elasticsearch-mcp-server

Provides a Model Context Protocol (MCP) server that exposes Elasticsearch capabilities as MCP tools, implemented using Quarkus. It starts an SSE endpoint and a streamable HTTP endpoint and forwards requests to a configured Elasticsearch cluster (supports optional basic username/password).

Evaluated Apr 04, 2026 (17d ago)
Repo ↗ Search mcp elasticsearch quarkus ai-tools sse search java
⚙ Agent Friendliness
46
/ 100
Can an agent use this?
🔒 Security
40
/ 100
Is it safe for agents?
⚡ Reliability
24
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
55
Error Messages
0
Auth Simplicity
75
Rate Limits
10

🔒 Security

TLS Enforcement
40
Auth Strength
35
Scope Granularity
10
Dep. Hygiene
45
Secret Handling
70

TLS requirement for MCP endpoints is not documented; authentication for MCP endpoints is not described (only Elasticsearch credentials for upstream access). Secrets appear intended to be provided via CLI args/env vars, but guidance about logging/redaction is not documented. Since the service can connect to Elasticsearch with credentials, ensure proper network controls and avoid exposing the MCP server publicly without additional safeguards.

⚡ Reliability

Uptime/SLA
0
Version Stability
35
Breaking Changes
40
Error Recovery
20
AF Security Reliability

Best When

You want a lightweight, locally deployable MCP bridge from agent workflows to Elasticsearch operations.

Avoid When

You require strict governance features (auditing, fine-grained auth, documented quotas) or you plan to expose the service publicly without network-level protections.

Use Cases

  • Letting AI agents query an Elasticsearch cluster via standardized MCP tools
  • Operational introspection (cluster health, index/alias listing, mappings retrieval)
  • Search workflows using Elasticsearch SQL or DSL through an agent-friendly interface
  • Retrieval of individual documents by ID

Not For

  • Public internet deployment without additional access controls
  • Use cases requiring a fully specified REST/OpenAPI contract for MCP endpoints
  • Environments needing explicit, documented rate limiting and pagination semantics for MCP tools

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Elasticsearch basic authentication via username/password (configurable for connecting to Elasticsearch)
OAuth: No Scopes: No

README describes connecting to Elasticsearch with optional username/password, but does not document authentication/authorization for the MCP server endpoints themselves.

Pricing

Free tier: No
Requires CC: No

Appears to be an open-source project (MIT) intended for self-hosting; no hosted pricing information provided.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Default MCP server listens on 0.0.0.0:19000 and auto-enables SSE and streamable endpoints; ensure network exposure is controlled.
  • Default Elasticsearch connection is http://localhost:9200 with no password; misconfiguration may lead to accidental connections to unintended clusters.
  • Only communication endpoints are documented; tool schemas, argument validation behavior, and error payload formats are not shown in the provided README.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for elasticsearch-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered