prometheus-mcp-server

Prometheus MCP server that exposes Prometheus data/queries as Model Context Protocol (MCP) tools. It supports running in an SSE transport mode (per README) and optionally authenticates requests to the upstream Prometheus using environment-configured Basic Auth or Bearer token.

Evaluated Apr 04, 2026 (16d ago)
Repo ↗ Monitoring mcp prometheus promql observability metrics docker sse go
⚙ Agent Friendliness
45
/ 100
Can an agent use this?
🔒 Security
48
/ 100
Is it safe for agents?
⚡ Reliability
24
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
65
Documentation
55
Error Messages
0
Auth Simplicity
75
Rate Limits
5

🔒 Security

TLS Enforcement
60
Auth Strength
55
Scope Granularity
20
Dep. Hygiene
50
Secret Handling
55

The README indicates authentication to upstream Prometheus via Basic Auth or Bearer token provided through environment variables. It does not state how the MCP server secures inbound connections or enforces TLS for the MCP endpoint. No information is provided about secret logging, JWT handling, or dependency/security posture.

⚡ Reliability

Uptime/SLA
0
Version Stability
40
Breaking Changes
30
Error Recovery
25
AF Security Reliability

Best When

You want an MCP interface for interactive querying/exploration of a Prometheus instance from an AI agent, and you can run the server as a Docker container using SSE transport.

Avoid When

You need strict, well-documented rate-limit semantics, robust idempotency/retry guidance, or transport modes other than SSE (unless you verify behavior beyond the README).

Use Cases

  • Let an MCP-capable agent list available Prometheus metrics
  • Enable agents to discover metric targets and explore metric metadata
  • Allow agents to execute PromQL instant queries via MCP tools
  • Support range and last-value style PromQL queries via MCP tools

Not For

  • Use cases requiring gRPC/GraphQL/REST interfaces from this MCP server
  • Producing production-grade SLAs or strong operational guarantees without additional verification
  • Environments that require non-SSE MCP transport based on the README (SSE-only mentioned)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: Environment-variable Basic Auth (to upstream Prometheus) Environment-variable Bearer Token (to upstream Prometheus)
OAuth: No Scopes: No

README describes upstream Prometheus auth using environment variables (PROMETHEUS_USERNAME/PROMETHEUS_PASSWORD or PROMETHEUS_TOKEN). It does not describe authentication for the MCP client-to-server connection itself.

Pricing

Free tier: No
Requires CC: No

No pricing information provided; appears to be an open-source Docker image/repo.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • README only explicitly mentions SSE transport; if an agent expects stdio or other transports, behavior may differ unless verified in code.
  • Authentication described is for reaching upstream Prometheus; it may not protect the MCP endpoint from untrusted MCP clients.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for prometheus-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered