stdio Process Management
DeployStack Satellite implements stdio subprocess management for local MCP servers through the ProcessManager component. This system handles spawning, monitoring, and lifecycle management of MCP server processes with dual-mode operation for development and production environments.
Overview
Core Components:
- ProcessManager: Handles spawning, communication, and lifecycle of stdio-based MCP servers
- RuntimeState: Maintains in-memory state of all processes with team-grouped tracking
- TeamIsolationService: Validates team-based access control for process operations
Deployment Modes:
- Development: Direct spawn without isolation (cross-platform)
- Production: nsjail isolation with resource limits (Linux only)
Process Spawning
Spawning Modes
The system automatically selects the appropriate spawning mode based on environment:
Direct Spawn (Development):
- Standard Node.js
child_process.spawn()without isolation - Full environment variable inheritance
- No resource limits or namespace isolation
- Works on all platforms (macOS, Windows, Linux)
nsjail Spawn (Production Linux):
- Resource limits: 50MB RAM, 60s CPU time, and one process per started MCP server
- Namespace isolation: PID, mount, UTS, IPC
- Filesystem isolation: Read-only mounts for
/usr,/lib,/lib64,/binwith writable/tmp - Team-specific hostname:
mcp-{team_id} - Non-root user (99999:99999)
- Network access enabled
Mode Selection: The system uses process.env.NODE_ENV === 'production' && process.platform === 'linux' to determine isolation mode. This ensures development works seamlessly on all platforms while production deployments get full security.
Process Configuration
Processes are spawned using MCPServerConfig containing:
installation_name: Unique identifier in format{server_slug}-{team_slug}-{installation_id}installation_id: Database UUID for the installationteam_id: Team owning the processcommand: Executable command (e.g.,npx,node)args: Command argumentsenv: Environment variables (credentials, configuration)
MCP Handshake Protocol
After spawning, processes must complete an MCP handshake before becoming operational:
Two-Step Process:
- Initialize Request: Sent to process via stdin
- Protocol version: 2025-11-05
- Client info: deploystack-satellite v1.0.0
- Capabilities: roots.listChanged=false, sampling=
- Initialized Notification: Sent after successful initialization response
Handshake Requirements:
- 30-second timeout (accounts for npx package downloads)
- Response must include
serverInfowith name and version - Process marked 'failed' and terminated if handshake fails
stdio Communication Protocol
Message Format
All communication uses newline-delimited JSON following JSON-RPC 2.0 specification:
stdin (Satellite → Process):
- Write JSON-RPC messages followed by
\n - Requests include
idfield for response matching - Notifications omit
idfield (no response expected)
stdout (Process → Satellite):
- Buffer-based parsing accumulates chunks
- Split on newlines to extract complete messages
- Incomplete lines remain in buffer for next chunk
- Parse complete lines as JSON
Message Types:
- Requests (with
id): Expect response, tracked in active requests map - Notifications (no
id): Fire-and-forget, no response tracking - Responses: Match
idto active request, resolve or reject promise
Request/Response Handling
Active Request Tracking:
- Map of request ID → {resolve, reject, timeout, startTime}
- Configurable timeout per request (default 30s)
- Automatic cleanup on response or timeout
Request Flow:
- Validate process status (must be 'starting' or 'running')
- Register timeout handler
- Write JSON-RPC message to stdin
- Wait for response via stdout parsing
- Resolve/reject promise based on response
Error Handling:
- Write errors: Immediate rejection
- Timeout errors: Clean up active request, reject with timeout message
- JSON-RPC errors: Extract
error.messagefrom response
Process Lifecycle
Lifecycle States
starting:
- Process spawned with handlers attached
- MCP handshake in progress
- Accepts handshake messages only
running:
- Handshake completed successfully
- Ready for JSON-RPC requests
- Tools discovered and cached
terminating:
- Graceful shutdown initiated
- Active requests cancelled
- Awaiting process exit
terminated:
- Process exited
- Removed from tracking maps
failed:
- Spawn or handshake failure
- Not operational
Graceful Termination
Termination follows a two-phase approach:
- SIGTERM Phase: Send graceful shutdown signal
- SIGKILL Phase: Force kill if timeout exceeded (default 10s)
Cleanup Operations:
- Cancel all active requests with rejection
- Clear active requests map
- Remove from tracking maps (by ID, by name, by team)
- Emit 'processTerminated' event
Auto-Restart System
Crash Detection
The system detects crashes based on exit conditions:
- Non-zero exit code
- Process not in 'terminating' state
- Unexpected signal termination
Restart Policy
Limits:
- Maximum 3 restart attempts in 5-minute window
- After limit exceeded: Process marked 'permanently_failed' in RuntimeState
Backoff Delays:
- Process ran >60 seconds before crash: Immediate restart
- Quick crashes: Exponential backoff (1s → 5s → 15s)
Restart Flow:
- Detect crash with exit code and signal
- Check restart eligibility (3 attempts in 5 minutes)
- Apply backoff delay based on uptime
- Attempt restart via
spawnProcess() - Emit 'processRestarted' or 'restartLimitExceeded' event
Permanently Failed State: After 3 failed restart attempts, processes enter a permanently_failed state and are tracked separately for reporting. They will not be restarted automatically and require manual intervention.
RuntimeState Integration
RuntimeState maintains in-memory tracking of all MCP server processes:
Tracking Methods:
- By process ID (UUID)
- By installation name (for lookups)
- By team ID (for team-grouped operations)
RuntimeProcessInfo Fields:
- Extends ProcessInfo with:
installationId,installationName,teamId - Health status: unknown/healthy/unhealthy
- Last health check timestamp
Special Tracking:
- Permanently Failed Map: Separate storage for processes exceeding restart limits
- Team-Grouped Sets: Map of team_id → Set of process IDs for heartbeat reporting
State Queries:
- Get all processes (includes permanently failed for reporting)
- Get team processes (filter by team_id)
- Get running team processes (status='running')
- Get process count by status
Process Monitoring
Metrics Tracked
Each process tracks operational metrics:
- Message count: Total requests sent to process
- Error count: Communication failures
- Last activity: Timestamp of last message sent/received
- Uptime: Calculated from start time
- Active requests: Count of pending requests
Events Emitted
The ProcessManager emits events for monitoring and integration:
processSpawned: New process started successfullyprocessRestarted: Process restarted after crashprocessTerminated: Process shut downprocessExit: Process exited (any reason)processError: Spawn or runtime errorserverNotification: Notification received from MCP serverrestartLimitExceeded: Max restart attempts reachedrestartFailed: Restart attempt failed
Logging
stderr Handling:
- Logged at debug level (informational output, not errors)
- MCP servers often write logs to stderr
stdout Parse Errors:
- Malformed JSON lines logged and skipped
- Does not crash the process or satellite
Structured Logging:
- All operations include:
installation_name,installation_id,team_id - Request tracking includes:
request_id,method,duration_ms - Error context includes: error messages, exit codes, signals
Team Isolation
Installation Name Format
Installation names follow strict format for team isolation:
{server_slug}-{team_slug}-{installation_id}Examples:
filesystem-john-R36no6FGoMFEZO9nWJJLTcontext7-alice-S47mp8GHpNGFZP0oWKKMU
Team Access Validation
TeamIsolationService provides:
extractTeamInfo(): Parse installation name into componentsvalidateTeamAccess(): Ensure request team matches process teamisValidInstallationName(): Validate name format
Team-Specific Features:
- RuntimeState groups processes by team_id
- nsjail uses team-specific hostname:
mcp-{team_id} - Heartbeat reports processes grouped by team
Performance Characteristics
Timing:
- Spawn time: 1-3 seconds (includes handshake and tool discovery)
- Message latency: ~10-50ms for stdio communication
- Handshake timeout: 30 seconds
Resource Usage:
- Memory per process: Base ~10-20MB (application-dependent, limited to 50MB in production)
- Event-driven architecture: Handles multiple processes concurrently
- CPU overhead: Minimal (background event loop processing)
Scalability:
- No hard limit on process count (bounded by system resources)
- Team-grouped tracking enables efficient filtering
- Permanent failure tracking prevents infinite restart loops
Development & Testing
Local Development
Development Mode:
- Uses direct spawn (no nsjail required)
- Works on macOS, Windows, Linux
- Full environment inheritance simplifies debugging
Debug Logging:
# Enable detailed stdio communication logs
LOG_LEVEL=debug npm run devTesting Processes
Manual Testing Methods:
getAllProcesses(): Inspect all active processesgetServerStatus(installationName): Get detailed process statusrestartServer(installationName): Test restart functionalityterminateProcess(processInfo): Test graceful shutdown
Platform Support:
- Development: All platforms (macOS/Windows/Linux)
- Production: Linux only (nsjail requirement)
Security Considerations
Environment Injection:
- Credentials passed securely via environment variables
- No credentials stored in process arguments or logs
Resource Limits (Production):
- nsjail enforces hard limits: 50MB RAM, 60s CPU, one process
- Prevents resource exhaustion attacks
Namespace Isolation (Production):
- Complete process isolation per team
- Separate PID, mount, UTS, IPC namespaces
Filesystem Jailing (Production):
- System directories mounted read-only
- Only
/tmpwritable - Prevents filesystem tampering
Network Access:
- Enabled by default (MCP servers need external connectivity)
- Can be disabled for higher security requirements
Related Documentation
- Satellite Architecture Design - Overall system architecture
- Tool Discovery Implementation - How tools are discovered from processes
- Team Isolation Implementation - Team-based access control
- Backend Communication - Integration with Backend commands
Satellite Development
Technical implementation of satellite-to-backend polling system for command orchestration and configuration management.
Satellite Development
Complete guide to DeployStack Satellite registration process - environment variables, validation rules, upsert logic, and database integration.