mcp-prometheus

mcp
README.md

MCP Prometheus

An MCP (Model Context Protocol) server for Prometheus and Mimir, written in Go.
Deployed in-cluster at Giant Swarm to give AI assistants authenticated, multi-tenant access to metrics infrastructure.

What it does

MCP Prometheus exposes 18 read-only MCP tools that wrap the Prometheus HTTP API:
instant and range PromQL queries, metric/label/series discovery, target and runtime information, TSDB stats, alerting rules, and exemplars.

When deployed with OAuth enabled it acts as a full OAuth 2.1 Authorization Server (backed by Dex/OIDC),
so MCP clients authenticate with the server before any tool call.
The server then resolves the authenticated user's Mimir tenant IDs and enforces them on every query.


Contents


Architecture

MCP Client (Claude, muster, …)
        │  OAuth 2.1 + MCP over HTTP
        ▼
┌──────────────────────────────────┐
│         mcp-prometheus           │
│                                  │
│  ┌────────────┐  ┌─────────────┐ │
│  │ OAuth 2.1  │  │  MCP Tools  │ │
│  │ server     │  │  (PromQL,   │ │
│  │ (mcp-oauth)│  │   labels, …)│ │
│  └─────┬──────┘  └──────┬──────┘ │
│        │                │        │
│  ┌─────▼──────┐  ┌──────▼──────┐ │
│  │ Dex OIDC   │  │  Tenancy    │ │
│  │ provider   │  │  resolver   │ │
│  └────────────┘  └──────┬──────┘ │
└─────────────────────────┼────────┘
                          │
          ┌───────────────┴──────────────┐
          │                              │
   ┌──────▼───────┐              ┌───────▼──────┐
   │ GrafanaOrg   │              │  Prometheus  │
   │ CRDs (k8s)   │              │  / Mimir     │
   └──────────────┘              └──────────────┘

The server listens on two ports:

  • :8080 — MCP + OAuth endpoints (served to clients)
  • :9091 — observability: /metrics, /healthz, /readyz (internal only)

Installation

Pre-built binaries

Download the latest release from the releases page.

From source

git clone https://github.com/giantswarm/mcp-prometheus.git
cd mcp-prometheus
go build -o mcp-prometheus ./...

Kubernetes (Helm)

See Kubernetes deployment (Helm).


Configuration reference

All configuration is via environment variables.

Prometheus connection

Variable Default Description
PROMETHEUS_URL Prometheus/Mimir base URL
PROMETHEUS_USERNAME Basic auth username
PROMETHEUS_PASSWORD Basic auth password
PROMETHEUS_TOKEN Bearer token
PROMETHEUS_ORGID Default Mimir org/tenant ID
PROMETHEUS_TLS_SKIP_VERIFY false Skip TLS verification (dev only)
PROMETHEUS_TLS_CA_CERT Path to PEM CA certificate

OAuth 2.1

Variable Default Description
MCP_OAUTH_ISSUER required Public base URL of this server (e.g. https://mcp.example.com)
MCP_OAUTH_ENCRYPTION_KEY 32-byte base64 AES-256-GCM key for token encryption (openssl rand -base64 32)
MCP_OAUTH_ALLOW_PUBLIC_REGISTRATION false Allow unauthenticated dynamic client registration (dev/MCP Inspector only)
MCP_OAUTH_ALLOW_PRIVATE_URLS false Allow OIDC discovery against Dex on private/internal IPs (see below)
OAUTH_TRUSTED_AUDIENCES Comma-separated client IDs trusted for SSO token forwarding
OAUTH_STORAGE memory Token storage: memory or valkey
VALKEY_URL Valkey/Redis address (required when OAUTH_STORAGE=valkey)
VALKEY_PASSWORD Valkey auth password
VALKEY_TLS_ENABLED false Enable TLS for Valkey
VALKEY_KEY_PREFIX mcp: Key namespace prefix

Dex OIDC provider

Variable Default Description
DEX_ISSUER_URL required Dex issuer URL (e.g. https://dex.mc.example.io)
DEX_CLIENT_ID required OAuth client ID registered in Dex
DEX_CLIENT_SECRET required OAuth client secret
DEX_REDIRECT_URL required Callback URL (e.g. https://mcp.example.com/oauth/callback)

Tenancy

Variable Default Description
TENANCY_STATIC_GROUP_MAP JSON map of Dex group → list of Mimir tenant IDs (static mode)

Observability

Variable Default Description
OTEL_EXPORTER_OTLP_ENDPOINT OTLP HTTP endpoint for tracing (no-op if unset)
OTEL_SERVICE_NAME mcp-prometheus Service name in traces

Transport modes

Start the server with serve --transport <mode>:

Mode Flag Use case
stdio --transport stdio Local desktop clients (Claude Desktop, MCP Inspector)
sse --transport sse Legacy SSE clients
streamable-http --transport streamable-http Production in-cluster (default)

OAuth requires sse or streamable-http.

# Local stdio (no OAuth)
./mcp-prometheus serve

# In-cluster HTTP with OAuth
./mcp-prometheus serve --transport streamable-http --http-addr :8080 --enable-oauth

OAuth 2.1 authentication

MCP Prometheus implements OAuth 2.1 (RFC 9700) using mcp-oauth and Dex as the OIDC identity provider.

Endpoints

Path Method Purpose
/.well-known/oauth-authorization-server GET OAuth server metadata (RFC 8414)
/.well-known/protected-resources GET Protected resource metadata
/oauth/authorize GET Authorization endpoint (redirects to Dex)
/oauth/callback GET Dex callback
/oauth/token POST Token exchange
/oauth/register POST Dynamic client registration (RFC 7591)
/oauth/revoke POST Token revocation

Full OAuth flow

MCP Client                mcp-prometheus              Dex OIDC
    │                           │                        │
    │  1. GET /.well-known/…    │                        │
    │──────────────────────────>│                        │
    │  server metadata          │                        │
    │<──────────────────────────│                        │
    │                           │                        │
    │  2. POST /oauth/register  │                        │
    │──────────────────────────>│                        │
    │  client_id + secret       │                        │
    │<──────────────────────────│                        │
    │                           │                        │
    │  3. GET /oauth/authorize  │                        │
    │──────────────────────────>│                        │
    │                           │  4. redirect to Dex    │
    │                           │───────────────────────>│
    │<──────────────────────────────────────────────────│
    │  browser: Dex login UI    │                        │
    │  (user authenticates)     │                        │
    │                           │                        │
    │                           │  5. callback + code    │
    │                           │<───────────────────────│
    │                           │                        │
    │  6. POST /oauth/token     │                        │
    │──────────────────────────>│                        │
    │  access_token + refresh   │                        │
    │<──────────────────────────│                        │
    │                           │                        │
    │  7. MCP tool call         │                        │
    │  Authorization: Bearer …  │                        │
    │──────────────────────────>│                        │
    │                           │  8. validate token     │
    │                           │  resolve tenants       │
    │                           │  forward to Mimir      │

The access token is a short-lived JWT signed by mcp-prometheus and validated on every request.
Refresh token rotation is enabled — every refresh issues a new refresh token.

Token storage

  • memory (default): in-process, lost on restart. Suitable for single-replica deployments and development.
  • valkey: production-grade Redis/Valkey backend. Required for multi-replica deployments.

Allow private URLs

When DEX_ISSUER_URL uses an internal DNS name that resolves to a private IP (RFC-1918 range),
the built-in SSRF protection in the OIDC discovery client would reject the connection.

Set MCP_OAUTH_ALLOW_PRIVATE_URLS=true to inject an HTTP client that allows private-IP connections
for OIDC discovery. TLS verification is still enforced.

MCP_OAUTH_ALLOW_PRIVATE_URLS=true
DEX_ISSUER_URL=https://dex.mc.my-cluster.example.io   # resolves to 10.x.x.x

In Helm: app.oauth.allowPrivateURLs: true

SSO token forwarding (trustedAudiences)

When users connect through an upstream MCP aggregator (e.g. muster) that has already authenticated them,
the aggregator can forward the user's Dex ID token directly instead of starting a new OAuth flow.

Configure OAUTH_TRUSTED_AUDIENCES with a comma-separated list of the aggregator's OAuth client IDs:

OAUTH_TRUSTED_AUDIENCES=muster-client,my-aggregator

mcp-prometheus will:

  1. Detect that the incoming token's audience matches a trusted client ID
  2. Verify the token signature against Dex's JWKS endpoint
  3. Accept the token and proceed with tenant resolution

Tokens must still originate from the configured Dex issuer.


Multi-tenancy

When OAuth is enabled, every tool call is scoped to the authenticated user's allowed Mimir tenant IDs.
The user can pass an explicit org_id parameter; the server validates it against their allowed tenants.
If no org_id is given, all allowed tenants are injected as a Mimir pipe-separated multi-tenant selector.

Two resolution modes are available, selected with --tenancy-mode (or app.tenancy.mode in Helm).

GrafanaOrganization mode (default)

--tenancy-mode grafana-organization

Reads GrafanaOrganization custom resources from the Kubernetes API.
Each CR declares which Dex groups have access (spec.rbac) and which Mimir tenant IDs map to it (spec.tenants).

apiVersion: observability.giantswarm.io/v1alpha1
kind: GrafanaOrganization
metadata:
  name: team-platform
spec:
  rbac:
    - groupName: github-org:team-platform   # Dex group from LDAP/GitHub
  tenants:
    - prod-eu-west
    - prod-us-east

When a user authenticates:

  1. The server reads the groups claim from their Dex token
  2. It looks up all GrafanaOrganization CRs where any group in spec.rbac matches
  3. It collects all tenant IDs from spec.tenants across matching CRs
  4. Results are cached per group-set for 60 seconds

The Helm chart creates a ClusterRole + ClusterRoleBinding granting get, list, watch on grafanaorganizations.observability.giantswarm.io when this mode is active.

Static mode

--tenancy-mode static

No Kubernetes API access required. Tenants are configured statically.

All-users: same tenants for everyone

# All authenticated users get these tenant IDs
--static-tenants=prod-eu,prod-us

Helm:

app:
  tenancy:
    mode: static
    static:
      tenants: "prod-eu,prod-us"

Group mapping: per-group tenant assignment

When TENANCY_STATIC_GROUP_MAP is set (or app.tenancy.static.groups in Helm), tenant IDs are resolved per group:

TENANCY_STATIC_GROUP_MAP='{"team-ops":["prod-eu","prod-us"],"team-dev":["staging"]}'

Helm:

app:
  tenancy:
    mode: static
    static:
      groups:
        team-ops:
          - prod-eu
          - prod-us
        team-dev:
          - staging

The user's allowed tenants are the union of all tenants from their Dex groups.


Available tools

All tools accept optional prometheus_url and org_id parameters for per-call overrides.

Query execution

Tool Description
mcp_prometheus_execute_query PromQL instant query
mcp_prometheus_execute_range_query PromQL range query with start, end, step

Query tools accept: timeout, limit, stats, lookback_delta, unlimited.

Metrics & discovery

Tool Description
mcp_prometheus_get_metric_metadata Metadata for a specific metric
mcp_prometheus_list_label_names All label names
mcp_prometheus_list_label_values Values for a specific label
mcp_prometheus_find_series Find series by label matchers

Targets & system info

Tool Description
mcp_prometheus_get_targets Scrape target list and health
mcp_prometheus_get_build_info Build/version information
mcp_prometheus_get_runtime_info Runtime information
mcp_prometheus_get_flags Runtime flags
mcp_prometheus_get_config Prometheus configuration
mcp_prometheus_get_tsdb_stats TSDB cardinality statistics
mcp_prometheus_check_ready Readiness check (/-/ready), works with Mimir

Alerting & rules

Tool Description
mcp_prometheus_get_alerts Active alerts
mcp_prometheus_get_alertmanagers AlertManager discovery
mcp_prometheus_get_rules Recording and alerting rules

Advanced

Tool Description
mcp_prometheus_query_exemplars Exemplar queries for trace correlation
mcp_prometheus_get_targets_metadata Per-target metric metadata

Large query results are automatically truncated with guidance for the AI to refine its query.


Kubernetes deployment (Helm)

Minimal (no OAuth)

app:
  env:
    - name: PROMETHEUS_URL
      value: "http://mimir-gateway.monitoring:8080/prometheus"
    - name: PROMETHEUS_ORGID
      value: "my-tenant"

Production with OAuth + GrafanaOrganization tenancy

app:
  server:
    transport: streamable-http

  oauth:
    enabled: true
    dexClientSecret: "..."        # stored in K8s Secret
    encryptionKey: "..."          # openssl rand -hex 32
    storage:
      type: valkey
      valkey:
        url: "valkey:6379"
    trustedAudiences:
      - muster-client

  tenancy:
    mode: grafana-organization

  env:
    - name: MCP_OAUTH_ISSUER
      value: "https://mcp-prometheus.mc.example.io"
    - name: DEX_ISSUER_URL
      value: "https://dex.mc.example.io"
    - name: DEX_CLIENT_ID
      value: "mcp-prometheus"
    - name: DEX_REDIRECT_URL
      value: "https://mcp-prometheus.mc.example.io/oauth/callback"
    - name: PROMETHEUS_URL
      value: "http://mimir-gateway.monitoring:8080/prometheus"

Production with OAuth + static group mapping

app:
  oauth:
    enabled: true
    dexClientSecret: "..."
    encryptionKey: "..."

  tenancy:
    mode: static
    static:
      groups:
        team-ops:
          - prod-eu
          - prod-us
        team-dev:
          - staging

Private Dex (internal DNS)

When DEX_ISSUER_URL resolves to a private IP:

app:
  oauth:
    enabled: true
    allowPrivateURLs: true    # enables private-IP OIDC discovery
    dexClientSecret: "..."
    encryptionKey: "..."

Valkey token storage (multi-replica)

app:
  oauth:
    storage:
      type: valkey
      valkey:
        url: "valkey.default:6379"
        password: ""
        tlsEnabled: false
        keyPrefix: "mcp-prometheus:"

Development

Project structure

mcp-prometheus/
├── cmd/                      # CLI (serve, version)
├── internal/
│   ├── oauth/                # OAuth 2.1 setup (Config, NewHandler)
│   ├── server/               # ServerContext, PrometheusConfig
│   ├── tenancy/              # TenancyResolver, GrafanaOrg + static modes
│   ├── tools/prometheus/     # 18 MCP tool registrations
│   └── observability/        # /metrics, /healthz, /readyz, OTel
├── helm/mcp-prometheus/      # Helm chart
├── go.mod
└── README.md

Building & testing

go build -o mcp-prometheus ./...
go test ./...

Code conventions

  • Every package has a doc.go
  • 80%+ unit test coverage on new code
  • Run goimports -w . && go fmt ./... before committing
  • Files kept under 500 lines; GoDoc on all exported members

Reviews (0)

No results found