{"id":"victoriametrics-mcp-victorialogs","name":"mcp-victorialogs","homepage":"https://victoriametrics.com/","repo_url":"https://github.com/VictoriaMetrics/mcp-victorialogs","category":"logging","subcategories":[],"tags":["mcp","logging","observability","victorialogs","victoriametrics","ai-tools","developer-tools","sse","http-transport","stdio"],"what_it_does":"Provides a Model Context Protocol (MCP) server that gives tools/agents access to a VictoriaLogs instance for read-only log exploration and querying (including stream/field discovery, stats, and embedded documentation search). Supports multiple MCP transports: stdio (default), SSE, and Streamable HTTP (with /mcp endpoint) and exposes Prometheus /metrics and health checks.","use_cases":["Chat/agent-driven log exploration and debugging over VictoriaLogs","Automating log queries and metadata discovery (streams/fields/values)","Building observability assistant workflows that also search embedded VictoriaLogs docs offline","Integrating VictoriaLogs querying with MCP-capable IDEs/clients (Cursor, Claude Desktop, VS Code, etc.)"],"not_for":["Write/modify VictoriaLogs data (claims are read-only APIs only)","Public internet exposure without considering upstream auth and network controls (configurable but not described as hardened)","Use cases requiring strict, well-defined API error codes/pagination semantics beyond what the MCP layer provides"],"best_when":"You want an MCP-compatible “log knowledge + query” interface to VictoriaLogs for engineers/agents using MCP clients, preferably in an environment where you can run the server (binary/Docker) and point it at your VictoriaLogs instance.","avoid_when":"You cannot supply/secure access to the underlying VictoriaLogs endpoint (e.g., need strong tenant isolation or fine-grained authorization not documented here) or you require a fully specified REST/GraphQL/SDK contract for agents beyond MCP.","alternatives":["Use VictoriaLogs HTTP APIs directly from your agent tooling","Use VictoriaMetrics/VictoriaLogs client libraries (if you build your own) plus doc retrieval tooling","Other MCP servers for observability/logs (if available) combined with VictoriaLogs querying separately"],"af_score":65.8,"security_score":49.8,"reliability_score":28.8,"package_type":"mcp_server","discovery_source":["github"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-30T15:19:44.013787+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":true,"mcp_server_url":"https://play-vmlogs-mcp.victoriametrics.com/mcp","has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["VL_INSTANCE_BEARER_TOKEN (VictoriaLogs API bearer token)","VL_INSTANCE_HEADERS (custom headers for upstream requests)"],"oauth":false,"scopes":false,"notes":"The MCP server is configured with a VictoriaLogs instance entrypoint plus optional bearer token/custom headers sent upstream. No MCP-native auth/authorization for clients is described in the README; access control is likely delegated to the MCP client environment and the upstream VictoriaLogs controls."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No pricing details for the server are provided; it appears to be self-hostable (Go binary/Docker) and there is also a public playground instance for testing."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":65.8,"security_score":49.8,"reliability_score":28.8,"mcp_server_quality":78.0,"documentation_accuracy":70.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":85.0,"rate_limit_clarity":30.0,"tls_enforcement":70.0,"auth_strength":55.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":60.0,"security_notes":"MCP server forwards authentication to VictoriaLogs via bearer token or custom headers, which supports controlled access to the upstream system. The README does not describe TLS enforcement for the MCP transport or provide details about client-side authz for the MCP endpoint itself. Secret handling best practices are not explicitly documented (assumed via standard env-var usage). Scope granularity and auditability are not described.","uptime_documented":0.0,"version_stability":45.0,"breaking_changes_history":40.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":"Read-only operations are implied, but no explicit idempotency guarantees or retry semantics are documented.","pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Upstream access: misconfigured VL_INSTANCE_ENTRYPOINT/headers/token will lead to failures that the MCP layer may surface as generic errors.","Tool breadth: many capabilities depend on the MCP client’s support for the chosen transport (stdio vs SSE vs HTTP).","Tool disabling: MCP_DISABLED_TOOLS may remove expected tools; agents should not assume all tools are always enabled."]}}