Self-Hosting Plugged.in
Deploy Plugged.in on your own infrastructure for complete control over your MCP server management platform.Overview
Self-hosting Plugged.in gives you:- Complete Data Control: All data stays on your infrastructure
- Custom Configuration: Tailor the platform to your needs
- Network Isolation: Run in air-gapped environments
- Compliance: Meet specific regulatory requirements
- Cost Control: Optimize for your usage patterns
System Requirements
Minimum Requirements
Component | Specification |
---|---|
CPU | 2 cores |
RAM | 4 GB |
Storage | 20 GB SSD |
OS | Ubuntu 20.04+ / Debian 11+ |
Database | PostgreSQL 15+ |
Node.js | 20.x LTS |
Recommended Production Setup
Component | Specification |
---|---|
CPU | 4+ cores |
RAM | 8+ GB |
Storage | 100 GB SSD |
Load Balancer | Nginx/HAProxy |
Cache | Redis 7+ |
Monitoring | Prometheus + Grafana |
Deployment Options
Docker Deployment (Recommended)
The easiest way to deploy Plugged.in is using Docker:1
Clone Repository
2
Configure Environment
3
Start Services
4
Run Migrations
Docker Compose Configuration
Manual Installation
For more control, install manually:1
Install Dependencies
2
Setup Database
3
Clone and Configure
4
Build and Deploy
Kubernetes Deployment
Deploy to Kubernetes for scalability:Configuration
Environment Variables
Never commit
.env
files to version control. Use secrets management for production.Required Variables
Optional Variables
Nginx Configuration
Configure Nginx as reverse proxy:Systemd Service
Create a systemd service for automatic startup:Security Hardening
SSL/TLS Configuration
Generate SSL certificates:Firewall Configuration
Database Security
Application Security
Authentication
Authentication
- Enforce strong passwords
- Enable 2FA for admin accounts
- Configure session timeouts
- Use secure session cookies
API Security
API Security
- Implement rate limiting
- Use API key rotation
- Enable CORS restrictions
- Log all API access
Network Security
Network Security
- Use VPN for admin access
- Implement IP whitelisting
- Enable DDoS protection
- Monitor network traffic
Data Security
Data Security
- Encrypt data at rest
- Backup encryption keys
- Regular security audits
- Implement data retention policies
Monitoring and Maintenance
Health Checks
Set up health monitoring endpoints:Prometheus Metrics
Export metrics for monitoring:Backup Strategy
Implement regular backups:Log Management
Configure centralized logging:Scaling Strategies
Horizontal Scaling
Deploy multiple instances behind a load balancer:Database Scaling
Implement read replicas:Caching Strategy
Implement multi-level caching:Troubleshooting
Common Issues
Issue | Solution |
---|---|
Database connection errors | Check PostgreSQL status and credentials |
High memory usage | Adjust Node.js heap size with --max-old-space-size |
Slow performance | Enable Redis caching and optimize database queries |
SSL errors | Verify certificate paths and permissions |
MCP server failures | Check sandboxing configuration and permissions |