CloudWatch Logs
Access AWS CloudWatch logs to list log groups and read log entries.
CloudWatch Logs MCP Server
An MCP (Model Context Protocol) server that provides tools for accessing AWS CloudWatch logs. This server allows AI assistants to list log groups and read log entries from AWS CloudWatch.
Available Tools
list_groups
Lists available CloudWatch log groups.
Parameters:
prefix(optional): Log group name prefixregion(optional): AWS regionaccessKeyId(optional): AWS access key IDsecretAccessKey(optional): AWS secret access keysessionToken(optional): AWS session token
Returns: JSON string with the list of log groups, including logGroupName, creationTime, and storedBytes.
get_logs
Gets CloudWatch logs from a specific log group.
Parameters:
logGroupName(required): The name of the log grouplogStreamName(optional): The name of the log streamstartTime(optional): Start time in ISO format or relative time (e.g., "5m", "1h", "1d")endTime(optional): End time in ISO formatfilterPattern(optional): Filter pattern for the logsregion(optional): AWS regionaccessKeyId(optional): AWS access key IDsecretAccessKey(optional): AWS secret access keysessionToken(optional): AWS session token
Returns: JSON string with the log events, including timestamp, message, and logStreamName.
Setup
AWS Credentials
Ensure you have AWS credentials configured. You can set them up using the AWS CLI or by setting environment variables:
AWS_ACCESS_KEY_IDAWS_SECRET_ACCESS_KEY
Usage with Claude Desktop
Add the following to your claude_desktop_config.json:
{
"mcpServers": {
"cloudwatch-logs": {
"command": "python3",
"args": ["/path/to/cloudwatch-logs-mcp/main.py"],
"env": {
"AWS_ACCESS_KEY_ID": "<YOUR_ACCESS_KEY_ID>",
"AWS_SECRET_ACCESS_KEY": "<YOUR_SECRET_ACCESS_KEY>",
},
"disabled": false,
"autoApprove": []
}
}
}
Docker
If you prefer to run the server in a Docker container, you can set up a Dockerfile and use the following configuration:
{
"mcpServers": {
"cloudwatch-logs": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e",
"AWS_ACCESS_KEY_ID",
"-e",
"AWS_SECRET_ACCESS_KEY",
"mcp/cloudwatch-logs"
],
"env": {
"AWS_ACCESS_KEY_ID": "<YOUR_ACCESS_KEY_ID>",
"AWS_SECRET_ACCESS_KEY": "<YOUR_SECRET_ACCESS_KEY>",
}
}
}
}
Implementation Details
This server is built using the FastMCP class from the MCP SDK, which provides a simple way to create MCP servers. The server exposes two main tools:
list_groups: Lists available CloudWatch log groupsget_logs: Reads log entries from specific log groups
Each tool is implemented as an async function decorated with @mcp.tool(). The server uses the boto3 library to interact with the AWS CloudWatch Logs API.
License
MIT
Servidores relacionados
Gdrive Cloudflare worker
Remote MCP server for Google Drive and Sheets running on Cloudflare Workers with full OAuth 2.0 support.
Commvault
Interact with Commvault software to access job details, security posture, and SLA status of the commcell.
CData PingOne
A read-only MCP server that allows LLMs to query live PingOne data. Requires a separate CData JDBC Driver for PingOne.
ALECS - MCP Server for Akamai
Manage Akamai's edge platform, including properties, DNS, certificates, security, and performance optimization, using AI assistants.
CoinMarketCap MCP
Access cryptocurrency market data, exchange information, and other blockchain-related metrics from the CoinMarketCap API.
DigitalOcean
Provides comprehensive access to all DigitalOcean API endpoints, dynamically extracted from their OpenAPI specification.
MCP Hive
MCP-Hive is a gateway to commerical-grade MCP Servers which can be only be accessed via paid subscriptions or pay-as-you-go access. AI applications pay for access to trusted and well-known industry data providers.
Google Analytics MCP Server
A structured interface for interacting with Google Analytics APIs, simplifying tasks like querying reports and managing properties.
Chronosphere
Fetch logs, metrics, traces, and events from the Chronosphere observability platform.
Spaceship MCP
Manage domains, DNS records, contacts, marketplace listings, and more via the Spaceship API