DeployStack Architecture
Understanding how DeployStack manages MCP servers at scale with Control Plane, Satellite Infrastructure, and hierarchical token optimization.
How DeployStack Works
Three-tier architecture: MCP Clients connect to Satellites for execution, while the Control Plane manages configuration, teams, and monitoring
Control Plane
cloud.deploystack.io
- • OAuth 2.1 authentication
- • Role-based access control
- • Team & user isolation
- • Official registry sync
- • Team & global servers
- • Version management
- • 3-tier config system
- • Encrypted credential vault
- • Per-user customization
- • Usage analytics
- • Real-time satellite health
- • Audit logging
DeployStack Satellite
Edge execution infrastructure
MCP Clients
VS Code, Claude Desktop, Cursor, etc.
MCP Clients Connect
VS Code, Claude Desktop, or any MCP client connects to the satellite via standard MCP protocol over HTTPS. No local processes, no installation required.
Satellite Executes
Each user gets isolated MCP server processes with merged configuration. The hierarchical router exposes 2 meta-tools instead of hundreds, saving 95%+ of context window.
Control Plane Manages
Backend coordinates everything: team management, MCP catalog, configuration delivery, credential encryption, and real-time monitoring across all satellites.
Control Plane (cloud.deploystack.io)
Centralized management platform for all satellite infrastructure.
Role-based access control
Comprehensive team and user management with role-based access control and OAuth2 authentication.
Global and team satellites
Manages both global satellites (operated by DeployStack) and team satellites (customer-deployed).
Approved servers and configurations
Centralized catalog of approved MCP servers and configurations available across all satellites.
Encrypted API keys and secrets
Stores encrypted API keys and environment variables for secure satellite deployment.
Track tool usage across organization
Tracks which tools are used, by whom, and how often across your organization.
Context window optimization
Shows context window consumption per team and user for optimization insights.
Satellite health and performance
Provides satellite health, process status, and performance metrics in real-time.
Complete compliance trails
Complete audit trails of all MCP tool interactions for compliance and security.
Control Plane (cloud.deploystack.io)
Centralized management platform for all satellite infrastructure.
Role-based access control
Comprehensive team and user management with role-based access control and OAuth2 authentication.
Global and team satellites
Manages both global satellites (operated by DeployStack) and team satellites (customer-deployed).
Approved servers and configurations
Centralized catalog of approved MCP servers and configurations available across all satellites.
Encrypted API keys and secrets
Stores encrypted API keys and environment variables for secure satellite deployment.
Track tool usage across organization
Tracks which tools are used, by whom, and how often across your organization.
Context window optimization
Shows context window consumption per team and user for optimization insights.
Satellite health and performance
Provides satellite health, process status, and performance metrics in real-time.
Complete compliance trails
Complete audit trails of all MCP tool interactions for compliance and security.
Satellite Infrastructure (Edge Execution)
Managed MCP server infrastructure with flexible deployment options.
Private MCP server processes
Each team member gets their own MCP server process with independent lifecycle (e.g., filesystem-team-alice-abc123, context7-team-bob-xyz789). Your instance crashes don't affect teammates, and your configuration remains completely private.
Complete data sovereignty
Deploy satellites inside your corporate network for complete data sovereignty. Internal databases, APIs, and file systems never leave your network. Data stays within your security perimeter while MCP servers run on your infrastructure with full compliance.
95%+ token reduction
Instead of exposing 100+ tools that consume 75,000 tokens, satellites expose just 2 meta-tools (discover_mcp_tools, execute_mcp_tool) reducing context window consumption by 95%+ while maintaining full functionality.
stdio and HTTP/SSE protocols
stdio subprocess servers run locally on satellite with process isolation (filesystem, postgres, context7), while HTTP/SSE remote servers proxy to external endpoints (GitHub API, Slack API, Figma API) with credential injection.
Cloud, on-premise, or local
Satellites can run in the cloud (managed by DeployStack), on-premise within your corporate network, or even on individual client machines. Think of them like GitHub Actions runners, but for MCP servers.
Flexible deployment options
DeployStack-operated satellites serving all teams with complete resource isolation, or customer-deployed satellites within corporate networks for accessing internal databases, APIs, and file systems not exposed to the internet.
Standard HTTPS endpoints
Standard HTTPS endpoints, just add a URL to VS Code. No CLI tools, no local processes, no port management. Automatic scaling, health monitoring, and idle process management (inactive processes terminated after 3 minutes, respawned on-demand).
Private MCP server processes
Each team member gets their own MCP server process with independent lifecycle (e.g., filesystem-team-alice-abc123, context7-team-bob-xyz789). Your instance crashes don't affect teammates, and your configuration remains completely private.
Complete data sovereignty
Deploy satellites inside your corporate network for complete data sovereignty. Internal databases, APIs, and file systems never leave your network. Data stays within your security perimeter while MCP servers run on your infrastructure with full compliance.
95%+ token reduction
Instead of exposing 100+ tools that consume 75,000 tokens, satellites expose just 2 meta-tools (discover_mcp_tools, execute_mcp_tool) reducing context window consumption by 95%+ while maintaining full functionality.
stdio and HTTP/SSE protocols
stdio subprocess servers run locally on satellite with process isolation (filesystem, postgres, context7), while HTTP/SSE remote servers proxy to external endpoints (GitHub API, Slack API, Figma API) with credential injection.
Cloud, on-premise, or local
Satellites can run in the cloud (managed by DeployStack), on-premise within your corporate network, or even on individual client machines. Think of them like GitHub Actions runners, but for MCP servers.
Flexible deployment options
DeployStack-operated satellites serving all teams with complete resource isolation, or customer-deployed satellites within corporate networks for accessing internal databases, APIs, and file systems not exposed to the internet.
Standard HTTPS endpoints
Standard HTTPS endpoints, just add a URL to VS Code. No CLI tools, no local processes, no port management. Automatic scaling, health monitoring, and idle process management (inactive processes terminated after 3 minutes, respawned on-demand).
Satellite Infrastructure (Edge Execution)
Managed MCP server infrastructure with flexible deployment options.
Traditionally, MCP servers run locally on the developer's PC. DeployStack shifts this execution to managed servers - our 'Satellites'. Just like GitHub Actions doesn't run code locally but on GitHub runners, we don't run MCP servers locally but on our Satellite infrastructure. This provides instant access without installation friction while enabling enterprise-grade security, per-user isolation, and organizational visibility.
How It All Connects
This creates instant MCP access without installation friction while providing enterprise-grade security, per-user isolation, and organizational visibility.
Satellite Registration & Polling
Satellites register with backend and poll for configuration updates and commands.
OAuth 2.1 Authentication
Users authenticate with backend, access satellites with JWT tokens containing team and user context.
Direct MCP Access
VS Code connects via HTTPS with hierarchical router exposing 2 meta-tools for per-user instance routing.
Usage Analytics & Monitoring
Satellites report usage data, process health, and audit logs to backend.
Enterprise Data Security
Team satellites deployed in corporate networks keep sensitive data isolated without internet exposure.
Token Optimization
Solving the Context Window Problem
When you install 10 MCP servers with 15 tools each, that's 150 tools consuming around 75,000 tokens - 37.5% of your context window gone before you start working. LLM accuracy drops significantly after 20-40 tools are loaded. Cursor enforces a 40-tool hard limit for this reason.
This creates a fundamental scaling problem: the more MCP servers you add, the worse your AI coding assistant performs. Teams hit this wall fast, forced to choose between breadth (many servers) and depth (AI effectiveness).
DeployStack's hierarchical router solves this by reducing token consumption by 95%+. Instead of loading 150 tools into context, we expose just 2 meta-tools: discover_mcp_tools and execute_mcp_tool. That drops consumption from 75,000 tokens to around 1,400 tokens.
This means you can scale from 3 to 100+ MCP servers without hitting performance walls or tool limits. The hierarchical router is fully operational and available today.
- Token Reduction
- 95%+
- Tools Exposed
- 2
- Original Consumption
- 75K
- New Consumption
- 1.4K
Ready to explore DeployStack?
See how our architecture solves MCP management at scale.