dynatrace-mcp
Verified Safeby dynatrace-oss
Overview
The server integrates Dynatrace observability with AI assistants, enabling real-time data access, incident investigation, security analysis, and DevOps automation in development workflows.
Installation
npx -y @dynatrace-oss/dynatrace-mcp-server@latestEnvironment Variables
- DT_ENVIRONMENT
- DT_PLATFORM_TOKEN
- OAUTH_CLIENT_ID
- OAUTH_CLIENT_SECRET
- DT_GRAIL_QUERY_BUDGET_GB
- SLACK_CONNECTION_ID
- HTTPS_PROXY
- HTTP_PROXY
- NO_PROXY
- DT_MCP_DISABLE_TELEMETRY
Security Notes
The server implements robust OAuth 2.0 flows (Client Credentials and Authorization Code with PKCE) for secure authentication with Dynatrace. It explicitly avoids persisting OAuth tokens to disk, enhancing security. Sensitive operations like sending emails, Slack messages, or modifying workflows require explicit human approval, significantly mitigating risks of automated unintended actions. All Dynatrace environment URLs are validated to prevent connections to arbitrary external domains. Telemetry is implemented with anonymized data and can be disabled. No 'eval' or obvious malicious code patterns were found. A minor consideration is the hardcoded default client ID for the interactive OAuth flow, which is acceptable for a public client but worth noting.
Similar Servers
mcp-grafana
Provides a Model Context Protocol (MCP) server to access Grafana instances and its ecosystem for observability and incident management tasks.
mcp-server
Facilitate AI assistants to inspect, query, and diagnose problems within an Octopus Deploy instance by exposing its API via Model Context Protocol (MCP).
opentelemetry-mcp-server
Connects AI assistants to OpenTelemetry trace backends for analyzing LLM traces with AI assistance.
mcp-server-atlassian-confluence
Enables AI assistants to interact with Atlassian Confluence for knowledge retrieval, search, and content management.