Last9
Seamlessly bring real-time production context—logs, metrics, and traces—into your local environment to auto-fix code faster.
Last9 MCP Server
A Model Context Protocol server
implementation for Last9 that enables AI agents to
seamlessly bring real-time production context — logs, metrics, and traces — into
your local environment to auto-fix code faster.
- View demo
- Read our announcement blog post
Quick Links
Installation
You can connect to Last9 MCP in two ways:
Recommended: Managed MCP over HTTP
This is the easiest and cleanest setup. You do not need to run a local binary.
You'll need a Client Token (MCP type) — see Getting your credentials below. Your org slug is in your Last9 URL: app.last9.io/<org_slug>/...
claude mcp add --transport http last9 https://app.last9.io/api/v4/organizations/<organization_slug>/mcp \
--header "X-LAST9-API-TOKEN: Bearer <last9_api_token>"
Or add it directly to your MCP client config:
{
"mcpServers": {
"last9": {
"type": "http",
"url": "https://app.last9.io/api/v4/organizations/<organization_slug>/mcp",
"headers": {
"X-LAST9-API-TOKEN": "Bearer <last9_api_token>"
}
}
}
}
Local Installation (STDIO fallback)
Use this only if your client needs a local STDIO server process.
Homebrew
brew update
brew install last9/tap/last9-mcp
brew upgrade last9/tap/last9-mcp
last9-mcp --version
NPM
# Install globally
npm install -g @last9/mcp-server@latest
# Or run directly with npx
npx -y @last9/mcp-server@latest
GitHub Releases (Windows / manual install)
Download the binary for your platform from GitHub Releases:
| Platform | Archive |
|---|---|
| Windows (x64) | last9-mcp-server_Windows_x86_64.zip |
| Windows (ARM64) | last9-mcp-server_Windows_arm64.zip |
| Linux (x64) | last9-mcp-server_Linux_x86_64.tar.gz |
| Linux (ARM64) | last9-mcp-server_Linux_arm64.tar.gz |
| macOS (x64) | last9-mcp-server_Darwin_x86_64.tar.gz |
| macOS (ARM64) | last9-mcp-server_Darwin_arm64.tar.gz |
Extract the archive. On Windows the binary is last9-mcp-server.exe. Use the full path to the binary in your MCP client config (see Windows example below).
On Windows, NPM is easier to set up (no path management needed), or use the hosted HTTP transport to skip local installation entirely.
Getting Your Credentials
For hosted MCP (recommended)
You need a Client Token with MCP type. Only admins can create tokens. If you're not an admin, ask your admin to create one or grant you admin access via User Access settings.
- Go to Ingestion Tokens
- Click New Ingestion Token
- Set Token Type to Client
- Set Client Type to MCP
- Enter a name (e.g.,
claude-desktop,cursor) - Click Create — copy the token immediately (shown only once)
Your organization slug is in your Last9 URL: https://app.last9.io/<org_slug>/...
For local binary (STDIO mode)
You need a Refresh Token with Write permissions. Only admins can create them.
- Go to API Access
- Click Generate Token with Write permissions
- Copy the token
Status
Works with Claude desktop app, or Cursor, Windsurf, and VSCode (Github Copilot) IDEs. Implements the following MCP tools: Observability & APM Tools:
get_exceptions: Get the list of exceptions.get_service_summary: Get service summary with throughput, error rate, and response time.get_service_environments: Get available environments for services.get_service_performance_details: Get detailed performance metrics for a service.get_service_operations_summary: Get operations summary for a service.get_service_dependency_graph: Get service dependency graph showing incoming/outgoing dependencies. Prometheus/PromQL Tools:prometheus_range_query: Execute PromQL range queries for metrics data.prometheus_instant_query: Execute PromQL instant queries for metrics data.prometheus_label_values: Get label values for PromQL queries.prometheus_labels: Get available labels for PromQL queries. Logs Management:get_logs: Get logs filtered by service name and/or severity level.get_drop_rules: Get drop rules for logs that determine what logs get filtered out at Last9 Control Planeadd_drop_rule: Create a drop rule for logs at Last9 Control Planeget_service_logs: Get raw log entries for a specific service over a time range. Can apply filters on severity and body.get_log_attributes: Get available log attributes (labels) for a specified time window. Traces Management:get_traces: Retrieve traces using JSON pipeline queries for advanced filtering.get_service_traces: Retrieve traces by trace ID or service name with time range filtering.get_trace_attributes: Get available trace attributes (series) for a specified time window. Change Events:get_change_events: Get change events from the last9_change_events prometheus metric over a given time range. Alert Management:get_alert_config: Get alert configurations (alert rules) from Last9.get_alerts: Get currently active alerts from Last9 monitoring system.
Tools Documentation
Time Input Standard
- For relative windows, prefer
lookback_minutes. - For absolute windows, use
start_time_iso,end_time_iso, ortime_isoin RFC3339/ISO8601 (for example,2026-02-09T15:04:05Z). - If both relative and absolute inputs are provided, absolute time inputs take precedence.
- Legacy
YYYY-MM-DD HH:MM:SSis accepted only for compatibility.
get_exceptions
Retrieves server-side exceptions over a specified time range. Parameters:
limit(integer, optional): Maximum number of exceptions to return. Default: 20.lookback_minutes(integer, recommended): Number of minutes to look back from now. Default: 60. Examples: 60, 30, 15.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to use lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.service_name(string, optional): Filter exceptions by service name (e.g., api-service).span_name(string, optional): Name of the span to filter by.deployment_environment(string, optional): Filter exceptions by deployment environment from resource attributes (e.g., production, staging).
get_service_summary
Get service summary over a given time range. Includes service name, environment, throughput, error rate, and response time. All values are p95 quantiles over the time range. Parameters:
start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to end_time_iso - 1 hour.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.env(string, optional): Environment to filter by. Defaults to 'prod'.
get_service_environments
Get available environments for services. Returns an array of environments that can be used with other APM tools. Parameters:
start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to end_time_iso - 1 hour.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time. Note: All other APM tools that retrieve service information (likeget_service_performance_details,get_service_dependency_graph,get_service_operations_summary,get_service_summary) require anenvparameter. This parameter must be one of the environments returned by this tool. If this tool returns an empty array, use an empty string""for the env parameter.
get_service_performance_details
Get detailed performance metrics for a specific service over a given time range. Parameters:
service_name(string, required): Name of the service to get performance details for.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.env(string, optional): Environment to filter by. Defaults to 'prod'.
get_service_operations_summary
Get a summary of operations inside a service over a given time range. Returns operations like HTTP endpoints, database queries, messaging producer and HTTP client calls. Parameters:
service_name(string, required): Name of the service to get operations summary for.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.env(string, optional): Environment to filter by. Defaults to 'prod'.
get_service_dependency_graph
Get details of the throughput, response times and error rates of incoming, outgoing and infrastructure components of a service. Useful for analyzing cascading effects of errors and performance issues. Parameters:
service_name(string, optional): Name of the service to get the dependency graph for.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.env(string, optional): Environment to filter by. Defaults to 'prod'.
prometheus_range_query
Perform a Prometheus range query to get metrics data over a specified time range. Recommended to check available labels first using prometheus_labels tool.
Parameters:
query(string, required): The range query to execute.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.
prometheus_instant_query
Perform a Prometheus instant query to get metrics data at a specific time. Typically should use rollup functions like sum_over_time, avg_over_time, quantile_over_time over a time window. Parameters:
query(string, required): The instant query to execute.time_iso(string, optional): Time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to current time.
prometheus_label_values
Return the label values for a particular label and PromQL filter query. Similar to Prometheus /label_values call. Parameters:
match_query(string, required): A valid PromQL filter query.label(string, required): The label to get values for.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.
prometheus_labels
Return the labels for a given PromQL match query. Similar to Prometheus /labels call. Parameters:
match_query(string, required): A valid PromQL filter query.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - 60 minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.
get_logs
Gets logs filtered by service name and/or severity level within a specified time range. This tool now uses the advanced v2 logs API with physical index optimization for better performance.
Note: This tool now requires a service_name parameter and internally uses the same advanced infrastructure as get_service_logs.
Parameters:
service_name(string, required): Name of the service to get logs for.severity(string, optional): Severity of the logs to get (automatically converted to severity_filters format).lookback_minutes(integer, recommended): Number of minutes to look back from now. Default: 60. Examples: 60, 30, 15.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to use lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.limit(integer, optional): Maximum number of logs to return. Default: 20.env(string, optional): Environment to filter by. Use "get_service_environments" tool to get available environments.
get_drop_rules
Gets drop rules for logs, which determine what logs get filtered out from reaching Last9.
add_drop_rule
Adds a new drop rule to filter out specific logs at Last9 Control Plane Parameters:
name(string, required): Name of the drop rule.filters(array, required): List of filter conditions to apply. Each filter has:key(string, required): The key to filter on. Only attributes and resource.attributes keys are supported. For resource attributes, use format: resource.attributes[key_name] and for log attributes, use format: attributes[key_name] Double quotes in key names must be escaped.value(string, required): The value to filter against.operator(string, required): The operator used for filtering. Valid values:- "equals"
- "not_equals"
conjunction(string, required): The logical conjunction between filters. Valid values:- "and"
get_alert_config
Get alert configurations (alert rules) from Last9. Returns all configured alert rules including their conditions, labels, and annotations. Parameters: None - This tool retrieves all available alert configurations. Returns information about:
- Alert rule ID and name
- Primary indicator being monitored
- Current state and severity
- Algorithm used for alerting
- Entity ID and organization details
- Properties and configuration
- Creation and update timestamps
- Group timeseries notification settings
get_alerts
Get currently active alerts from Last9 monitoring system. Returns all alerts that are currently firing or have fired recently within the specified time window. Parameters:
time_iso(string, optional): Evaluation time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Preferred.timestamp(integer, optional): Unix timestamp for the query time. Deprecated alias.window(integer, optional): Time window in seconds to look back for alerts. Defaults to 900 seconds (15 minutes). Range: 60-86400 seconds. Returns information about:- Alert rule details (ID, name, group, type)
- Current state and severity
- Last fired timestamp and duration
- Rule properties and configuration
- Alert instances with current values
- Metric degradation information
- Group labels and annotations for each instance
get_service_logs
Get raw log entries for a specific service over a time range. This tool retrieves actual log entries including log messages, timestamps, severity levels, and other metadata. Useful for debugging issues, monitoring service behavior, and analyzing specific log patterns. Parameters:
service_name(string, required): Name of the service to get logs for.lookback_minutes(integer, optional): Number of minutes to look back from now. Default: 60 minutes. Examples: 60, 30, 15.limit(integer, optional): Maximum number of log entries to return. Default: 20.env(string, optional): Environment to filter by. Use "get_service_environments" tool to get available environments.severity_filters(array, optional): Array of severity patterns to filter logs (e.g., ["error", "warn"]). Uses OR logic.body_filters(array, optional): Array of message content patterns to filter logs (e.g., ["timeout", "failed"]). Uses OR logic.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time. Filtering behavior:- Multiple filter types are combined with AND logic (service AND severity AND body)
- Each filter array uses OR logic (matches any pattern in the array) Examples:
- service_name="api" + severity_filters=["error"] + body_filters=["timeout"] → finds error logs containing "timeout"
- service_name="web" + body_filters=["timeout", "failed", "error 500"] → finds logs containing any of these patterns
get_log_attributes
Get available log attributes (labels) for a specified time window. This tool retrieves all attribute names that exist in logs during the specified time range, which can be used for filtering and querying logs. Parameters:
lookback_minutes(integer, optional): Number of minutes to look back from now for the time window. Default: 15. Examples: 15, 30, 60.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to use lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.region(string, optional): AWS region to query. Leave empty to use default from configuration. Examples: ap-south-1, us-east-1, eu-west-1. Returns:- List of log attributes grouped into two categories:
- Log Attributes: Standard log fields like service, severity, body, level, etc.
- Resource Attributes: Resource-related fields prefixed with "resource_" like resource_k8s.pod.name, resource_service.name, etc.
get_traces
Execute advanced trace queries using JSON pipeline syntax for complex filtering and aggregation. This tool provides powerful querying capabilities for traces using a pipeline-based approach with filters, aggregations, and transformations. Parameters:
tracejson_query(array, required): JSON pipeline query for traces. Use the tracejson_query_builder prompt to generate JSON pipeline queries from natural language.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z).end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z).lookback_minutes(integer, optional): Number of minutes to look back from now. Default: 60 minutes.limit(integer, optional): Maximum number of traces to return. Default: 20. Range: 1-100. This tool supports complex queries with multiple filter conditions, aggregations, and custom processing pipelines for advanced trace analysis.
get_service_traces
Retrieve traces from Last9 by trace ID or service name. This tool allows you to get specific traces either by providing a trace ID for a single trace, or by providing a service name to get all traces for that service within a time range. Parameters:
trace_id(string, optional): Specific trace ID to retrieve. Cannot be used with service_name.service_name(string, optional): Name of service to get traces for. Cannot be used with trace_id.lookback_minutes(integer, optional): Number of minutes to look back from now. Default: 60 minutes. Examples: 60, 30, 15.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to use lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.limit(integer, optional): Maximum number of traces to return. Default: 10. Range: 1-100.env(string, optional): Environment to filter by. Use "get_service_environments" tool to get available environments. Usage rules:- Exactly one of
trace_idorservice_namemust be provided (not both, not neither) - Time range filtering only applies when using
service_nameExamples: - trace_id="abc123def456" - retrieves the specific trace
- service_name="payment-service" + lookback_minutes=30 - gets all payment service traces from last 30 minutes Returns trace data including trace IDs, spans, duration, timestamps, and status information.
get_trace_attributes
Get available trace attributes (series) for a specified time window. This tool retrieves all attribute names that exist in traces during the specified time range, which can be used for filtering and querying traces. Parameters:
lookback_minutes(integer, optional): Number of minutes to look back from now for the time window. Default: 15. Examples: 15, 30, 60.start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to use lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.region(string, optional): AWS region to query. Leave empty to use default from configuration. Examples: ap-south-1, us-east-1, eu-west-1. Returns:- An alphabetically sorted list of all available trace attributes (e.g., http.method, http.status_code, db.name, resource_service.name, duration, etc.)
get_change_events
Get change events from the last9_change_events prometheus metric over a given time range. Returns change events that occurred in the specified time window, including deployments, configuration changes, and other system modifications. Parameters:
start_time_iso(string, optional): Start time in RFC3339/ISO8601 format (e.g. 2026-02-09T15:04:05Z). Leave empty to default to now - lookback_minutes.end_time_iso(string, optional): End time in RFC3339/ISO8601 format (e.g. 2026-02-09T16:04:05Z). Leave empty to default to current time.lookback_minutes(integer, optional): Number of minutes to look back from now. Default: 60 minutes. Examples: 60, 30, 15.service(string, optional): Name of the service to filter change events for.environment(string, optional): Environment to filter by.event_name(string, optional): Name of the change event to filter by (use available_event_names to see valid values). Returns:available_event_names: List of all available event types that can be used for filteringchange_events: Array of timeseries data with metric labels and timestamp-value pairscount: Total number of change events returnedtime_range: Start and end time of the query window Each change event includes:metric: Map of metric labels (service_name, env, event_type, message, etc.)values: Array of timestamp-value pairs representing the timeseries data Common event types include: deployment, config_change, rollback, scale_up/scale_down, restart, upgrade/downgrade, maintenance, backup/restore, health_check, certificate, database. Best practices:
- First call without event_name to get available_event_names
- Use exact event name from available_event_names for the event_name parameter
- Combine with other filters (service, environment, time) for precise results
Configuration
Managed HTTP transport (recommended)
Set this header in your MCP client config:
X-LAST9-API-TOKEN: Bearer token for Last9 API access.
Local STDIO server environment variables
If you run the server locally (last9-mcp), use these environment variables:
LAST9_REFRESH_TOKEN: (required) Refresh Token with Write permissions from API Access. Only admins can create refresh tokens.
Optional environment variables:
LAST9_DISABLE_TELEMETRY: Defaults totrue(telemetry is disabled by default). Set tofalseto enable OpenTelemetry tracing if you have an OTLP collector configured.OTEL_EXPORTER_OTLP_ENDPOINT: OpenTelemetry collector endpoint URL. Only needed ifLAST9_DISABLE_TELEMETRY=false.OTEL_EXPORTER_OTLP_HEADERS: Headers for OTLP exporter authentication. Only needed ifLAST9_DISABLE_TELEMETRY=false.LAST9_DATASOURCE: Name of the datasource/cluster to use. If not specified, the default datasource configured in your Last9 organization will be used.LAST9_API_HOST: API host to connect to. Defaults toapp.last9.io. Use this if you need to connect to a different Last9 endpoint (e.g., regional or self-hosted instances).
Usage
Use the managed HTTP transport config from Installation whenever possible. The examples below are for local STDIO setup via Homebrew or NPM.
Usage with Claude Desktop
Configure the Claude app to use the MCP server:
- Open the Claude Desktop app, go to Settings, then Developer
- Click Edit Config
- Open the
claude_desktop_config.jsonfile - Copy and paste the server config to your existing file, then save
- Restart Claude
Hosted MCP over HTTP (recommended)
No local binary needed. Use a Client Token (MCP type):
{
"mcpServers": {
"last9": {
"type": "http",
"url": "https://app.last9.io/api/v4/organizations/<org_slug>/mcp",
"headers": {
"X-LAST9-API-TOKEN": "Bearer <mcp_client_token>"
}
}
}
}
Or via the Claude Code CLI:
claude mcp add --transport http last9 https://app.last9.io/api/v4/organizations/<org_slug>/mcp \
--header "X-LAST9-API-TOKEN: Bearer <mcp_client_token>"
Local STDIO (alternative)
Install via Homebrew or NPM first, then use a Refresh Token.
If installed via Homebrew:
{
"mcpServers": {
"last9": {
"command": "/opt/homebrew/bin/last9-mcp",
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
If installed via NPM:
{
"mcpServers": {
"last9": {
"command": "npx",
"args": ["-y", "@last9/mcp-server@latest"],
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
Usage with Cursor
Configure Cursor to use the MCP server:
- Open Cursor, go to Settings, then Cursor Settings
- Select MCP on the left
- Click Add "New Global MCP Server" at the top right
- Copy and paste the server config to your existing file, then save
- Restart Cursor
Hosted MCP over HTTP (recommended)
{
"mcpServers": {
"last9": {
"type": "http",
"url": "https://app.last9.io/api/v4/organizations/<org_slug>/mcp",
"headers": {
"X-LAST9-API-TOKEN": "Bearer <mcp_client_token>"
}
}
}
}
Local STDIO (alternative)
If installed via Homebrew:
{
"mcpServers": {
"last9": {
"command": "/opt/homebrew/bin/last9-mcp",
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
If installed via NPM:
{
"mcpServers": {
"last9": {
"command": "npx",
"args": ["-y", "@last9/mcp-server@latest"],
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
Usage with Windsurf
Configure Windsurf to use the MCP server:
- Open Windsurf, go to Settings, then Developer
- Click Edit Config
- Open the
windsurf_config.jsonfile - Copy and paste the server config to your existing file, then save
- Restart Windsurf
Hosted MCP over HTTP (recommended)
{
"mcpServers": {
"last9": {
"type": "http",
"url": "https://app.last9.io/api/v4/organizations/<org_slug>/mcp",
"headers": {
"X-LAST9-API-TOKEN": "Bearer <mcp_client_token>"
}
}
}
}
Local STDIO (alternative)
If installed via Homebrew:
{
"mcpServers": {
"last9": {
"command": "/opt/homebrew/bin/last9-mcp",
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
If installed via NPM:
{
"mcpServers": {
"last9": {
"command": "npx",
"args": ["-y", "@last9/mcp-server@latest"],
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
Usage with VS Code
Note: MCP support in VS Code is available starting v1.99 and is currently in preview. For advanced configuration options and alternative setup methods, view the VS Code MCP documentation.
- Open VS Code, go to Settings, select the User tab, then Features, then Chat
- Click "Edit settings.json"
- Copy and paste the server config to your existing file, then save
- Restart VS Code
Hosted MCP over HTTP (recommended)
{
"mcp": {
"servers": {
"last9": {
"type": "http",
"url": "https://app.last9.io/api/v4/organizations/<org_slug>/mcp",
"headers": {
"X-LAST9-API-TOKEN": "Bearer <mcp_client_token>"
}
}
}
}
}
Local STDIO (alternative)
If installed via Homebrew:
{
"mcp": {
"servers": {
"last9": {
"type": "stdio",
"command": "/opt/homebrew/bin/last9-mcp",
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
}
If installed via NPM:
{
"mcp": {
"servers": {
"last9": {
"type": "stdio",
"command": "npx",
"args": ["-y", "@last9/mcp-server@latest"],
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
}
Windows Example (Claude Desktop)
After downloading last9-mcp-server_Windows_x86_64.zip from GitHub Releases, extract to get last9-mcp-server.exe and use its full path:
{
"mcpServers": {
"last9": {
"command": "C:\\Users\\<user>\\AppData\\Local\\Programs\\last9-mcp-server.exe",
"env": {
"LAST9_REFRESH_TOKEN": "<last9_refresh_token>"
}
}
}
}
The same pattern applies for Cursor and Windsurf on Windows. For VS Code, use the "mcp": { "servers": { ... } } wrapper. On Windows, prefer NPM to avoid path management, or use the hosted HTTP transport to skip local installation entirely.
Development
For local development and testing, you can run the MCP server in HTTP mode which makes it easier to debug requests and responses.
Running in HTTP Mode
Set the LAST9_HTTP environment variable to enable HTTP server mode:
# Export required environment variables
export LAST9_REFRESH_TOKEN="your_refresh_token"
export LAST9_HTTP=true
export LAST9_PORT=8080 # Optional, defaults to 8080
# Run the server
./last9-mcp-server
The server will start on http://localhost:8080/mcp and you can test it with curl:
Testing with curl
The MCP Streamable HTTP protocol requires an initialize handshake first. The server creates and returns a session ID in the response — do not set Mcp-Session-Id on the first request.
# Step 1: Initialize — omit Mcp-Session-Id so the server creates the session.
# Extract the returned Mcp-Session-Id from the response headers.
SESSION_ID=$(curl -si -X POST http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "initialize",
"params": {
"protocolVersion": "2024-11-05",
"capabilities": {},
"clientInfo": {"name": "curl-test", "version": "1.0"}
}
}' | grep -i "^Mcp-Session-Id:" | awk '{print $2}' | tr -d '\r')
echo "Session: $SESSION_ID"
# Step 2: Send the initialized notification
curl -s -X POST http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-H "Mcp-Session-Id: $SESSION_ID" \
-d '{"jsonrpc": "2.0", "method": "notifications/initialized", "params": {}}'
# Step 3: List available tools
curl -s -X POST http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-H "Mcp-Session-Id: $SESSION_ID" \
-d '{"jsonrpc": "2.0", "id": 2, "method": "tools/list", "params": {}}'
# Step 4: Call a tool
curl -s -X POST http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-H "Mcp-Session-Id: $SESSION_ID" \
-d '{
"jsonrpc": "2.0",
"id": 3,
"method": "tools/call",
"params": {
"name": "get_service_logs",
"arguments": {
"service_name": "your-service-name",
"lookback_minutes": 30,
"limit": 10
}
}
}'
Building from Source
# Clone the repository
git clone https://github.com/last9/last9-mcp-server.git
cd last9-mcp-server
# Build the binary
go build -o last9-mcp-server
# Run in development mode
LAST9_HTTP=true ./last9-mcp-server
Note: LAST9_HTTP=true is for local development and debugging of your own server process. For normal client integration, prefer the managed HTTP endpoint from Installation.
Testing
See TESTING.md for detailed testing instructions.
Badges
Related Servers
Scout Monitoring MCP
sponsorPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
sponsorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
Remote MCP Server on Cloudflare
A template for deploying a remote MCP server on Cloudflare Workers, customizable by defining tools in the source code.
Codesys-mcp-toolkit
A Model Context Protocol (MCP) server for CODESYS V3 programming environments.
xcsimctl
Manage Xcode simulators.
MCP Server
Automate data science stages using your own CSV data files.
MicroShift Test Analyzer
Analyzes MicroShift test failures from Google Sheets to correlate them with specific MicroShift versions.
OpsLevel
Interact with your OpsLevel account using read-only access.
MCP Tree-sitter Server
A server for code analysis using Tree-sitter, with context management capabilities.
MCP System Monitor Server
A cross-platform server for real-time monitoring of CPU, GPU, memory, disk, network, and process information.
Valyu
Access Valyu's knowledge retrieval and feedback APIs.
Mobile Xray MCP
Take screenshots and analyze mobile apps with AI assistance directly from your IDE.
