provide a few of them out-of-the box, not all of them will fit all the use cases. For most cases, users should rely on the Camel Integration Capability for Wanaku. That capability service leverages Apache Camel which offers more than 300 components capable of talking to any type of system. Users can design their integrations using tools such as Kaoto or Karavan and expose the routes as tools or resources using that capability service.
Adding a New Resource Provider Capability
For cases where the Camel Integration Capability for Wanaku is not sufficient, users can create their own capability services.
Why try to make it simple for users to create custom services that solve their particular need.
Creating a New Resource Provider
To create a custom resource provider, you can run:
wanaku capabilities create resource --name y4To run the newly created service enter the directory that was created (i.e.,; cd wanaku-provider-y4), then build the project using Maven (mvn clean package).
NOTE
Capabilities services are created, by default, using Apache Camel. However, it is possible to create purely Quarkus-based capabilities using the option --type=quarkus.
Then, launch it using:
java -Dwanaku.service.registration.uri=http://localhost:8080 -Dquarkus.grpc.server.port=9901 ... -jar target/quarkus-app/quarkus-run.jarYou can check if the service was registered correctly using wanaku capabilities list.
IMPORTANT
Remember to set the parameters in the application.properties file and also adjust the authentication settings.
Adjusting Your Resource Capability
After created, then most of the work is to adjust the auto-generated Delegate class to provide the Camel-based URI and, if necessary, coerce (convert) the response from its specific type to String.
Adding a New Tool Invoker Capability
Creating a New Tool Service
To create a custom tool service, you can run:
wanaku capabilities create tool --name jmsNOTE
Capabilities services are created, by default, using Apache Camel. However, it is possible to create purely Quarkus-based capabilities using the option --type=quarkus.
To run the newly created service enter the directory that was created (i.e.,; cd wanaku-tool-service-jms), then build the project using Maven (mvn clean package).
Then, launch it using:
java -Dwanaku.service.registration.uri=http://localhost:8080 -Dquarkus.grpc.server.port=9900 ... -jar target/quarkus-app/quarkus-run.jarYou can check if the service was registered correctly using wanaku capabilities list.
IMPORTANT
Remember to set the parameters in the application.properties file and also adjust the authentication settings.
To customize your service, adjust the delegate and client classes.
Adjusting Your Tool Invoker Capability
After created, then most of the work is to adjust the auto-generated Delegate and Client classes to invoke the service and provide the returned response.
In those cases, then you also need to write a class that leverages Apache Camel's ProducerTemplate and (or, sometimes, both) ConsumerTemplate to interact with the system you are implementing connectivity too.
Adding a New Mcp server Capability
Creating a New Mcp server
To create a custom mcp server, you can run:
wanaku capabilities create mcp --name s3To run the newly created service enter the directory that was created (i.e.,; cd wanaku-mcp-servers-s3), then build the project using Maven (mvn clean package).
NOTE
Capabilities services are created, by default, using Apache Camel. However, it is possible to create purely Quarkus-based capabilities using the option --type=quarkus.
Then, launch it using:
java -Dwanaku.service.registration.uri=http://localhost:8080 -Dquarkus.grpc.server.port=9901 ... -jar target/quarkus-app/quarkus-run.jarYou can check if the service was registered correctly using wanaku forwards list.
IMPORTANT
Remember to set the parameters in the application.properties file.
Adjusting Your Mcp server Capability
After created, then most of the work is to adjust the auto-generated Tool class to implement the mcp server tool.
Implementing Services in Other Languages
The communication between Wanaku MCP Router and its downstream services is capable of talking to any type of service using gRPC. Therefore, it's possible to implement services in any language that supports it.
For those cases, leverage the .proto files in the core-exchange module for creating your own service.
CAUTION
At this time, Wanaku is being intensively developed, therefore, we cannot guarantee backwards compatibility of the protocol.
NOTE
For plain Java, you can still generate the project using the archetype, but in this case, you must implement your own delegate from scratch and adjust the dependencies.
Adjusting the announcement address
You can adjust the address used to announce to the MCP Router using either (depending on whether using a tool or a resource provider):
wanaku.service.registration.announce-address=my-host
This is particularly helpful when running a capability service in the cloud, behind a proxy or firewall.
Adjusting the authentication parameters
quarkus.oidc-client.auth-server-url=http://localhost:8543/realms/wanakuquarkus.oidc-client.client-id=wanaku-servicequarkus.oidc-client.refresh-token-time-skew=1mquarkus.oidc-client.credentials.secret=<insert key here>
Supported/Tested Clients
Wanaku implements the MCP protocol and, by definition, should support any client that is compliant to the protocol.
The details below describe how Wanaku MCP router can be used with some prominent MCP clients:
Embedded LLMChat for testing
Wanaku Console includes simple LLMChat specificly designed for quick testing of the tools.
NOTE
At the moment, the Embedded LLMChat supports only the tools.
open http://localhost:8080- Setup LLM -
baseurl,api key,model, and extra parameters - Select tools
- Enter prompt and send
Creating New MCP Server Using Maven
mvn -B archetype:generate -DarchetypeGroupId=ai.wanaku -DarchetypeArtifactId=wanaku-mcp-servers-archetype \
-DarchetypeVersion=0.0.8 -DgroupId=ai.wanaku -Dpackage=ai.wanaku.mcp.servers.s3 -DartifactId=wanaku-mcp-servers-s3 \
-Dname=S3 -Dwanaku-version=0.0.8 -Dwanaku-capability-type=camelIMPORTANT
When using the maven way, please make sure to adjust the version of Wanaku to be used by correctly setting the wanaku-version property to the base Wanaku version to use.
Adjusting the MCP Server
After creating the mcp server, open the pom.xml file to add the dependencies for your project. Using the example above, we would include the following dependencies:
<dependency>
<groupId>org.apache.camel.quarkus</groupId>
<artifactId>camel-quarkus-aws-s3</artifactId>
</dependency>Adjust the gPRC port in the application.properties file by adjusting the quarkus.grpc.server.port property.
NOTE
You can also provide the port when launching (i.e., java -Dquarkus.grpc.server.port=9190 -jar target/quarkus-app/quarkus-run.jar)
Then, build the project:
mvn clean packageAnd run it:
java -jar target/quarkus-app/quarkus-run.jarClaude
To integrate Wanaku with Claude Desktop, you will need to add an entry into the claude_desktop_config.json file - see instructions for creating a Claude desktop configuration if you do not already have one.
Claude Desktop does not currently support connecting to SSE-based endpoints, so you will have to configure wanaku using a stdio-to-sse wrapper. Note that you will have to install for this purpose, and specify the SSE URL for your Wanaku instance in the arguments.
{
"mcpServers": {
"wanaku": {
"command": "uvx",
"args": [
"mcp-proxy",
"http://localhost:8080/mcp/sse/"
]
}
}
}HyperChat
Wanaku works with HyperChat. To do so, you can configure Wanaku as an MCP server using the MCP configuration as shown below:

IMPORTANT
Make sure to have Wanaku up and running before configuring HyperChat. You may also need to close and reopen HyperChat.
After configuring HyperChat, you may need to go the Main Window and edit any existing agent if you have any. Then, in the agent configuration Window, in the allowMCPs option, make sure you mark Wanaku as an allowed MCP server. If in doubt, check the HyperChat project documentation.
NOTE
Older versions of HyperChat (pre 1.1.13) required manually editing the mcp.json file as described on the improvement ticket. This is not necessary for newer versions.
LibreChat
For LibreChat search for mcpServers on the librechat.yml file and include something similar to this:
mcpServers:
everything:
url: http://host.docker.internal:8080/mcp/sseIMPORTANT
Make sure to point to the correct address of your Wanaku MCP instance.
In LibreChat, you can access Wanaku MCP tools using Agents.
Witsy
We also have tested Wanaku with Witsy - AI Desktop Assistant.
Using an STDIO gateway
Wanaku does not support stdio. Therefore, to use Wanaku with to use it with tools that don't support SSE, it is necessary to use an stdio-to-SSE gateway. The application super gateway can be used for this.
npx -y supergateway --sse http://localhost:8080/mcp/sseAvailable Resources Capabilities
Visit this page to check all the providers that come built-in with Wanaku.
NOTE
Most users should rely on the Camel Integration Capability for Wanaku.
Available Tools Capabilities
Visit this page to check all the tools that come built-in with Wanaku.
NOTE
Most users should rely on the Camel Integration Capability for Wanaku.
API Note
All CLI commands use the Wanaku management API under the hood. If you need more advanced functionality or want to automate tasks, you may be able to use this API directly.
By using these CLI commands, you can manage resources and tools for your Wanaku MCP Router instance.
Troubleshooting
This section provides solutions to common issues you may encounter while using Wanaku.
Authentication Issues
Cannot authenticate with the router
Symptoms:
- CLI commands fail with authentication errors
- Web UI redirects to Keycloak but login fails
Solutions:
Verify Keycloak is running and accessible:
shellcurl http://localhost:8543/healthCheck that the Keycloak realm is properly configured:
- Ensure the
wanakurealm exists - Verify the
wanaku-mcp-routerclient is configured - Confirm user accounts have been created
- Ensure the
Clear stored credentials and re-authenticate:
shellrm ~/.wanaku/credentials wanaku auth login --url http://localhost:8080Verify the router can reach Keycloak:
- Check the
auth.serverconfiguration property - Ensure network connectivity between components
- Check the
Token expired errors
Symptoms:
- Commands work initially but fail after some time
- Error messages about expired tokens
Solutions:
Re-authenticate with the router:
shellwanaku auth login --url http://localhost:8080Check token lifetime settings in Keycloak if tokens expire too quickly
Service Registration Issues
Capability services not appearing in the router
Symptoms:
- Services start successfully but don't show up in
wanaku capabilities list - Tools or resources from a service are not available
Solutions:
Verify the service registration configuration:
shell# In the capability service application.properties wanaku.service.registration.enabled=true wanaku.service.registration.uri=http://localhost:8080Check service logs for registration errors:
shell# Look for registration-related errors grep -i "registration" /path/to/service.logVerify network connectivity between the service and router:
shell# From the service host curl http://localhost:8080/q/healthCheck if the service is using the correct OIDC credentials:
- Verify
quarkus.oidc-client.credentials.secretmatches the secret in Keycloak - Ensure the
wanaku-serviceclient exists in Keycloak
- Verify
Check the router backend logs for incoming registration requests
Service shows as "offline" or "unhealthy"
Symptoms:
- Service appears in
wanaku capabilities listbut marked as offline - Intermittent availability
Solutions:
Verify the service is running:
shell# Check if the gRPC port is listening netstat -an | grep 9009Check the registration interval and ensure heartbeats are being sent:
shell# In application.properties wanaku.service.registration.interval=10sReview service health and ensure it's not crashing or restarting
Connection Issues
Cannot connect to the router from MCP clients
Symptoms:
- MCP clients fail to connect
- Timeout errors when connecting
Solutions:
Verify the router is running and accessible:
shellcurl http://localhost:8080/q/healthCheck the correct MCP endpoint is being used:
- SSE transport:
http://localhost:8080/mcp/sse - Streamable HTTP:
http://localhost:8080/mcp/
- SSE transport:
For namespace-specific connections, ensure the correct path:
shell# For namespace ns-1 http://localhost:8080/ns-1/mcp/sseVerify firewall rules allow traffic on port 8080
Check CORS settings if connecting from a web application:
shellquarkus.http.cors.enabled=true quarkus.http.cors.origins=http://localhost:3000
Tool and Resource Issues
Tools or resources not appearing in MCP clients
Symptoms:
wanaku tools listshows tools, but they don't appear in the MCP client- Resources are registered but not accessible
Solutions:
Verify the tool/resource is in the correct namespace:
shellwanaku tools list wanaku namespaces listCheck if the client is connected to the correct namespace endpoint
Refresh the MCP client connection
Verify the capability service providing the tool is online:
shellwanaku capabilities list
Tool invocation fails
Symptoms:
- Tool appears in client but execution fails
- Error messages when calling a tool
Solutions:
Check the tool URI is correct:
shellwanaku tools listVerify the capability service is running and healthy
Review capability service logs for errors during tool execution
Ensure required configuration or secrets are properly set:
shellwanaku tools listFor HTTP tools, verify the target endpoint is accessible from the service
Resource read fails
Symptoms:
- Resource appears but cannot be read
- Empty or error responses when accessing resources
Solutions:
Verify the resource URI and that the target exists:
shellwanaku resources listCheck file permissions if using file-based resources
Verify network access if using remote resources (S3, FTP, etc.)
Review provider service logs for errors
Build and Deployment Issues
Build fails with missing dependencies
Symptoms:
- Maven build errors
- Missing artifact errors
Solutions:
Ensure you're using the correct Maven version:
shellmvn --version # Should be 3.xClear Maven cache and rebuild:
shellrm -rf ~/.m2/repository/ai/wanaku mvn clean installVerify internet connectivity for downloading dependencies
Native build fails
Symptoms:
- Native compilation errors
- GraalVM-related failures
Solutions:
Verify GraalVM is properly installed:
shelljava -version # Should show GraalVM native-image --versionCheck the Quarkus native build guide for system requirements
Try building without native mode first to isolate the issue:
shellmvn clean package
Container deployment fails
Symptoms:
- Pods in CrashLoopBackOff state
- ImagePullBackOff errors
Solutions:
Verify the container image exists and is accessible:
shellpodman pull quay.io/wanaku/wanaku-router-backend:latestCheck pod logs for startup errors:
shelloc logs <pod-name> kubectl logs <pod-name>Verify ConfigMaps and Secrets are properly mounted:
shelloc describe pod <pod-name>Check resource limits and ensure sufficient memory/CPU
Verify Keycloak is accessible from the pods:
shelloc exec <pod-name> -- curl http://keycloak:8080/health
Performance Issues
Slow response times
Symptoms:
- Tools take a long time to execute
- Resource reads are slow
- MCP clients experience timeouts
Solutions:
Check router and service resource usage:
shelltop htopReview logs for errors or warnings
Verify network latency between components:
shellping <service-host>Check Infinispan cache performance and consider adjusting:
shellwanaku.infinispan.max-state-count=10For Kubernetes deployments, ensure adequate resource limits:
yamlresources: requests: memory: "512Mi" cpu: "500m" limits: memory: "1Gi" cpu: "1000m"
Logging and Debugging
Enable debug logging
To get more detailed logs for troubleshooting:
Router backend:
quarkus.log.level=DEBUG
quarkus.log.category."ai.wanaku".level=DEBUG
quarkus.mcp.server.traffic-logging.enabled=trueCapability services:
quarkus.log.level=DEBUG
quarkus.log.category."ai.wanaku".level=DEBUGCLI:
wanaku --verbose tools listAccess logs
Check logs in these locations:
- Router backend: Look for
wanaku-router-backend.logor check container logs - Capability services: Check individual service log files
- Kubernetes:
oc logs <pod-name>orkubectl logs <pod-name>
Getting Help
If you continue to experience issues:
- Check the GitHub Issues for similar problems
- Review the documentation
- Join the community discussions
- Open a new issue with:
- Wanaku version
- Deployment environment (local, OpenShift, etc.)
- Steps to reproduce
- Relevant log excerpts
- Configuration (with secrets redacted)
