Blog Post

Linux and Open Source Blog
5 MIN READ

Getting Started with the SUSE Multi-Linux Manager MCP Server and GitHub Copilot

abbottkarl's avatar
abbottkarl
Icon for Microsoft rankMicrosoft
Apr 22, 2026

Enterprise Linux environments are heterogeneous. That's not a problem statement - it's just the truth. SUSE, Ubuntu, RHEL, and their downstream variants coexist in every data center I've seen, and increasingly across Azure subscriptions too.  AI assistants like GitHub Copilot can already  connect to these machines, run commands, troubleshoot issues, apply patches  one box at a time. But if you're managing a fleet of hundreds or thousands  of  systems across distributions, the gap isn't whether AI can touch your  infrastructure. It's whether it can work through the centralized management  tooling where your inventory, patch orchestration, RBAC, and audit trails  actually live.

SUSE just took a meaningful step to close that gap. Their Multi-Linux Manager MCP Server, built on the open source Uyuni project gives AI agents like GitHub Copilot a structured, authenticated interface to your existing  management platform. Not the individual boxes. The management plane where your centralized inventory, CVE auditing, cross-distribution patch scheduling, and RBAC already live. Not a rip-and-replace. Not a new console to learn. A way to talk to the infrastructure management you've already built.

This post walks through what the MCP server does, why it matters in an Azure context, and how to get it wired up with GitHub Copilot so you can start working with it today.

The Model Context Protocol (MCP) is an open standard that defines how AI models connect to external tools and data sources. Think of it as the USB-C of AI integrations - a common interface so that different clients (GitHub Copilot, Claude Desktop, Gemini CLI) can talk to different servers (Azure, SUSE, databases, APIs) without bespoke glue code for every combination.

Why This Matters for Azure Customers

If you are running Linux workloads on Azure - whether for SAP, HPC, or traditional enterprise applications - the Multi-Linux Manager MCP server provides a conversational interface for your infrastructure without requiring you to change tools.

  • Management-plane depth, not just infrastructure inventory. Azure and Copilot already give you fleet-wide visibility into your VMs. The SUSE MCP server adds the layer underneath: patch scheduling state, erratum tracking, cross-distribution CVE audits, and system group management that lives in your Multi-Linux Manager instance.
  • A single pane of glass. Pair this with the Azure MCP Server and your AI assistant can move between Azure resource operations and OS-level fleet management in one conversation, across the distributions Multi-Linux Manager supports, without switching tools or contexts.

What You Can Actually Do With It

The MCP server exposes over 20 practical tools for day-to-day infrastructure operations. Instead of relying on a generic knowledge base, Copilot queries your actual infrastructure.

  • Inventory and Inspection: You can list active systems across your fleet or pull detailed event histories for specific machines.
  • Patch Management and CVE Response: Copilot can rapidly audit all systems for pending updates or identify specific machines vulnerable to a new CVE.
  • Operational Actions: You can list system groups, register new systems, or schedule server reboots.

The Security Model: Human-in-the-Loop

Letting an AI agent touch production infrastructure raises the obvious question: what keeps it from doing something destructive? SUSE has been deliberate about this by designing the MCP server with a default "human-in-the-loop" security model.

  • Read-Only by Default: The server ships with all write actions disabled (UYUNI_MCP_WRITE_TOOLS_ENABLED=false).
  • Explicit Confirmation: If you enable write tools, Copilot is required to ask for your explicit confirmation before executing state-changing actions like applying patches or scheduling reboots.
  • Enterprise Authentication: The server supports OAuth 2.0, ensuring the AI agent authenticates through your identity provider. 
  • Layered Governance: Combined with Multi-Linux Manager’s role-based access control (RBAC) and the principle of least privilege for the service account, you get layered governance without bolting on a separate approval system.

AI-assisted operations that bypass human judgment won't get adopted in enterprises. AI-assisted operations that make the human faster while keeping them in control, that's the model that actually ships.

Architecture on Azure

Here's the topology we're working with:

 

 

  1. SUSE Multi-Linux Manager - Running on an Azure VM, managing your Linux fleet across distributions. This is the control plane for your systems - inventory, patching, configuration. Available on Azure Marketplace.
  2. MCP Server - Runs as a container (Docker/Podman), either locally alongside your dev environment or as a standalone HTTP service. The MCP Server container is available in SUSE Registry and is backed by a secure, trusted software supply chain.
  3. GitHub Copilot - In VS Code or the CLI. Configured to use the MCP server as a tool source. Sends natural language requests, receives structured responses from your infrastructure.
  4. Your Linux fleet on Azure - Whatever Multi-Linux Manager manages for you. The MCP server doesn't care about the distribution mix; that's the whole point of Multi-Linux Manager.

Getting Started: Step by Step

Prerequisites

  •       A running SUSE Multi-Linux Manager instance managing your Linux estate
  •       Docker or Podman installed on your workstation (for local deployment) or network access to a remote MCP server instance
  •       GitHub Copilot with agent mode enabled (VS Code or CLI)

Step 1: Stand up the MCP Server

For local deployment, pull the container and point it at your Multi-Linux Manager instance following the project documentation. For remote/team deployments, your administrator can run the server as a standalone HTTP service with OAuth 2.0.

Step 2: Configure GitHub Copilot

In VS Code, open the Command Palette and type GitHub Copilot: Configure MCP Servers. Add your server to the config:

{
  "mcpServers": {
"suse-multi-linux-manager": {
  "type": "http",
  "url": "https://your-mcp-server.example.com/mcp"
}
  }
}

Step 3: Verify the Connection

Open GitHub Copilot and try a read-only query:

"List all active systems managed by my SUSE Multi-Linux Manager."

If your fleet inventory appears, you're connected.

Step 4: Start Operating

"Are any of my systems affected by CVE-2026-XXXX?"

"Show me all systems that have pending but unscheduled security patches."

"Which systems need a reboot?"

Getting Involved

The SUSE Multi-Linux Manager MCP server is open source under the Apache 2.0 license, built on the Uyuni project. The current v0.5 is a tech preview. Feedback goes to uyuni-project/uyuni#10562, bugs to GitHub Issues.

The gap in AI-assisted Linux operations was never whether AI could reach your infrastructure. It was whether it could work through the management tooling where your fleet-scale decisions actually get made. SUSE built the bridge to that layer. GitHub Copilot is the conversational interface. Your fleet is already there. Go connect them.

Published Apr 22, 2026
Version 1.0
No CommentsBe the first to comment