Skip to main content

BlazeMeter MCP

Project description

GitHub Downloads (all assets, all releases) GHCR Pulls

BlazeMeter MCP Server

The BlazeMeter MCP Server connects AI tools directly to BlazeMeter's cloud-based performance testing platform. This gives AI agents, assistants, and chatbots the ability to manage complete load testing workflows from creation to execution and reporting. All through natural language interactions.

[!NOTE] For detailed documentation including use cases, available tools, integration points, and troubleshooting, see the BlazeMeter MCP Server documentation.


Prerequisites

  • BlazeMeter API credentials (API Key ID and Secret)
  • Comply Blazemeter AI Consent
  • Compatible MCP host (VS Code, Claude Desktop, Cursor, Windsurf, etc.)
  • Docker (only for Docker-based deployment)
  • uv and Python 3.11+ (only for installation from source code distribution)

Setup

Get BlazeMeter API Credentials

Follow the BlazeMeter API Keys guide to obtain your API keys as JSON.

[!IMPORTANT] When downloading your API keys from BlazeMeter, save the api-keys.json file in the same folder where you'll place the MCP binary.

Quick Setup with CLI Tool

The easiest way to configure your MCP client is using our interactive CLI tool:

  1. Download the appropriate binary for your operating system from the Releases page

[!NOTE] Choose the binary that matches your OS (Windows, macOS, Linux)

  1. Place the binary in the same folder as your api-keys.json file
  2. Execute or Double-click the binary to launch the interactive configuration tool
  3. The tool automatically generates the JSON configuration file for you

[!IMPORTANT] For macOS: You may encounter a security alert saying "Apple could not verify 'bzm-mcp-darwin' is free of malware." To resolve this:

  1. Go to System SettingsPrivacy & SecuritySecurity
  2. Look for the blocked application and click "Allow Anyway"
  3. Try running the binary again

CLI Demo


Manual Client Configuration (Binary Installation)

  1. Download the binary for your operating system from the Releases page
  2. Configure your MCP client with the following settings:
{
  "mcpServers": {
    "BlazeMeter MCP": {
      "command": "/path/to/bzm-mcp-binary",
      "args": ["--mcp"],
      "env": {
        "BLAZEMETER_API_KEY": "/path/to/your/api-key.json"
      }
    }
  }
}

Manual Client Configuration (From Remote Source Code)

  1. Prerequisites: uv and Python 3.11+
  2. Configure your MCP client with the following settings:
{
  "mcpServers": {
    "BlazeMeter MCP": {
      "command": "uvx",
      "args": [
        "--from", "git+https://github.com/Blazemeter/bzm-mcp.git@v1.0.1",
        "-q", "bzm-mcp", "--mcp"
      ],
      "env": {
        "BLAZEMETER_API_KEY": "/path/to/your/api-key.json"
      }
    }
  }
}

[!NOTE] uvx installs and runs the package and its dependencies in a temporary environment. You can change to any version that has been released or any branch you want. Package support for uvx command is supported from version 1.0.1 onwards. For more details on the uv/uvx arguments used, please refer to the official uv documentation.


Docker MCP Client Configuration

{
  "mcpServers": {
    "Docker BlazeMeter MCP": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "--mount",
        "type=bind,source=/path/to/your/test/files,target=/home/bzm-mcp/working_directory/",
        "-e",
        "API_KEY_ID=your_api_key_id",
        "-e",
        "API_KEY_SECRET=your_api_key_secret",
        "-e",
        "SOURCE_WORKING_DIRECTORY=/path/to/your/test/files",
        "ghcr.io/blazemeter/bzm-mcp:latest"
      ]
    }
  }
}

[!IMPORTANT] For Windows OS, paths must use backslashes (\) and be properly escaped as double backslashes (\\) in the JSON configuration. E.g.: C:\\User\\Desktop\\mcp_test_folder

[!NOTE] In order to obtain the API_KEY_ID andAPI_KEY_SECRET refere to BlazeMeter API keys


Custom CA Certificates (Corporate Environments) for Docker

When you need this:

  • Your organization uses self-signed certificates
  • You're behind a corporate proxy with SSL inspection
  • You have a custom Certificate Authority (CA)
  • You encounter SSL certificate verification errors when running tests

Required Configuration:

When using custom CA certificate bundles, you must configure both:

  1. Certificate Volume Mount: Mount your custom CA certificate bundle into the container
  2. SSL_CERT_FILE Environment Variable: Explicitly set the SSL_CERT_FILE environment variable to point to the certificate location inside the container
Example Configuration
{
  "mcpServers": {
    "Docker BlazeMeter MCP": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "--mount",
        "type=bind,source=/path/to/your/test/files,target=/home/bzm-mcp/working_directory/",
        "-v",
        "/path/to/your/ca-bundle.crt:/etc/ssl/certs/custom-ca-bundle.crt",
        "-e",
        "SSL_CERT_FILE=/etc/ssl/certs/custom-ca-bundle.crt",
        "-e",
        "API_KEY_ID=your_api_key_id",
        "-e",
        "API_KEY_SECRET=your_api_key_secret",
        "-e",
        "SOURCE_WORKING_DIRECTORY=/path/to/your/test/files",
        "ghcr.io/blazemeter/bzm-mcp:latest"
      ]
    }
  }
}

Replace:

  • /path/to/your/ca-bundle.crt with your host system's CA certificate file path
  • The container path /etc/ssl/certs/custom-ca-bundle.crt can be any path you prefer (just ensure it matches SSL_CERT_FILE)

The SSL_CERT_FILE environment variable must be set to point to your custom CA certificate bundle. The httpx library automatically respects the SSL_CERT_FILE environment variable for SSL certificate verification.


License

This project is licensed under the Apache License, Version 2.0. Please refer to LICENSE for the full terms.


Support

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_blazemeter_bzm_mcp-1.1.1.tar.gz (552.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iflow_mcp_blazemeter_bzm_mcp-1.1.1-py3-none-any.whl (643.9 kB view details)

Uploaded Python 3

File details

Details for the file iflow_mcp_blazemeter_bzm_mcp-1.1.1.tar.gz.

File metadata

  • Download URL: iflow_mcp_blazemeter_bzm_mcp-1.1.1.tar.gz
  • Upload date:
  • Size: 552.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_blazemeter_bzm_mcp-1.1.1.tar.gz
Algorithm Hash digest
SHA256 def28cd0c6dd135b752c1bfe1165576ee16fb2dfbc6472c5e87a0196747940a4
MD5 f2470d70beefc8eec85fa29a55274d28
BLAKE2b-256 20bf4d9e2e2d1f8e6209d15be73dd0dbbc57960837fb36df2428ad0d3d021b84

See more details on using hashes here.

File details

Details for the file iflow_mcp_blazemeter_bzm_mcp-1.1.1-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_blazemeter_bzm_mcp-1.1.1-py3-none-any.whl
  • Upload date:
  • Size: 643.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_blazemeter_bzm_mcp-1.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4719b4ad13924df8d056b9626c54d53f423d27c41dec68090320df08e328478e
MD5 c53447ae9e879d295f569e46e4467c2e
BLAKE2b-256 344ae07569419f555a00702e426fa11f63b56df0f6af327a447cdca6c7d8b8e5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page