io.github.TANTIOPE/datadog-mcp
安全与合规by tantiope
提供完整 Datadog API 访问,覆盖 monitors、logs、metrics、traces、dashboards 及 observability 工具。
什么是 io.github.TANTIOPE/datadog-mcp?
提供完整 Datadog API 访问,覆盖 monitors、logs、metrics、traces、dashboards 及 observability 工具。
README
Datadog MCP Server
DISCLAIMER: This is a community-maintained project and is not officially affiliated with, endorsed by, or supported by Datadog, Inc. This MCP server utilizes the Datadog API but is developed independently.
MCP server providing AI assistants with full Datadog observability access. Features grep-like log search, APM trace filtering with duration/status/error queries, smart sampling modes for token efficiency, and cross-correlation between logs, traces, and metrics.
Configuration
Required Environment Variables
DD_API_KEY=your-api-key
DD_APP_KEY=your-app-key
Optional Environment Variables
DD_SITE=datadoghq.com # Default. Use datadoghq.eu for EU, etc.
# Limit defaults (fallbacks when AI doesn't specify)
MCP_DEFAULT_LIMIT=50 # General tools default limit
MCP_DEFAULT_LOG_LINES=200 # Logs tool default limit
MCP_DEFAULT_METRIC_POINTS=1000 # Metrics timeseries data points
MCP_DEFAULT_TIME_RANGE=24 # Default time range in hours
Optional Flags
--site=datadoghq.com # Datadog site (overrides DD_SITE)
--transport=stdio|http # Transport mode (default: stdio)
--port=3000 # HTTP port when using http transport
--host=0.0.0.0 # HTTP host when using http transport
--read-only # Block all write operations
--disable-tools=synthetics,rum,security # Comma-separated list of tools to disable
Usage
Claude Desktop / VS Code / Cursor
{
"mcpServers": {
"datadog": {
"command": "npx",
"args": ["-y", "datadog-mcp"],
"env": {
"DD_API_KEY": "your-api-key",
"DD_APP_KEY": "your-app-key",
"DD_SITE": "datadoghq.com"
}
}
}
}
Docker
{
"mcpServers": {
"datadog": {
"command": "docker",
"args": [
"run", "-i", "--rm",
"-e", "DD_API_KEY",
"-e", "DD_APP_KEY",
"-e", "DD_SITE",
"ghcr.io/tantiope/datadog-mcp"
],
"env": {
"DD_API_KEY": "your-api-key",
"DD_APP_KEY": "your-app-key",
"DD_SITE": "datadoghq.com"
}
}
}
}
Kubernetes
Use environment variables instead of container args:
env:
- name: DD_API_KEY
value: "your-api-key"
- name: DD_APP_KEY
value: "your-app-key"
- name: MCP_TRANSPORT
value: "http"
- name: MCP_PORT
value: "3000"
- name: MCP_HOST
value: "0.0.0.0"
Note: Kubernetes
args:replaces the entire Dockerfile CMD, causing Node.js to receive the flags instead of your application. Environment variables avoid this issue.
HTTP Transport
When running with --transport=http:
POST /mcp— MCP protocol endpointGET /mcp— SSE stream for responsesDELETE /mcp— Close sessionGET /health— Health check
Tools
| Tool | Action | Category | Description | Required Scopes |
|---|---|---|---|---|
monitors | list | Alerting | List monitors with optional filters | monitors_read |
monitors | get | Alerting | Get monitor by ID | monitors_read |
monitors | search | Alerting | Search monitors by query | monitors_read |
monitors | create | Alerting | Create a new monitor | monitors_write |
monitors | update | Alerting | Update an existing monitor | monitors_write |
monitors | delete | Alerting | Delete a monitor | monitors_write |
monitors | mute | Alerting | Mute a monitor | monitors_write |
monitors | unmute | Alerting | Unmute a monitor | monitors_write |
monitors | top | Alerting | Top N monitors by alert frequency with real monitor names and context breakdown. Groups without context tags are included as "no_context" | monitors_read |
dashboards | list | Visualization | List all dashboards | dashboards_read |
dashboards | get | Visualization | Get dashboard by ID | dashboards_read |
dashboards | create | Visualization | Create a new dashboard | dashboards_write |
dashboards | update | Visualization | Update a dashboard | dashboards_write |
dashboards | delete | Visualization | Delete a dashboard | dashboards_write |
logs | search | Logs | Search logs with query syntax and filters | logs_read_data, logs_read_index_data |
logs | aggregate | Logs | Aggregate log data with groupBy | logs_read_data |
metrics | query | Metrics | Query timeseries data | metrics_read, timeseries_query |
metrics | search | Metrics | Search for metrics by name | metrics_read |
metrics | list | Metrics | List active metrics | metrics_read |
metrics | metadata | Metrics | Get metric metadata | metrics_read |
traces | search | APM | Search spans with filters | apm_read |
traces | aggregate | APM | Aggregate trace data | apm_read |
traces | services | APM | List APM services | apm_service_catalog_read |
events | list | Events | List events | events_read |
events | get | Events | Get event by ID | events_read |
events | create | Events | Create an event | events_read |
events | search | Events | Search events with v2 API and cursor pagination | events_read |
events | aggregate | Events | Client-side aggregation by monitor_name, source, etc. | events_read |
events | top | Events | Top N event groups by count with generic groupBy support (deployments, configs, alerts, etc.). Groups without context tags are included as "no_context" | events_read |
events | timeseries | Events | Time-bucketed alert trends (hourly/daily counts) | events_read |
events | incidents | Events | Deduplicate alerts into incidents with Trigger/Recover pairing | events_read |
incidents | list | Incidents | List incidents | incident_read |
incidents | get | Incidents | Get incident by ID | incident_read |
incidents | search | Incidents | Search incidents | incident_read |
incidents | create | Incidents | Create an incident | incident_write |
incidents | update | Incidents | Update an incident | incident_write |
incidents | delete | Incidents | Delete an incident | incident_write |
slos | list | SLOs | List SLOs | slos_read |
slos | get | SLOs | Get SLO by ID | slos_read |
slos | create | SLOs | Create an SLO | slos_write |
slos | update | SLOs | Update an SLO | slos_write |
slos | delete | SLOs | Delete an SLO | slos_write |
slos | history | SLOs | Get SLO history | slos_read |
synthetics | list | Synthetics | List synthetic tests | synthetics_read |
synthetics | get | Synthetics | Get test by public ID | synthetics_read |
synthetics | create | Synthetics | Create a test | synthetics_write |
synthetics | update | Synthetics | Update a test | synthetics_write |
synthetics | delete | Synthetics | Delete a test | synthetics_write |
synthetics | trigger | Synthetics | Trigger a test run | synthetics_write |
synthetics | results | Synthetics | Get test results | synthetics_read |
downtimes | list | Downtimes | List downtimes | monitors_downtime |
downtimes | get | Downtimes | Get downtime by ID | monitors_downtime |
downtimes | create | Downtimes | Create a downtime | monitors_downtime |
downtimes | update | Downtimes | Update a downtime | monitors_downtime |
downtimes | cancel | Downtimes | Cancel a downtime | monitors_downtime |
downtimes | listByMonitor | Downtimes | List downtimes for a monitor | monitors_downtime |
hosts | list | Infrastructure | List hosts | hosts_read |
hosts | totals | Infrastructure | Get host totals | hosts_read |
hosts | mute | Infrastructure | Mute a host | hosts_read |
hosts | unmute | Infrastructure | Unmute a host | hosts_read |
rum | applications | RUM | List RUM applications | rum_read |
rum | events | RUM | Search RUM events | rum_read |
rum | aggregate | RUM | Aggregate RUM data | rum_read |
rum | performance | RUM | Get Core Web Vitals (LCP, FCP, CLS, FID, INP) | rum_read |
rum | waterfall | RUM | Get session timeline with resources/actions/errors | rum_read |
security | rules | Security | List security rules | security_monitoring_rules_read |
security | signals | Security | Search security signals | security_monitoring_signals_read |
security | findings | Security | List security findings | security_monitoring_findings_read |
notebooks | list | Notebooks | List notebooks | notebooks_read |
notebooks | get | Notebooks | Get notebook by ID | notebooks_read |
notebooks | create | Notebooks | Create a notebook | notebooks_write |
notebooks | update | Notebooks | Update a notebook | notebooks_write |
notebooks | delete | Notebooks | Delete a notebook | notebooks_write |
users | list | Admin | List users | user_access_read |
users | get | Admin | Get user by ID | user_access_read |
teams | list | Admin | List teams | teams_read |
teams | get | Admin | Get team by ID | teams_read |
teams | members | Admin | List team members | teams_read |
tags | list | Infrastructure | List all tags | hosts_read |
tags | get | Infrastructure | Get tags for a host | hosts_read |
tags | add | Infrastructure | Add tags to a host | hosts_read |
tags | update | Infrastructure | Update host tags | hosts_read |
tags | delete | Infrastructure | Delete host tags | hosts_read |
usage | summary | Billing | Usage summary | usage_read |
usage | hosts | Billing | Host usage | usage_read |
usage | logs | Billing | Log usage | usage_read |
usage | custom_metrics | Billing | Custom metrics usage | usage_read |
usage | indexed_spans | Billing | Indexed spans usage | usage_read |
usage | ingested_spans | Billing | Ingested spans usage | usage_read |
auth | validate | Auth | Test API and App key validity | — |
Token Efficiency
Limit Control
AI assistants have full control over query limits. The environment variables set what value is used when the AI doesn't specify a limit. They do NOT cap what the AI can request.
| Tool | Default | Parameter | Description |
|---|---|---|---|
| Logs | 200 | limit | Log lines to return |
| Metrics (timeseries) | 1000 | pointLimit | Data points per series (controls resolution) |
| General tools | 50 | limit | Results to return |
Defaults can be configured via MCP_DEFAULT_* environment variables:
{
"mcpServers": {
"datadog": {
"command": "npx",
"args": ["-y", "datadog-mcp"],
"env": {
"DD_API_KEY": "your-api-key",
"DD_APP_KEY": "your-app-key",
"MCP_DEFAULT_LIMIT": "50", // General fallback for most tools
"MCP_DEFAULT_LOG_LINES": "200", // Logs search only
"MCP_DEFAULT_METRIC_POINTS": "1000", // Metrics query timeseries only
"MCP_DEFAULT_TIME_RANGE": "24" // Default time range in hours
}
}
}
}
Compact Mode (Logs)
Use compact: true when searching logs to reduce token usage. Strips custom attributes and keeps only essential fields:
logs({ action: "search", status: "error", compact: true })
Returns: id, timestamp, service, status, message (truncated), traceId, spanId, error
Sampling Modes (Logs)
Control how logs are sampled with the sample parameter:
| Mode | Description | Use Case |
|---|---|---|
first | Chronological order (default) | Timeline analysis, specific events |
spread | Evenly distributed across time range | See patterns over time |
diverse | Deduplicated by message pattern | Error investigation (distinct error types) |
Example - find distinct error patterns:
logs({ action: "search", status: "error", sample: "diverse", limit: 25 })
The diverse mode normalizes messages (strips UUIDs, timestamps, IPs, numbers) to identify unique error patterns instead of returning duplicates.
Events Aggregation
Top Monitors Report (Monitor-Specific)
Use monitors tool for monitor alerts with real monitor names:
monitors({ action: "top", from: "7d", limit: 10 })
Returns monitors with real names (including {{template.vars}}) from monitors API:
{
"top": [
{
"rank": 1,
"monitor_id": 67860480,
"name": "High number of ready messages on {{queue.name}}",
"message": "Queue {{queue.name}} has {{value}} ready messages",
"total_count": 50,
"by_context": [
{"context": "queue:email-notifications", "count": 30},
{"context": "queue:payment-processing", "count": 20}
]
},
{
"rank": 2,
"monitor_id": 134611486,
"name": "Nginx some requests on errors (HTTP 5XX) on {{ingress.name}}",
"message": "Nginx request on ingress {{ingress.name}} contains some errors (HTTP 5XX)",
"total_count": 42,
"by_context": [
{"context": "ingress:api-gateway", "count": 29},
{"context": "ingress:admin-panel", "count": 13}
]
}
]
}
Top Events Report (Generic)
Use events tool for any event type (deployments, configs, custom events):
events({ action: "top", from: "7d", limit: 10, groupBy: ["service"] })
Returns event groups by custom fields:
{
"top": [
{
"rank": 1,
"service": "api-server",
"message": "Deployment completed",
"total_count": 30,
"by_context": [
{"context": "env:prod", "count": 20},
{"context": "env:staging", "count": 10}
]
}
]
}
Key Differences:
monitors top: Fetches real monitor names from monitors API (slower, monitor-specific)events top: Fast generic grouping, returns event message text (any event type)
Context tags are auto-extracted: queue:, service:, ingress:, pod_name:, kube_namespace:, kube_container_name:
Tag Discovery
Discover available tag prefixes in your alert data:
events({ action: "discover", from: "7d", tags: ["source:alert"] })
Returns: {tagPrefixes: ["queue", "service", "ingress", "pod_name", "monitor", "priority"], sampleSize: 150}
Custom Aggregation
For custom grouping patterns, use aggregate:
events({
action: "aggregate",
from: "7d",
tags: ["source:alert"],
groupBy: ["monitor_name", "priority"]
})
Supported groupBy fields: monitor_name, priority, alert_type, source, status, host, or any tag prefix
The aggregation uses v2 API with cursor pagination to stream through events efficiently (up to 10k events).
Alert Trends (Timeseries)
Visualize alert patterns over time with time-bucketed aggregation:
events({ action: "timeseries", from: "7d", interval: "1d" })
Returns hourly/daily alert counts grouped by monitor:
{
"timeseries": [
{ "timestamp": "2024-01-15T00:00:00Z", "counts": { "High CPU": 5, "Low Disk": 2 }, "total": 7 },
{ "timestamp": "2024-01-16T00:00:00Z", "counts": { "High CPU": 3 }, "total": 3 }
]
}
| Interval | Use Case |
|---|---|
1h | Recent incident analysis (default) |
4h | Daily patterns |
1d | Weekly trends |
Combine with groupBy to see trends per monitor, source, or priority.
Incident Deduplication
Consolidate noisy alert floods into logical incidents:
events({ action: "incidents", from: "24h", dedupeWindow: "5m" })
Groups repeated triggers within the dedupe window and pairs with recovery events:
{
"incidents": [
{
"monitorName": "High CPU Usage",
"firstTrigger": "2024-01-15T10:00:00Z",
"lastTrigger": "2024-01-15T10:15:00Z",
"triggerCount": 4,
"recovered": true,
"recoveredAt": "2024-01-15T10:30:00Z",
"duration": "30m"
}
],
"meta": { "totalIncidents": 15, "recoveredCount": 12, "activeCount": 3 }
}
| Dedupe Window | Use Case |
|---|---|
5m | Flapping detection (default) |
15m | Alert storm consolidation |
1h | Incident grouping |
Monitor Enrichment
Add monitor metadata to search results for deeper context:
events({ action: "search", tags: ["source:alert"], from: "1h", enrich: true })
Returns events with monitor details (type, thresholds, tags):
{
"events": [{
"id": "...",
"title": "[Triggered on {host:prod-1}] High CPU Usage",
"monitorMetadata": {
"id": 12345,
"type": "metric alert",
"message": "CPU is above threshold",
"tags": ["team:platform", "env:prod"],
"options": { "thresholds": { "critical": 90 } }
}
}]
}
Note: Enrichment adds latency (fetches monitor list). Use for detailed investigation, not bulk analysis.
Cross-Correlation
Logs → Traces → Metrics
- Find errors in logs:
logs({ action: "search", status: "error", sample: "diverse" }) - Extract trace_id from log attributes (
dd.trace_id) - Get full trace:
traces({ action: "search", query: "trace_id:<id>" }) - Query APM metrics (avg):
metrics({ action: "query", query: "avg:trace.express.request.duration{service:my-service}" }) - Query APM latency percentiles (p95):
metrics({ action: "query", query: "p95:trace.express.request{service:my-service}" })— note: use root metric without.durationsuffix for percentiles
Deep Links
All query responses include a datadog_url field that links directly to the Datadog UI, allowing AI assistants to provide evidence links back to the source data.
Example Response
{
"logs": [...],
"meta": {
"count": 25,
"query": "service:api status:error",
"from": "2024-01-15T10:00:00Z",
"to": "2024-01-15T11:00:00Z",
"datadog_url": "https://app.datadoghq.com/logs?query=service%3Aapi%20status%3Aerror&from_ts=1705312800000&to_ts=1705316400000"
}
}
Supported Tools
| Tool | URL Type |
|---|---|
logs | Logs Explorer with query and time range |
metrics | Metrics Explorer with query and time range |
traces | APM Traces with query and time range |
events | Event Explorer with query and time range |
monitors | Monitor detail page (get) or Manage Monitors (list/search) |
rum | RUM Explorer or Session Replay |
Multi-Region Support
URLs are automatically generated for your configured Datadog site:
| Site | App URL |
|---|---|
datadoghq.com (default) | https://app.datadoghq.com |
datadoghq.eu | https://app.datadoghq.eu |
us3.datadoghq.com | https://us3.datadoghq.com |
us5.datadoghq.com | https://us5.datadoghq.com |
ap1.datadoghq.com | https://ap1.datadoghq.com |
ddog-gov.com | https://app.ddog-gov.com |
Configure your site via the DD_SITE environment variable or --site flag.
Contributing
Contributions are welcome! Feel free to open an issue or a pull request if you have any suggestions, bug reports, or improvements to propose.
License
This project is licensed under the Apache License, Version 2.0.
常见问题
io.github.TANTIOPE/datadog-mcp 是什么?
提供完整 Datadog API 访问,覆盖 monitors、logs、metrics、traces、dashboards 及 observability 工具。
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP Server
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。