A Model Context Protocol (MCP) server that provides seamless access to SigNoz observability data through AI assistants and LLMs. Query metrics, traces, logs, alerts, dashboards, and services using natural language.
- Connect to SigNoz Cloud
- Self-Hosted Installation
- Connect to Self-Hosted SigNoz
- What Can You Do With It?
- Available Tools
- Environment Variables
- Claude Desktop Extension
- Architecture
- Contributing
Connect your AI tool to SigNoz Cloud's hosted MCP server. No installation is required; just add the hosted MCP URL and authenticate.
https://mcp.<region>.signoz.cloud/mcp
Make sure you select the correct region that matches your SigNoz Cloud account. Using the wrong region will result in authentication failures.
Find your region under Settings → Ingestion in SigNoz, or see the SigNoz Cloud region reference.
GitHub does not reliably make custom-protocol links like cursor:// and vscode: clickable in README rendering.
Use the documentation page for one-click install buttons:
If you prefer, use the manual configuration examples below in this README.
Add this configuration to .cursor/mcp.json:
{
"mcpServers": {
"signoz": {
"url": "https://mcp.<region>.signoz.cloud/mcp"
}
}
}Need help? See the Cursor MCP docs.
Add this configuration to .vscode/mcp.json:
{
"servers": {
"signoz": {
"type": "http",
"url": "https://mcp.<region>.signoz.cloud/mcp"
}
}
}Need help? See the VS Code MCP docs.
Add SigNoz Cloud as a custom connector in Claude Desktop:
- Open Claude Desktop.
- Go to Settings → Developer (or Features, depending on your version).
- Click Add Custom Connector or Add Remote MCP Server.
- Enter your SigNoz MCP URL:
https://mcp.<region>.signoz.cloud/mcp
When prompted, complete the authentication flow.
Run this command to add the hosted SigNoz MCP server:
claude mcp add --scope user --transport http signoz https://mcp.<region>.signoz.cloud/mcpAfter configuring the MCP server, authenticate in a terminal:
claude /mcpSelect the signoz server and complete the authentication flow.
Run this command to add the hosted SigNoz MCP server:
codex mcp add signoz --url https://mcp.<region>.signoz.cloud/mcpOr add this configuration to config.toml:
[mcp_servers.signoz]
url = "https://mcp.<region>.signoz.cloud/mcp"After adding the server, authenticate:
codex mcp login signozThen run /mcp inside Codex to verify the connection.
When you add the hosted MCP URL to your client, the client initiates an authentication flow. You will be prompted to enter:
- Your SigNoz instance URL (for example,
https://your-instance.signoz.cloud) - Your API key
Create an API key in Settings → API Keys in SigNoz. Only Admin users can create API keys.
Download the latest binary from GitHub Releases:
# macOS (Apple Silicon)
curl -L https://github.com/SigNoz/signoz-mcp-server/releases/latest/download/signoz-mcp-server_darwin_arm64.tar.gz | tar xz
# macOS (Intel)
curl -L https://github.com/SigNoz/signoz-mcp-server/releases/latest/download/signoz-mcp-server_darwin_amd64.tar.gz | tar xz
# Linux (amd64)
curl -L https://github.com/SigNoz/signoz-mcp-server/releases/latest/download/signoz-mcp-server_linux_amd64.tar.gz | tar xzThis extracts a signoz-mcp-server binary in the current directory. Move it somewhere on your PATH or note the absolute path for the config below.
go install github.com/SigNoz/signoz-mcp-server/cmd/server@latestThe binary is installed as server to $GOPATH/bin/ (default: $HOME/go/bin/server). You may want to rename it:
mv "$(go env GOPATH)/bin/server" "$(go env GOPATH)/bin/signoz-mcp-server"Docker images are available on Docker Hub:
docker pull signoz/signoz-mcp-server:latestRun in HTTP mode:
docker run -p 8000:8000 \
-e TRANSPORT_MODE=http \
-e MCP_SERVER_PORT=8000 \
-e SIGNOZ_URL=https://your-signoz-instance.com \
-e SIGNOZ_API_KEY=your-api-key \
signoz/signoz-mcp-server:latestUse a specific version tag (e.g. v0.1.0) instead of latest for pinned deployments.
git clone https://github.com/SigNoz/signoz-mcp-server.git
cd signoz-mcp-server
make buildThe binary is at ./bin/signoz-mcp-server.
- A running SigNoz instance
- SigNoz v0.120.0 or newer for alert rule tools that use the
/api/v2/rulesAPIs - A SigNoz API key (Settings → API Keys in the SigNoz UI)
- The
signoz-mcp-serverbinary (see Self-Hosted Installation)
Add this to your MCP client config (claude_desktop_config.json, .cursor/mcp.json, etc.). Replace the command path with the absolute path to your signoz-mcp-server binary:
{
"mcpServers": {
"signoz": {
"command": "/absolute/path/to/signoz-mcp-server",
"args": [],
"env": {
"SIGNOZ_URL": "https://your-signoz-instance.com",
"SIGNOZ_API_KEY": "your-api-key-here",
"LOG_LEVEL": "info"
}
}
}
}Start the server:
TRANSPORT_MODE=http \
MCP_SERVER_PORT=8000 \
OAUTH_ENABLED=true \
OAUTH_TOKEN_SECRET=$(openssl rand -base64 32) \
OAUTH_ISSUER_URL=https://your-public-mcp-url.com \
./signoz-mcp-serverClient config — just the URL, no keys needed:
{
"mcpServers": {
"signoz": {
"url": "https://your-public-mcp-url.com/mcp"
}
}
}The client discovers OAuth endpoints automatically, opens a browser for credentials, and handles token exchange.
The API key and SigNoz URL only need to be provided in one place — either on the server or on the client.
Option A — Credentials on the server (simpler client config):
SIGNOZ_URL=https://your-signoz-instance.com \
SIGNOZ_API_KEY=your-api-key \
TRANSPORT_MODE=http \
MCP_SERVER_PORT=8000 \
./signoz-mcp-server{
"mcpServers": {
"signoz": {
"url": "http://localhost:8000/mcp"
}
}
}Option B — API key on the client (server holds the URL, client sends the key):
SIGNOZ_URL=https://your-signoz-instance.com \
TRANSPORT_MODE=http \
MCP_SERVER_PORT=8000 \
./signoz-mcp-server{
"mcpServers": {
"signoz": {
"url": "http://localhost:8000/mcp",
"headers": {
"SIGNOZ-API-KEY": "your-api-key-here"
}
}
}
}HTTP mode exposes unauthenticated probe endpoints. New Kubernetes deployments should use /livez for livenessProbe and /readyz for readinessProbe.
| Endpoint | Purpose |
|---|---|
/livez |
Shallow liveness probe. Returns 200 OK when the server process can answer HTTP requests. It does not check dependencies. |
/readyz |
Readiness probe. Returns 200 OK only after the pod is ready to receive traffic; currently this requires the docs index to be ready. Otherwise returns 503. |
/healthz |
Legacy/generic health check kept for backward compatibility. It follows the same strict status as /readyz; use /livez for shallow liveness. |
"Show me all available metrics"
"What's the p99 latency for http_request_duration_seconds?"
"List all active alerts"
"Show me error logs for the paymentservice from the last hour"
"How many errors per service in the last hour?"
"Search traces for the checkout service from the last hour"
"Get details for trace ID abc123"
"Create a dashboard with CPU and memory widgets"
"How do I send Docker logs to SigNoz?"
SigNoz compatibility: alert-rule tools target
/api/v2/rules/*, which is available in SigNoz v0.120.0 and newer. Self-hosted deployments on older SigNoz versions will see HTTP 404 from the affected alert-rule tools. Notification-channel tools target the render-envelope/api/v1/channels/*routes introduced by SigNoz/signoz#10941, #10957, #10995, and #10997.
Tool metadata: every tool accepts
searchContext, the user's original question/search text. It is used for MCP observability and is not forwarded to SigNoz APIs.
| Tool | Description |
|---|---|
signoz_list_metrics |
Search and list available metrics |
signoz_query_metrics |
Query metrics with smart aggregation defaults |
signoz_get_field_keys |
Discover available field keys for metrics, traces, or logs |
signoz_get_field_values |
Get possible values for a field key |
signoz_list_alerts |
List firing/silenced/inhibited Alertmanager alert instances (not rule definitions) |
signoz_list_alert_rules |
List configured alert rules, including inactive/OK and disabled rules |
signoz_get_alert |
Get an alert rule definition by ID via GET /api/v2/rules/{ruleId} |
signoz_get_alert_history |
Get alert state history timeline for a rule |
signoz_create_alert |
Create an alert rule via POST /api/v2/rules; v2alpha1 for threshold/promql, v1 for anomaly |
signoz_update_alert |
Update an alert rule by UUIDv7 via PUT /api/v2/rules/{ruleId} |
signoz_delete_alert |
Delete an alert rule by UUIDv7 via DELETE /api/v2/rules/{ruleId} |
signoz_list_dashboards |
List all dashboards with summaries |
signoz_get_dashboard |
Get full dashboard configuration |
signoz_create_dashboard |
Create a new dashboard |
signoz_update_dashboard |
Update an existing dashboard |
signoz_delete_dashboard |
Delete a dashboard by UUID |
signoz_list_services |
List services within a time range |
signoz_get_service_top_operations |
Get top operations for a service |
signoz_list_views |
List saved Explorer views for a sourcePage (traces/logs/metrics) |
signoz_get_view |
Get a saved view by UUID |
signoz_search_docs |
Search official SigNoz docs for product, setup, instrumentation, config, API, deployment, or troubleshooting questions |
signoz_fetch_doc |
Fetch full markdown for one official SigNoz docs page or heading |
signoz_create_view |
Create a new saved Explorer view |
signoz_update_view |
Replace an existing saved view (full-body PUT) |
signoz_delete_view |
Delete a saved view by UUID |
signoz_aggregate_logs |
Aggregate logs (count, avg, p99, etc.) with grouping |
signoz_search_logs |
Search logs with flexible filtering |
signoz_aggregate_traces |
Aggregate trace statistics with grouping |
signoz_search_traces |
Search traces with flexible filtering |
signoz_get_trace_details |
Get full trace with all spans |
signoz_execute_builder_query |
Execute a raw Query Builder v5 query |
signoz_list_notification_channels |
List notification channels |
signoz_get_notification_channel |
Get a single notification channel by ID |
signoz_create_notification_channel |
Create a notification channel and send a test notification |
signoz_update_notification_channel |
Update a notification channel and send a test notification |
signoz_delete_notification_channel |
Delete a notification channel by ID |
For detailed usage and examples, see the full documentation.
Use signoz_search_docs for any SigNoz product question: how-to, feature usage, setup, configuration, API behavior, deployment, instrumentation, OpenTelemetry integration with SigNoz, and troubleshooting. Use live data tools for actual telemetry, alert state, dashboard contents, saved views, and tenant-specific resources. When a docs search result needs exact commands or a specific section, call signoz_fetch_doc.
Docs tools use the same authentication path as other MCP tools.
Parameter Reference
Search and list available metrics from SigNoz. Supports filtering by name substring, time range, and source.
- Parameters:
searchText(optional) - Filter metrics by name substring (e.g., 'cpu', 'memory')limit(optional) - Maximum number of metrics to return (default: 50)start(optional) - Start time in unix millisecondsend(optional) - End time in unix millisecondssource(optional) - Filter by source
Query metrics with smart aggregation defaults and validation. Automatically applies the right timeAggregation and spaceAggregation based on metric type (gauge, counter, histogram). Auto-fetches metric metadata if not provided.
- Parameters:
metricName(required) - Metric name to querymetricType(optional) - gauge, sum, histogram, exponential_histogram (auto-fetched if absent)isMonotonic(optional) - true/false (auto-fetched if absent)temporality(optional) - cumulative, delta, unspecified (auto-fetched if absent)timeAggregation(optional) - Aggregation over time (auto-defaulted by type)spaceAggregation(optional) - Aggregation across dimensions (auto-defaulted by type)groupBy(optional) - Comma-separated field namesfilter(optional) - Filter expressiontimeRange(optional) - Relative range: 30m, 1h, 6h, 24h, 7d (default: 1h; ignored when bothstartandendare provided)start/end(optional) - Unix ms timestamps. When both are provided, they overridetimeRangestepInterval(optional) - Step in seconds (auto-calculated if omitted)requestType(optional) - time_series (default) or scalarreduceTo(optional) - For scalar: sum, count, avg, min, max, last, medianformula(optional) - Expression over named queries (e.g., "A / B * 100")formulaQueries(optional) - JSON array of additional named metric queries for formula
Lists currently firing/silenced/inhibited alert instances from Alertmanager — not rule definitions. Use signoz_list_alert_rules for configured rules, signoz_get_alert with a ruleId for one full rule definition, or signoz_get_alert_history for the state timeline.
Lists configured alert rules from GET /api/v2/rules, including inactive/OK and disabled rules. Returns compact summaries with ruleId, alert, alertType, ruleType, state, disabled, severity, labels, createdAt, and updatedAt.
- Parameters:
limit(optional) - Maximum number of rules to return (default: 50)offset(optional) - Number of rules to skip for pagination (default: 0)
Gets the rule definition for an alert (GET /api/v2/rules/{ruleId}).
- Parameters:
ruleId(required) - Alert rule ID (UUIDv7 on v2-capable servers). - Note: Response shape depends on the SigNoz server version. Post-#10997 servers return the canonical
Ruletype withcreatedAt/updatedAt/createdBy/updatedBy; older servers returnGettableRulewithcreateAt/updateAt/createBy/updateBy(no 'd').
Lists all dashboards with summaries (name, UUID, description, tags).
Gets complete dashboard configuration.
- Parameters:
uuid(required) - Dashboard UUID
Creates a dashboard.
- Parameters:
title(required) – Dashboard namedescription(optional) – Short summary of what the dashboard showstags(optional) – List of tagslayout(required) – Widget positioning gridvariables(optional) – Map of variables available for use in querieswidgets(required) – List of widgets added to the dashboard
Updates an existing dashboard.
- Parameters:
uuid(required) – Unique identifier of the dashboard to updatedashboard(required) – Complete dashboard object representing the post-update statetitle(required) – Dashboard namedescription(optional) – Short summary of what the dashboard showstags(optional) – List of tags applied to the dashboardlayout(required) – Full widget positioning gridvariables(optional) – Map of variables available for use in querieswidgets(required) – Complete set of widgets defining the updated dashboard
Lists all services within a time range.
- Parameters:
timeRange(optional) - Time range like '2h', '6h', '2d', '7d' (ignored when bothstartandendare provided)start(optional) - Start time in nanoseconds (defaults to 6 hours ago)end(optional) - End time in nanoseconds (defaults to now)
Gets top operations for a specific service.
- Parameters:
service(required) - Service nametimeRange(optional) - Time range like '2h', '6h', '2d', '7d' (ignored when bothstartandendare provided)start(optional) - Start time in nanoseconds (defaults to 6 hours ago)end(optional) - End time in nanoseconds (defaults to now)tags(optional) - JSON array of tags
Gets alert history timeline for a specific rule.
- Parameters:
ruleId(required) - Alert rule IDtimeRange(optional) - Time range like '2h', '6h', '2d', '7d' (ignored when bothstartandendare provided)start(optional) - Start timestamp in milliseconds (defaults to 6 hours ago)end(optional) - End timestamp in milliseconds (defaults to now)offset(optional) - Offset for pagination (default: 0)limit(optional) - Limit number of results (default: 20)order(optional) - Sort order: 'asc' or 'desc' (default: 'asc')
List SigNoz saved Explorer views for a given sourcePage. Supports pagination; response includes a pagination block with total, hasMore, and nextOffset.
- Parameters:
sourcePage(required) - One of:traces,logs,metricsname(optional) - Partial-match filter on view name (server-side)category(optional) - Partial-match filter on view category (server-side)limit(optional) - Page size (default: 50)offset(optional) - Number of results to skip (default: 0)
Get a single saved view by UUID.
- Parameters:
viewId(required) - Saved view UUID
Search official SigNoz documentation with BM25 over indexed markdown content.
- Parameters:
query(required) - Natural-language or keyword querylimit(optional) - Maximum results to return (default: 10, max: 25)section_slug(optional) - Exact top-level docs section filter, such assetup,logs-management,apm-distributed-tracing,metrics,alerts,dashboards,signoz-apis,querying, orcollection-agentssearchContext- User's original question
Fetch full markdown for one official SigNoz docs page from the local index. Accepts only https://signoz.io/docs/... URLs or /docs/... paths.
- Parameters:
url(required) - Docs page URL or pathheading(optional) - Heading anchor ID or heading textsearchContext- User's original question
Read-only MCP resource containing the indexed docs sitemap used by the docs search and fetch tools.
Create a new saved Explorer view.
- Parameters: JSON payload matching the
SavedViewschema. - Tip: Read MCP resources
signoz://view/instructionsandsignoz://view/examplesbefore composing payloads.
Replace an existing saved view (full-body PUT).
- Parameters:
viewId(required) - UUID of the view to replaceview(required) - FullSavedViewobject (name,sourcePage,compositeQuery, plus any ofcategory,tags,extraData)
- Tip: Read MCP resources
signoz://view/instructionsandsignoz://view/examplesbefore composing payloads. Callsignoz_get_viewfirst, pass itsdataobject underviewwith whichever fields changed. Partial bodies wipe unspecified fields.
Delete a saved view by UUID.
- Parameters:
viewId(required) - Saved view UUID
Aggregate logs with count, average, sum, min, max, or percentiles, optionally grouped by fields.
- Parameters:
aggregation(required) - Aggregation function: count, count_distinct, avg, sum, min, max, p50, p75, p90, p95, p99, rateaggregateOn(optional) - Field to aggregate on (required for all except count and rate)groupBy(optional) - Comma-separated fields to group by (e.g., 'service.name, severity_text')filter(optional) - Filter expression using SigNoz search syntaxservice(optional) - Shortcut filter for service nameseverity(optional) - Shortcut filter for severity (DEBUG, INFO, WARN, ERROR, FATAL)orderBy(optional) - Order expression and direction (e.g., 'count() desc')limit(optional) - Maximum number of groups to return (default: 10)timeRange(optional) - Time range like '30m', '1h', '6h', '24h' (default: '1h'; ignored when bothstartandendare provided)start/end(optional) - Start/end time in milliseconds. When both are provided, they overridetimeRange
Search logs with flexible filtering across all services.
- Parameters:
query(optional) - Filter expression using SigNoz search syntax (e.g., "service.name = 'payment-svc' AND http.status_code >= 400")service(optional) - Service name to filter byseverity(optional) - Severity filter (DEBUG, INFO, WARN, ERROR, FATAL)searchText(optional) - Text to search for in log body (uses CONTAINS matching)timeRange(optional) - Time range like '30m', '1h', '6h', '24h' (default: '1h'; ignored when bothstartandendare provided)start/end(optional) - Start/end time in milliseconds. When both are provided, they overridetimeRangelimit(optional) - Maximum number of logs to return (default: 100)offset(optional) - Offset for pagination (default: 0)
Get available field keys for a given signal (metrics, traces, or logs).
- Parameters:
signal(required) - Signal type:metrics,traces, orlogssearchText(optional) - Filter field keys by name substringmetricName(optional) - Filter by metric name (relevant for metrics signal)fieldContext(optional) - Filter by field context (e.g.,resource,span)fieldDataType(optional) - Filter by data type (e.g.,string,int64)source(optional) - Filter by source
Get possible values for a specific field key for a given signal.
- Parameters:
signal(required) - Signal type:metrics,traces, orlogsname(required) - Field key name to get values for (e.g.,service.name,http.method)searchText(optional) - Filter values by substringmetricName(optional) - Filter by metric name (relevant for metrics signal)source(optional) - Filter by source
Aggregate trace statistics like count, average, sum, min, max, or percentiles over spans, optionally grouped by fields.
- Parameters:
aggregation(required) - Aggregation function: count, count_distinct, avg, sum, min, max, p50, p75, p90, p95, p99, rateaggregateOn(optional) - Field to aggregate on (e.g., 'durationNano'). Required for all except count and rategroupBy(optional) - Comma-separated fields to group by (e.g., 'service.name, name')filter(optional) - Filter expression using SigNoz search syntaxservice(optional) - Shortcut filter for service nameoperation(optional) - Shortcut filter for span/operation nameerror(optional) - Shortcut filter for error spans ('true' or 'false')orderBy(optional) - Order expression and direction (e.g., 'avg(durationNano) desc')limit(optional) - Maximum number of groups to return (default: 10)timeRange(optional) - Time range like '30m', '1h', '6h', '24h' (default: '1h'; ignored when bothstartandendare provided)start/end(optional) - Start/end time in milliseconds. When both are provided, they overridetimeRange
Gets trace information including all spans and metadata.
- Parameters:
traceId(required) - Trace ID to get details fortimeRange(optional) - Time range like '2h', '6h', '2d', '7d' (ignored when bothstartandendare provided)start(optional) - Start time in milliseconds (defaults to 6 hours ago)end(optional) - End time in milliseconds (defaults to now)includeSpans(optional) - Include detailed span information (true/false, default: true)
Create a new alert rule in SigNoz via POST /api/v2/rules.
- Parameters: JSON payload matching the SigNoz alert rule schema.
- Schema varies by
ruleType:threshold_rule/promql_rule→ v2alpha1 (structuredcondition.thresholds,evaluation,notificationSettings).anomaly_rule→ v1 schema: top-levelevalWindowandfrequency;condition.op/matchType/target/algorithm/seasonality; anomaly function insidecompositeQuery.queries[].spec.functions. Omitthresholds,evaluation,schemaVersion.
- Tip: Read MCP resources
signoz://alert/instructionsandsignoz://alert/examples(mirrors the ten canonical SigNoz PR #11023 payloads) before composing payloads. Forpromql_rule, also readsignoz://promql/instructions— OTel dotted metric names require the Prometheus 3.x UTF-8 quoted-selector form.
Update an existing alert rule via PUT /api/v2/rules/{ruleId}. Replaces the full rule configuration — fetch the current rule with signoz_get_alert first and merge changes on top of it.
- Parameters:
ruleId(required) - UUIDv7 of the rule to update (obtain fromsignoz_list_alert_rules/signoz_get_alert).- Plus all fields of the alert rule schema (same shape as
signoz_create_alert).
Delete an alert rule via DELETE /api/v2/rules/{ruleId}. Irreversible — confirm with the user first.
- Parameters:
ruleId(required) - UUIDv7 of the rule to delete. The server rejects non-UUIDv7 values withinvalid_input.
Delete a dashboard by UUID.
- Parameters:
uuid(required) - Dashboard UUID to delete
List notification channels configured in SigNoz.
- Parameters:
limit(optional) - Maximum number of channels to return (default: 50)offset(optional) - Offset for pagination (default: 0)
Create a notification channel and send a test notification.
- Parameters:
type(required) - Channel type: slack, webhook, pagerduty, email, opsgenie, msteamsname(required) - Channel name- Type-specific fields (required by channel type), such as
slack_api_url,webhook_url,pagerduty_routing_key,email_to,opsgenie_api_key, ormsteams_webhook_url
Update an existing notification channel and send a test notification.
- Parameters:
id(required) - Notification channel IDtype(required) - Channel typename(required) - Channel name- Full channel configuration fields for the selected channel type
Get a single notification channel by ID (GET /api/v1/channels/{id}).
- Parameters:
id(required) - Notification channel ID
Delete a notification channel by ID (DELETE /api/v1/channels/{id}). Irreversible — warn if alert rules still reference this channel.
- Parameters:
id(required) - Notification channel ID
Executes a SigNoz Query Builder v5 query.
- Parameters:
query(required) - Complete SigNoz Query Builder v5 JSON object - Documentation: See SigNoz Query Builder v5 docs
| Variable | Description | Required |
|---|---|---|
SIGNOZ_URL |
SigNoz instance URL | Yes (stdio); Optional (http with OAuth) |
SIGNOZ_API_KEY |
SigNoz API key (get from Settings → API Keys in the SigNoz UI) | Yes (stdio); Optional (http with OAuth) |
LOG_LEVEL |
Logging level: info(default), debug, warn, error |
No |
TRANSPORT_MODE |
MCP transport mode: stdio(default) or http |
No |
MCP_SERVER_PORT |
Port for HTTP transport mode | Yes only when TRANSPORT_MODE=http |
SIGNOZ_DOCS_REFRESH_INTERVAL |
Runtime docs sitemap refresh interval (Go duration, default: 6h) |
No |
SIGNOZ_DOCS_FULL_REFRESH_INTERVAL |
Runtime full docs refresh interval (Go duration, default: 24h) |
No |
OAUTH_ENABLED |
Enable OAuth 2.1 authentication flow (true/false) |
No (default: false) |
OAUTH_TOKEN_SECRET |
Encryption key for OAuth tokens (min 32 bytes, e.g. openssl rand -base64 32) |
Yes when OAUTH_ENABLED=true |
OAUTH_ISSUER_URL |
Public URL of this MCP server (used in OAuth metadata discovery) | Yes when OAUTH_ENABLED=true |
OAUTH_ACCESS_TOKEN_TTL_MINUTES |
Access token lifetime in minutes (default: 60) | No |
OAUTH_REFRESH_TOKEN_TTL_MINUTES |
Refresh token lifetime in minutes (default: 1440 / 24h) | No |
OAUTH_AUTH_CODE_TTL_SECONDS |
Authorization code lifetime in seconds (default: 600 / 10min) | No |
SIGNOZ_CUSTOM_HEADERS |
Extra HTTP headers added to every API request, useful when SigNoz is behind a reverse proxy requiring auth (e.g. CF-Access-Client-Id:id.access,CF-Access-Client-Secret:secret). Format: Key1:Value1,Key2:Value2 |
No |
OTEL_EXPORTER_OTLP_ENDPOINT |
OTLP gRPC endpoint for the MCP server's own traces and metrics. Internal telemetry export is disabled when no OTLP endpoint/exporter is configured. For plaintext collectors, use an http:// endpoint such as http://localhost:4317. |
No |
OTEL_EXPORTER_OTLP_TRACES_ENDPOINT |
Trace-specific OTLP gRPC endpoint; overrides OTEL_EXPORTER_OTLP_ENDPOINT for traces. |
No |
OTEL_EXPORTER_OTLP_METRICS_ENDPOINT |
Metrics-specific OTLP gRPC endpoint; overrides OTEL_EXPORTER_OTLP_ENDPOINT for metrics. |
No |
OTEL_TRACES_EXPORTER |
Set to none to disable internal trace export even when an OTLP endpoint is configured. |
No |
OTEL_METRICS_EXPORTER |
Set to none to disable internal metrics export and runtime metrics even when an OTLP endpoint is configured. |
No |
The MCP server does not run an OTLP log exporter; logs are emitted as JSON to stderr. OTEL_LOGS_EXPORTER is therefore not used.
Requires Node.js. See Anthropic MCPB for details.
make bundle- Open Claude Desktop → Settings → Developer → Edit Config → Add bundle.mcpb
- Select
./bundle/bundle.mcpb - Enter your
SIGNOZ_URL,SIGNOZ_API_KEY, and optionallyLOG_LEVEL - Restart Claude Desktop
For a detailed overview of request flow, component interactions, and design decisions, see docs/architecture.md.
See CONTRIBUTING.md for development workflow, required docs/manifest sync for MCP changes, and PR checklist.
Made with ❤️ for the observability community