Skip to main content

An AWS Labs Model Context Protocol (MCP) server for cloudwatch

Project description

AWS Labs cloudwatch MCP Server

This AWS Labs Model Context Protocol (MCP) server for CloudWatch enables your troubleshooting agents to use CloudWatch data to do AI-powered root cause analysis and provide recommendations. It offers comprehensive observability tools that simplify monitoring, reduce context switching, and help teams quickly diagnose and resolve service issues. This server will provide AI agents with seamless access to CloudWatch telemetry data through standardized MCP interfaces, eliminating the need for custom API integrations and reducing context switching during troubleshooting workflows. By consolidating access to all CloudWatch capabilities, we enable powerful cross-service correlations and insights that accelerate incident resolution and improve operational visibility.

Instructions

The CloudWatch MCP Server provides specialized tools to address common operational scenarios including alarm troubleshooting, understand metrics definitions, alarm recommendations and log analysis. Each tool encapsulates one or multiple CloudWatch APIs into task-oriented operations.

Features

Alarm Based Troubleshooting - Identifies active alarms, retrieves related metrics and logs, and analyzes historical alarm patterns to determine root causes of triggered alerts. Provides context-aware recommendations for remediation.

Log Analyzer - Analyzes a CloudWatch log group for anomalies, message patterns, and error patterns within a specified time window.

Metric Definition Analyzer - Provides comprehensive descriptions of what metrics represent, how they're calculated, recommended statistics to use for metric data retrieval

Alarm Recommendations - Suggests recommended alarm configurations for CloudWatch metrics, including thresholds, evaluation periods, and other alarm settings.

Prerequisites

  1. An AWS account with CloudWatch Telemetry
  2. This MCP server can only be run locally on the same host as your LLM client.
  3. Set up AWS credentials with access to AWS services
    • You need an AWS account with appropriate permissions (See required permissions below)
    • Configure AWS credentials with aws configure or environment variables

Available Tools

Tools for CloudWatch Metrics

  • get_metric_data - Retrieves detailed CloudWatch metric data for any CloudWatch metric. Use this for general CloudWatch metrics that aren't specific to Application Signals. Provides ability to query any metric namespace, dimension, and statistic
  • get_metric_metadata - Retrieves comprehensive metadata about a specific CloudWatch metric
  • get_recommended_metric_alarms - Gets recommended alarms for a CloudWatch metric based on best practice, and trend, seasonality and statistical analysis.
  • analyze_metric - Analyzes CloudWatch metric data to determine trend, seasonality, and statistical properties

Tools for CloudWatch Alarms

  • get_active_alarms - Identifies currently active CloudWatch alarms across the account
  • get_alarm_history - Retrieves historical state changes and patterns for a given CloudWatch alarm

Tools for CloudWatch Logs

  • describe_log_groups - Finds metadata about CloudWatch log groups
  • analyze_log_group - Analyzes CloudWatch logs for anomalies, message patterns, and error patterns
  • execute_log_insights_query - Executes CloudWatch Logs insights query on CloudWatch log group(s) with specified time range and query syntax, returns a unique ID used to retrieve results
  • get_logs_insight_query_results - Retrieves the results of an executed CloudWatch insights query using the query ID. It is used after execute_log_insights_query has been called
  • cancel_logs_insight_query - Cancels in progress CloudWatch logs insights query

Required IAM Permissions

  • cloudwatch:DescribeAlarms

  • cloudwatch:DescribeAlarmHistory

  • cloudwatch:GetMetricData

  • cloudwatch:ListMetrics

  • logs:DescribeLogGroups

  • logs:DescribeQueryDefinitions

  • logs:ListLogAnomalyDetectors

  • logs:ListAnomalies

  • logs:StartQuery

  • logs:GetQueryResults

  • logs:StopQuery

Installation

Option 1: Python (UVX)

Prerequisites

  1. Install uv from Astral or the GitHub README
  2. Install Python using uv python install 3.10

One Click Install

Kiro Cursor VS Code
Add to Kiro Install MCP Server Install on VS Code

MCP Config (Kiro, Cline)

  • For Kiro, update MCP Config (~/.kiro/settings/mcp.json)
  • For Cline click on "Configure MCP Servers" option from MCP tab
{
  "mcpServers": {
    "awslabs.cloudwatch-mcp-server": {
      "autoApprove": [],
      "disabled": false,
      "command": "uvx",
      "args": [
        "awslabs.cloudwatch-mcp-server@latest"
      ],
      "env": {
        "AWS_PROFILE": "[The AWS Profile Name to use for AWS access]",
        "FASTMCP_LOG_LEVEL": "ERROR"
      },
      "transportType": "stdio"
    }
  }
}

Windows Installation

For Windows users, the MCP server configuration format is slightly different:

{
  "mcpServers": {
    "awslabs.cloudwatch-mcp-server": {
      "disabled": false,
      "timeout": 60,
      "type": "stdio",
      "command": "uv",
      "args": [
        "tool",
        "run",
        "--from",
        "awslabs.cloudwatch-mcp-server@latest",
        "awslabs.cloudwatch-mcp-server.exe"
      ],
      "env": {
        "FASTMCP_LOG_LEVEL": "ERROR",
        "AWS_PROFILE": "your-aws-profile",
        "AWS_REGION": "us-east-1"
      }
    }
  }
}

Please reference AWS documentation to create and manage your credentials profile

Option 2: Docker Image

Prerequisites

Build and install docker image locally on the same host of your LLM client

  1. Install Docker
  2. git clone https://github.com/awslabs/mcp.git
  3. Go to sub-directory cd src/cloudwatch-mcp-server/
  4. Run docker build -t awslabs/cloudwatch-mcp-server:latest .

One Click Cursor Install

Install CloudWatch MCP Server

MCP Config using Docker image(Kiro, Cline)

  {
    "mcpServers": {
      "awslabs.cloudwatch-mcp-server": {
        "command": "docker",
        "args": [
          "run",
          "--rm",
          "--interactive",
          "-v",
          "~/.aws:/root/.aws",
          "-e",
          "AWS_PROFILE=[The AWS Profile Name to use for AWS access]",
          "awslabs/cloudwatch-mcp-server:latest"
        ],
        "env": {},
        "disabled": false,
        "autoApprove": []
      }
    }
  }

Please reference AWS documentation to create and manage your credentials profile

Skills

This MCP server includes reusable investigation skills that encode domain expertise into structured workflows for AI agents.

Skill Description Setup Guide
AgentCore Investigation Investigate Bedrock AgentCore runtime sessions — resolve session/trace IDs, query OTEL spans, filter noise, build timelines Kiro CLI setup

Skills provide pre-built investigation pipelines that agents can follow. They include the skill definition (SKILL.md), reference documentation, and MCP server configuration.

See the skills directory for details.

Contributing

Contributions are welcome! Please see the CONTRIBUTING.md in the monorepo root for guidelines.

Feedback and Issues

We value your feedback! Submit your feedback, feature requests and any bugs at GitHub issues with prefix cloudwatch-mcp-server in title.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

awslabs_cloudwatch_mcp_server-0.0.23.tar.gz (306.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

awslabs_cloudwatch_mcp_server-0.0.23-py3-none-any.whl (162.1 kB view details)

Uploaded Python 3

File details

Details for the file awslabs_cloudwatch_mcp_server-0.0.23.tar.gz.

File metadata

File hashes

Hashes for awslabs_cloudwatch_mcp_server-0.0.23.tar.gz
Algorithm Hash digest
SHA256 d4eece1c82016b709e41b1b69d2da4e13312bf3040f62c2be2b346137a10dea2
MD5 e06969c899b2f0665fe854b6d7394e38
BLAKE2b-256 6e728ab504e58e99b90a40c79cd6fa793dcfd078411401366e7732e17dec99fe

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_cloudwatch_mcp_server-0.0.23.tar.gz:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file awslabs_cloudwatch_mcp_server-0.0.23-py3-none-any.whl.

File metadata

File hashes

Hashes for awslabs_cloudwatch_mcp_server-0.0.23-py3-none-any.whl
Algorithm Hash digest
SHA256 7512bf61536c3ed4c9db1477e6717726cdd2e835cf182c8ca003e06d7adbb99b
MD5 bb3bb85e05490635df6c3f1ef9775c40
BLAKE2b-256 e3d94c094214d531e7fbb4acac1c8aed4784894fdb663389c252b4c9578c6b2a

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_cloudwatch_mcp_server-0.0.23-py3-none-any.whl:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page