by dynatrace-oss
Provides a local server that enables real‑time interaction with the Dynatrace observability platform, exposing tools for querying data, retrieving problems, sending Slack notifications, and integrating AI assistance.
Enables developers to query Dynatrace data, fetch problem and security details, execute DQL, send Slack alerts, and run automated workflows directly from IDEs or terminals. AI‑powered helpers convert natural language to DQL, explain queries, and act as a chat assistant for Dynatrace‑related questions.
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --help
mcp.json
(or IDE‑specific) configuration that points to the npx command.DT_PLATFORM_TOKEN
or OAuth client credentials) and the required scopes.--http
/ --port <port>
if your client supports HTTP transport.dynatrace-agent-rules/rules/
to give AI assistants the context needed for advanced observability workflows.Q: Which authentication method should I use?
A: Platform tokens are recommended for simplicity; OAuth clients are needed only for scopes unavailable to tokens (e.g., environment-api:entities:read
).
Q: What scopes are required?
A: At minimum app-engine:apps:run
and app-engine:functions:run
. For full feature set include storage read scopes, automation workflow scopes, davis-copilot:*
scopes, and settings:objects:read
.
Q: Will using DQL increase my Dynatrace bill?
A: Yes, queries that scan Grail storage incur costs based on scanned GB. Use smaller time windows and Grail buckets to control spend.
Q: Can the server run as an HTTP service?
A: Absolutely—start it with --http
(default port 3000) or customize host/port with --host
and --port
flags, then point your client to http://localhost:<port>
.
Q: How do I provide AI agents with the rule files?
A: Copy the contents of dynatrace-agent-rules/rules/
into the rule directory of your AI assistant (e.g., .amazonq/rules/
, .cursor/rules/
, .clinerules/
, etc.) and load the agent with load dynatrace mcp
.
Q: Where can I find troubleshooting help for authentication?
A: Verify token scopes, ensure the token is not expired, and test with a minimal API call as described in the README. For OAuth, follow the Dynatrace OAuth token retrieval steps.
This local MCP server allows interaction with the Dynatrace observability platform. Bring real-time observability data directly into your development workflow.
Important: While this local MCP server is provided for free, using certain capabilities to access data in Dynatrace Grail may incur additional costs based
on your Dynatrace consumption model. This affects execute_dql
tool and other capabilities that query Dynatrace Grail storage, and costs
depend on the volume (GB scanned).
Before using this MCP server extensively, please:
To understand costs that occured:
Execute the following DQL statement in a notebook to see how much bytes have been queried from Grail (Logs, Events, etc...):
fetch dt.system.events
| filter event.kind == "QUERY_EXECUTION_EVENT" and contains(client.client_context, "dynatrace-mcp")
| sort timestamp desc
| fields timestamp, query_id, query_string, scanned_bytes, table, bucket, user.id, user.email, client.client_context
| maketimeSeries sum(scanned_bytes), by: { user.email, user.id, table }
Note: While Davis CoPilot AI is generally available (GA), the Davis CoPilot APIs are currently in preview. For more information, visit the Davis CoPilot Preview Community.
Enhance your AI assistant with comprehensive Dynatrace observability analysis capabilities through our streamlined workshop rules. These rules provide hierarchical workflows for security, compliance, incident response, and distributed systems investigation.
Copy the comprehensive rule files from the dynatrace-agent-rules/rules/
directory to your AI assistant's rules directory:
IDE-Specific Locations:
.amazonq/rules/
(project) or ~/.aws/amazonq/rules/
(global).cursor/rules/
(project) or via Settings → Rules (global).windsurfrules/
(project) or via Customizations → Rules (global).clinerules/
(project) or ~/Documents/Cline/Rules/
(global).github/copilot-instructions.md
(project only)Then initialize the agent in your AI chat:
load dynatrace mcp
The workshop rules unlock advanced observability analysis modes:
The rules are organized in a context-window optimized structure:
rules/
├── DynatraceMcpIntegration.md # 🎯 MAIN ORCHESTRATOR
├── workflows/ # 🔧 ANALYSIS WORKFLOWS
│ ├── incidentResponse.md # Core incident investigation
│ ├── DynatraceSecurityCompliance.md # Security & compliance analysis
│ ├── DynatraceDevOpsIntegration.md # CI/CD automation
│ └── dataSourceGuides/ # 📊 DATA ANALYSIS GUIDES
│ ├── dataInvestigation.md # Logs, services, processes
│ └── DynatraceSpanAnalysis.md # Transaction tracing
└── reference/ # 📚 TECHNICAL DOCUMENTATION
├── DynatraceQueryLanguage.md # DQL syntax foundation
├── DynatraceExplore.md # Field discovery patterns
├── DynatraceSecurityEvents.md # Security events schema
└── DynatraceProblemsSpec.md # Problems schema reference
Key Architectural Benefits:
For detailed information about the workshop rules, see the Rules README.
You can add this MCP server (using STDIO) to your MCP Client like VS Code, Claude, Cursor, Amazon Q Developer CLI, Windsurf Github Copilot via the package @dynatrace-oss/dynatrace-mcp-server
.
We recommend to always set it up for your current workspace instead of using it globally.
VS Code
{
"servers": {
"npx-dynatrace-mcp-server": {
"command": "npx",
"cwd": "${workspaceFolder}",
"args": ["-y", "@dynatrace-oss/dynatrace-mcp-server@latest"],
"envFile": "${workspaceFolder}/.env"
}
}
}
Please note: In this config, the ${workspaceFolder}
variable is used.
This only works if the config is stored in the current workspaces, e.g., <your-repo>/.vscode/mcp.json
. Alternatively, this can also be stored in user-settings, and you can define env
as follows:
{
"servers": {
"npx-dynatrace-mcp-server": {
"command": "npx",
"args": ["-y", "@dynatrace-oss/dynatrace-mcp-server@latest"],
"env": {
"DT_PLATFORM_TOKEN": "",
"DT_ENVIRONMENT": ""
}
}
}
}
Claude Desktop
{
"mcpServers": {
"mobile-mcp": {
"command": "npx",
"args": ["-y", "@dynatrace-oss/dynatrace-mcp-server@latest"],
"env": {
"DT_PLATFORM_TOKEN": "",
"DT_ENVIRONMENT": ""
}
}
}
}
Amazon Q Developer CLI
The Amazon Q Developer CLI provides an interactive chat experience directly in your terminal. You can ask questions, get help with AWS services, troubleshoot issues, and generate code snippets without leaving your command line environment.
{
"mcpServers": {
"mobile-mcp": {
"command": "npx",
"args": ["-y", "@dynatrace-oss/dynatrace-mcp-server@latest"],
"env": {
"DT_PLATFORM_TOKEN": "",
"DT_ENVIRONMENT": ""
}
}
}
}
This configuration should be stored in <your-repo>/.amazonq/mcp.json
.
For scenarios where you need to run the MCP server as an HTTP service instead of using stdio (e.g., for stateful sessions, load balancing, or integration with web clients), you can use the HTTP server mode:
Running as HTTP server:
# Get help and see all available options
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --help
# Run with HTTP server on default port 3000
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --http
# Run with custom port (using short or long flag)
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --server -p 8080
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --http --port 3001
# Run with custom host/IP (using short or long flag)
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --http --host 127.0.0.1
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --http -H 192.168.0.1
# Check version
npx -y @dynatrace-oss/dynatrace-mcp-server@latest --version
Configuration for MCP clients that support HTTP transport:
{
"mcpServers": {
"dynatrace-http": {
"url": "http://localhost:3000",
"transport": "http"
}
}
}
Configuration for MCP clients that support HTTP transport:
{
"mcpServers": {
"dynatrace-http": {
"url": "http://localhost:3000",
"transport": "http"
}
}
}
For efficient result retrieval from Dynatrace, please consider creating a rule file (e.g., .github/copilot-instructions.md, .amazonq/rules/), instructing coding agents on how to get more details for your component/app/service. Here is an example for easytrade, please adapt the names and filters to fit your use-cases and components:
# Observability
We use Dynatrace as an Observability solution. This document provides instructions on how to get data for easytrade from Dynatrace using DQL.
## How to get any data for my App
Depending on the query and tool used, the following filters can be applied to narrow down results:
* `contains(entity.name, "easytrade")`
* `contains(affected_entity.name, "easytrade")`
* `contains(container.name, "easytrade")`
For best results, you can combine these filters with an `OR` operator.
## Logs
To fetch logs for easytrade, execute `fetch logs | filter contains(container.name, "easyatrade")`.
For fetching just error-logs, add `| filter loglevel == "ERROR"`.
You can set up authentication via Platform Tokens (recommended) or OAuth Client via the following environment variables:
DT_ENVIRONMENT
(string, e.g., https://abc12345.apps.dynatrace.com) - URL to your Dynatrace Platform (do not use Dynatrace classic URLs like abc12345.live.dynatrace.com
)DT_PLATFORM_TOKEN
(string, e.g., dt0s16.SAMPLE.abcd1234
) - Recommended: Dynatrace Platform TokenOAUTH_CLIENT_ID
(string, e.g., dt0s02.SAMPLE
) - Alternative: Dynatrace OAuth Client ID (for advanced use cases)OAUTH_CLIENT_SECRET
(string, e.g., dt0s02.SAMPLE.abcd1234
) - Alternative: Dynatrace OAuth Client Secret (for advanced use cases)Platform Tokens are recommended for most use cases as they provide a simpler authentication flow. OAuth Clients should only be used when specific OAuth features are required.
For more information, please have a look at the documentation about creating a Platform Token in Dynatrace, as well as creating an OAuth Client in Dynatrace for advanced scenarios.
In addition, depending on the features you use, the following variables can be configured:
SLACK_CONNECTION_ID
(string) - connection ID of a Slack ConnectionDepending on the features you are using, the following scopes are needed:
Available for both Platform Tokens and OAuth Clients:
app-engine:apps:run
- needed for almost all tools
app-engine:functions:run
- needed for for almost all tools
environment-api:entities:read
- for retrieving ownership details from monitored entities (currently not available for Platform Tokens)
automation:workflows:read
- read Workflows
automation:workflows:write
- create and update Workflows
automation:workflows:run
- run Workflows
storage:buckets:read
- needed for execute_dql
tool to read all system data stored on Grail
storage:logs:read
- needed for execute_dql
tool to read logs for reliability guardian validations
storage:metrics:read
- needed for execute_dql
tool to read metrics for reliability guardian validations
storage:bizevents:read
- needed for execute_dql
tool to read bizevents for reliability guardian validations
storage:spans:read
- needed for execute_dql
tool to read spans from Grail
storage:entities:read
- needed for execute_dql
tool to read Entities from Grail
storage:events:read
- needed for execute_dql
tool to read Events from Grail
storage:security.events:read
- needed for execute_dql
tool to read Security Events from Grail
storage:system:read
- needed for execute_dql
tool to read System Data from Grail
storage:user.events:read
- needed for execute_dql
tool to read User events from Grail
storage:user.sessions:read
- needed for execute_dql
tool to read User sessions from Grail
davis-copilot:conversations:execute
- execute conversational skill (chat with Copilot)
davis-copilot:nl2dql:execute
- execute Davis Copilot Natural Language (NL) to DQL skill
davis-copilot:dql2nl:execute
- execute DQL to Natural Language (NL) skill
settings:objects:read
- needed for reading ownership information and Guardians (SRG) from settings
Note: Please ensure that settings:objects:read
is used, and not the similarly named scope app-settings:objects:read
.
Important: Some features requiring environment-api:entities:read
will only work with OAuth Clients. For most use cases, Platform Tokens provide all necessary functionality.
Use these example prompts as a starting point. Just copy them into your IDE or agent setup, adapt them to your services/stack/architecture, and extend them as needed. They're here to help you imagine how real-time observability and automation work together in the MCP context in your IDE.
Write a DQL query from natural language:
Show me error rates for the payment service in the last hour
Explain a DQL query:
What does this DQL do?
fetch logs | filter dt.source_entity == 'SERVICE-123' | summarize count(), by:{severity} | sort count() desc
Chat with Davis CoPilot:
How can I investigate slow database queries in Dynatrace?
Multi-phase incident response:
Our checkout service is experiencing high error rates. Start a systematic 4-phase incident investigation:
1. Detect and triage the active problems
2. Assess user impact and affected services
3. Perform cross-data source analysis (problems → spans → logs)
4. Identify root cause with file/line-level precision
Cross-service failure analysis:
We have cascading failures across our microservices architecture.
Analyze the entity relationships and trace the failure propagation from the initial problem
through all downstream services. Show me the correlation timeline.
Latest-scan vulnerability assessment:
Perform a comprehensive security analysis using the latest scan data:
- Check for new vulnerabilities in our production environment
- Focus on critical and high-severity findings
- Provide evidence-based remediation paths
- Generate risk scores with team-specific guidance
Multi-cloud compliance monitoring:
Run a compliance assessment across our AWS, Azure, and Kubernetes environments.
Check for configuration drift and security posture changes in the last 24 hours.
Deployment health gate analysis:
Our latest deployment is showing performance degradation.
Run deployment health gate analysis with:
- Golden signals monitoring (Rate, Errors, Duration, Saturation)
- SLO/SLI validation with error budget calculations
- Generate automated rollback recommendation if needed
Infrastructure as Code remediation:
Generate Infrastructure as Code templates to remediate the current alert patterns.
Include automated scaling policies and resource optimization recommendations.
Business logic error investigation:
Our payment processing is showing intermittent failures.
Perform advanced transaction analysis:
- Extract exception details with full stack traces
- Correlate with deployment events and ArgoCD changes
- Identify the exact code location causing the issue
Performance correlation analysis:
Analyze the performance impact across our distributed system for the slow checkout flow.
Show me the complete trace analysis with business context and identify bottlenecks.
Find open vulnerabilities on production, setup alert:
I have this code snippet here in my IDE, where I get a dependency vulnerability warning for my code.
Check if I see any open vulnerability/cve on production.
Analyze a specific production problem.
Setup a workflow that sends Slack alerts to the #devops-alerts channel when availability problems occur.
Debug intermittent 503 errors:
Our load balancer is intermittently returning 503 errors during peak traffic.
Pull all recent problems detected for our front-end services and
run a query to correlate error rates with service instance health indicators.
I suspect we have circuit breakers triggering, but need confirmation from the telemetry data.
Correlate memory issue with logs:
There's a problem with high memory usage on one of our hosts.
Get the problem details and then fetch related logs to help understand
what's causing the memory spike? Which file in this repo is this related to?
Trace request flow analysis:
Our users are experiencing slow checkout processes.
Can you execute a DQL query to show me the full request trace for our checkout flow,
so I can identify which service is causing the bottleneck?
Analyze Kubernetes cluster events:
Our application deployments seem to be failing intermittently.
Can you fetch recent events from our "production-cluster"
to help identify what might be causing these deployment issues?
In most cases, authentication issues are related to missing scopes or invalid tokens. Please ensure that you have added all required scopes as listed above.
For Platform Tokens:
For OAuth Clients: In case of OAuth-related problems, you can troubleshoot SSO/OAuth issues based on our Dynatrace Developer Documentation.
It is recommended to test access with the following API (which requires minimal scopes app-engine:apps:run
and app-engine:functions:run
):
curl --request POST 'https://sso.dynatrace.com/sso/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id={your-client-id}' \
--data-urlencode 'client_secret={your-client-secret}' \
--data-urlencode 'scope=app-engine:apps:run app-engine:functions:run'
access_token
from the response of the above call as the bearer-token in the next call:curl -X GET https://abc12345.apps.dynatrace.com/platform/management/v1/environment \
-H 'accept: application/json' \
-H 'Authorization: Bearer {your-bearer-token}'
{
"environmentId": "abc12345",
"createTime": "2023-01-01T00:10:57.123Z",
"blockTime": "2025-12-07T00:00:00Z",
"state": "ACTIVE"
}
Grail has a dedicated section about permissions in the Dynatrace Docs. Please refer to https://docs.dynatrace.com/docs/discover-dynatrace/platform/grail/data-model/assign-permissions-in-grail for more details.
For local development purposes, you can use VSCode and GitHub Copilot.
First, enable Copilot for your Workspace .vscode/settings.json
:
{
"github.copilot.enable": {
"*": true
}
}
and make sure that you are using Agent Mode in Copilot.
Second, add the MCP to .vscode/mcp.json
:
{
"servers": {
"my-dynatrace-mcp-server": {
"command": "node",
"args": ["--watch", "${workspaceFolder}/dist/index.js"],
"envFile": "${workspaceFolder}/.env"
}
}
}
Third, create a .env
file in this repository (you can copy from .env.template
) and configure environment variables as described above.
Finally, make changes to your code and compile it with npm run build
or just run npm run watch
and it auto-compiles.
When you are preparing for a release, you can use GitHub Copilot to guide you through the preparations.
In Visual Studio Code, you can use /release
in the chat with Copilot in Agent Mode, which will execute release.prompt.md.
You may include additional information such as the version number. If not specified, you will be asked.
This will
This product is not officially supported by Dynatrace. Please contact us via GitHub Issues if you have feature requests, questions, or need help.
Please log in to share your review and rating for this MCP.
{ "mcpServers": { "dynatrace-mcp": { "command": "npx", "args": [ "-y", "@dynatrace-oss/dynatrace-mcp-server@latest" ], "env": { "DT_PLATFORM_TOKEN": "<YOUR_PLATFORM_TOKEN>", "DT_ENVIRONMENT": "<YOUR_ENVIRONMENT_URL>" } } } }
Explore related MCPs that share similar capabilities and solve comparable challenges
by Arize-ai
Open-source AI observability platform enabling tracing, evaluation, dataset versioning, experiment tracking, prompt management, and interactive playground for LLM applications.
by grafana
Provides programmatic access to a Grafana instance and its surrounding ecosystem through the Model Context Protocol, enabling AI assistants and other clients to query and manipulate dashboards, datasources, alerts, incidents, on‑call schedules, and more.
by VictoriaMetrics-Community
Provides a Model Context Protocol server exposing read‑only VictoriaMetrics APIs, enabling seamless monitoring, observability, and automation through AI‑driven assistants.
by GeLi2001
Enables interaction with the Datadog API through a Model Context Protocol server, providing access to monitors, dashboards, metrics, logs, events, and incident data.
by QAInsights
Execute JMeter test plans through Model Context Protocol clients, capture console output, generate HTML dashboards, and automatically analyze JTL results to surface performance metrics, bottlenecks, and actionable recommendations.
by grafana
Provides a Model Context Protocol (MCP) server that enables AI agents to query Grafana Loki log data via stdin/stdout or Server‑Sent Events, supporting both local binary execution and containerized deployment.
by TocharianOU
Provides a Model Context Protocol (MCP) server that enables MCP‑compatible clients to access, search, and manage Kibana APIs using natural language or programmatic requests.
by MindscapeHQ
Provides comprehensive access to Raygun's API V3 endpoints for crash reporting and real user monitoring via the Model Context Protocol.
by grafana
Provides Model Context Protocol endpoints that enable AI assistants to query and analyze distributed tracing data stored in Grafana Tempo, supporting both stdin/stdout communication and an HTTP SSE interface.